draft-ietf-pim-v2-auth-00.txt   draft-ietf-pim-v2-auth-01.txt 
Network Working Group PIM Working Group Network Working Group PIM Working Group
INTERNET DRAFT Editor, INTERNET DRAFT Editor,
Expire in six months Liming Wei Expire in six months Liming Wei
cisco Systems Inc. Redback Networks Inc.
Nov 11, 1998 July 14, 2000
Authenticating PIM version 2 messages Authenticating PIM version 2 messages
<draft-ietf-pim-v2-auth-00.txt> <draft-ietf-pim-v2-auth-01.txt>
Status of this Memo Status of this Memo
This document is an Internet-Draft. Internet Drafts are working This document is an Internet-Draft and is in full conformance
documents of the Internet Engineering Task Force (IETF), its areas, with all provisions of Section 10 of RFC2026.
and its working Groups. Note that other groups may also distribute
working documents as Internet Drafts.
Internet-Drafts draft documents are valid for a maximum of six months Internet-Drafts are working documents of the Internet Engineering
and may be updated, replaced, or obsoleted by other documents at any Task Force (IETF), its areas, and its working groups. Note that
time. It is inappropriate to use Internet-Drafts as reference other groups may also distribute working documents as
material or to cite them other than as "work in progress." Internet-Drafts.
To learn the current status of any Internet-Draft, please check the Internet-Drafts are draft documents valid for a maximum of six
"1id-abstracts.txt" listing contained in the Internet-Drafts Shadow months and may be updated, replaced, or obsoleted by other
Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe), documents at any time. It is inappropriate to use Internet-
munnari.oz.au (Pacific Rim), ftp.ietf.org (US East Coast), or Drafts as reference material or to cite them other than as
ftp.isi.edu (US West Coast). "work in progress."
Distribution of this memo is unlimited. The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Abstract Abstract
This draft specifies the use of IPSEC authentication header [KA98] to This draft specifies the use of IPSEC authentication header [KA98] to
provide protocol message integrity protection and groupwise message provide protocol message integrity protection and groupwise message
origin authentication. origin authentication.
The text in this draft will be either incorporated into or referenced The text in this draft will be either incorporated into or referenced
by the PIM version 2 protocol specifications. by the PIM version 2 protocol specifications.
skipping to change at line 218 skipping to change at line 219
The strength of message integrity protection and groupwise message The strength of message integrity protection and groupwise message
origin authentication depends on the strength of the underlying origin authentication depends on the strength of the underlying
security transformations used. According to [MG98][SHA][PKCS1], to security transformations used. According to [MG98][SHA][PKCS1], to
date, there are no known attacks against these algorithms. date, there are no known attacks against these algorithms.
5. Acknowledgements 5. Acknowledgements
The ideas in this draft were contributed or instigated by Dino The ideas in this draft were contributed or instigated by Dino
Farinacci, David Meyer, Dan Harkins, Tony Speakman, Cheryl Madson, Farinacci, David Meyer, Dan Harkins, Tony Speakman, Cheryl Madson,
Brian Weis, and Achutha Rao. Other members of the PIM working group Brian Weis, Achutha Rao and Tom Pusateri. Other members of the PIM
also contributed to the discussions and ideas in this draft. working group also contributed to the discussions and ideas in this
draft.
6. References 6. References
[KA98] Kent Stephen, Randall Atkinson, "IP Authentication Header", [KA98] Kent Stephen, Randall Atkinson, "IP Authentication Header",
"draft-ietf-ipsec-auth-header-07.txt", July 1998 "draft-ietf-ipsec-auth-header-07.txt", July 1998
[RFC1321] R. Rivest, "MD5 Digest Algorithm", RFC1321, April 1992 [RFC1321] R. Rivest, "MD5 Digest Algorithm", RFC1321, April 1992
[MG98] C. Madson, R. Glenn, "The Use of HMAC-MD5-96 within ESP and AH", [MG98] C. Madson, R. Glenn, "The Use of HMAC-MD5-96 within ESP and AH",
"draft-ietf-ipsec-auth-hmac-md5-96-03.txt", Feb 1998 "draft-ietf-ipsec-auth-hmac-md5-96-03.txt", Feb 1998
[PKCS1] RSA Laboratories, "PKCS#1: RSA Encryption Standard", Volume1.5, [PKCS1] RSA Laboratories, "PKCS#1: RSA Encryption Standard", Volume1.5,
No. 1993 No. 1993
[SHA] C. Madson, R Glenn "The Use of HMAC-SHA-1-96 within ESP and AH", [SHA] C. Madson, R Glenn "The Use of HMAC-SHA-1-96 within ESP and AH",
"draft-ietf-ipsec-auth-hmac-sha1-96-03.txt", Feb, 1998 "draft-ietf-ipsec-auth-hmac-sha1-96-03.txt", Feb, 1998
6. Editor's address 6. Editor's address
Liming Wei Liming Wei
cisco Systems, Inc. Redback Networks, Inc.
170 West Tasman Drive 350 Holger Way,
San Jose, CA 95134 San Jose, CA 95134
lwei@cisco.com lwei@redback.com
 End of changes. 

This html diff was produced by rfcdiff 1.23, available from http://www.levkowetz.com/ietf/tools/rfcdiff/