[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Bellovin's attack and others like it





It look like there are two approaches out there, using a UDP
port for key management, or having separate layers for key mgmt
vs. data packets.

I'd like to see a constructive discussion of the tradeoffs using
each technique from Pau-Chen, Hilarie and others. Then, I think
that some recommendation, or at least suggestions should go into
the key management documents.

Avi

***********************************************************************
Aviel D. Rubin                         Email: rubin@faline.bellcore.com
Bellcore  (MRE-2M354)   ftp://thumper.bellcore.com/pub/rubin/rubin.html 
445 South St.
Morristown,  NJ  07960                       Voice: +1 201 829 4105
USA                                          FAX:   +1 201 829 5889
 


Follow-Ups: References: