[tcpm] Protocol Action: 'The TCP Authentication Option' to Proposed Standard

The IESG <iesg-secretary@ietf.org> Tue, 23 March 2010 23:12 UTC

Return-Path: <wwwrun@core3.amsl.com>
X-Original-To: tcpm@ietf.org
Delivered-To: tcpm@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 30) id 7C2D53A6CFC; Tue, 23 Mar 2010 16:12:49 -0700 (PDT)
X-idtracker: yes
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Message-Id: <20100323231249.7C2D53A6CFC@core3.amsl.com>
Date: Tue, 23 Mar 2010 16:12:49 -0700
Cc: tcpm chair <tcpm-chairs@tools.ietf.org>, tcpm mailing list <tcpm@ietf.org>, Internet Architecture Board <iab@iab.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: [tcpm] Protocol Action: 'The TCP Authentication Option' to Proposed Standard
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Mar 2010 23:12:49 -0000

The IESG has approved the following document:

- 'The TCP Authentication Option '
   <draft-ietf-tcpm-tcp-auth-opt-11.txt> as a Proposed Standard


This document is the product of the TCP Maintenance and Minor Extensions Working Group. 

The IESG contact persons are Lars Eggert and Magnus Westerlund.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcp-auth-opt-11.txt

Technical Summary

  This document specifies the TCP Authentication Option (TCP-AO), which
  obsoletes the TCP MD5 Signature option of RFC-2385 (TCP MD5). TCP-AO
  specifies the use of stronger Message Authentication Codes (MACs),
  protects against replays even for long-lived TCP connections, and
  provides more details on the association of security with TCP
  connections than TCP MD5. TCP-AO is compatible with either static
  master key tuple (MKT) configuration or an external, out-of-band MKT
  management mechanism; in either case, TCP-AO also protects
  connections when using the same MKT across repeated instances of a
  connection, using traffic keys derived from the MKT, and coordinates
  MKT changes between endpoints. The result is intended to support
  current infrastructure uses of TCP MD5, such as to protect long-lived
  connections (as used, e.g., in BGP and LDP), and to support a larger
  set of MACs with minimal other system and operational changes. TCP-AO
  uses a different option identifier than TCP MD5, even though TCP-AO
  and TCP MD5 are never permitted to be used simultaneously. TCP-AO
  supports IPv6, and is fully compatible with the proposed requirements
  for the replacement of TCP MD5.

Working Group Summary

  There was some initial controversy on this work due to the prior rushed

  deployment of a similar mechanism which had not been reviewed by the
WG.
  The WG's decision to build an incompatible mechanism was not unanimous,
  with strong initial resistance from one of the implementers of the prior

  solution, however other implementors of that solution did come out in
  support of the WG's product during the course of its evolution.

Document Quality

  Several widely-deployed implementations exist of a pre-WG protocol
  which is not compatible with the WG's protocol, but very similar both
  functionally and on the wire.  Some vendors have expressed strong
  support for implementing the WG's product.  At one point, a Linux
  implementation was being pursued of the WG draft, though its status
  with regard to the current document is unknown.

Personnel

  Wesley Eddy (Wesley.M.Eddy@nasa.gov) is the document shepherd. Lars
  Eggert (lars.eggert@nokia.com) reviewed the document for the IESG.