Download presentation
Presentation is loading. Please wait.
Published byChristian Ross Modified over 11 years ago
1
1 IETF 74, 30 Jul 2009draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt Applicability of Keying Methods for RSVP security draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt 75 th IETF, 30 Jul 2009 Michael Behringer Francois Le Faucheur
2
2 IETF 74, 30 Jul 2009draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt Background Goal: –Discussion on Keying Methods (including group keying), associated key provisioning and applicability for RSVP security –Goal: informational RFC History: –Initial document: June 2007 –Accepted as WG document: Feb 2008 –All received feedback incorporated –Currently 8 th revision
3
3 IETF 74, 30 Jul 2009draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt Changes from -03 to -05 Added below table 1 in note (1) that "RSVP encryption with ESP and RSVP authentication with AH work over non-RSVP nodes in 'Tunnel Mode with Address Preservation'" Clarified in section 6.3 that IPsec AH also secures the immutable fields of the outer header (comment from Bob Briscoe) Simplified in section 2 the comment that trust in group keying extends to all members of the group (deleted the words on "explicit and implicit"). (comment from Brian Weis) A number of corrections, re-wordings and clarifications in response to Kenneth Carlberg's email from 2 June 2009
4
4 IETF 74, 30 Jul 2009draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt Next Steps Last IETF we asked for WG last call –Chair feedback: Reviews needed Since then had full reviews from: –Brian Weis –Bob Briscoe –Ran Atkinson –Kenneth Carlberg We believe to have addressed all outstanding comments, concerns, questions. We request WG last call
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.