2013
DOI: 10.17487/rfc6862
|View full text |Cite
|
Sign up to set email alerts
|

Keying and Authentication for Routing Protocols (KARP) Overview, Threats, and Requirements

Abstract: Different routing protocols employ different mechanisms for securing protocol packets on the wire. While most already have some method for accomplishing cryptographic message authentication, in many cases the existing methods are dated, vulnerable to attack, and employ cryptographic algorithms that have been deprecated. The "Keying and Authentication for Routing Protocols" (KARP) effort aims to overhaul and improve these mechanisms. This document does not contain protocol specifications. Instead, it defines th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 18 publications
0
13
0
Order By: Relevance
“…This section focuses on where the IS-IS protocol fails to meet general requirements as specified in the threats and requirements document [RFC6862].…”
Section: Gap Analysis and Security Requirementsmentioning
confidence: 99%
See 1 more Smart Citation
“…This section focuses on where the IS-IS protocol fails to meet general requirements as specified in the threats and requirements document [RFC6862].…”
Section: Gap Analysis and Security Requirementsmentioning
confidence: 99%
“…This document also analyzes various threats to IS-IS (as described in [RFC6862]), lists security gaps, and provides specific recommendations to thwart the threats for both manual keying and automated key management mechanisms.…”
Section: Introductionmentioning
confidence: 99%
“…There are several requirements described in Section 4 of [RFC6862] that BFD, as defined in BFD [RFC5880], does not currently meet:…”
Section: Requirements To Meetmentioning
confidence: 99%
“…However, some gaps remain between the current state and the requirements for manually keyed routing security expressed in [RFC6862]. This document explores these gaps and proposes directions for addressing the gaps.…”
Section: Work On Solutions To Address Gaps Identified In This Analysimentioning
confidence: 99%
“…There are a number of requirements described in Section 3 of [RFC6862] that OSPF does not currently meet. The gaps are as follows:…”
Section: Requirements To Meetmentioning
confidence: 99%