I-D Action: draft-kuehlewind-taps-crypto-sep-01.txt
internet-drafts@ietf.org Mon, 30 October 2017 23:32 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: i-d-announce@ietf.org
Delivered-To: i-d-announce@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 313D0CAC6 for <i-d-announce@ietf.org>; Mon, 30 Oct 2017 16:32:45 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-kuehlewind-taps-crypto-sep-01.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 6.63.2
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <150940636516.28302.17842903886435583956@ietfa.amsl.com>
Date: Mon, 30 Oct 2017 16:32:45 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/i-d-announce/zwrqkHhxKF6ut9Xgq-WQqOjwITM>
X-BeenThere: i-d-announce@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Internet Draft Announcements only <i-d-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i-d-announce/>
List-Post: <mailto:i-d-announce@ietf.org>
List-Help: <mailto:i-d-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 Oct 2017 23:32:45 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories. Title : Separating Crypto Negotiation and Communication Authors : Mirja Kuehlewind Tommy Pauly Christopher A. Wood Filename : draft-kuehlewind-taps-crypto-sep-01.txt Pages : 12 Date : 2017-10-30 Abstract: Secure transport protocols often consist of three logically distinct components: transport, control (handshake), and record protection. Typically, such a protocol contains a single module that is responsible for all three functions. However, in many cases, this coupling is unnecessary. For example, while cryptographic context and endpoint capabilities need to be known before encrypted application data can be sent on a specific transport connection, there is otherwise no technical constraint that a cryptographic handshake must be performed on said connection. This document recommends a logical separation between transport, control, and record components of secure transport protocols. We compare existing protocols such as Transport Layer Security, QUIC, and IKEv2+ESP in the context of this logical separation. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-kuehlewind-taps-crypto-sep/ There are also htmlized versions available at: https://tools.ietf.org/html/draft-kuehlewind-taps-crypto-sep-01 https://datatracker.ietf.org/doc/html/draft-kuehlewind-taps-crypto-sep-01 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-kuehlewind-taps-crypto-sep-01 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/
- I-D Action: draft-kuehlewind-taps-crypto-sep-01.t… internet-drafts