@techreport{voit-rats-trustworthy-path-routing-09, number = {draft-voit-rats-trustworthy-path-routing-09}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-voit-rats-trustworthy-path-routing/09/}, author = {Eric Voit and Chennakesava Reddy Gaddam and Guy Fedorkow and Henk Birkholz and Meiling Chen}, title = {{Trusted Path Routing}}, pagetotal = 33, year = 2024, month = feb, day = 22, abstract = {There are end-users who believe encryption technologies like IPSec alone are insufficient to protect the confidentiality of their highly sensitive traffic flows. These end-users want their flows to traverse devices which have been freshly appraised and verified for trustworthiness. This specification describes Trusted Path Routing. Trusted Path Routing protects sensitive flows as they transit a network by forwarding traffic to/from sensitive subnets across network devices recently appraised as trustworthy.}, }