Skip to main content

The Authentication of Internet Datagrams
draft-ietf-auth-ipauthoption-00

Document Type Expired Internet-Draft (candidate for ipauth WG)
Expired & archived
Authors
Last updated 1989-08-01
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Stream WG state Call For Adoption By WG Issued
Document shepherd (None)
IESG IESG state Expired
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This draft describes a protocol and IP option to allow two communicating Internet hosts to authenticate datagrams that travel from one to the other. This authentication is limited to source, destination IP address pair. It is up to host-based mechanisms to provide authentication between separate processes running on the same IP host. The protocol will provide for ``authentication'' of the datagram, not concealment from third party observers. By authentication, I mean that an IP host receiving a datagram claiming to be from some other IP host will be able (if both hosts are set up to authenticate datagrams between each other) to determine if in fact the datagram is from the host claimed, and that it has not been altered in transit.

Authors

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)