23
Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

Embed Size (px)

DESCRIPTION

WG Reports BOF Reports Invited Presentation –ECC Efficiencies (Rene Struik) –Distributed Security Architecture Within Enterprise Environments (Radia Pearlman and Ken Grewal) –TLS Server ID Check (Jeff Hodges) –Cryptographically Generated Address (CGA) Extension Header for Internet Protocol version 6 (IPv6) (Margaret Wasserman) –Cipher Suite Proliferation (Sean Turner ) –Revisiting IPv6 Node Requirements (Thomas Narten) Open Mike

Citation preview

Page 1: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

Security Area Advisory Group

Tim PolkSean Turner

July 29, 2010

Page 2: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

Note WellAny submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made within the context of an IETF activity is considered an "IETF Contribution". Such statements include oral statements in IETF sessions, as well as written and electronic communications made at any time or place, which are addressed to:

  - the IETF plenary session,  - any IETF working group or portion thereof,  - the IESG or any member thereof on behalf of the IESG,  - the IAB or any member thereof on behalf of the IAB,  - any IETF mailing list, including the IETF list itself, any working group or design team list, or any other list functioning under IETF auspices,  - the RFC Editor or the Internet-Drafts function

All IETF Contributions are subject to the rules of RFC 5378 and RFC 3979 (updated by RFC 4879).

Statements made outside of an IETF session, mailing list or other function, that are clearly not intended to be input to an IETF activity, group or function, are not IETF Contributions in the context of this notice.  Please consult RFC 5378 and RFC 3979 for details.

A participant in any IETF activity is deemed to accept all IETF rules of process, as documented in Best Current Practices RFCs and IESG Statements.

A participant in any IETF activity acknowledges that written, audio and video records of meetings may be made and may be available to the public.

Page 3: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

• WG Reports• BOF Reports• Invited Presentation

– ECC Efficiencies (Rene Struik)– Distributed Security Architecture Within Enterprise

Environments (Radia Pearlman and Ken Grewal)– TLS Server ID Check (Jeff Hodges)– Cryptographically Generated Address (CGA) Extension

Header for Internet Protocol version 6 (IPv6) (Margaret Wasserman)

– Cipher Suite Proliferation (Sean Turner)

– Revisiting IPv6 Node Requirements (Thomas Narten)• Open Mike

Page 4: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

ipsecme(IP Security Maintenance and Extensions)

• Paul Hoffman• Yaron Sheffer• https://www.ietf.org/mail-archive/web/saag/current/msg02853.html

Page 5: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

pkix (Public Key Infrastructure using X.509)• Stephen Kent• Stefan Santesson• https://www.ietf.org/mail-archive/web/saag/current/msg02849.html

Page 6: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

kitten(GSS-API Next Generation)

• Shawn Emery• Tom Yu• http://www.ietf.org/mail-archive/web/saag/current/msg02858.html

Page 7: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

nea(Network Endpoint Assessment)

• Stephen Hanna• Susan Thomson• https://www.ietf.org/mail-archive/web/saag/current/msg02852.html

Page 8: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

emu(EAP Method Update)

• Alan DeKok• Joe Salowey• https://www.ietf.org/mail-archive/web/saag/current/msg02854.html

Page 9: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

dkim(Domain Keys Identified Mail)

• Stephen Farrell• Barry Leiba• https://www.ietf.org/mail-archive/web/saag/current/msg02855.html

Page 10: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

hokey(Handover Keying)

• Tina Tsou• Glen Zorn• (meeting later today)

Page 11: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

tls(Transport Layer Security)

• Eric Rescorla• Joe Salowey• (meeting later today)

Page 12: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

msec(Multicast Security)

• Vincent Roca• Brian Weis• (meeting Friday)

Page 13: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

ltans (Long Term Archive and Notary Service)• Tobias Gondrom• Carl Wallace• (meeting Friday)

Page 14: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

isms (Integrated Security Model for SNMP)• Jürgen Schönwälder• Russ Mundy• (not meeting this week) • https://www.ietf.org/mail-archive/web/saag/current/msg02850.html

Page 15: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

krb-wg(Kerberos)

• Jeff Hutzelman• Larry Zhu• (not meeting this week)

Page 16: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

keyprov(Provisioning of Symmetric Keys)

• Phillip Hallam-Baker• Hannes Tschofenig• (not meeting this week)• http://www.ietf.org/mail-archive/web/saag/current/msg02859.html

Page 17: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

sasl (Simple Authentication and Layer Services)

• Tom Yu• Kurt Zeilenga• Merged with kitten

Page 18: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

smime(S/MIME Mail Security)

• Paul Hoffman• Blake Ramsdell• (not meeting this week)• http://www.ietf.org/mail-archive/web/saag/current/msg02857.html

Page 19: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

syslog (Security Issues in Network Event Logging)

• David Harrington• Chris Lonvick• (not meeting this week)• https://www.ietf.org/mail-archive/web/saag/current/msg02848.html

Page 20: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

fedauth(Federated Authentication Beyond

The Web BOF)• Sam Hartman• Leif Johansson• http://www.ietf.org/mail-archive/web/saag/current/????

Page 21: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

Other WGs and BOFs

• BOF– HASMAT

• WGs– KARP– SIDR– OAUTH

• Bar BOFs

Page 22: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

Invited Presentations• ECC Efficiencies (Rene Struik)• Distributed Security Architecture Within Enterprise

Environments (Radia Pearlman and Ken Grewal)• TLS Server ID Check (Jeff Hodges)• Cryptographically Generated Address (CGA)

Extension Header for Internet Protocol version 6 (IPv6) (Margaret Wasserman)

• Cipher Suite Proliferation (Sean Turner)

• Revisiting IPv6 Node Requirements (Thomas Narten)

Page 23: Security Area Advisory Group Tim Polk Sean Turner July 29, 2010

Open Mike

• Concerns?• Issues?• Soap Box?