1 \subsection{005: routing below tunnel layer to support mobility and multi-homing}
5 \subsubsection{005: Definition of requirement }
7 Ciphertext packets should be treated like all other packets, and should be
8 subject to normal routing proceedures.
10 \subsubsection{005: Response}
12 Implementation of MAST devices and packet escalator should accomplish this.
14 This is a critical piece for reliability of opportunistic encryption, as
15 current routing tricks cause plaintext packets to blackhole after a physical