Dear Chairs,
I have updated my following IETF draft about using FrodoKEM in the IKEv2 by
changing its title and modifying the content to focus mainly on how to use
FrodoKEM for the IKEv2 and apply code points.
https://datatracker.ietf.org/doc/draft-wang-hybrid-kem-ikev2-frodo/
Will appreciate
Linda Dunbar wrote:
> We presented the 01 version at the Alldispatch session in IETF120. The
> feedback was the mechanism should be discussed in the IPsecme group.
Well, my feedback, at the MIC, at Vancouver was that you needed a new key
agreement protocol that could share keys with the
Here is the agenda for the IPsecME meeting in the IETF #121.
As we will be meeting in the Monday morning, I request all presentors
to send their slides Saturday, so I have time to generate my normal
combined slideset. You can either send slides to chairs directly, or
propose them in the datatracke
Daniel Migault writes:
> We would like to present the two drafts below and believe they will be ready
> for WGLC.
> draft-ietf-ipsecme-diet-esp
> draft-ietf-ipsecme-ikev2-diet-esp-extension
I added 5 minutes for them in the beginning.
--
kivi...@iki.fi
__
Linda Dunbar writes:
> We would like a 10minutes slot at the IPsecme session in IETF 121 to discuss
> this draft:
>
> https://datatracker.ietf.org/doc/draft-dunbar-secdispatch-ligthtweight-authenticate/
>
> This document describes lightweight authentication methods to prevent
> malicious actors t
Hi, Linda (et al.),
I’m not sure I get the whole thing, but (help me if I'm wrong), it seems like
the point of this is:
a) there are stacks of protocols used for tunnels
b) it can be useful to protect just those added protocol layers (which for UDP
would include the trailing options).
If so, it