Cryptographic Algorithms, Use, & Implementation Requirments for TCP Authentication Option

Document Type Replaced Internet-Draft (tcpm WG)
Author Gregory Lebovitz 
Last updated 2009-09-17 (latest revision 2009-07-27)
Replaced by RFC 5926
Stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Expired & archived
plain text html xml pdf htmlized bibtex
Stream WG state WG Document
Document shepherd No shepherd assigned
IESG IESG state Replaced by draft-ietf-tcpm-tcp-ao-crypto
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


The TCP Authentication Option, TCP-AO, relies on security algorithms to provide authentication between two end-points. There are many such algorithms available, and two TCP-AO systems cannot interoperate unless they are using the same algorithm(s). This document specifies the algorithms and attributes that can be used in TCP-AO's current manual keying mechanism.


Gregory Lebovitz (

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)