On the Generation of Transient Numeric Identifiers
draft-gont-numeric-ids-generation-04
Document | Type | Replaced Internet-Draft (pearg RG) | |
---|---|---|---|
Last updated | 2019-08-23 (latest revision 2019-07-08) | ||
Replaced by | draft-irtf-pearg-numeric-ids-generation | ||
Stream | IRTF | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
pdf
htmlized
bibtex
|
||
Stream | IRTF state | Replaced | |
Consensus Boilerplate | Unknown | ||
Document shepherd | No shepherd assigned | ||
IESG | IESG state | Replaced by draft-irtf-pearg-numeric-ids-generation | |
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
https://www.ietf.org/archive/id/draft-gont-numeric-ids-generation-04.txt
Abstract
This document performs an analysis of the security and privacy implications of different types of "numeric identifiers" used in IETF protocols, and tries to categorize them based on their interoperability requirements and the associated failure severity when such requirements are not met. Subsequently, it provides advice on possible algorithms that could be employed to satisfy the interoperability requirements of each identifier type, while minimizing the security and privacy implications, thus providing guidance to protocol designers and protocol implementers. Finally, this describes a number of algorithms that have been employed in real implementations to generate transient numeric identifiers and analyzes their security and privacy properties.
Authors
Fernando Gont
(fgont@si6networks.com)
Ivan Arce
(iarce@quarkslab.com)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)