[LACNIC/Seguridad] On the Generation of Transient Numeric Identifiers (Fwd: New Version Notification for draft-irtf-pearg-numeric-ids-generation-11.txt)

Fernando Gont fgont en si6networks.com
Lun Jul 11 21:19:00 -03 2022


Estimades,

Publicamos la rev -11 de nuestro I-D sobre generacion de transient 
numeric identifiers: 
https://www.ietf.org/archive/id/draft-irtf-pearg-numeric-ids-generation-11.txt

P.S.: Mientras que lo estas leyendo, podes mandarle un poquitin de esto: 
https://www.youtube.com/watch?v=FzTmRL14vkc&t=412s

Hable ahora, o calle para siempre. :-)

Abrazo,
Fernando




-------- Forwarded Message --------
Subject: New Version Notification for 
draft-irtf-pearg-numeric-ids-generation-11.txt
Date: Mon, 11 Jul 2022 16:57:28 -0700
From: internet-drafts en ietf.org
To: Fernando Gont <fgont en si6networks.com>, Ivan Arce <iarce en quarkslab.com>


A new version of I-D, draft-irtf-pearg-numeric-ids-generation-11.txt
has been successfully submitted by Fernando Gont and posted to the
IETF repository.

Name:		draft-irtf-pearg-numeric-ids-generation
Revision:	11
Title:		On the Generation of Transient Numeric Identifiers
Document date:	2022-07-11
Group:		pearg
Pages:		45
URL: 
https://www.ietf.org/archive/id/draft-irtf-pearg-numeric-ids-generation-11.txt
Status: 
https://datatracker.ietf.org/doc/draft-irtf-pearg-numeric-ids-generation/
Htmlized: 
https://datatracker.ietf.org/doc/html/draft-irtf-pearg-numeric-ids-generation
Diff: 
https://www.ietf.org/rfcdiff?url2=draft-irtf-pearg-numeric-ids-generation-11

Abstract:
    This document performs an analysis of the security and privacy
    implications of different types of "transient numeric identifiers"
    used in IETF protocols, and tries to categorize them based on their
    interoperability requirements and their associated failure severity
    when such requirements are not met.  Subsequently, it provides advice
    on possible algorithms that could be employed to satisfy the
    interoperability requirements of each identifier category, while
    minimizing the negative security and privacy implications, thus
    providing guidance to protocol designers and protocol implementers.
    Finally, it describes a number of algorithms that have been employed
    in real implementations to generate transient numeric identifiers,
    and analyzes their security and privacy properties.  This document is
    a product of the Privacy Enhancement and Assessment Research Group
    (PEARG) in the IRTF.

 


The IETF Secretariat




Más información sobre la lista de distribución Seguridad