--- 1/draft-ietf-bfd-generic-crypto-auth-04.txt 2013-10-15 02:14:27.336885513 -0700 +++ 2/draft-ietf-bfd-generic-crypto-auth-05.txt 2013-10-15 02:14:27.368886337 -0700 @@ -1,21 +1,21 @@ Network Working Group M. Bhatia Internet-Draft Alcatel-Lucent Intended status: Standards Track V. Manral -Expires: October 20, 2013 Hewlett-Packard Co. +Expires: April 18, 2014 Hewlett-Packard Co. D. Zhang Huawei - April 18, 2013 + October 15, 2013 BFD Generic Cryptographic Authentication - draft-ietf-bfd-generic-crypto-auth-04 + draft-ietf-bfd-generic-crypto-auth-05 Abstract This document proposes an extension to Bidirectional Forwarding Detection (BFD) to allow the use of arbitary cryptographic authentication algorithms in addition to the already-documented authentication schemes described in the base specification. This document adds the basic infrastructure that is required for supporting algorithm and key agility for BFD. @@ -33,21 +33,21 @@ Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." - This Internet-Draft will expire on October 20, 2013. + This Internet-Draft will expire on April 18, 2014. Copyright Notice Copyright (c) 2013 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents @@ -479,22 +479,22 @@ 7.2. Informative References [Dobb96a] Dobbertin, H., "Cryptanalysis of MD5 Compress", May 1996. [Dobb96b] Dobbertin, H., "The Status of MD5 After a Recent Attack", CryptoBytes", 1996. [I-D.ietf-karp-crypto-key-table] Housley, R., Polk, T., Hartman, S., and D. Zhang, "Database of Long-Lived Symmetric Cryptographic Keys", - draft-ietf-karp-crypto-key-table-07 (work in progress), - March 2013. + draft-ietf-karp-crypto-key-table-08 (work in progress), + July 2013. [I-D.ietf-karp-design-guide] Lebovitz, G. and M. Bhatia, "Keying and Authentication for Routing Protocols (KARP) Design Guidelines", draft-ietf- karp-design-guide-10 (work in progress), December 2011. [MD5-attack] Wang, X., Feng, D., Lai, X., and H. Yu, "Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD", August 2004.