[e2e] where to put endpoint authentication?

RJ Atkinson rja at extremenetworks.com
Mon May 10 13:27:00 PDT 2004


On May 10, 2004, at 14:09, Joe Touch wrote:
> HIP (IMO) appears similar to IPsec in the protection it provides (i.e.,
> network layer), and is very similar to IPsec tunnel mode in how 
> endpoint
> ID is somewhat decoupled from forwarding ID (like E2E tunnels, the
> endpoint needs to 'route' based on these endpoint IDs, though).

"similar" was a good choice of wording above.  My perception is that
the set of protections provided with HIP is not identical with those
provided by ESP/AH.  Maybe I am just confused about how HIP works.

Ran



More information about the end2end-interest mailing list