Impact of TLS 1.3 to Operational Network Security Practices
draft-ietf-opsec-ns-impact-04

Document Type Expired Internet-Draft (opsec WG)
Authors Nancy Cam-Winget  , Eric Wang  , Roman Danyliw  , Roelof DuToit 
Last updated 2021-07-30 (latest revision 2021-01-26)
Replaces draft-camwinget-opsec-ns-impact
Stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf htmlized bibtex
Stream WG state In WG Last Call
Document shepherd No shepherd assigned
IESG IESG state Expired
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ietf-opsec-ns-impact-04.txt

Abstract

Network-based security solutions are used by enterprises, the public sector, internet-service providers, and cloud-service providers to both complement and enhance host-based security solutions. As TLS is a widely deployed protocol to secure communication, these network- based security solutions must necessarily interact with it. This document describes this interaction for current operational security practices and notes the impact of TLS 1.3 on them.

Authors

Nancy Cam-Winget (ncamwing@cisco.com)
Eric Wang (ejwang@cisco.com)
Roman Danyliw (rdd@cert.org)
Roelof DuToit (roelof.dutoit@broadcom.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)