[mpls] I-D Action: draft-ietf-mpls-opportunistic-encrypt-02.txt

internet-drafts@ietf.org Tue, 20 September 2016 09:53 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: mpls@ietf.org
Delivered-To: mpls@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 882A512B0B8; Tue, 20 Sep 2016 02:53:03 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.33.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <147436518355.29015.712079375922552840.idtracker@ietfa.amsl.com>
Date: Tue, 20 Sep 2016 02:53:03 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/5-DSNZAYEqvf5URnqIAmUdJkiJY>
Cc: mpls@ietf.org
Subject: [mpls] I-D Action: draft-ietf-mpls-opportunistic-encrypt-02.txt
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.17
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Sep 2016 09:53:03 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Multiprotocol Label Switching of the IETF.

        Title           : Opportunistic Security in MPLS Networks
        Authors         : Adrian Farrel
                          Stephen Farrell
	Filename        : draft-ietf-mpls-opportunistic-encrypt-02.txt
	Pages           : 38
	Date            : 2016-09-20

Abstract:
   This document describes a way to apply opportunistic security between
   adjacent nodes on an MPLS Label Switched Path (LSP) or between end
   points of an LSP.  It explains how keys may be agreed to enable
   encryption, and how key identifiers are exchanged in encrypted MPLS
   packets.  Finally, this document describes the applicability of this
   approach to opportunistic security in MPLS networks with an
   indication of the level of improved security as well as the continued
   vulnerabilities.

   This document does not describe security for MPLS control plane
   protocols.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-mpls-opportunistic-encrypt/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-mpls-opportunistic-encrypt-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-mpls-opportunistic-encrypt-02


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/