[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: How to authenticate ESP (was risks of MACs)




Phil Karn says:
> If you wanted an entity that could verify the authenticity of a packet
> without being able to read the contents, wouldn't it make more sense
> to run two nested IPSP associations, one for encryption that runs
> end-to-end and another for authentication only that runs, e.g, between
> two routers?

Of course -- but thats a different problem. I'm just trying to define
transforms for combining authentication and encryption from one
endpoint to the other.

Perry


References: