[tsvwg] I-D Action: draft-ietf-tsvwg-transport-encrypt-13.txt

internet-drafts@ietf.org Sat, 21 March 2020 10:05 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: tsvwg@ietf.org
Delivered-To: tsvwg@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id CBBDF3A05A0; Sat, 21 Mar 2020 03:05:07 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: tsvwg@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.122.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: tsvwg@ietf.org
Message-ID: <158478510771.22419.11787558217390691432@ietfa.amsl.com>
Date: Sat, 21 Mar 2020 03:05:07 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/lzylTHvN9n_g6dWqoTdW45pPuJE>
Subject: [tsvwg] I-D Action: draft-ietf-tsvwg-transport-encrypt-13.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Mar 2020 10:05:09 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Transport Area Working Group WG of the IETF.

        Title           : Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols
        Authors         : Godred Fairhurst
                          Colin Perkins
	Filename        : draft-ietf-tsvwg-transport-encrypt-13.txt
	Pages           : 50
	Date            : 2020-03-21

Abstract:
   To protect user data and privacy, Internet transport protocols have
   supported payload encryption and authentication for some time.  Such
   encryption and authentication is now also starting to be applied to
   the transport protocol headers.  This helps avoid transport protocol
   ossification by middleboxes, while also protecting metadata about the
   communication.  Current operational practice in some networks inspect
   transport header information within the network, but this is no
   longer possible when those transport headers are encrypted.  This
   document discusses the possible impact when network traffic uses a
   protocol with an encrypted transport header.  It suggests issues to
   consider when designing new transport protocols or features.  These
   considerations arise from concerns such as network operations,
   prevention of network ossification, enabling transport protocol
   evolution and respect for user privacy.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-tsvwg-transport-encrypt/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-tsvwg-transport-encrypt-13
https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-transport-encrypt-13

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-tsvwg-transport-encrypt-13


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/