2017
DOI: 10.17487/rfc8060
|View full text |Cite
|
Sign up to set email alerts
|

LISP Canonical Address Format (LCAF)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0
1

Year Published

2017
2017
2018
2018

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(14 citation statements)
references
References 5 publications
0
13
0
1
Order By: Relevance
“…(See Section 4.7 of [RFC8060] for details regarding the R bit.) The DDT node must also include a signature in the Record that covers this Record; this is computed using the private key corresponding to the key being revoked.…”
Section: Ddt Public Key Revocationmentioning
confidence: 99%
See 1 more Smart Citation
“…(See Section 4.7 of [RFC8060] for details regarding the R bit.) The DDT node must also include a signature in the Record that covers this Record; this is computed using the private key corresponding to the key being revoked.…”
Section: Ddt Public Key Revocationmentioning
confidence: 99%
“…o Additional key structures for use with LISP-DDT, such as key structures to support additional EID formats as defined in [RFC8060].…”
Section: Open Issues and Considerationsmentioning
confidence: 99%
“…Endpoint Identifier (EID): a 32-bit (for IPv4) or 128-bit (for IPv6) value (or an address encoded per [RFC8060]) used in the source and destination address fields of the first (innermost) LISP header of a packet. The host obtains a destination EID the same way it obtains a destination address today --for example, through a Domain Name System (DNS) [RFC1034] lookup or a Session Initiation Protocol (SIP) [RFC3261] exchange.…”
Section: Definitions Of Termsmentioning
confidence: 99%
“…This could include the geo-coordinates of the RTRs, their the current load, the probability of an attack on each on them, etc. The exact information included is up to the specific implementation, but it can be encoded in the LISP control messages using the format defined in [16]. The MN can use that extra information provided by the Mapping System to choose the most suitable RTR for its needs, e.g either choose a close RTR to reduce the latency or choose a far away one to better mislead possible attackers.…”
Section: A Location Privacymentioning
confidence: 99%