On 14.01.25 20:41, Soni "It/Its" L. wrote:
> we've been looking at various ipsec RFCs, mailing list discussions, 
> deployments, etc, and the protocol looks very neat, this "transport 
> mode" stuff looks really useful, but we see no way for an app to use it.
> 
> we would like to propose a small experiment which we would call "ipsec 
> address families". rather than using ipv4 or ipv6 address families and 
> letting the os quietly use ipsec but only if configured by the admin, 
> the application would open a socket explicitly for ipsec, either on ipv4 
> or ipv6, and then give it public key material (for connect) or private 
> key material (for listen) and then the application can enforce ipsec 
> instead.
> 
> we don't propose any further changes to any other apis, for now. these 
> changes would only impact calls to socket, bind, and connect. depending 
> on how this goes, we can then discuss the implications for other parts 
> of the network stack.
> 
> thoughts? would anyone be interested in this idea? we really wanna be 
> able to use ipsec in end-user applications...

FWIW, Android's IpSecManager API [1] works kinda like that (protecting
individual sockets via a transport mode IPsec SA).  It does not include
IKE, so the key exchange and transform negotiation etc. is up to the
application.

Regards,
Tobias

[1] https://developer.android.com/reference/android/net/IpSecManager

_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to