Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols
draft-ietf-msec-tesla-for-alc-norm-10
Technical Summary
This document describes how to use the TESLA Multicast Source
Authentication Transform (RFC 4082) in a packet source authentication and
packet integrity verification protocol within the ALC and NORM content
delivery protocols. In other words, the TESLA method allows ALC and NORM
receivers to verify that the sender identified as sending the ALC or NORM
packet actually originated the packet. TELSA is a well-known algorithm for
integrity protecting single-source multicast packet streams.
Working Group Summary
This I-D was discussed on the MSEC WG mailing list, in particular during
the WG last call period. Comments were received, and two additional
versions of the I-D were generated by the authors. The WG had no further
comments on the document.
Document Quality
The TESLA portions of the document was reviewed in detail by an
implementor of TESLA, and his comments are adequately addressed. It was
also reviewed in detail by a security protocol implementer, who felt it
was implementable.
Personnel
Brian Weis is the Document Shepherd; Tim Polk is the Responsible Area
Director.