Browse Prior Art Database

YANG Data Model for Key Chains (RFC8177)

IP.com Disclosure Number: IPCOM000250243D
Original Publication Date: 2017-Jun-01
Included in the Prior Art Database: 2017-Jun-16
Document File: 50 page(s) / 46K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

A. Lindem: AUTHOR [+6]

Abstract

This document describes the key chain YANG [YANG-1.1] data model. Key chains are commonly used for routing protocol authentication and other applications requiring symmetric keys. A key chain is a list containing one or more elements containing a Key ID, key string, send/accept lifetimes, and the associated authentication or encryption algorithm. By properly overlapping the send and accept lifetimes of multiple key chain elements, key strings and algorithms may be gracefully updated. By representing them in a YANG data model, key distribution can be automated.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 5% of the total text.

Internet Engineering Task Force (IETF)                    A. Lindem, Ed. Request for Comments: 8177                                 Cisco Systems Category: Standards Track                                          Y. Qu ISSN: 2070-1721                                                   Huawei                                                                 D. Yeung                                                              Arrcus, Inc                                                                  I. Chen                                                                    Jabil                                                                 J. Zhang                                                         Juniper Networks                                                                June 2017

                      YANG Data Model for Key Chains

Abstract

   This document describes the key chain YANG data model.  Key chains    are commonly used for routing protocol authentication and other    applications requiring symmetric keys.  A key chain is a list    containing one or more elements containing a Key ID, key string,    send/accept lifetimes, and the associated authentication or    encryption algorithm.  By properly overlapping the send and accept    lifetimes of multiple key chain elements, key strings and algorithms    may be gracefully updated.  By representing them in a YANG data    model, key distribution can be automated.

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force    (IETF).  It represents the consensus of the IETF community.  It has    received public review and has been approved for publication by the    Internet Engineering Steering Group (IESG).  Further information on    Internet Standards is available in Section 2 of RFC 7841.

   Information about the current status of this document, any errata,    and how to provide feedback on it may be obtained at    http://www.rfc-editor.org/info/rfc8177.

Lindem, et al.               Standards Track                    [Page 1]
 RFC 8177                     YANG Key Chain                    June 2017

 Copyright Notice

   Copyright (c) 2017 IETF Trust and the persons identified as...