[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: IPsec and RSVP
Derek Atkins writes:
> "Hannes Tschofenig" <Hannes.Tschofenig@mchp.siemens.de> writes:
>
> > hi
> >
> > what speaks against applying ipsec hop-by-hop (whereby a hop is a rsvp
> > capable router)?
>
> You lose the authentication of the end-point requesting the
> reservation. If you use ipsec in this way, then each router
> knows its peer, but you have no transitive authentication.
> The only protection you get is protection of on-the-wire
> request. You have no protection against a corrupt router
> along the path, or indeed no way to know what the actual
> original request was.
Derek,
There are two different forms of crypto needed for
RSVP: a hop-by-hop integrity object and a policy
object. IPsec could in theory replace the
integrity object, but cannot replace the policy
object. Considering that there is no key
distribution for the hop-by-hop integrity objects,
IPsec might not be a bad choice in some
situations.
Mike
- References:
- RE:
- From: "Hannes Tschofenig" <Hannes.Tschofenig@mchp.siemens.de>
- Re: IPsec and RSVP
- From: Derek Atkins <derek@ihtfp.com>