[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Bellovin's and Ashar's attacks




Dan Nessett says:
> Your clarification that :
> 
> >  As an aside, one of the things I've not been good about making clear
> >  in my notes is that my interest in user-oriented keying has much to do
> >  with the use of ESP as a transport-layer encryptor.
> 
> raises a question in my mind. I'm not sure how an ESP protected
> packet can be demultiplexed by the IP layer, so it can be routed to
> the appropriate transport layer code, without first decrypting
> it.

It can't. You decrypt it first and then pass it along with information
to the transport that indicates what the transform that had been used
for the encapsulation was before you unencapsulated the packet.

Perry


References: