Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols

Approval announcement
Draft of message to be sent after approval:

From: The IESG <>
To: IETF-Announce <>
Cc: Internet Architecture Board <>,
    RFC Editor <>, 
    msec mailing list <>, 
    msec chair <>
Subject: Document Action: 'Use of TESLA in the ALC and NORM Protocols' to Experimental RFC

The IESG has approved the following document:

- 'Use of TESLA in the ALC and NORM Protocols '
   <draft-ietf-msec-tesla-for-alc-norm-10.txt> as an Experimental RFC

This document is the product of the Multicast Security Working Group. 

The IESG contact persons are Tim Polk and Pasi Eronen.

A URL of this Internet-Draft is:

Technical Summary

This document describes how to use the TESLA Multicast Source
Authentication Transform (RFC 4082) in a packet source authentication and
packet integrity verification protocol within the ALC and NORM content
delivery protocols. In other words, the TESLA method allows ALC and NORM
receivers to verify that the sender identified as sending the ALC or NORM
packet actually originated the packet. TELSA is a well-known algorithm for
integrity protecting single-source multicast packet streams.

Working Group Summary

This I-D was discussed on the MSEC WG mailing list, in particular during
the WG last call period. Comments were received, and two additional
versions of the I-D were generated by the authors. The WG had no further
comments on the document.

Document Quality

The TESLA portions of the document was reviewed in detail by an
implementor of TESLA, and his comments are adequately addressed. It was
also reviewed in detail by a security protocol implementer, who felt it
was implementable.


Brian Weis is the Document Shepherd; Tim Polk is the Responsible Area