Sign in
Version 5.13.0, 2015-03-25
Report a bug

Cryptographic Algorithms, Use, & Implementation Requirments for TCP Authentication Option

Document type: Replaced Internet-Draft (tcpm WG)
Document stream: IETF
Last updated: 2009-09-17 (latest revision 2009-07-27)
Intended RFC status: Unknown
Other versions: (expired, archived): plain text, pdf, html

IETF State: WG Document
Document shepherd: No shepherd assigned

IESG State: Replaced by draft-ietf-tcpm-tcp-ao-crypto
Responsible AD: (None)
Send notices to: No addresses provided

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found here:


The TCP Authentication Option, TCP-AO, relies on security algorithms to provide authentication between two end-points. There are many such algorithms available, and two TCP-AO systems cannot interoperate unless they are using the same algorithm(s). This document specifies the algorithms and attributes that can be used in TCP-AO's current manual keying mechanism.


Gregory Lebovitz <>

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid)