[Tcpcrypt] Fwd: New Version Notification for draft-touch-tcp-ao-encrypt-01.txt

Joe Touch <touch@isi.edu> Mon, 12 May 2014 18:47 UTC

Return-Path: <touch@isi.edu>
X-Original-To: tcpcrypt@ietfa.amsl.com
Delivered-To: tcpcrypt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB0281A077C for <tcpcrypt@ietfa.amsl.com>; Mon, 12 May 2014 11:47:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.551
X-Spam-Level:
X-Spam-Status: No, score=-2.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JW1-PH3pSCzP for <tcpcrypt@ietfa.amsl.com>; Mon, 12 May 2014 11:47:47 -0700 (PDT)
Received: from darkstar.isi.edu (darkstar.isi.edu [128.9.128.127]) by ietfa.amsl.com (Postfix) with ESMTP id 2CDE11A0782 for <tcpcrypt@ietf.org>; Mon, 12 May 2014 11:47:47 -0700 (PDT)
Received: from [10.133.205.183] (UAPublic-35.guest.arizona.edu [206.207.225.35]) (authenticated bits=0) by darkstar.isi.edu (8.13.8/8.13.8) with ESMTP id s4CIlIIY013661 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 12 May 2014 11:47:22 -0700 (PDT)
Message-ID: <53711737.9070906@isi.edu>
Date: Mon, 12 May 2014 11:47:19 -0700
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.5.0
MIME-Version: 1.0
To: "tcpcrypt@ietf.org" <tcpcrypt@ietf.org>
References: <20140512184357.12356.22258.idtracker@ietfa.amsl.com>
In-Reply-To: <20140512184357.12356.22258.idtracker@ietfa.amsl.com>
X-Forwarded-Message-Id: <20140512184357.12356.22258.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpcrypt/70SgOR4nvWeXIuq6CEfXMF35Tnc
Subject: [Tcpcrypt] Fwd: New Version Notification for draft-touch-tcp-ao-encrypt-01.txt
X-BeenThere: tcpcrypt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion list for adding encryption to TCP." <tcpcrypt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpcrypt/>
List-Post: <mailto:tcpcrypt@ietf.org>
List-Help: <mailto:tcpcrypt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 May 2014 18:47:48 -0000

FYI.

This version includes in-band unsigned Diffie-Hellman exchange (BTNS-mode).

Joe

-------- Original Message --------
Subject: New Version Notification for draft-touch-tcp-ao-encrypt-01.txt
Date: Mon, 12 May 2014 11:43:57 -0700
From: internet-drafts@ietf.org
To: Dr. Joseph D. Touch <touch@isi.edu>, Joe Touch <touch@isi.edu>


A new version of I-D, draft-touch-tcp-ao-encrypt-01.txt
has been successfully submitted by Joe Touch and posted to the
IETF repository.

Name:		draft-touch-tcp-ao-encrypt
Revision:	01
Title:		A TCP Authentication Option Extension for Payload Encryption
Document date:	2014-05-12
Group:		Individual Submission
Pages:		9
URL: 
http://www.ietf.org/internet-drafts/draft-touch-tcp-ao-encrypt-01.txt
Status:         https://datatracker.ietf.org/doc/draft-touch-tcp-ao-encrypt/
Htmlized:       http://tools.ietf.org/html/draft-touch-tcp-ao-encrypt-01
Diff: 
http://www.ietf.org/rfcdiff?url2=draft-touch-tcp-ao-encrypt-01

Abstract:
    This document describes an extension to the TCP Authentication
    Option (TCP-AO) to encrypt the TCP segment payload in addition to
    providing TCP-AO's authentication of the payload, TCP header, and IP
    pseudoheader. This extension augments how the packet contents and
    headers are processed and which keys are derived, and adds a
    capability for in-band coordination of unauthenticated Diffie-
    Hellman key exchange at connection establishment. The extension
    preserves key rollover coordination and protection of long-lived
    connections.

 



Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat