[tsvwg] Fwd: New Version Notification for draft-fairhurst-tsvwg-transport-encrypt-06.txt
Gorry Fairhurst <gorry@erg.abdn.ac.uk> Thu, 08 February 2018 13:59 UTC
Return-Path: <gorry@erg.abdn.ac.uk>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A987A12DA07 for <tsvwg@ietfa.amsl.com>; Thu, 8 Feb 2018 05:59:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level:
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i8T0F17xnvHA for <tsvwg@ietfa.amsl.com>; Thu, 8 Feb 2018 05:59:44 -0800 (PST)
Received: from pegasus.erg.abdn.ac.uk (pegasus.erg.abdn.ac.uk [IPv6:2001:630:241:204::f0f0]) by ietfa.amsl.com (Postfix) with ESMTP id 3370912DA03 for <tsvwg@ietf.org>; Thu, 8 Feb 2018 05:59:37 -0800 (PST)
Received: from [10.210.69.179] (unknown [37.205.56.236]) by pegasus.erg.abdn.ac.uk (Postfix) with ESMTPSA id 6F6CE1B00091 for <tsvwg@ietf.org>; Thu, 8 Feb 2018 13:59:36 +0000 (GMT)
From: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Content-Type: multipart/alternative; boundary="Apple-Mail-D883C2D4-E168-44F8-B250-2BA152ECE22D"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (1.0)
Date: Thu, 08 Feb 2018 13:59:36 +0000
Message-Id: <9AA9C6DA-6C24-4FDF-B257-0EA73098966D@erg.abdn.ac.uk>
References: <151809823018.17167.6875192429088355895.idtracker@ietfa.amsl.com>
To: tsvwg@ietf.org
X-Mailer: iPad Mail (14F89)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/yugO9s2KJ406zNYw3Lyh8rmIqoc>
Subject: [tsvwg] Fwd: New Version Notification for draft-fairhurst-tsvwg-transport-encrypt-06.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Feb 2018 13:59:48 -0000
We have just completed a revision to the transport encryption draft. This revision has sought to improve the readability and presentation of the security story. It also adds a (currently draft) conclusion, and includes (as always) a request for further inputs - especially from people about their current practice using transport existing header information. Gorry and Colin Begin forwarded message: > From: internet-drafts@ietf.org > Date: 8 February 2018 at 13:57:10 GMT > To: "Colin Perkins" <csp@csperkins.org>, "Godred Fairhurst" <gorry@erg.abdn.ac.uk>, "Gorry Fairhurst" <gorry@erg.abdn.ac.uk> > Subject: New Version Notification for draft-fairhurst-tsvwg-transport-encrypt-06.txt > > > A new version of I-D, draft-fairhurst-tsvwg-transport-encrypt-06.txt > has been successfully submitted by Godred Fairhurst and posted to the > IETF repository. > > Name: draft-fairhurst-tsvwg-transport-encrypt > Revision: 06 > Title: The Impact of Transport Header Confidentiality on Network Operation and Evolution of the Internet > Document date: 2018-02-09 > Group: Individual Submission > Pages: 33 > URL: https://www.ietf.org/internet-drafts/draft-fairhurst-tsvwg-transport-encrypt-06.txt > Status: https://datatracker.ietf.org/doc/draft-fairhurst-tsvwg-transport-encrypt/ > Htmlized: https://tools.ietf.org/html/draft-fairhurst-tsvwg-transport-encrypt-06 > Htmlized: https://datatracker.ietf.org/doc/html/draft-fairhurst-tsvwg-transport-encrypt-06 > Diff: https://www.ietf.org/rfcdiff?url2=draft-fairhurst-tsvwg-transport-encrypt-06 > > Abstract: > This document describes implications of applying end-to-end > encryption at the transport layer. It identifies in-network uses of > transport layer header information. It then reviews the implications > of developing end-to-end transport protocols that use encryption to > provide confidentiality of the transport protocol header and expected > implications of transport protocol design and network operation. > Since transport measurement and analysis of the impact of network > characteristics have been important to the design of current > transport protocols, it also considers the impact on transport and > application evolution. > > > > > Please note that it may take a couple of minutes from the time of submission > until the htmlized version and diff are available at tools.ietf.org. > > The IETF Secretariat
- [tsvwg] Fwd: New Version Notification for draft-f… Gorry Fairhurst