Protocol Action: 'Softwire Security Analysis and Requirements' to Proposed Standard

The IESG <iesg-secretary@ietf.org> Mon, 29 June 2009 16:28 UTC

Return-Path: <wwwrun@core3.amsl.com>
X-Original-To: ietf-announce@ietf.org
Delivered-To: ietf-announce@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 30) id 9EF0B28C27B; Mon, 29 Jun 2009 09:28:41 -0700 (PDT)
X-idtracker: yes
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: Protocol Action: 'Softwire Security Analysis and Requirements' to Proposed Standard
Message-Id: <20090629162841.9EF0B28C27B@core3.amsl.com>
Date: Mon, 29 Jun 2009 09:28:41 -0700
Cc: softwire mailing list <softwires@ietf.org>, Internet Architecture Board <iab@iab.org>, softwire chair <softwire-chairs@tools.ietf.org>, RFC Editor <rfc-editor@rfc-editor.org>
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-announce>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jun 2009 16:28:41 -0000

The IESG has approved the following document:

- 'Softwire Security Analysis and Requirements '
   <draft-ietf-softwire-security-requirements-09.txt> as a Proposed Standard

This document is the product of the Softwires Working Group. 

The IESG contact persons are Ralph Droms and Jari Arkko.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-softwire-security-requirements-09.txt

Technical Summary

This document describes the security guidelines for the softwire
"Hubs and Spokes" and "Mesh" solutions. Together with the discussion of
the softwire deployment scenarios, the vulnerability to the security
attacks is analyzed to provide the security protection mechanism such as
authentication, integrity and confidentiality to the softwire
control and data packets.

Working Group Summary

The SOFTWIRE WG supports the development and advancement of this
document.

Protocol Quality

This document was thoroughly reviewed by WG chairs and WG members,
including those with expertise in security, IPv4 to IPv6
transitions and interworking.