[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Bellovin's attack and others like it
It look like there are two approaches out there, using a UDP
port for key management, or having separate layers for key mgmt
vs. data packets.
I'd like to see a constructive discussion of the tradeoffs using
each technique from Pau-Chen, Hilarie and others. Then, I think
that some recommendation, or at least suggestions should go into
the key management documents.
Avi
***********************************************************************
Aviel D. Rubin Email: rubin@faline.bellcore.com
Bellcore (MRE-2M354) ftp://thumper.bellcore.com/pub/rubin/rubin.html
445 South St.
Morristown, NJ 07960 Voice: +1 201 829 4105
USA FAX: +1 201 829 5889
Follow-Ups:
References: