Re: [IPsec] Proposed document list for ipsecme

Paul Hoffman <paul.hoffman@vpnc.org> Tue, 08 July 2008 19:16 UTC

Return-Path: <ipsec-bounces@ietf.org>
X-Original-To: ipsec-archive@megatron.ietf.org
Delivered-To: ietfarch-ipsec-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 873373A6839; Tue, 8 Jul 2008 12:16:15 -0700 (PDT)
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B679B28C25C for <ipsec@core3.amsl.com>; Tue, 8 Jul 2008 12:16:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yw3v2Pevj9Zh for <ipsec@core3.amsl.com>; Tue, 8 Jul 2008 12:16:13 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 58B563A6811 for <ipsec@ietf.org>; Tue, 8 Jul 2008 12:16:13 -0700 (PDT)
Received: from [10.20.30.162] (dsl-63-249-108-169.cruzio.com [63.249.108.169]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id m68JDRYT075907 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Tue, 8 Jul 2008 12:13:28 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06240823c4996bfff167@[10.20.30.162]>
In-Reply-To: <48726D5F.7080706@checkpoint.com>
References: <48726D5F.7080706@checkpoint.com>
Date: Tue, 08 Jul 2008 12:13:23 -0700
To: ipsec@ietf.org
From: Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [IPsec] Proposed document list for ipsecme
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Updated to add the ESP-null work

The following list attempts to cover the working group's charter. 
Please review and comment.

o A revision to IKEv2 (RFC 4306) that incorporates the clarifications 
from RFC 4718, and otherwise improves the quality of the 
specification, taking into account implementation and 
interoperability experience.
Proposed filename: draft-ietf-ipsecme-ikev2bis
Proposed authors: Charlie Kaufman, Paul Hoffman, plus one implementer

o An IPsec document roadmap that describes the various RFC documents 
covering IPsec, including both the core RFC 240x and RFC 430x 
versions of IPsec, and extensions specified in other documents.
Proposed filename: draft-ietf-ipsecme-roadmap
Proposed editor(s): one or two volunteers

o A standards-track extension to IKEv2 that provides full IPv6 
support for IPsec remote access clients that use configuration 
payloads.
Proposed filename: draft-ietf-ipsecme-ikev2-ipv6-config
Proposed authors: Pasi Eronen, plus one implementer

o A standards-track extension that allows an IPsec remote access 
client to "resume" a session with a gateway; that is, to skip certain 
parts of IKE negotation when connecting again to the same gateway (or 
possibly a cluster of closely cooperating gateways).
Proposed filename: draft-ietf-ipsecme-resumption
Proposed authors: Authors of draft-sheffer-ipsec-failover-03.txt

o A standards-track extension to IPsec that allows an IPsec remote 
access gateway to redirect VPN clients to another gateway.
Proposed filename: draft-ietf-ipsecme-ikev2-redirect
Proposed authors: Authors of draft-devarapalli-ipsec-ikev2-redirect-00.txt

o A standards-track mechanism that allows an intermediary device, 
such as a firewall or intrusion detection system, to easily and 
reliably determine whether an ESP packet is encrypted with the NULL 
cipher; and if it is, determine the location of the actual payload 
data inside the
packet.
Proposed filename: draft-ietf-ipsecme-esp-null
Proposed authors: Authors of draft-grewal-ipsec-traffic-visibility-01.txt


Note that the session resumption draft and the redirection drafts 
might be merged into a single draft if it makes technical sense.

Paul & Yaron
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


--Paul Hoffman, Director
--VPN Consortium
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec