[karp] Fwd: Document Action: 'Applicability of Keying Methods for RSVP Security' to Informational RFC (draft-ietf-tsvwg-rsvp-security-groupkeying-11.txt)

"Joel M. Halpern" <jmh@joelhalpern.com> Mon, 12 September 2011 18:34 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: karp@ietfa.amsl.com
Delivered-To: karp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27B8B21F8C46 for <karp@ietfa.amsl.com>; Mon, 12 Sep 2011 11:34:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.539
X-Spam-Level:
X-Spam-Status: No, score=-102.539 tagged_above=-999 required=5 tests=[AWL=0.060, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ek0KaJoWw8-R for <karp@ietfa.amsl.com>; Mon, 12 Sep 2011 11:34:08 -0700 (PDT)
Received: from hermes.out.tigertech.net (hermes-ipv6.tigertech.net [IPv6:2604:4f00::1:0:0:16]) by ietfa.amsl.com (Postfix) with ESMTP id 8C94321F8C56 for <karp@ietf.org>; Mon, 12 Sep 2011 11:34:08 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by hermes.tigertech.net (Postfix) with ESMTP id 2870F43B314 for <karp@ietf.org>; Mon, 12 Sep 2011 11:36:12 -0700 (PDT)
X-Virus-Scanned: Debian amavisd-new at hermes.tigertech.net
Received: from [10.10.10.104] (pool-71-161-50-124.clppva.btas.verizon.net [71.161.50.124]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by hermes.tigertech.net (Postfix) with ESMTPSA id 863A043B311 for <karp@ietf.org>; Mon, 12 Sep 2011 11:36:11 -0700 (PDT)
Message-ID: <4E6E5119.4060902@joelhalpern.com>
Date: Mon, 12 Sep 2011 14:36:09 -0400
From: "Joel M. Halpern" <jmh@joelhalpern.com>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:6.0.2) Gecko/20110902 Thunderbird/6.0.2
MIME-Version: 1.0
To: "karp@ietf.org" <karp@ietf.org>
References: <20110912182724.26813.11921.idtracker@ietfa.amsl.com>
In-Reply-To: <20110912182724.26813.11921.idtracker@ietfa.amsl.com>
X-Forwarded-Message-Id: <20110912182724.26813.11921.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: [karp] Fwd: Document Action: 'Applicability of Keying Methods for RSVP Security' to Informational RFC (draft-ietf-tsvwg-rsvp-security-groupkeying-11.txt)
X-BeenThere: karp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion list for key management for routing and transport protocols <karp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/karp>, <mailto:karp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/karp>
List-Post: <mailto:karp@ietf.org>
List-Help: <mailto:karp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/karp>, <mailto:karp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Sep 2011 18:34:09 -0000

For our RSVP-TE Work.

Yours,
Joel

-------- Original Message --------
Subject: Document Action: 'Applicability of Keying Methods for RSVP 
Security' to Informational RFC 
(draft-ietf-tsvwg-rsvp-security-groupkeying-11.txt)
Date: Mon, 12 Sep 2011 11:27:24 -0700
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
CC: RFC Editor <rfc-editor@rfc-editor.org>

The IESG has approved the following document:
- 'Applicability of Keying Methods for RSVP Security'
   (draft-ietf-tsvwg-rsvp-security-groupkeying-11.txt) as an Informational
RFC

This document is the product of the Transport Area Working Group.

The IESG contact persons are David Harrington and Wesley Eddy.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-tsvwg-rsvp-security-groupkeying/




Technical Summary

The Resource reSerVation Protocol [RFC2205] allows hop-by-hop
authentication of RSVP neighbors, as specified in [RFC2747].  In this
mode, an integrity object is attached to each RSVP message to
transmit a keyed message digest.  This message digest allows the
recipient to verify the identity of the RSVP node that sent the
message, and to validate the integrity of the message.  Through the
inclusion of a sequence number in the scope of the digest, the digest
also offers replay protection.

This document discusses a variety of keying methods and their
applicability to different RSVP deployment environments, for both
message integrity and encryption.  It is meant as a comparative guide
to understand where each RSVP keying method is best deployed, and the
limitations of each method.  Furthermore, it discusses how RSVP hop
by hop authentication is impacted in the presence of non-RSVP nodes,
or subverted nodes, in the reservation path.

The document "RSVP Security Properties" ([RFC4230]) provides an
overview of RSVP security, including RSVP Cryptographic
Authentication [RFC2747], but does not discuss key management.  It
states that "RFC 2205 assumes that security associations are already
available".  The present document focuses specifically on key
management with different key types, including group keys.  Therefore
this document complements [RFC4230].


Working Group Summary

Understanding that 'strong' consensus is nearly impossible in an open
area WG such as TSVWG, with 5-6 sub-groups within this WG divided
along technology focuses -- there is unwavering consensus in the WG
amongst interested parties to publish this document. It has been
reviewed by several people in the WG last call. Comments raised have
been addressed, including those from the Sec-dir.

A question was raised by the AD about the wording in the IPR declaration
(does the non-assert include Informational documents?)
The WG discussed this IPR declaration and have no objection to publishing.

Document Quality

    Key members of the WG have reviewed this document.
    This was reviewed by the RSVP Directorate.
     Stephen Kent provided a detailed secdir review.

Personnel

    Document Shepherd:  James Polk.
    Responsible Area Director:  David Harrington
    There are no IANA registrations specified by this document.

_______________________________________________
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce