Dismiss
InnovationQ/InnovationQ Plus content will be updated on Sunday, June 25, 10am ET, with new patent and non-patent literature collections. Click here to learn more.
Browse Prior Art Database

Report of IAB Workshop on Security in the Internet Architecture - February 8-10, 1994 (RFC1636)

IP.com Disclosure Number: IPCOM000002472D
Original Publication Date: 1994-Jun-01
Included in the Prior Art Database: 2000-Sep-12

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

R. Braden: AUTHOR [+4]

Abstract

This document is a report on an Internet architecture workshop, initiated by the IAB and held at USC Information Sciences Institute on February 8-10, 1994. This workshop generally focused on security issues in the Internet architecture.

This text was extracted from a ASCII Text document.
This is the abbreviated version, containing approximately 2% of the total text.

Network Working Group R. Braden

Request for Comments: 1636 ISI

Category: Informational D. Clark

MIT Laboratory for Computer Science

S. Crocker

Trusted Information Systems, Inc.

C. Huitema

INRIA, IAB Chair

June 1994

Report of IAB Workshop on

Security in the Internet Architecture

February 8-10, 1994

Status of this Memo

This memo provides information for the Internet community. This memo

does not specify an Internet standard of any kind. Distribution of

this memo is unlimited.

Abstract

This document is a report on an Internet architecture workshop,

initiated by the IAB and held at USC Information Sciences Institute

on February 8-10, 1994. This workshop generally focused on security

issues in the Internet architecture.

This document should be regarded as a set of working notes containing

ideas about security that were developed by Internet experts in a

broad spectrum of areas, including routing, mobility, realtime

service, and provider requirements, as well as security. It contains

some significant diversity of opinions on some important issues.

This memo is offered as one input in the process of developing viable

security mechanisms and procedures for the Internet.

Table of Contents

1. INTRODUCTION .................................................. 2

2. OVERVIEW ...................................................... 4

2.1 Strategic and Political Issues ........................... 4

2.2 Security Issues .......................................... 4

2.3 DNS Names for Certificates ............................... 7

3. FIREWALL ARCHITECTURE ......................................... 9

3.1 Introduction ............................................. 9

3.2 Application-Layer Firewalls .............................. 11

3.3 IP-Layer Firewalls ....................................... 12

4. SECURE QOS FORWARDING ......................................... 21

4.1 The Requirement for Setup ................................ 21

4.2 Securing the Setup Process. .............................. 22

4.3 Validating an LLID ....................................... 24

4.4 Dynamics of Setup ........................................ 28

4.5 Receiver-Initiated Setup ................................. 30

4.6 Other Issues ............................................. 30

5. AN AUTHENTICATION SERVICE ..................................... 35

5.1 Names and Credentials ......................