| < draft-ietf-kink-reqmt-02.txt | draft-ietf-kink-reqmt-03.txt > | |||
|---|---|---|---|---|
| INTERNET-DRAFT KINK Requirements Michael Thomas | ||||
| Cisco Systems | ||||
| March 1, 2001 | ||||
| Kerberized Internet Negotiation of Keys | INTERNET-DRAFT Requirements for Kerberized Michael Thomas | |||
| Internet Negotiation of Keys Cisco Systems | ||||
| April 30, 2001 | ||||
| draft-ietf-kink-reqmt-02.txt | Requirements for Kerberized Internet Negotiation of Keys | |||
| draft-ietf-kink-reqmt-03.txt | ||||
| Status of this Memo | Status of this Memo | |||
| This document is an Internet-Draft and is in full conformance with | This document is an Internet-Draft and is in full conformance with | |||
| all provisions of Section 10 of RFC2026. Internet-Drafts are working | all provisions of Section 10 of RFC2026. Internet-Drafts are working | |||
| documents of the Internet Engineering Task Force (IETF), its areas, | documents of the Internet Engineering Task Force (IETF), its areas, | |||
| and its working groups. Note that other groups may also distribute | and its working groups. Note that other groups may also distribute | |||
| working documents as Internet-Drafts. | working documents as Internet-Drafts. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| skipping to change at page 4, line 35 ¶ | skipping to change at page 4, line 35 ¶ | |||
| - The protocol must be capable of rekeying without the assistance of | - The protocol must be capable of rekeying without the assistance of | |||
| the KDC if the Kerberos session ticket is still valid | the KDC if the Kerberos session ticket is still valid | |||
| - The protocol must make an effort to mitigate third party Denial of | - The protocol must make an effort to mitigate third party Denial of | |||
| Service attacks (aka Zombies attacks) | Service attacks (aka Zombies attacks) | |||
| - The protocol must be able to be used for more than IPsec keying | - The protocol must be able to be used for more than IPsec keying | |||
| - The protocol must support both IPv4 and IPv6 | - The protocol must support both IPv4 and IPv6 | |||
| Security Considerations | ||||
| These requirements lay out input to define a protocol which allows | ||||
| the keying of IPsec security associations using Kerberos as the key | ||||
| distribution mechanism. As such, the security associations that | ||||
| will be created by the new protocol will inherit the union of IPsec | ||||
| and Kerberos's existing security weaknesses. There is no require- | ||||
| ment to address those weaknesses unless in combination they produce | ||||
| a new weakness which is not inherent in other keying protocols. | ||||
| Acknowledgments | Acknowledgments | |||
| The original KINK Kabal was: | The original KINK Kabal was: | |||
| Michael Thomas (Cisco) | Michael Thomas (Cisco) | |||
| David McGrew (Cisco) | David McGrew (Cisco) | |||
| Jan Vilhuber (Cisco) | Jan Vilhuber (Cisco) | |||
| Jonathan Trostle (Cisco) | Jonathan Trostle (Cisco) | |||
| Matt Hur (Cybersafe) | Matt Hur (Cybersafe) | |||
| Mike Froh (Cybersafe) | Mike Froh (Cybersafe) | |||
| End of changes. 4 change blocks. | ||||
| 5 lines changed or deleted | 16 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||