Heuristics for Detecting ESP-NULL packets
draft-kivinen-ipsecme-esp-null-heuristics-00

 
Document Type Replaced Internet-Draft (individual)
Last updated 2009-05-26 (latest revision 2009-01-22)
Replaced by draft-ietf-ipsecme-esp-null-heuristics
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html
Stream Stream state (No stream defined)
Document shepherd No shepherd assigned
IESG IESG state Replaced by draft-ietf-ipsecme-esp-null-heuristics
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-kivinen-ipsecme-esp-null-heuristics-00.txt

Abstract

This document describes a heuristic approach for distinguishing ESP- NULL (Encapsulating Security Payload without encryption) packets from encrypted ESP packets. The reason for using heuristics instead of modifying ESP is to provide a solution that can be used now without updating all end nodes. With heuristic methods, only the intermediate devices wanting to find ESP-NULL packets need to be updated.

Authors

Tero Kivinen (kivinen@safenet-inc.com)
Daniel McDonald (danmcd@sun.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)