2010
DOI: 10.17487/rfc5796
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and Confidentiality in Protocol Independent Multicast Sparse Mode (PIM-SM) Link-Local Messages

Abstract: RFC 4601 mandates the use of IPsec to ensure authentication of the link-local messages in the Protocol Independent Multicast -Sparse Mode (PIM-SM) routing protocol. This document specifies mechanisms to authenticate the PIM-SM link-local messages using the IP security (IPsec) Encapsulating Security Payload (ESP) or (optionally) the Authentication Header (AH). It specifies optional mechanisms to provide confidentiality using the ESP. Manual keying is specified as the mandatory and default group key management s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…This "pseudo-header" is prepended to the PIM header for the purposes of calculating the checksum. The "Upper-Layer Packet Length" in the pseudo-header is set to the length of the PIM message, except in Register messages where it is set to the length of the PIM register header (8). The Next Header value used in the pseudo-header is 103.…”
Section: Checksummentioning
confidence: 99%
See 1 more Smart Citation
“…This "pseudo-header" is prepended to the PIM header for the purposes of calculating the checksum. The "Upper-Layer Packet Length" in the pseudo-header is set to the length of the PIM message, except in Register messages where it is set to the length of the PIM register header (8). The Next Header value used in the pseudo-header is 103.…”
Section: Checksummentioning
confidence: 99%
“…The reader is referred to [8], [14], and [15] for further discussion of PIM-SM and multicast security.…”
Section: +-----------------------------------------------------------mentioning
confidence: 99%
“…For at least one of them, IPsec is not part of the PIM implementation itself --one just configures IPsec with Security Policy Databases (SPDs) where interface, the ALL_PIM_ROUTERS multicast address, etc., can be used as selectors, according to [RFC5796].…”
Section: Security Considerationsmentioning
confidence: 99%
“…Therefore the implementations must use manually configured keys with the same SA parameters for both inbound and outbound SAs. ' A similar set of procedures is specified for PIM-SM in [6]. However, the PIM-SM document recognizes the potential for automated key management in future specifications.…”
Section: A Near-neighbor Communication For Routersmentioning
confidence: 99%
“…For a specific example of these patterns in the case of PIM-SM, see [6]. This "group per speaker" model forms the basis for our proposed system architecture.…”
Section: Communication Patternsmentioning
confidence: 99%