[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: IPSEC WORKING GROUP LAST CALL



> >> Here I think we differ on what the secure IP network model should be.
> >> I believe that it should be a resource owned by an organization or a
> >> company that wants to control access to it...
> >If keys are established over the public network, then AFAIK
> >only PK methods can assure forward secrecy of prior established 
> >keys when the authenticating key is compromised.
> 
> ...My contention is that for 
> model explained above that this feature is unnecessary.

Whether or not it is true, this statement is uninteresting, because many
would-be users of IPSEC do not fit your model.  I could, with equal
validity, claim that IPSEC itself is unnecessary because a model in which
the network is physically secure does not need encryption at all.

                                                      Henry Spencer
                                             henry%spenford@zoo.toronto.edu





References: