Wednesday, May 20, 2020

3.0 IPsec and the IETF

In this section, we return to the original question about rekeying that sparked this whole venture, and answer three questions:

  1. What are the technical mechanisms in place for rekeying and effective use of encryption in the Internet standard security protocol IPsec?
  2. What was known, at the time these protocols were developed, about the best practices for rekeying?
  3. What are best practices today?

No comments: