I-D Action: draft-seitz-ace-design-considerations-00.txt

internet-drafts@ietf.org Fri, 14 February 2014 17:59 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: i-d-announce@ietfa.amsl.com
Delivered-To: i-d-announce@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB9521A0358 for <i-d-announce@ietfa.amsl.com>; Fri, 14 Feb 2014 09:59:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iyQ8Pm6OknM6 for <i-d-announce@ietfa.amsl.com>; Fri, 14 Feb 2014 09:59:50 -0800 (PST)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 96AD81A02CF for <i-d-announce@ietf.org>; Fri, 14 Feb 2014 09:59:49 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-seitz-ace-design-considerations-00.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 5.0.0.p1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20140214175949.3190.46486.idtracker@ietfa.amsl.com>
Date: Fri, 14 Feb 2014 09:59:49 -0800
Archived-At: http://mailarchive.ietf.org/arch/msg/i-d-announce/uNHjsIbNhbLq4MzZ1C9KLE8-rfQ
X-BeenThere: i-d-announce@ietf.org
X-Mailman-Version: 2.1.15
Reply-To: internet-drafts@ietf.org
List-Id: Internet Draft Announcements only <i-d-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i-d-announce/>
List-Post: <mailto:i-d-announce@ietf.org>
List-Help: <mailto:i-d-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2014 17:59:58 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.


        Title           : Design Considerations for Security Protocols in Constrained Environments
        Authors         : Ludwig Seitz
                          Goeran Selander
	Filename        : draft-seitz-ace-design-considerations-00.txt
	Pages           : 14
	Date            : 2014-02-14

Abstract:
   Considerable effort has been spent on securing existing Internet
   standard authentication and authorization protocols such as TLS,
   Kerberos, and OAuth, among others. It would save a lot of effort if
   these protocols could be profiled to be feasible for constrained
   environments, with some easily obtainable security considerations.

   However, these protocols were typically not designed with constrained
   environments in mind, so profiling of an existing protocol may result
   in a far from optimal solution. Moreover they are not necessarily
   complying with their original design objectives outside their
   intended domain of application.

   This document examines the impact of typical characteristics of
   security protocols (e.g. cryptographic calculations, number and size
   of protocol messages) in a constrained environment.  The goal is to
   provide decision support when different resource usage optimizations
   are possible in the adaptation of a security protocol for this
   setting.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-seitz-ace-design-considerations/

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-seitz-ace-design-considerations-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/