The Token Binding Protocol Version 1.0
draft-popov-token-binding-00
Document | Type |
Replaced Internet-Draft
(tokbind WG)
Expired & archived
|
|
---|---|---|---|
Authors | Andrei Popov , Magnus Nyström , Dirk Balfanz , Adam Langley | ||
Last updated | 2015-10-14 (Latest revision 2014-10-13) | ||
Replaced by | draft-ietf-tokbind-protocol | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | Adopted by a WG | |
Document shepherd | (None) | ||
IESG | IESG state | Replaced by draft-ietf-tokbind-protocol | |
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document specifies Version 1.0 of the Token Binding protocol. The Token Binding protocol allows client/server applications to create long-lived, uniquely identifiable TLS [RFC5246] bindings spanning multiple TLS sessions and connections. Applications are then enabled to cryptographically bind security tokens to the TLS layer, preventing token export and replay attacks. To protect privacy, the TLS Token Binding identifiers are only transmitted encrypted and can be reset by the user at any time.
Authors
Andrei Popov
Magnus Nyström
Dirk Balfanz
Adam Langley
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)