[tsvwg] Fwd: New Version Notification for draft-fairhurst-tsvwg-transport-encrypt-06.txt

Gorry Fairhurst <gorry@erg.abdn.ac.uk> Thu, 08 February 2018 13:59 UTC

Return-Path: <gorry@erg.abdn.ac.uk>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A987A12DA07 for <tsvwg@ietfa.amsl.com>; Thu, 8 Feb 2018 05:59:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level:
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i8T0F17xnvHA for <tsvwg@ietfa.amsl.com>; Thu, 8 Feb 2018 05:59:44 -0800 (PST)
Received: from pegasus.erg.abdn.ac.uk (pegasus.erg.abdn.ac.uk [IPv6:2001:630:241:204::f0f0]) by ietfa.amsl.com (Postfix) with ESMTP id 3370912DA03 for <tsvwg@ietf.org>; Thu, 8 Feb 2018 05:59:37 -0800 (PST)
Received: from [10.210.69.179] (unknown [37.205.56.236]) by pegasus.erg.abdn.ac.uk (Postfix) with ESMTPSA id 6F6CE1B00091 for <tsvwg@ietf.org>; Thu, 8 Feb 2018 13:59:36 +0000 (GMT)
From: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Content-Type: multipart/alternative; boundary="Apple-Mail-D883C2D4-E168-44F8-B250-2BA152ECE22D"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (1.0)
Date: Thu, 08 Feb 2018 13:59:36 +0000
Message-Id: <9AA9C6DA-6C24-4FDF-B257-0EA73098966D@erg.abdn.ac.uk>
References: <151809823018.17167.6875192429088355895.idtracker@ietfa.amsl.com>
To: tsvwg@ietf.org
X-Mailer: iPad Mail (14F89)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/yugO9s2KJ406zNYw3Lyh8rmIqoc>
Subject: [tsvwg] Fwd: New Version Notification for draft-fairhurst-tsvwg-transport-encrypt-06.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Feb 2018 13:59:48 -0000

We have just completed a revision to the transport encryption draft.

This revision has sought to improve the readability and presentation of the security story. It also adds a (currently draft) conclusion, and includes (as always) a request for further inputs - especially from people about their current practice using transport existing header information.

Gorry and Colin

Begin forwarded message:

> From: internet-drafts@ietf.org
> Date: 8 February 2018 at 13:57:10 GMT
> To: "Colin Perkins" <csp@csperkins.org>, "Godred Fairhurst" <gorry@erg.abdn.ac.uk>, "Gorry Fairhurst" <gorry@erg.abdn.ac.uk>
> Subject: New Version Notification for draft-fairhurst-tsvwg-transport-encrypt-06.txt
> 
> 
> A new version of I-D, draft-fairhurst-tsvwg-transport-encrypt-06.txt
> has been successfully submitted by Godred Fairhurst and posted to the
> IETF repository.
> 
> Name:        draft-fairhurst-tsvwg-transport-encrypt
> Revision:    06
> Title:        The Impact of Transport Header Confidentiality on Network Operation and Evolution of the Internet
> Document date:    2018-02-09
> Group:        Individual Submission
> Pages:        33
> URL:            https://www.ietf.org/internet-drafts/draft-fairhurst-tsvwg-transport-encrypt-06.txt
> Status:         https://datatracker.ietf.org/doc/draft-fairhurst-tsvwg-transport-encrypt/
> Htmlized:       https://tools.ietf.org/html/draft-fairhurst-tsvwg-transport-encrypt-06
> Htmlized:       https://datatracker.ietf.org/doc/html/draft-fairhurst-tsvwg-transport-encrypt-06
> Diff:           https://www.ietf.org/rfcdiff?url2=draft-fairhurst-tsvwg-transport-encrypt-06
> 
> Abstract:
>   This document describes implications of applying end-to-end
>   encryption at the transport layer.  It identifies in-network uses of
>   transport layer header information.  It then reviews the implications
>   of developing end-to-end transport protocols that use encryption to
>   provide confidentiality of the transport protocol header and expected
>   implications of transport protocol design and network operation.
>   Since transport measurement and analysis of the impact of network
>   characteristics have been important to the design of current
>   transport protocols, it also considers the impact on transport and
>   application evolution.
> 
> 
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> The IETF Secretariat