Rfc 6518 Karp
نویسندگان
چکیده
This document is one of a series concerned with defining a roadmap of protocol specification work for the use of modern cryptographic mechanisms and algorithms for message authentication in routing protocols. In particular, it defines the framework for a key management protocol that may be used to create and manage session keys for message authentication and integrity.
منابع مشابه
Analysis of OSPF Security According to the Keying and Authentication for Routing Protocols (KARP) Design Guide
This document analyzes OSPFv2 and OSPFv3 according to the guidelines set forth in Section 4.2 of the "Keying and Authentication for Routing Protocols (KARP) Design Guidelines" (RFC 6518). Key components of solutions to gaps identified in this document are already underway.
متن کاملRFC 6862 KARP Overview , Threats , and Requirements March
Different routing protocols employ different mechanisms for securing protocol packets on the wire. While most already have some method for accomplishing cryptographic message authentication, in many cases the existing methods are dated, vulnerable to attack, and employ cryptographic algorithms that have been deprecated. The "Keying and Authentication for Routing Protocols" (KARP) effort aims to...
متن کاملRFC 7211 Operations Model for Router Keying
The IETF is engaged in an effort to analyze the security of routing protocol authentication according to design guidelines discussed in RFC 6518, "Keying and Authentication for Routing Protocols (KARP) Design Guidelines". Developing an operational and management model for routing protocol security that works with all the routing protocols will be critical to the deployability of these efforts. ...
متن کاملDisplay-Based Address Sorting for the IMAP4 SORT Extension
This document describes an IMAP protocol extension enabling server-side message sorting on the commonly displayed portion of the From and To header fields. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this document. Please review these documents carefully, as they describe your rig...
متن کاملWhat we hope is an official list of host names
The enclosed is what we hope will be accepted as a list of official formal host names and nicknames. As no other subject worked on by the NWG has generated so much comment, it is worthwhile to review briefly how this list came into being. The need for some standard set of names recognized by NCP's and Telnets and usable on hardcopy to designate a persons affiliation had been recognized for some...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012