[IPsec] Re: Need 5 minutes slot at the IPsecme session

2024-10-30 Thread Wang Guilin
Dear Chairs, I have updated my following IETF draft about using FrodoKEM in the IKEv2 by changing its title and modifying the content to focus mainly on how to use FrodoKEM for the IKEv2 and apply code points. https://datatracker.ietf.org/doc/draft-wang-hybrid-kem-ikev2-frodo/ Will appreciate

[IPsec] Re: Need 10 minutes slot at the IPsecme session

2024-10-30 Thread Michael Richardson
Linda Dunbar wrote: > We presented the 01 version at the Alldispatch session in IETF120. The > feedback was the mechanism should be discussed in the IPsecme group. Well, my feedback, at the MIC, at Vancouver was that you needed a new key agreement protocol that could share keys with the

[IPsec] IPsecME agenda for IETF #121

2024-10-30 Thread Tero Kivinen
Here is the agenda for the IPsecME meeting in the IETF #121. As we will be meeting in the Monday morning, I request all presentors to send their slides Saturday, so I have time to generate my normal combined slideset. You can either send slides to chairs directly, or propose them in the datatracke

[IPsec] Re: IPsecME agenda items for IETF #121

2024-10-30 Thread Tero Kivinen
Daniel Migault writes: > We would like to present the two drafts below and believe they will be ready > for WGLC. > draft-ietf-ipsecme-diet-esp > draft-ietf-ipsecme-ikev2-diet-esp-extension I added 5 minutes for them in the beginning. -- kivi...@iki.fi __

[IPsec] Need 10 minutes slot at the IPsecme session

2024-10-30 Thread Tero Kivinen
Linda Dunbar writes: > We would like a 10minutes slot at the IPsecme session in IETF 121 to discuss > this draft: > > https://datatracker.ietf.org/doc/draft-dunbar-secdispatch-ligthtweight-authenticate/ > > This document describes lightweight authentication methods to prevent > malicious actors t

[IPsec] Re: Need 10 minutes slot at the IPsecme session

2024-10-30 Thread to...@strayalpha.com
Hi, Linda (et al.), I’m not sure I get the whole thing, but (help me if I'm wrong), it seems like the point of this is: a) there are stacks of protocols used for tunnels b) it can be useful to protect just those added protocol layers (which for UDP would include the trailing options). If so, it