[tsvwg] I-D Action: draft-ietf-tsvwg-transport-encrypt-20.txt
internet-drafts@ietf.org Mon, 08 March 2021 18:23 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: tsvwg@ietf.org
Delivered-To: tsvwg@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id CB5D43A1436; Mon, 8 Mar 2021 10:23:33 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: tsvwg@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.27.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: tsvwg@ietf.org
Message-ID: <161522781379.1888.16597181009083108790@ietfa.amsl.com>
Date: Mon, 08 Mar 2021 10:23:33 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/sAoIjW5k4tdavTyPjGEWpDHX8rQ>
Subject: [tsvwg] I-D Action: draft-ietf-tsvwg-transport-encrypt-20.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Mar 2021 18:23:34 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Transport Area Working Group WG of the IETF. Title : Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols Authors : Godred Fairhurst Colin Perkins Filename : draft-ietf-tsvwg-transport-encrypt-20.txt Pages : 47 Date : 2021-03-08 Abstract: To protect user data and privacy, Internet transport protocols have supported payload encryption and authentication for some time. Such encryption and authentication is now also starting to be applied to the transport protocol headers. This helps avoid transport protocol ossification by middleboxes, mitigate attacks against the transport protocol, and protect metadata about the communication. Current operational practice in some networks inspect transport header information within the network, but this is no longer possible when those transport headers are encrypted. This document discusses the possible impact when network traffic uses a protocol with an encrypted transport header. It suggests issues to consider when designing new transport protocols or features. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-tsvwg-transport-encrypt/ There are also htmlized versions available at: https://tools.ietf.org/html/draft-ietf-tsvwg-transport-encrypt-20 https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-transport-encrypt-20 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-ietf-tsvwg-transport-encrypt-20 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/
- [tsvwg] I-D Action: draft-ietf-tsvwg-transport-en… internet-drafts