Technical Summary
The TCP Authentication Option, TCP-AO, relies on security algorithms
to provide authentication between two end-points. There are many
such algorithms available, and two TCP-AO systems cannot interoperate
unless they are using the same algorithms. This document specifies
the algorithms and attributes that can be used in TCP-AO's current
manual keying mechanism.
Document Quality
Vendors have expressed support for this work and begun implementing
it and sharing feedback with TCPM.
Personnel
Wesley Eddy (Wesley.M.Eddy@nasa.gov) is the document shepherd. Lars
Eggert (lars.eggert@nokia.com) reviewed the document for the IESG.
RFC Editor Note
Deficiencies in xml2rfc cause an invalid table-of-contents to be
generated. As discussed during IETF-77, please manually recreate
the table-of-contents.