The Impact of Transport Header Confidentiality on Network Operation and Evolution of the Internet
draft-fairhurst-tsvwg-transport-encrypt-10

Document Type Replaced Internet-Draft (individual)
Last updated 2018-08-28
Replaced by draft-ietf-tsvwg-transport-encrypt
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-tsvwg-transport-encrypt
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-fairhurst-tsvwg-transport-encrypt-10.txt

Abstract

This document describes implications of applying end-to-end encryption at the transport layer. It identifies in-network uses of transport layer header information. It then reviews the implications of developing end-to-end transport protocols that use authentication to protect the integrity of transport information or encryption to provide confidentiality of the transport protocol header and expected implications of transport protocol design and network operation. Since transport measurement and analysis of the impact of network characteristics have been important to the design of current transport protocols, it also considers the impact on transport and application evolution.

Authors

Gorry Fairhurst (gorry@erg.abdn.ac.uk)
Colin Perkins (csp@csperkins.org)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)