Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

The Keying and Authentication for Routing Protocol (KARP) IS-IS Security Analysis (RFC7645)

IP.com Disclosure Number: IPCOM000244985D
Original Publication Date: 2015-Sep-01
Included in the Prior Art Database: 2016-Feb-05
Document File: 24 page(s) / 29K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

U. Chunduri: AUTHOR [+3]

Abstract

This document analyzes the current state of the Intermediate System to Intermediate System (IS-IS) protocol according to the requirements set forth in "Keying and Authentication for Routing Protocols (KARP) Design Guidelines" [RFC6518] for both manual and automated key management protocols.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 10% of the total text.

Internet Engineering Task Force (IETF)                       U. Chunduri Request for Comments: 7645                                       A. Tian Category: Informational                                            W. Lu ISSN: 2070-1721                                            Ericsson Inc.                                                           September 2015

        The Keying and Authentication for Routing Protocol (KARP)                         IS-IS Security Analysis

Abstract

   This document analyzes the current state of the Intermediate System    to Intermediate System (IS-IS) protocol according to the requirements    set forth in "Keying and Authentication for Routing Protocols (KARP)    Design Guidelines" (RFC 6518) for both manual and automated key    management protocols.

Status of This Memo

   This document is not an Internet Standards Track specification; it is    published for informational purposes.

   This document is a product of the Internet Engineering Task Force    (IETF).  It represents the consensus of the IETF community.  It has    received public review and has been approved for publication by the    Internet Engineering Steering Group (IESG).  Not all documents    approved by the IESG are a candidate for any level of Internet    Standard; see Section 2 of RFC 5741.

   Information about the current status of this document, any errata,    and how to provide feedback on it may be obtained at    http://www.rfc-editor.org/info/rfc7645.

Copyright Notice

   Copyright (c) 2015 IETF Trust and the persons identified as the    document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal    Provisions Relating to IETF Documents    (http://trustee.ietf.org/license-info) in effect on the date of    publication of this document.  Please review these documents    carefully, as they describe your rights and restrictions with respect    to this document.  Code Components extracted from this document must    include Simplified BSD License text as described in Section 4.e of    the Trust Legal Provisions and are provided without warranty as    described in the Simplified BSD License.

Chunduri, et al.              Informational                     [Page 1]
 RFC 7645              KARP IS-IS Security Analysis        September 2015

 Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2

     1.1.  Requirements Language . . . . . . . . . . . . . . . . . .   3

     1.2.  Acronyms  . . . . . . . . . . . . . . . . . . . . . . . .   3

   2.  Current State . . . . . . . . . . . ....