TICTOC Security Requirements
draft-mizrahi-tictoc-security-requirements-00
| Document | Type | Expired Internet-Draft (individual) | |
|---|---|---|---|
| Author | Tal Mizrahi | ||
| Last updated | 2012-04-26 (Latest revision 2011-10-24) | ||
| Stream | (None) | ||
| Intended RFC status | (None) | ||
| Formats |
Expired & archived
plain text
htmlized
pdfized
bibtex
|
||
| Stream | Stream state | (No stream defined) | |
| Consensus boilerplate | Unknown | ||
| RFC Editor Note | (None) | ||
| IESG | IESG state | Expired | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
https://www.ietf.org/archive/id/draft-mizrahi-tictoc-security-requirements-00.txt
Abstract
As time synchronization protocols are becoming increasingly common and widely deployed, concern about their exposure to various security threats is increasing. This document defines a set of requirements for security solutions for time synchronization protocols, focusing on the IEEE 1588 and NTP. This document also discusses the security impacts of time synchronization protocol practices, the time synchronization performance implications of external security practices, the dependencies between other security services and time synchronization.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)