Cite this RFC:TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC9415
Discuss this RFC: Send questions or comments to the mailing listpearg@irtf.org
Other actions:Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 9415
This document performs an analysis of the security and privacyimplications of different types of "transient numeric identifiers"used in IETF protocols and tries to categorize them based on theirinteroperability requirements and their associated failure severitywhen such requirements are not met. Subsequently, it provides adviceon possible algorithms that could be employed to satisfy theinteroperability requirements of each identifier category whileminimizing the negative security and privacy implications, thusproviding guidance to protocol designers and protocol implementers.Finally, it describes a number of algorithms that have been employedin real implementations to generate transient numeric identifiers andanalyzes their security and privacy properties. This document is aproduct of the Privacy Enhancements and Assessments Research Group(PEARG) in the IRTF.
For the definition ofStatus,seeRFC 2026.
For the definition ofStream, seeRFC 8729.