[LACNIC/Seguridad] Fwd: A tale of (flawed) transient numeric identifiers (Fwd: New Version Notification for draft-gont-numeric-ids-history-00.txt)

Fernando Gont fgont en si6networks.com
Vie Jul 8 14:45:49 BRT 2016

FYI. IETF I-D por la Iglesia Maradoniana...

-------- Forwarded Message --------
Subject: A tale of (flawed) transient numeric identifiers (Fwd: New
Version Notification for draft-gont-numeric-ids-history-00.txt)
Date: Fri, 8 Jul 2016 18:23:05 +0200
From: Fernando Gont <fgont en si6networks.com>
To: saag en ietf.org <saag en ietf.org>
CC: privsec-program en iab.org <privsec-program en iab.org>, Iván Arce
<iarce en fundacionsadosky.org.ar>


As suggested by a number of folks during the SAAG meeing in Buenos
Aires, we have submitted the history of flawed numeric IDs as a
stand-alone I-D. It is available at:

We believe this information provides good background and motivation for
pursuing further work in this area, and learning about errors from the past.

Your input will be very appreciated.


-------- Forwarded Message --------
Subject: New Version Notification for draft-gont-numeric-ids-history-00.txt
Date: Fri, 08 Jul 2016 09:17:38 -0700
From: internet-drafts en ietf.org
To: Ivan Arce <stic en fundacionsadosky.org.ar>, Fernando Gont
<fgont en si6networks.com>

A new version of I-D, draft-gont-numeric-ids-history-00.txt
has been successfully submitted by Fernando Gont and posted to the
IETF repository.

Name:		draft-gont-numeric-ids-history
Revision:	00
Title:		Unfortunate History of Transient Numeric Identifiers
Document date:	2016-07-08
Group:		Individual Submission
Pages:		13

   This document performs an analysis of the security and privacy
   implications of different types of "numeric identifiers" used in IETF
   protocols, and tries to categorize them based on their
   interoperability requirements and the associated failure severity
   when such requirements are not met.  It describes a number of
   algorithms that have been employed in real implementations to meet
   such requirements and analyzes their security and privacy properties.
   Additionally, it provides advice on possible algorithms that could be
   employed to satisfy the interoperability requirements of each
   identifier type, while minimizing the security and privacy
   implications, thus providing guidance to protocol designers and
   protocol implementers.  Finally, it provides recommendations for
   future protocol specifications regarding the specification of the
   aforementioned numeric identifiers.

Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat

Más información sobre la lista de distribución Seguridad