Key rollover schemes for TCP connections employing a shared key model.
draft-ramaiah-key-rollover-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Anantha Ramaiah | ||
Last updated | 2005-11-02 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document describes mechanisms to achieve Key rollover for TCP connections that are using the TCP MD5 digest as described in RFC 2385. The mechanisms presented here do not require TCP protocol changes. The mechanisms are not just limited to TCP MD5 digest Key rollover but can be used for any shared Key based TCP security option.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)