Attacking the IPsec Standards in Encryption-only Configurations