Jan Vilhuber wrote: > > Cheryl tried to put together a requirements/scenario > document. You can find it here. > > http://www.ietf.org/internet-drafts/draft-ietf-ipsec-sonofike-rqts-00.txt > > It tries to list all scenarios we could think of. You missed opportunistic encryption: http://www.ietf.org/internet-drafts/draft-richardson-ipsec-opportunistic-09.txt