[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Proposed changes to ESP (andf a little AH too)



At 04:12 PM 3/21/97 -0500, Theodore Y. Ts'o wrote:
>
>In the case of using ESP to create VPN's through security gateways, the
>threat of traffic analysis doesn't really apply, since the authenticated
>destination will always be the other security gateway.  Indeed, the
>traffic analysis threat isn't important if we're doing host keying for
>the same reason --- the low level, unauthenticated address allows for
>traffic analysis anyway.
>
>The only place where traffic analysis would matter would be if we did
>user-based keying, and we have multiple users using the same host, in a
>time-sharing fashion.  

Ah, but you missed the case where the SA was built from the identity of the
system behind the gateway.  This is not user-based keying, but key proxing.


Robert Moskowitz
Chrysler Corporation
(810) 758-8212



References: