default search action
Request for Comments (RFC) 6600-6699
2012
- 6601Gerald R. Ash, Dave McDysan:
Generic Connection Admission Control (GCAC) Algorithm Specification for IP/MPLS Networks. 1-34 - 6602Fuad M. Abinader, Sri Gundavelli, Kent Leung, Suresh Krishnan, Domagoj Premec:
Bulk Binding Update Support for Proxy Mobile IPv6. 1-23 - 6603Jouni Korhonen, Teemu Savolainen, Suresh Krishnan, Ole Troan:
Prefix Exclude Option for DHCPv6-based Prefix Delegation. 1-10 - 6604Donald E. Eastlake III:
xNAME RCODE and Status Bits Clarification. 1-5 - 6605Paul E. Hoffman, Wouter C. A. Wijngaards:
Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC. 1-8 - 6606Eunsook Eunah Kim, Dominik Kaspar, Carles Gomez, Carsten Bormann:
Problem Statement and Requirements for IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) Routing. 1-32 - 6607Kim Kinnear, Richard A. Johnson, Mark Stapp:
Virtual Subnet Selection Options for DHCPv4 and DHCPv6. 1-26 - 6608Jie Dong, Mach (Guoyi) Chen, Anantharamu Suryanarayana:
Subcodes for BGP Finite State Machine Error. 1-5 - 6609Cyrus Daboo, Aaron Stone:
Sieve Email Filtering: Include Extension. 1-14 - 6610Heejin Jang, Alper E. Yegin, Kuntal Chowdhury, JinHyeock Choi, Ted Lemon:
DHCP Options for Home Information Discovery in Mobile IPv6 (MIPv6). 1-16 - 6611Kuntal Chowdhury, Alper E. Yegin:
Mobile IPv6 (MIPv6) Bootstrapping for the Integrated Scenario. 1-12 - 6612Gerardo Giaretta:
Interactions between Proxy Mobile IPv6 (PMIPv6) and Mobile IPv6 (MIPv6): Scenarios and Related Issues. 1-18 - 6613Alan DeKok:
RADIUS over TCP. 1-16 - 6614Stefan Winter, Mike McCauley, Stig Venaas, Klaas Wierenga:
Transport Layer Security (TLS) Encryption for RADIUS. 1-22 - 6615Thomas Dietz, Atsushi Kobayashi, Benoit Claise, Gerhard Münz:
Definitions of Managed Objects for IP Flow Information Export. 1-65 - 6616Eliot Lear, Hannes Tschofenig, Henry Mauldin, Simon Josefsson:
A Simple Authentication and Security Layer (SASL) and Generic Security Service Application Program Interface (GSS-API) Mechanism for OpenID. 1-18 - 6617Dan Harkins:
Secure Pre-Shared Key (PSK) Authentication for the Internet Key Exchange Protocol (IKE). 1-24 - 6618Jouni Korhonen, Basavaraj Patil, Hannes Tschofenig, Dirk Kröselberg:
Mobile IPv6 Security Framework Using Transport Layer Security for Communication between the Mobile Node and Home Agent. 1-38 - 6619Jari Arkko, Lars Eggert, Mark Townsley:
Scalable Operation of Address Translators with Per-Interface Bindings. 1-9 - 6620Erik Nordmark, Marcelo Bagnulo, Eric Levy-Abegnoli:
FCFS SAVI: First-Come, First-Served Source Address Validation Improvement for Locally Assigned IPv6 Addresses. 1-35 - 6621Joseph P. Macker:
Simplified Multicast Forwarding. 1-55 - 6622Ulrich Herberg, Thomas Heide Clausen:
Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs). 1-21 - 6623Eric William Burger:
IANA Registry for MEDIACTRL Interactive Voice Response Control Package. 1-6 - 6624Kireeti Kompella, Bhupesh Kothari, Rao Cherukuri:
Layer 2 Virtual Private Networks Using BGP for Auto-Discovery and Signaling. 1-26 - 6625Eric C. Rosen, Yakov Rekhter, Wim Henderickx, Ray (Lei) Qiu:
Wildcards in Multicast VPN Auto-Discovery Routes. 1-17 - 6626George Tsirtsis, Vincent D. Park, Vidya Narayanan, Kent Leung:
Dynamic Prefix Allocation for Network Mobility for Mobile IPv4 (NEMOv4). 1-5 - 6627Georgios Karagiannis, Kwok-Ho Chan, Toby Moncaster, Michael Menth, Philip Eardley, Bob Briscoe:
Overview of Pre-Congestion Notification Encoding. 1-20 - 6628SeongHan Shin, Kazukuni Kobara:
Efficient Augmented Password-Only Authentication and Key Exchange for IKEv2. 1-20 - 6629Joe Abley, Marcelo Bagnulo, Alberto García-Martínez:
Considerations on the Application of the Level 3 Multihoming Shim Protocol for IPv6 (Shim6). 1-28 - 6630Zhen Cao, Hui Deng, Qin Wu, Glen Zorn:
EAP Re-authentication Protocol Extensions for Authenticated Anticipatory Keying (ERP/AAK). 1-20 - 6631Dennis Kügler, Yaron Sheffer:
Password Authenticated Connection Establishment with the Internet Key Exchange Protocol version 2 (IKEv2). 1-26 - 6632Mehmet Ersue, Benoit Claise:
An Overview of the IETF Network Management Standards. 1-85 - 6633Fernando Gont:
Deprecation of ICMP Source Quench Messages. 1-8 - 6635Olaf M. Kolkman, Joel M. Halpern, Internet Architecture Board:
RFC Editor Model (Version 2). 1-21 - 6636Hitoshi Asaeda, Hui Liu, Qin Wu:
Tuning the Behavior of the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) for Routers in Mobile and Wireless Networks. 1-12 - 6637Andrey Jivsov:
Elliptic Curve Cryptography (ECC) in OpenPGP. 1-15 - 6638Cyrus Daboo, Bernard Desruisseaux:
Scheduling Extensions to CalDAV. 1-78 - 6639Daniel King, Mahalingam Venkatesan:
Multiprotocol Label Switching Transport Profile (MPLS-TP) MIB-Based Management Overview. 1-29 - 6640Wesley George:
IETF Meeting Attendees' Frequently Asked (Travel) Questions. 1-13 - 6641Craig Everhart, W. A. Adamson, Jiaying Zhang:
Using DNS SRV to Specify a Global File Namespace with NFS Version 4. 1-11 - 6642Qin Wu, Frank Xia, Roni Even:
RTP Control Protocol (RTCP) Extension for a Third-Party Loss Report. 1-13 - 6643Jürgen Schönwälder:
Translation of Structure of Management Information Version 2 (SMIv2) MIB Modules to YANG Modules. 1-36 - 6644D. R. Evans, Ralph E. Droms, Sheng Jiang:
Rebind Capability in DHCPv6 Reconfigure Messages. 1-10 - 6645Jan Novak:
IP Flow Information Accounting and Export Benchmarking Methodology. 1-39 - 6646Haibin Song, Ning Zong, Yang Richard Yang, Richard Alimi:
DECoupled Application Data Enroute (DECADE) Problem Statement. 1-12 - 6647Murray S. Kucherawy, Dave Crocker:
Email Greylisting: An Applicability Statement for SMTP. 1-17 - 6648Peter Saint-Andre, Dave Crocker, Mark Nottingham:
Deprecating the "X-" Prefix and Similar Constructs in Application Protocols. 1-13 - 6649Love Hörnquist-Åstrand, Tom Yu:
Deprecate DES, RC4-HMAC-EXP, and Other Weak Cryptographic Algorithms in Kerberos. 1-7 - 6650J. D. Falk, Murray S. Kucherawy:
Creation and Use of Email Feedback Reports: An Applicability Statement for the Abuse Reporting Format (ARF). 1-15 - 6651Murray S. Kucherawy:
Extensions to DomainKeys Identified Mail (DKIM) for Failure Reporting. 1-18 - 6652Scott Kitterman:
Sender Policy Framework (SPF) Authentication Failure Reporting Using the Abuse Reporting Format. 1-8 - 6653Behçet Sarikaya, Frank Xia, Ted Lemon:
DHCPv6 Prefix Delegation in Long-Term Evolution (LTE) Networks. 1-13 - 6654Tina Tsou, Cathy Zhou, Tom Taylor, Qi Chen:
Gateway-Initiated IPv6 Rapid Deployment on IPv4 Infrastructures (GI 6rd). 1-8 - 6655David A. McGrew, Daniel V. Bailey:
AES-CCM Cipher Suites for Transport Layer Security (TLS). 1-8 - 6656Richard A. Johnson, Kim Kinnear, Mark Stapp:
Description of Cisco Systems' Subnet Allocation Option for DHCPv4. 1-24 - 6657Alexey Melnikov, Julian F. Reschke:
Update to MIME regarding "charset" Parameter Handling in Textual Media Types. 1-6 - 6658Stewart Bryant, Luca Martini, George Swallow, Andrew G. Malis:
Packet Pseudowire Encapsulation over an MPLS PSN. 1-15 - 6659Ali C. Begen:
Considerations for Deploying the Rapid Acquisition of Multicast RTP Sessions (RAMS) Method. 1-12 - 6660Bob Briscoe, Toby Moncaster, Michael Menth:
Encoding Three Pre-Congestion Notification (PCN) States in the IP Header Using a Single Diffserv Codepoint (DSCP). 1-24 - 6661Anna Charny, Fortune Huang, Georgios Karagiannis, Michael Menth, Tom Taylor:
Pre-Congestion Notification (PCN) Boundary-Node Behavior for the Controlled Load (CL) Mode of Operation. 1-33 - 6662Anna Charny, Xinyan (Joy) Zhang, Georgios Karagiannis, Michael Menth, Tom Taylor:
Pre-Congestion Notification (PCN) Boundary-Node Behavior for the Single Marking (SM) Mode of Operation. 1-31 - 6663Georgios Karagiannis, Tom Taylor, Kwok-Ho Chan, Michael Menth, Philip Eardley:
Requirements for Signaling of Pre-Congestion Information in a Diffserv Domain. 1-7 - 6664Jim Schaad:
S/MIME Capabilities for Public Key Definitions. 1-19 - 6665Adam B. Roach:
SIP-Specific Event Notification. 1-53 - 6666Nick Hilliard, David Freedman:
A Discard Prefix for IPv6. 1-6 - 6667Kamran Raza, Sami Boutros, Carlos Pignataro:
LDP 'Typed Wildcard' Forwarding Equivalence Class (FEC) for PWid and Generalized PWid FEC Elements. 1-8 - 6668Denis Bider, Mark D. Baushke:
SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol. 1-5 - 6669Nurit Sprecher, Luyuan Fang:
An Overview of the Operations, Administration, and Maintenance (OAM) Toolset for MPLS-Based Transport Networks. 1-21 - 6670Nurit Sprecher, Kyung-Yeop Hong:
The Reasons for Selecting a Single Solution for MPLS Transport Profile (MPLS-TP) Operations, Administration, and Maintenance (OAM). 1-33 - 6671Malcolm Betts:
Allocation of a Generic Associated Channel Type for ITU-T MPLS Transport Profile Operation, Maintenance, and Administration (MPLS-TP OAM). 1-5 - 6672Scott Rose, Wouter C. A. Wijngaards:
DNAME Redirection in the DNS. 1-22 - 6673Al Morton:
Round-Trip Packet Loss Metrics. 1-14 - 6674Frank Brockners, Sri Gundavelli, Sebastian Speicher, David Ward:
Gateway-Initiated Dual-Stack Lite Deployment. 1-15 - 6675Ethan Blanton, Mark Allman, Lili Wang, Ilpo Järvinen, Markku Kojo, Yoshifumi Nishida:
A Conservative Loss Recovery Algorithm Based on Selective Acknowledgment (SACK) for TCP. 1-15 - 6676Stig Venaas, Rishabh Parekh, Gunter Van de Velde, Tim Chown, Marshall Eubanks:
Multicast Addresses for Documentation. 1-7 - 6677Sam Hartman, T. Charles Clancy, Katrin Hoeper:
Channel-Binding Support for Extensible Authentication Protocol (EAP) Methods. 1-31 - 6678Katrin Hoeper, Stephen R. Hanna, Hao Zhou, Joseph Salowey:
Requirements for a Tunnel-Based Extensible Authentication Protocol (EAP) Method. 1-23 - 6679Magnus Westerlund, Ingemar Johansson, Colin Perkins, Piers O'Hanlon, Ken Carlberg:
Explicit Congestion Notification (ECN) for RTP over UDP. 1-58 - 6680Nicolas Williams, Leif Johansson, Sam Hartman, Simon Josefsson:
Generic Security Service Application Programming Interface (GSS-API) Naming Extensions. 1-18 - 6681Mark Watson, Thomas Stockhammer, Michael Luby:
Raptor Forward Error Correction (FEC) Schemes for FECFRAME. 1-22 - 6682Mark Watson, Thomas Stockhammer, Michael Luby:
RTP Payload Format for Raptor Forward Error Correction (FEC). 1-18 - 6683Ali C. Begen, Thomas Stockhammer:
Guidelines for Implementing Digital Video Broadcasting - IPTV (DVB-IPTV) Application-Layer Hybrid Forward Error Correction (FEC) Protection. 1-11 - 6684Brian Trammell:
Guidelines and Template for Defining Extensions to the Incident Object Description Exchange Format (IODEF). 1-12 - 6685Brian Trammell:
Expert Review for Incident Object Description Exchange Format (IODEF) Extensions in IANA XML Registry. 1-3 - 6686Murray S. Kucherawy:
Resolution of the Sender Policy Framework (SPF) and Sender ID Experiments. 1-12 - 6687Joydeep Tripathi, Jaudelice Cavalcante de Oliveira, Jean-Philippe Vasseur:
Performance Evaluation of the Routing Protocol for Low-Power and Lossy Networks (RPL). 1-26 - 6688David L. Black, Jason Glasgow, Sorin Faibish:
Parallel NFS (pNFS) Block Disk Protection. 1-6 - 6689Lou Berger:
Usage of the RSVP ASSOCIATION Object. 1-11 - 6690Zach Shelby:
Constrained RESTful Environments (CoRE) Link Format. 1-22 - 6691David A. Borman:
TCP Options and Maximum Segment Size (MSS). 1-9 - 6692Richard Clayton, Murray S. Kucherawy:
Source Ports in Abuse Reporting Format (ARF) Reports. 1-5 - 6693Anders Lindgren, Avri Doria, Elwyn B. Davies, Samo Grasic:
Probabilistic Routing Protocol for Intermittently Connected Networks. 1-113 - 6694S. Moonesamy:
The "about" URI Scheme. 1-7 - 6695Rajiv Asati:
Methods to Convey Forward Error Correction (FEC) Framework Configuration Information. 1-15 - 6696Zhen Cao, Baohong He, Yang Shi, Qin Wu, Glen Zorn:
EAP Extensions for the EAP Re-authentication Protocol (ERP). 1-47 - 6697Glen Zorn, Qin Wu, Tom Taylor, Yoav Nir, Katrin Hoeper, Sebastien Decugis:
Handover Keying (HOKEY) Architecture Design. 1-20 - 6698Paul E. Hoffman, Jakob Schlyter:
The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA. 1-37
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.