[LACNIC/Seguridad] On the Generation of Transient Numeric Identifiers (Fwd: New Version Notification for draft-irtf-pearg-numeric-ids-generation-11.txt)
Fernando Gont
fgont en si6networks.com
Lun Jul 11 21:19:00 -03 2022
Estimades,
Publicamos la rev -11 de nuestro I-D sobre generacion de transient
numeric identifiers:
https://www.ietf.org/archive/id/draft-irtf-pearg-numeric-ids-generation-11.txt
P.S.: Mientras que lo estas leyendo, podes mandarle un poquitin de esto:
https://www.youtube.com/watch?v=FzTmRL14vkc&t=412s
Hable ahora, o calle para siempre. :-)
Abrazo,
Fernando
-------- Forwarded Message --------
Subject: New Version Notification for
draft-irtf-pearg-numeric-ids-generation-11.txt
Date: Mon, 11 Jul 2022 16:57:28 -0700
From: internet-drafts en ietf.org
To: Fernando Gont <fgont en si6networks.com>, Ivan Arce <iarce en quarkslab.com>
A new version of I-D, draft-irtf-pearg-numeric-ids-generation-11.txt
has been successfully submitted by Fernando Gont and posted to the
IETF repository.
Name: draft-irtf-pearg-numeric-ids-generation
Revision: 11
Title: On the Generation of Transient Numeric Identifiers
Document date: 2022-07-11
Group: pearg
Pages: 45
URL:
https://www.ietf.org/archive/id/draft-irtf-pearg-numeric-ids-generation-11.txt
Status:
https://datatracker.ietf.org/doc/draft-irtf-pearg-numeric-ids-generation/
Htmlized:
https://datatracker.ietf.org/doc/html/draft-irtf-pearg-numeric-ids-generation
Diff:
https://www.ietf.org/rfcdiff?url2=draft-irtf-pearg-numeric-ids-generation-11
Abstract:
This document performs an analysis of the security and privacy
implications of different types of "transient numeric identifiers"
used in IETF protocols, and tries to categorize them based on their
interoperability requirements and their associated failure severity
when such requirements are not met. Subsequently, it provides advice
on possible algorithms that could be employed to satisfy the
interoperability requirements of each identifier category, while
minimizing the negative security and privacy implications, thus
providing guidance to protocol designers and protocol implementers.
Finally, it describes a number of algorithms that have been employed
in real implementations to generate transient numeric identifiers,
and analyzes their security and privacy properties. This document is
a product of the Privacy Enhancement and Assessment Research Group
(PEARG) in the IRTF.
The IETF Secretariat
Más información sobre la lista de distribución Seguridad