Hi Dan

I agree with you regarding some of the proposals that have been floating around 
re: exposing bits and pieces of encrypted data.

I disagree though that WESP should not be used for encrypted data:

- It is simpler for implementations and architecturally cleaner for WESP to 
support both flavors.
- WESP provides for (secure) extensibility, which unfortunately we have not had 
with ESP. Indeed we should be wise about picking such extensions.

Thanks,
        Yaron

-----Original Message-----
From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Dan 
McDonald
Sent: Thursday, December 17, 2009 4:35
To: Russ Housley
Cc: ipsec@ietf.org; i...@ietf.org
Subject: Re: [IPsec] DISCUSS: draft-ietf-ipsecme-traffic-visibility

On Wed, Dec 16, 2009 at 02:59:45PM -0800, Russ Housley wrote:

<SNIP!>

>   The document allows the encapsulation of encrypted IPsec traffic.
>   Why?  I cannot see the justification for the use if WESP at all if
>   the IPsec traffic is encrypted.

<tin-foil-hat>
        Because THE MAN told 'em to do it!
</tin-foil-hat>

:)

Seriously though, I agree with Russ -- it makes little to no sense to expose
privacy-protected fields.  If you're worried about traffic shaping, just put
all ESP/WESP/whatever packets in the lowest priority bucket.  Any other
reason that springs to mind simply defeats the purpose of privacy-protection.

Dan
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Scanned by Check Point Total Security Gateway.
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to