Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English.The Security Considerations sections of many Internet Drafts say, in effect, "just use IPsec".While this is sometimes correct, more often it will leave users without real, interoperable security mechanisms.
Copyright (c) 2009 IETF Trust and the persons identified as the document authors. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents in effect on the date of publication of this document (
Please review these documents carefully, as they describe your rights and restrictions with respect to this document.
This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008.
The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process.
While the use of IPsec is sometimes the correct security solution, more information is needed to provide interoperable security solutions.
In some cases, IPsec is unavailable in the likely endpoints.
If IPsec is unavailable to -- and hence unusable by -- a majority of the users in a particular protocol environment, then the specification of IPsec is tantamount to saying "turn off security" within this community.
Further, when IPsec is available, the implementation may not provide the proper granularity of protection.
Finally, if IPsec is available and appropriate, the document mandating the use of IPsec needs to specify just how it is to be used.
The goal of this document is to provide guidance to protocol designers on the specification of IPsec when it is the appropriate security mechanism.
The protocol specification is expected to provide realistic, interoperable security.