4
1 IETF 74, 30 Jul 2009 draft-ietf-tsvwg-rsvp-security-groupkeying- 05.txt Applicability of Keying Methods for RSVP security draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt 75 th IETF, 30 Jul 2009 Michael Behringer Francois Le Faucheur

1 IETF 74, 30 Jul 2009draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt Applicability of Keying Methods for RSVP security draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt

Embed Size (px)

Citation preview

Page 1: 1 IETF 74, 30 Jul 2009draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt Applicability of Keying Methods for RSVP security draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt

1IETF 74, 30 Jul 2009 draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt

Applicability of Keying Methods for RSVP security

draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt

75th IETF, 30 Jul 2009 

Michael Behringer

Francois Le Faucheur

Page 2: 1 IETF 74, 30 Jul 2009draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt Applicability of Keying Methods for RSVP security draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt

2IETF 74, 30 Jul 2009 draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt

Background

• Goal: – Discussion on Keying Methods (including group keying),

associated key provisioning and applicability for RSVP security

– Goal: informational RFC

• History:– Initial document: June 2007– Accepted as WG document: Feb 2008– All received feedback incorporated– Currently 8th revision

Page 3: 1 IETF 74, 30 Jul 2009draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt Applicability of Keying Methods for RSVP security draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt

3IETF 74, 30 Jul 2009 draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt

Changes from -03 to -05

• Added below table 1 in note (1) that "RSVP encryption with ESP and RSVP authentication with AH work over non-RSVP nodes in 'Tunnel Mode with Address Preservation'"

• Clarified in section 6.3 that IPsec AH also secures the immutable fields of the outer header (comment from Bob Briscoe)

• Simplified in section 2 the comment that trust in group keying extends to all members of the group (deleted the words on "explicit and implicit"). (comment from Brian Weis)

• A number of corrections, re-wordings and clarifications in response to Kenneth Carlberg's email from 2 June 2009

Page 4: 1 IETF 74, 30 Jul 2009draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt Applicability of Keying Methods for RSVP security draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt

4IETF 74, 30 Jul 2009 draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt

Next Steps

• Last IETF we asked for WG last call– Chair feedback: “Reviews needed”

• Since then had full reviews from: – Brian Weis – Bob Briscoe– Ran Atkinson– Kenneth Carlberg

• We believe to have addressed all outstanding comments, concerns, questions.

• We request WG last call