This paper is relevant to the discussion : http://www.iiss.oeaw.ac.at/files/pub/2010-ISPCS-Securing-IEEE1588-by-IPsec_tunnels-An-Analysis.pdf
I remember another paper, but can't find it right now. Y(J)S
_______________________________________________ TICTOC mailing list [email protected] https://www.ietf.org/mailman/listinfo/tictoc
