- From: William Allen Simpson <wsimpson@greendragon.com>
- Date: Sun, 7 Apr 96 13:50:48 GMT
- To: ietf-tls@w3.org
> From: Win Treese <treese@openmarket.com> > standards track RFC(s) for protocols using the currently available > Internet drafts as a basis. The SSL, PCT and SSH protocols are > examples of mechanisms of establishing a secure channel for general > purpose or special purpose Internet applications running over a > reliable transport, usually TCP. > Are we limited to these drafts? Or do other drafts already presented to the IPSec WG (specifically Photuris) that include general mechanisms for transport-layer security negotiation possible? The above seems to conflict with the "best effort" clause on key management: > The work currently under way in the area of secure IP is outside the > scope of this working group. Also, general authentication mechanism > discussions are outside the focus of this group. However, best efforts > will be made to utilize as much as possible of the already existing > technologies and methodologies in the IETF and other places to solve > common problems, such as key management. > WSimpson@UMich.edu Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32 BSimpson@MorningStar.com Key fingerprint = 2E 07 23 03 C5 62 70 D3 59 B1 4F 5E 1D C2 C1 A2
Received on Sunday, 7 April 1996 09:58:02 UTC