Yaron Sheffer writes:
- Sec. 5. In the definition of IPsec flows, how is this done for (typically
tunnel mode) UDP-encapsulated ESP? Are port numbers part of the flow
definition? This text belongs either here or in Sec. 8.
Adding port numbers as part of the flow table might make some extra
Hi everyone,
As a general comment, this document got me thinking whether pseudo-code can
be made amenable to some minimal level of validation. For example, there is
so much code here that I could never be sure that all gotos are
referencing valid labels. If any member of this list is a aware