[tsvwg] Fwd: New Version Notification for draft-ietf-tsvwg-transport-encrypt-10.txt
Gorry Fairhurst <gorry@erg.abdn.ac.uk> Thu, 09 January 2020 17:07 UTC
Return-Path: <gorry@erg.abdn.ac.uk>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 86C86120019 for <tsvwg@ietfa.amsl.com>; Thu, 9 Jan 2020 09:07:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WBnkH5WPE1a1 for <tsvwg@ietfa.amsl.com>; Thu, 9 Jan 2020 09:07:53 -0800 (PST)
Received: from pegasus.erg.abdn.ac.uk (pegasus.erg.abdn.ac.uk [137.50.19.135]) by ietfa.amsl.com (Postfix) with ESMTP id 1692912001A for <tsvwg@ietf.org>; Thu, 9 Jan 2020 09:07:52 -0800 (PST)
Received: from Gs-MacBook-Pro.local (fgrpf.plus.com [212.159.18.54]) by pegasus.erg.abdn.ac.uk (Postfix) with ESMTPSA id 38B521B0022C for <tsvwg@ietf.org>; Thu, 9 Jan 2020 17:07:50 +0000 (GMT)
References: <157858934742.11715.7847933385953766057.idtracker@ietfa.amsl.com>
To: tsvwg@ietf.org
From: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
X-Forwarded-Message-Id: <157858934742.11715.7847933385953766057.idtracker@ietfa.amsl.com>
Message-ID: <c43830fd-333a-0f9b-f10e-5057b5ad0a2a@erg.abdn.ac.uk>
Date: Thu, 09 Jan 2020 17:07:49 +0000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:68.0) Gecko/20100101 Thunderbird/68.3.1
MIME-Version: 1.0
In-Reply-To: <157858934742.11715.7847933385953766057.idtracker@ietfa.amsl.com>
Content-Type: multipart/alternative; boundary="------------A54D57A440A6D0E257BF43F4"
Content-Language: en-GB
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/FvTD4VmWh5yf8c46vs66yMTSEYI>
Subject: [tsvwg] Fwd: New Version Notification for draft-ietf-tsvwg-transport-encrypt-10.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2020 17:07:55 -0000
We're pleased to upload a version of draft-ietf-tsvwg-transport-encrypt after processing the WGLC comments. Thanks again to all who commented, both on the list and in private emails during the WGLC process! Best wishes Gorry & Colin (as the document editors) -------- Forwarded Message -------- A new version of I-D, draft-ietf-tsvwg-transport-encrypt-10.txt has been successfully submitted by Godred Fairhurst and posted to the IETF repository. Name: draft-ietf-tsvwg-transport-encrypt Revision: 10 Title: Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols Document date: 2020-01-09 Group: tsvwg Pages: 47 URL: https://www.ietf.org/internet-drafts/draft-ietf-tsvwg-transport-encrypt-10.txt Status: https://datatracker.ietf.org/doc/draft-ietf-tsvwg-transport-encrypt/ Htmlized: https://tools.ietf.org/html/draft-ietf-tsvwg-transport-encrypt-10 Htmlized: https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-transport-encrypt Diff: https://www.ietf.org/rfcdiff?url2=draft-ietf-tsvwg-transport-encrypt-10 Abstract: To protect user data and privacy, Internet transport protocols have supported payload encryption and authentication for some time. Such encryption and authentication is now also starting to be applied to the transport protocol headers. This helps avoid transport protocol ossification by middleboxes, while also protecting metadata about the communication. Current operational practice in some networks inspect transport header information within the network, but this is no longer possible when those transport headers are encrypted. This document discusses the possible impact when network traffic uses a protocol with an encrypted transport header. It suggests issues to consider when designing new transport protocols, to account for network operations, prevent network ossification, and enable transport evolution, while still respecting user privacy. Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. The IETF Secretariat
- [tsvwg] Fwd: New Version Notification for draft-i… Gorry Fairhurst