[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Bellovin's attack and others like it




Aviel D Rubin says:
> Now, I have a totally different question. At the IETF in
> Danvers, I asked many people that are implementing key
> management, how do you do key management over IP when your
> policy indicates that all IP traffic must be encrypted?
> The answer I got from everyone is that you somehow mark
> the key management packets so that they are allowed. Doesn't
> that violate the independence of the layers in the network?

In my implementation, which permits per socket keying, the layers
already have enhanced communication on such matters -- this is NOT the
same as violating layering.

.pm


References: