References from draft-ietf-lisp-sec
This is an experimental product. These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Document | Title | Status | Type | Downref |
---|---|---|---|---|
bcp106 |
Randomness Requirements for Security Refs Ref'd by |
Best Current Practice | Normative Reference | |
bcp14 |
Key words for use in RFCs to Indicate Requirement Levels Refs Ref'd by |
Best Current Practice | Normative Reference | |
bcp26 |
Guidelines for Writing an IANA Considerations Section in RFCs Refs Ref'd by |
Best Current Practice | Normative Reference | |
draft-ietf-lisp-threats |
LISP Threats Analysis Refs Ref'd by |
Normative Reference | ||
rfc2104 |
HMAC: Keyed-Hashing for Message Authentication Refs Ref'd by |
Informational | Normative Reference | |
rfc2119 |
Key words for use in RFCs to Indicate Requirement Levels Refs Ref'd by |
Best Current Practice | Normative Reference | |
rfc3339 |
Date and Time on the Internet: Timestamps Refs Ref'd by |
Proposed Standard | Possible Reference | |
rfc3394 |
Advanced Encryption Standard (AES) Key Wrap Algorithm Refs Ref'd by |
Informational | Normative Reference | |
rfc4086 |
Randomness Requirements for Security Refs Ref'd by |
Best Current Practice | Normative Reference | |
rfc4634 |
US Secure Hash Algorithms (SHA and HMAC-SHA) Refs Ref'd by |
Informational | Possible Reference | |
rfc5226 |
Guidelines for Writing an IANA Considerations Section in RFCs Refs Ref'd by |
Best Current Practice | Normative Reference | |
rfc5869 |
HMAC-based Extract-and-Expand Key Derivation Function (HKDF) Refs Ref'd by |
Informational | Normative Reference | |
rfc6830 |
The Locator/ID Separation Protocol (LISP) Refs Ref'd by |
Experimental | Normative Reference | |
rfc6833 |
Locator/ID Separation Protocol (LISP) Map-Server Interface Refs Ref'd by |
Experimental | Normative Reference |