[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Last Call: Security Architecture for the Internet Protocol to



One of the biggest reasons we have AH is because there _are_ some things
in the middle of the "IP header" that need to be authenticated for them to be
simultaneously safe and useful.  The biggest example of this is source
routing.

I'll admit that I've never been in the operations business, but I've been
told that source routing is a very useful tool for diagnosing some classes of
problems.  AH allows source routing to be useful again w/o opening the holes
it opens.

--
Daniel L. McDonald  -  Solaris Internet Engineering  ||  MY OPINIONS ARE NOT
Mail: danmcd@eng       MS UMPK17-202                 ||  NOT NECESSARILY SUN'S!
Extension:  x86815               |"rising falling at force ten
WWW: http://jurassic.eng/~danmcd | we twist the world and ride the wind" - Rush


References: