inline...

On Mon, Nov 16, 2009 at 8:39 AM, Stephen Kent <k...@bbn.com> wrote:

--snip--


> I am not suggesting that any aspect of your analysis is flawed. I am
> suggesting that before the WG chooses to further deprecate AH, it needs to
> document the analysis supporting this decision, not just cite a couple of
> examples and make general statements in support of such an action.
>

WESP implementations need to occur, be deployed, and have some time in
operational networks. It would benefit the standards process to get some
feedback from the operational community once this has happened. Whether or
not we call it "experimental", we need to try out the WESP mechanism, in
parallel with the heuristics method, in the wild and see what comes of
them.

We need not be shy about WESP's existence and benefits. I agree we ought to
go on a bit of an intra-IETF "road show" and get the word to other Areas and
WG's about WESP as compared to AH, and see what feedback we get. This can
only help the standards process. In this context, Steve's suggestion for a
an analysis document would be very helpful. Much of the arguments made in
this thread would be excellently housed in said document.

After some time in the wild, If we observe signs that WESP is operationally
replacing AH, then we could seriously discuss deprecating AH.

HTH,
Gregory.


>
> Steve
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>



-- 
----
IETF related email from
Gregory M. Lebovitz
Juniper Networks
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to