I-D Action: draft-kuehlewind-taps-crypto-sep-02.txt
internet-drafts@ietf.org Mon, 05 March 2018 16:50 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: i-d-announce@ietf.org
Delivered-To: i-d-announce@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 6EFE712895E for <i-d-announce@ietf.org>; Mon, 5 Mar 2018 08:50:52 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-kuehlewind-taps-crypto-sep-02.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 6.74.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <152026865242.14648.16373743255441102493@ietfa.amsl.com>
Date: Mon, 05 Mar 2018 08:50:52 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/i-d-announce/Wr4PQKD0k3_wdgijMaVd9N4k1eA>
X-BeenThere: i-d-announce@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Internet Draft Announcements only <i-d-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i-d-announce/>
List-Post: <mailto:i-d-announce@ietf.org>
List-Help: <mailto:i-d-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Mar 2018 16:50:52 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories. Title : Separating Crypto Negotiation and Communication Authors : Mirja Kuehlewind Tommy Pauly Christopher A. Wood Filename : draft-kuehlewind-taps-crypto-sep-02.txt Pages : 12 Date : 2018-03-05 Abstract: Secure transport protocols often consist of three logically distinct components: transport, control (handshake), and record protection. Typically, such a protocol contains a single module that is responsible for all three functions. However, in many cases, this coupling is unnecessary. For example, while cryptographic context and endpoint capabilities need to be known before encrypted application data can be sent on a specific transport connection, there is otherwise no technical constraint that a cryptographic handshake must be performed on said connection. This document recommends a logical separation between transport, control, and record components of secure transport protocols. We compare existing protocols such as Transport Layer Security, QUIC, and IKEv2+ESP in the context of this logical separation. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-kuehlewind-taps-crypto-sep/ There are also htmlized versions available at: https://tools.ietf.org/html/draft-kuehlewind-taps-crypto-sep-02 https://datatracker.ietf.org/doc/html/draft-kuehlewind-taps-crypto-sep-02 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-kuehlewind-taps-crypto-sep-02 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/
- I-D Action: draft-kuehlewind-taps-crypto-sep-02.t… internet-drafts