Hi, This document still remains a focus for discussion and is not (yet?) a concrete proposal for implementation. Our purpose is to establish what could be done and to have the discussion about whether there could be value.
You can, of course, diff out the changes in this revision. The main change is to add some discussion of the nonce (nonce-sense) and to add text to the applicability discussion in section 5. As before, Stephen and I remain at your disposal for entertaining and enlightening conversation on this topic. Adrian > -----Original Message----- > From: [email protected] [mailto:[email protected]] > Sent: 21 January 2014 21:48 > To: Adrian Farrel; Stephen Farrell; Adrian Farrel; Stephen Farrell > Subject: New Version Notification for > draft-farrelll-mpls-opportunistic-encrypt- > 01.txt > > > A new version of I-D, draft-farrelll-mpls-opportunistic-encrypt-01.txt > has been successfully submitted by Adrian Farrel and posted to the > IETF repository. > > Name: draft-farrelll-mpls-opportunistic-encrypt > Revision: 01 > Title: Opportunistic Encryption in MPLS Networks > Document date: 2014-01-21 > Group: Individual Submission > Pages: 25 > URL: > http://www.ietf.org/internet-drafts/draft-farrelll-mpls-opportunistic- > encrypt-01.txt > Status: > https://datatracker.ietf.org/doc/draft-farrelll-mpls-opportunistic- > encrypt/ > Htmlized: > http://tools.ietf.org/html/draft-farrelll-mpls-opportunistic-encrypt- > 01 > Diff: > http://www.ietf.org/rfcdiff?url2=draft-farrelll-mpls-opportunistic- > encrypt-01 > > Abstract: > This document describes a way to apply opportunistic encryption > between adjacent nodes on an MPLS Label Switched Path (LSP) or > between end points of an LSP. It explains how keys may be exchanged > to enable the encryption, and indicates how key identifiers are > exchanged in encrypted MPLS packets. Finally, this document > describes the applicability of opportunistic encryption in MPLS > networks with an indication of the level of improved security as well > as the continued vulnerabilities. > > This document does not describe security for MPLS control plane > protocols. > > > > > Please note that it may take a couple of minutes from the time of submission > until the htmlized version and diff are available at tools.ietf.org. > > The IETF Secretariat _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
