Skip to main content

Security Considerations for Tenant ID and Similar Fields
draft-eastlake-secdispatch-tenantid-consid-03

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Active".
Expired & archived
Authors Donald E. Eastlake 3rd , Nancy Cam-Winget , Mohammed Umair
Last updated 2024-04-14 (Latest revision 2023-10-12)
RFC stream (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Many protocols provide for header fields to be added to a packet on ingress to a network domain and removed on egress from that domain. Examples of such fields are Tenant ID for multi-tenant networks, ingress port ID and/or type, and other identity or handling directive fields. These fields mean that a packet may be accompanied by supplemental information as it transits the network domain that would not be present with the packet or not be visible if it were simply forwarded in a traditional manner. A particular concern is that these fields may harm privacy by identifying, in greater detail, the packet source and intended traffic handling. This document provides Security Considerations for the inclusion of such fields with a packet.

Authors

Donald E. Eastlake 3rd
Nancy Cam-Winget
Mohammed Umair

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)