[mpls] I-D Action: draft-ietf-mpls-opportunistic-encrypt-03.txt

internet-drafts@ietf.org Tue, 28 March 2017 18:22 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: mpls@ietf.org
Delivered-To: mpls@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 497741299B8; Tue, 28 Mar 2017 11:22:58 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: mpls@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.48.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <149072537825.1283.10211341750934588513@ietfa.amsl.com>
Date: Tue, 28 Mar 2017 11:22:58 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/rNDGB60qOPnEcpQe-zoYZE0ZGYk>
Subject: [mpls] I-D Action: draft-ietf-mpls-opportunistic-encrypt-03.txt
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.22
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Mar 2017 18:22:58 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Multiprotocol Label Switching of the IETF.

        Title           : Opportunistic Security in MPLS Networks
        Authors         : Adrian Farrel
                          Stephen Farrell
	Filename        : draft-ietf-mpls-opportunistic-encrypt-03.txt
	Pages           : 38
	Date            : 2017-03-28

Abstract:
   This document describes a way to apply opportunistic security between
   adjacent nodes on an MPLS Label Switched Path (LSP) or between end
   points of an LSP.  It explains how keys may be agreed to enable
   encryption, and how key identifiers are exchanged in encrypted MPLS
   packets.  Finally, this document describes the applicability of this
   approach to opportunistic security in MPLS networks with an
   indication of the level of improved security as well as the continued
   vulnerabilities.

   This document does not describe security for MPLS control plane
   protocols.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-mpls-opportunistic-encrypt/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-mpls-opportunistic-encrypt-03
https://datatracker.ietf.org/doc/html/draft-ietf-mpls-opportunistic-encrypt-03

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-mpls-opportunistic-encrypt-03


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/