Skip to main content

The Impact of Transport Header Confidentiality on Network Operation and Evolution of the Internet
draft-fairhurst-tsvwg-transport-encrypt-10

Document Type Replaced Internet-Draft (individual)
Expired & archived
Authors Gorry Fairhurst , Colin Perkins
Last updated 2018-08-28
Replaced by draft-ietf-tsvwg-transport-encrypt
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-tsvwg-transport-encrypt
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document describes implications of applying end-to-end encryption at the transport layer. It identifies in-network uses of transport layer header information. It then reviews the implications of developing end-to-end transport protocols that use authentication to protect the integrity of transport information or encryption to provide confidentiality of the transport protocol header and expected implications of transport protocol design and network operation. Since transport measurement and analysis of the impact of network characteristics have been important to the design of current transport protocols, it also considers the impact on transport and application evolution.

Authors

Gorry Fairhurst
Colin Perkins

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)