datatracker.ietf.org
Sign in
Version 5.13.0, 2015-03-25
Report a bug

Cryptographic Algorithms, Use, & Implementation Requirments for TCP Authentication Option
draft-lebovitz-ietf-tcpm-tcp-ao-crypto-02

Document type: Replaced Internet-Draft (tcpm WG)
Document stream: IETF
Last updated: 2009-09-17 (latest revision 2009-07-27)
Intended RFC status: Unknown
Other versions: (expired, archived): plain text, pdf, html

IETF State: WG Document
Document shepherd: No shepherd assigned

IESG State: Replaced by draft-ietf-tcpm-tcp-ao-crypto
Responsible AD: (None)
Send notices to: No addresses provided

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found here:
http://www.ietf.org/archive/id/draft-lebovitz-ietf-tcpm-tcp-ao-crypto-02.txt

Abstract

The TCP Authentication Option, TCP-AO, relies on security algorithms to provide authentication between two end-points. There are many such algorithms available, and two TCP-AO systems cannot interoperate unless they are using the same algorithm(s). This document specifies the algorithms and attributes that can be used in TCP-AO's current manual keying mechanism.

Authors

Gregory Lebovitz <gregory.ietf@gmail.com>

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid)