Skip to main content

Multicast IP Security Composite Cryptographic Groups
draft-gross-msec-ipsec-composite-group-01

Document Type Replaced Internet-Draft (individual)
Expired & archived
Authors George Gross , Haitham Cruickshank
Last updated 2008-04-02 (Latest revision 2006-10-20)
Replaced by draft-ietf-msec-ipsec-composite-group
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-msec-ipsec-composite-group
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

The Multicast IP Security extension architecture [Weis] implicitly assumes a basic group endpoint population that shares homogeneous cryptographic capabilities and security policies. In practice, large- scale cryptographic groups may contain a heterogeneous endpoint population that can not be accommodated by that basic multicast IPsec architecture. For example, some endpoints may not have been upgraded to handle the successor algorithm for one that is being retired (e.g. SHA1 transition to SHA-ng). Group deployments that span multiple legal jurisdictions may have a different security policy in each jurisdiction (e.g. key strength). This document defines the "composite cryptographic group" IP security architecture capability. A composite cryptographic group allows multicast IPsec applications to transparently interact with the single logical group that is formed by the union of one or more basic cryptographic groups.

Authors

George Gross
Haitham Cruickshank

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)