Re: [IPsec] Proposed document list for ipsecme
Paul Hoffman <paul.hoffman@vpnc.org> Tue, 08 July 2008 19:16 UTC
Return-Path: <ipsec-bounces@ietf.org>
X-Original-To: ipsec-archive@megatron.ietf.org
Delivered-To: ietfarch-ipsec-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 873373A6839; Tue, 8 Jul 2008 12:16:15 -0700 (PDT)
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B679B28C25C for <ipsec@core3.amsl.com>; Tue, 8 Jul 2008 12:16:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yw3v2Pevj9Zh for <ipsec@core3.amsl.com>; Tue, 8 Jul 2008 12:16:13 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 58B563A6811 for <ipsec@ietf.org>; Tue, 8 Jul 2008 12:16:13 -0700 (PDT)
Received: from [10.20.30.162] (dsl-63-249-108-169.cruzio.com [63.249.108.169]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id m68JDRYT075907 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Tue, 8 Jul 2008 12:13:28 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06240823c4996bfff167@[10.20.30.162]>
In-Reply-To: <48726D5F.7080706@checkpoint.com>
References: <48726D5F.7080706@checkpoint.com>
Date: Tue, 08 Jul 2008 12:13:23 -0700
To: ipsec@ietf.org
From: Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [IPsec] Proposed document list for ipsecme
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Updated to add the ESP-null work The following list attempts to cover the working group's charter. Please review and comment. o A revision to IKEv2 (RFC 4306) that incorporates the clarifications from RFC 4718, and otherwise improves the quality of the specification, taking into account implementation and interoperability experience. Proposed filename: draft-ietf-ipsecme-ikev2bis Proposed authors: Charlie Kaufman, Paul Hoffman, plus one implementer o An IPsec document roadmap that describes the various RFC documents covering IPsec, including both the core RFC 240x and RFC 430x versions of IPsec, and extensions specified in other documents. Proposed filename: draft-ietf-ipsecme-roadmap Proposed editor(s): one or two volunteers o A standards-track extension to IKEv2 that provides full IPv6 support for IPsec remote access clients that use configuration payloads. Proposed filename: draft-ietf-ipsecme-ikev2-ipv6-config Proposed authors: Pasi Eronen, plus one implementer o A standards-track extension that allows an IPsec remote access client to "resume" a session with a gateway; that is, to skip certain parts of IKE negotation when connecting again to the same gateway (or possibly a cluster of closely cooperating gateways). Proposed filename: draft-ietf-ipsecme-resumption Proposed authors: Authors of draft-sheffer-ipsec-failover-03.txt o A standards-track extension to IPsec that allows an IPsec remote access gateway to redirect VPN clients to another gateway. Proposed filename: draft-ietf-ipsecme-ikev2-redirect Proposed authors: Authors of draft-devarapalli-ipsec-ikev2-redirect-00.txt o A standards-track mechanism that allows an intermediary device, such as a firewall or intrusion detection system, to easily and reliably determine whether an ESP packet is encrypted with the NULL cipher; and if it is, determine the location of the actual payload data inside the packet. Proposed filename: draft-ietf-ipsecme-esp-null Proposed authors: Authors of draft-grewal-ipsec-traffic-visibility-01.txt Note that the session resumption draft and the redirection drafts might be merged into a single draft if it makes technical sense. Paul & Yaron _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec --Paul Hoffman, Director --VPN Consortium _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec
- [IPsec] Proposed document list for ipsecme Yaron Sheffer
- Re: [IPsec] Proposed document list for ipsecme gabriel montenegro
- Re: [IPsec] Proposed document list for ipsecme gabriel montenegro
- Re: [IPsec] Proposed document list for ipsecme Paul Hoffman