Issues with Existing Cryptographic Protection Methods for Routing Protocols
RFC 6039

Revision differences

Document history

Date Rev. By Action
2018-12-20
07 (System)
Received changes through RFC Editor sync (changed abstract to 'Routing protocols have been extended over time to use cryptographic mechanisms to ensure that data received ...
2015-10-14
07 (System) Notify list changed from opsec-chairs@ietf.org, draft-ietf-opsec-routing-protocols-crypto-issues@ietf.org to (None)
2012-08-22
07 (System) post-migration administrative database adjustment to the Yes position for Jari Arkko
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Lars Eggert
2010-10-25
07 Cindy Morgan State changed to RFC Published from RFC Ed Queue by Cindy Morgan
2010-10-25
07 Cindy Morgan [Note]: changed to 'RFC 6039' by Cindy Morgan
2010-10-22
07 (System) RFC published
2010-09-02
07 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2010-09-02
07 (System) IANA Action state changed to No IC from In Progress
2010-09-02
07 (System) IANA Action state changed to In Progress
2010-09-02
07 Amy Vezza IESG state changed to Approved-announcement sent
2010-09-02
07 Amy Vezza IESG has approved the document
2010-09-02
07 Amy Vezza Closed "Approve" ballot
2010-09-02
07 Ron Bonica State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Ron Bonica
2010-09-02
07 Tim Polk
[Ballot comment]
I would like to thank the authors for all their hard work.  I have cleared.  I did note
two small issues that I ...
2010-09-02
07 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk
2010-08-31
07 (System) New version available: draft-ietf-opsec-routing-protocols-crypto-issues-07.txt
2010-06-14
07 Lars Eggert [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss by Lars Eggert
2010-06-13
07 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to Yes from Discuss by Jari Arkko
2010-06-10
07 (System) Sub state has been changed to AD Follow up from New Id Needed
2010-06-10
06 (System) New version available: draft-ietf-opsec-routing-protocols-crypto-issues-06.txt
2010-06-03
07 Cindy Morgan State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan
2010-06-03
07 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo
2010-06-03
07 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2010-06-03
07 Sean Turner [Ballot comment]
I support Tim's DISCUSSes.
2010-06-03
07 Sean Turner [Ballot Position Update] New position, No Objection, has been recorded by Sean Turner
2010-06-03
07 Tim Polk
[Ballot comment]
(a) On discuss issue #1, here are some papers that could be referenced
regarding concerns with SHA-1 and SHA-2:

        ...
2010-06-03
07 Tim Polk
[Ballot discuss]
This is a useful document and I look forward to seeing it published.
However, there ae a few issues I believe need to ...
2010-06-03
07 Tim Polk
[Ballot comment]
(a) On discuss issue #1, here are some papers that could be referenced
regarding concerns with SHA-1 and SHA-2:

        ...
2010-06-03
07 Tim Polk
[Ballot discuss]
This is a useful document and I look forward to seeing it published.
However, there ae a few issues I believe need to ...
2010-06-03
07 Tim Polk
[Ballot comment]
(a) On discuss issue #1, here are some papers that could be referenced
regarding concerns with SHA-1 and SHA-2:

        ...
2010-06-03
07 Tim Polk
[Ballot discuss]
This is a useful document and I look forward to seeing it published.
However, there ae a few issues I believe need to ...
2010-06-03
07 Dan Romascanu [Ballot Position Update] New position, Yes, has been recorded by Dan Romascanu
2010-06-03
07 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2010-06-03
07 Jari Arkko
[Ballot comment]
The document says:

  [RFC4552] mandates the use of ESP with null encryption
  for authentication and also does encourage the use of ...
2010-06-03
07 Jari Arkko
[Ballot discuss]
This is a truly excellent and much needed document and I wanted to
ballot Yes on it. However, there was one small but ...
2010-06-03
07 Jari Arkko
[Ballot comment]
The document says:

  [RFC4552] mandates the use of ESP with null encryption
  for authentication and also does encourage the use of ...
2010-06-03
07 Jari Arkko
[Ballot discuss]
This is a truly excellent and much needed document and I wanted to
ballot Yes on it. However, there was one small but ...
2010-06-03
07 Jari Arkko
[Ballot comment]
The document says:

  [RFC4552] mandates the use of ESP with null encryption
  for authentication and also does encourage the use of ...
2010-06-03
07 Jari Arkko
[Ballot discuss]
This is a truly excellent document and I wanted to ballot Yes on it.
However, there was a small but annoying mistake in ...
2010-06-03
07 Jari Arkko
[Ballot comment]
The document says:

  [RFC4552] mandates the use of ESP with null encryption
  for authentication and also does encourage the use of ...
2010-06-03
07 Jari Arkko
[Ballot discuss]
This is a truly excellent document and I wanted to ballot Yes on it.
However, there was a small but annoying mistake in ...
2010-06-03
07 Jari Arkko
[Ballot comment]
The document says:

  [RFC4552] mandates the use of ESP with null encryption
  for authentication and also does encourage the use of ...
2010-06-03
07 Jari Arkko
[Ballot discuss]
This is a truly excellent document and I wanted to ballot Yes on it.
However, there was a small but annoying mistake in ...
2010-06-03
07 Jari Arkko
[Ballot comment]
The document says:

  [RFC4552] mandates the use of ESP with null encryption
  for authentication and also does encourage the use of ...
2010-06-03
07 Jari Arkko
[Ballot discuss]
This is a truly excellent document and I wanted to ballot Yes on it.
However, there was a small but annoying mistake in ...
2010-06-03
07 Jari Arkko
[Ballot comment]
The document says:

  [RFC4552] mandates the use of ESP with null encryption
  for authentication and also does encourage the use of ...
2010-06-03
07 Jari Arkko
[Ballot discuss]
This is a truly excellent document and I wanted to ballot Yes on it.
However, there was a small but annoying mistake in ...
2010-06-03
07 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko
2010-06-03
07 Jari Arkko
[Ballot comment]
The document says:

  [RFC4552] mandates the use of ESP with null encryption
  for authentication and also does encourage the use of ...
2010-06-02
07 Stewart Bryant
[Ballot comment]
Scenario 1:
     
      R1 sends an authenticated RIP message to R2 with a cryptographic 
      sequence ...
2010-06-02
07 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded by Stewart Bryant
2010-06-02
07 Peter Saint-Andre [Ballot Position Update] New position, No Objection, has been recorded by Peter Saint-Andre
2010-06-01
07 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms
2010-06-01
05 (System) New version available: draft-ietf-opsec-routing-protocols-crypto-issues-05.txt
2010-06-01
07 Adrian Farrel [Ballot Position Update] New position, Yes, has been recorded by Adrian Farrel
2010-06-01
07 Adrian Farrel
[Ballot comment]
Please capture the changes agreed with Young Lee as the result of his
Routing Area Directorate review.

---

Nit

Abstract bullet 2
Begin ...
2010-05-31
07 Russ Housley
[Ballot comment]
Please consider the comments in the Gen-ART Review from
  Enrico Marocco on 10-May-2010.  The review can be found at:

    http://www.softarmor.com/rai/temp-gen-art/ ...
2010-05-31
07 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2010-05-31
07 (System) State Changes to IESG Evaluation from IESG Evaluation - Defer by system
2010-05-22
07 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Nicolas Williams.
2010-05-21
07 (System) Removed from agenda for telechat - 2010-05-20
2010-05-20
07 Lars Eggert
[Ballot discuss]
>    [RFC2385] describes the use of TCP MD5 signature option for providing
>    packet origin authentication and data integrity protection of ...
2010-05-20
07 Lars Eggert [Ballot Position Update] New position, Discuss, has been recorded by Lars Eggert
2010-05-18
07 Sean Turner State Changes to IESG Evaluation - Defer from IESG Evaluation by Sean Turner
2010-05-14
07 Ron Bonica State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Ron Bonica
2010-05-10
07 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2010-04-30
07 Ron Bonica Placed on agenda for telechat - 2010-05-20 by Ron Bonica
2010-04-27
07 Samuel Weiler Request for Last Call review by SECDIR is assigned to Nicolas Williams
2010-04-27
07 Samuel Weiler Request for Last Call review by SECDIR is assigned to Nicolas Williams
2010-04-26
07 Amanda Baber IANA comments:

As described in the IANA Considerations section, we understand this document
to have NO IANA Actions.
2010-04-26
07 Amy Vezza Last call sent
2010-04-26
07 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2010-04-26
07 Ron Bonica Last Call was requested by Ron Bonica
2010-04-26
07 Ron Bonica Removed from agenda for telechat - 2010-05-06 by Ron Bonica
2010-04-26
07 Ron Bonica State Changes to Last Call Requested from AD Evaluation::AD Followup by Ron Bonica
2010-04-23
07 Ron Bonica Placed on agenda for telechat - 2010-05-06 by Ron Bonica
2010-04-23
07 Ron Bonica [Ballot Position Update] New position, Yes, has been recorded for Ronald Bonica
2010-04-23
07 Ron Bonica Ballot has been issued by Ron Bonica
2010-04-23
07 Ron Bonica Created "Approve" ballot
2010-04-23
07 (System) Ballot writeup text was added
2010-04-23
07 (System) Last call text was added
2010-04-23
07 (System) Ballot approval text was added
2010-04-22
07 (System) Sub state has been changed to AD Follow up from New Id Needed
2010-04-22
04 (System) New version available: draft-ietf-opsec-routing-protocols-crypto-issues-04.txt
2010-04-20
07 Ron Bonica State Changes to AD Evaluation::Revised ID Needed from Expert Review by Ron Bonica
2010-03-18
07 Ron Bonica State Changes to Expert Review from Publication Requested by Ron Bonica
2010-02-24
07 Cindy Morgan [Note]: 'Joe Abley (jabley@hopcount.ca) is the document shepherd.' added by Cindy Morgan
2010-02-24
07 Cindy Morgan
Hi,

Document shepherd write-up for draft-ietf-opsec-routing-protocols-crypto-issues-03 follows.

>  (1.a) Who is the Document Shepherd for this document? Has the
>        Document Shepherd ...
2010-02-24
07 Cindy Morgan Draft Added by Cindy Morgan in state Publication Requested
2010-01-21
03 (System) New version available: draft-ietf-opsec-routing-protocols-crypto-issues-03.txt
2009-11-11
02 (System) New version available: draft-ietf-opsec-routing-protocols-crypto-issues-02.txt
2009-10-20
01 (System) New version available: draft-ietf-opsec-routing-protocols-crypto-issues-01.txt
2008-10-22
00 (System) New version available: draft-ietf-opsec-routing-protocols-crypto-issues-00.txt