Skip to main content

IPv6 Encapsulating Security Payload (ESP)
draft-ietf-ipngwg-esp-00

Document Type Expired Internet-Draft (ipngwg WG)
Expired & archived
Author Ran Atkinson
Last updated 1995-03-02
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Additional resources Mailing list discussion
Stream WG state WG Document
Document shepherd (None)
IESG IESG state Expired
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This memo describes the IPv6 Encapsulating Security Payload (ESP). ESP seeks to provide integrity and confidentiality to IPv6 datagrams. It may also provide authentication, depending on which algorithm and algorithm mode are used. Non-repudiation and protection from traffic analysis are not provided by ESP. The IPv6 Authentication Header (AH) might provide non-repudiation if used with certain authentication algorithms. The IPv6 Authentication Header may be used in conjunction with ESP to provide authentication. Users desiring integrity and authentication without confidentiality should use the IPv6 Authentication Header (AH) instead of ESP. This document assumes that the reader is familiar with the related document 'IPv6 Security Architecture', which defines the overall security architecture for IPv6 and provides important background for this specification.

Authors

Ran Atkinson

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)