Works for me too!

Cheers, Manav 

> -----Original Message-----
> From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] 
> On Behalf Of Grewal, Ken
> Sent: Tuesday, August 18, 2009 10.03 PM
> To: Yaron Sheffer; ipsec@ietf.org
> Subject: Re: [IPsec] Relating the two ESP-null documents
> 
> Works for me!
> 
> Thanks, 
> - Ken
>  
> 
> >-----Original Message-----
> >From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] 
> On Behalf
> >Of Yaron Sheffer
> >Sent: Tuesday, August 11, 2009 6:04 AM
> >To: ipsec@ietf.org
> >Subject: [IPsec] Relating the two ESP-null documents
> >
> >Hi,
> >
> >As we near publication of the WESP and Heuristics drafts, 
> we'd like to
> >make
> >sure that the WG consensus is clearly expressed in both 
> documents. So we
> >propose to include the following note as a section in both documents.
> >Please
> >let us know if this works for you:
> >
> >-- begin text
> >
> >Applicability: Heuristic Traffic Inspection and Wrapped ESP
> >-----------------------------------------------------------
> >
> >There are two ways to enable intermediate security devices to
> >distinguish
> >between encrypted and unencrypted ESP traffic:
> >
> >- The heuristics approach [heuristics I-D] has the intermediate node
> >inspect
> >the unchanged ESP traffic, to determine with extremely high 
> probability
> >whether or not the traffic stream is encrypted.
> >
> >- The Wrapped ESP approach [WESP I-D], in contrast, requires the ESP
> >endpoints to be modified to support the new protocol. WESP allows the
> >intermediate node to distinguish encrypted and unencrypted traffic
> >deterministically, using a simpler implementation for the 
> intermediate
> >node.
> >
> >Both approaches are being documented simultaneously by the IPsecME
> >Working
> >Group, with WESP being put on Standards Track while the heuristics
> >approach
> >is being published as an Informational RFC. While endpoints are being
> >modified to adopt WESP, we expect both approaches to coexist 
> for years,
> >because the heuristic approach is needed to inspect traffic where at
> >least
> >one of the endpoints has not been modified. In other words, 
> intermediate
> >nodes are expected to support both approaches in order to 
> achieve good
> >security and performance during the transition period.
> >
> >-- end text
> >
> >[Note: both references are non-normative.]
> >
> >Currently both documents have direct or indirect references to one
> >another,
> >but they are not exactly in line with the consensus we have 
> reached. In
> >both
> >cases the emphasis is on the two solutions competing with 
> one another,
> >rather than complementing each other.
> >
> >Thanks,
> >     Yaron
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
> 
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to