< draft-ietf-karp-crypto-key-table-05.txt   draft-ietf-karp-crypto-key-table-06.txt >
INTERNET-DRAFT R. Housley INTERNET-DRAFT R. Housley
Internet Engineering Task Force (IETF) Vigil Security Internet Engineering Task Force (IETF) Vigil Security
Intended Status: Standards Track T. Polk Intended Status: Standards Track T. Polk
NIST NIST
S. Hartman S. Hartman
Painless Security Painless Security
D. Zhang D. Zhang
Huawei Huawei
Expires: 14 August 2013 14 February 2013 Expires: 20 August 2013 20 February 2013
Database of Long-Lived Symmetric Cryptographic Keys Database of Long-Lived Symmetric Cryptographic Keys
<draft-ietf-karp-crypto-key-table-05.txt> <draft-ietf-karp-crypto-key-table-06.txt>
Status of this Memo Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other Task Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet-Drafts. groups may also distribute working documents as Internet-Drafts.
skipping to change at page 6, line 14 skipping to change at page 6, line 14
indication that the time is in UTC. indication that the time is in UTC.
AcceptLifeTimeEnd AcceptLifeTimeEnd
The AcceptLifeTimeEnd field specifies the latest date and time The AcceptLifeTimeEnd field specifies the latest date and time
at which this key should be considered for use when processing at which this key should be considered for use when processing
the received traffic. The format of this field is identical to the received traffic. The format of this field is identical to
the format of AcceptLifeTimeStart. the format of AcceptLifeTimeStart.
3. Key Selection and Rollover 3. Key Selection and Rollover
A protocol may directly consult the key table to find the key A protocol may directly consult the key table to find the key to use
to use on an outgoing packet. The protocol provides a protocol on an outgoing packet. The protocol provides a protocol (P) and a
(P) and a peer identifier (H) into the key selection function. peer identifier (H) into the key selection function. Optionally, an
Optionally, an interface identifier (I) may also need to be interface identifier (I) may also need to be provided. Any key that
provided. Any key that satisfies the following conditions may satisfies the following conditions may be selected:
be selected:
(1) the Peers field includes H; (1) the Peers field includes H;
(2) the Protocol field matches P; (2) the Protocol field matches P;
(3) If an interface is specified, the Interfaces field includes I (3) If an interface is specified, the Interfaces field includes I
or "all"; or "all";
(4) the Direction field is either "out" or "both"; and (4) the Direction field is either "out" or "both"; and
skipping to change at page 7, line 8 skipping to change at page 7, line 4
time in the SendLifetimeStart field. time in the SendLifetimeStart field.
In order to look up a key for verifying an incoming packet, the In order to look up a key for verifying an incoming packet, the
protocol provides its protocol (P), the peer identifier (H), the key protocol provides its protocol (P), the peer identifier (H), the key
identifier (L), and optionally the interface (I). If one key matches identifier (L), and optionally the interface (I). If one key matches
the following conditions it is selected: the following conditions it is selected:
(1) the Peer field includes H; (1) the Peer field includes H;
(2) the Protocol field matches P; (2) the Protocol field matches P;
(3) if the Interface field is provided, it includes I or is (3) if the Interface field is provided, it includes I or is
"all"; "all";
(4) the Direction field is either "in" or "both"; (4) the Direction field is either "in" or "both";
(5) the LocalKeyName is L; and (5) the LocalKeyName is L; and
(5) AcceptLifeTimeStart <= current time <= AcceptLifeTimeEnd. (6) AcceptLifeTimeStart <= current time <= AcceptLifeTimeEnd.
Note that the key usage is loosely bound by the times specified in Note that the key usage is loosely bound by the times specified in
the AcceptLifeTimeStart and AcceptLifeTimeEnd fields. New security the AcceptLifeTimeStart and AcceptLifeTimeEnd fields. New security
associations should not be established except within the period of associations should not be established except within the period of
use specified by these fields, while allowing some grace time for use specified by these fields, while allowing some grace time for
clock skew. However, if a security association has already been clock skew. However, if a security association has already been
established based on a particular long-lived key, exceeding the established based on a particular long-lived key, exceeding the
lifetime does not have any direct impact. The implementations of lifetime does not have any direct impact. The implementations of
security protocols that involve long-lived security association security protocols that involve long-lived security association
should be designed to periodically interrogate the database and should be designed to periodically interrogate the database and
 End of changes. 5 change blocks. 
10 lines changed or deleted 8 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/