Document Action: 'Use of TESLA in the ALC and NORM Protocols' to Experimental RFC
The IESG <iesg-secretary@ietf.org> Sun, 08 November 2009 04:40 UTC
Return-Path: <wwwrun@core3.amsl.com>
X-Original-To: ietf-announce@ietf.org
Delivered-To: ietf-announce@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 30) id 96FB53A68FA; Sat, 7 Nov 2009 20:40:53 -0800 (PST)
X-idtracker: yes
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: Document Action: 'Use of TESLA in the ALC and NORM Protocols' to Experimental RFC
Message-Id: <20091108044053.96FB53A68FA@core3.amsl.com>
Date: Sat, 07 Nov 2009 20:40:53 -0800
Cc: msec mailing list <msec@ietf.org>, msec chair <msec-chairs@tools.ietf.org>, Internet Architecture Board <iab@iab.org>, RFC Editor <rfc-editor@rfc-editor.org>
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-announce>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Nov 2009 04:40:53 -0000
The IESG has approved the following document: - 'Use of TESLA in the ALC and NORM Protocols ' <draft-ietf-msec-tesla-for-alc-norm-10.txt> as an Experimental RFC This document is the product of the Multicast Security Working Group. The IESG contact persons are Tim Polk and Pasi Eronen. A URL of this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-msec-tesla-for-alc-norm-10.txt Technical Summary This document describes how to use the TESLA Multicast Source Authentication Transform (RFC 4082) in a packet source authentication and packet integrity verification protocol within the ALC and NORM content delivery protocols. In other words, the TESLA method allows ALC and NORM receivers to verify that the sender identified as sending the ALC or NORM packet actually originated the packet. TELSA is a well-known algorithm for integrity protecting single-source multicast packet streams. Working Group Summary This I-D was discussed on the MSEC WG mailing list, in particular during the WG last call period. Comments were received, and two additional versions of the I-D were generated by the authors. The WG had no further comments on the document. Document Quality The TESLA portions of the document was reviewed in detail by an implementor of TESLA, and his comments are adequately addressed. It was also reviewed in detail by a security protocol implementer, who felt it was implementable. Personnel Brian Weis is the Document Shepherd; Tim Polk is the Responsible Area Director.