[mpls] I-D Action: draft-ietf-mpls-opportunistic-encrypt-01.txt

internet-drafts@ietf.org Tue, 15 March 2016 23:56 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: mpls@ietf.org
Delivered-To: mpls@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 5709512DE6B; Tue, 15 Mar 2016 16:56:13 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.16.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20160315235613.22774.45860.idtracker@ietfa.amsl.com>
Date: Tue, 15 Mar 2016 16:56:13 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/mpls/McuZVpwxp1jA_NoiW3pO_rNFCFs>
Cc: mpls@ietf.org
Subject: [mpls] I-D Action: draft-ietf-mpls-opportunistic-encrypt-01.txt
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.17
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2016 23:56:13 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Multiprotocol Label Switching of the IETF.

        Title           : Opportunistic Security in MPLS Networks
        Authors         : Adrian Farrel
                          Stephen Farrell
	Filename        : draft-ietf-mpls-opportunistic-encrypt-01.txt
	Pages           : 37
	Date            : 2016-03-15

   This document describes a way to apply opportunistic security between
   adjacent nodes on an MPLS Label Switched Path (LSP) or between end
   points of an LSP.  It explains how keys may be agreed to enable
   encryption, and how key identifiers are exchanged in encrypted MPLS
   packets.  Finally, this document describes the applicability of this
   approach to opportunistic security in MPLS networks with an
   indication of the level of improved security as well as the continued

   This document does not describe security for MPLS control plane

The IETF datatracker status page for this draft is:

There's also a htmlized version available at:

A diff from the previous version is available at:

Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at: