Internet Documents

RFCs 4200 - 4299s

RFCs All DocumentsSTDs Internet Standards DocumentsBCPs Best Current Practice DocumentsFYIs Informational Documents
 

PROPOSEDDRAFTSTANDARDEXPMTLBCPINFOHISTORICUPDATEDOBSOLETEDUNKNOWN

 
RFC 4201 Link Bundling in MPLS Traffic Engineering (TE)
 
Authors:K. Kompella, Y. Rekhter, L. Berger.
Date:October 2005
Formats:txt html json
Updates:RFC 3471, RFC 3472, RFC 3473
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4201
For the purpose of Generalized Multi-Protocol Label Switching (GMPLS) signaling, in certain cases a combination of <link identifier, label&rt; is not sufficient to unambiguously identify the appropriate resource used by a Label Switched Path (LSP). Such cases are handled by using the link bundling construct, which is described in this document.This document updates the interface identification TLVs, which are defined in the GMPLS Signaling Functional Description.
 
RFC 4202 Routing Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)
 
Authors:K. Kompella, Ed., Y. Rekhter, Ed..
Date:October 2005
Formats:txt json html
Updated by:RFC 6001, RFC 6002, RFC 7074
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4202
This document specifies routing extensions in support of carrying link state information for Generalized Multi-Protocol Label Switching(GMPLS). This document enhances the routing extensions required to support MPLS Traffic Engineering (TE).
 
RFC 4203 OSPF Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)
 
Authors:K. Kompella, Ed., Y. Rekhter, Ed..
Date:October 2005
Formats:txt json html
Updates:RFC 3630
Updated by:RFC 6001, RFC 6002, RFC 7074
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4203
This document specifies encoding of extensions to the OSPF routing protocol in support of Generalized Multi-Protocol Label Switching(GMPLS).
 
RFC 4204 Link Management Protocol (LMP)
 
Authors:J. Lang, Ed..
Date:October 2005
Formats:txt html json
Updated by:RFC 6898
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4204
For scalability purposes, multiple data links can be combined to form a single traffic engineering (TE) link. Furthermore, the management of TE links is not restricted to in-band messaging, but instead can be done using out-of-band techniques. This document specifies a link management protocol (LMP) that runs between a pair of nodes and is used to manage TE links. Specifically, LMP will be used to maintain control channel connectivity, verify the physical connectivity of the data links, correlate the link property information, suppress downstream alarms, and localize link failures for protection/restoration purposes in multiple kinds of networks.
 
RFC 4205 Intermediate System to Intermediate System (IS-IS) Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)
 
Authors:K. Kompella, Ed., Y. Rekhter, Ed..
Date:October 2005
Formats:txt html json
Obsoleted by:RFC 5307
Updates:RFC 3784
Status:INFORMATIONAL
DOI:10.17487/RFC 4205
This document specifies encoding of extensions to the IS-IS routing protocol in support of Generalized Multi-Protocol Label Switching(GMPLS).
 
RFC 4206 Label Switched Paths (LSP) Hierarchy with Generalized Multi-Protocol Label Switching (GMPLS) Traffic Engineering (TE)
 
Authors:K. Kompella, Y. Rekhter.
Date:October 2005
Formats:txt json html
Updated by:RFC 6001, RFC 6107
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4206
To improve scalability of Generalized Multi-Protocol Label Switching(GMPLS) it may be useful to aggregate Label Switched Paths (LSPs) by creating a hierarchy of such LSPs. A way to create such a hierarchy is by (a) a Label Switching Router (LSR) creating a TrafficEngineering Label Switched Path (TE LSP), (b) the LSR forming a forwarding adjacency (FA) out of that LSP (by advertising this LSP as a Traffic Engineering (TE) link into the same instance of ISIS/OSPF as the one that was used to create the LSP), (c) allowing other LSRs to use FAs for their path computation, and (d) nesting of LSPs originated by other LSRs into that LSP (by using the label stack construct).

This document describes the mechanisms to accomplish this.

 
RFC 4207 Synchronous Optical Network (SONET)/Synchronous Digital Hierarchy (SDH) Encoding for Link Management Protocol (LMP) Test Messages
 
Authors:J. Lang, D. Papadimitriou.
Date:October 2005
Formats:txt json html
Updated by:RFC 6898
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4207
This document details the Synchronous Optical Network(SONET)/Synchronous Digital Hierarchy (SDH) technology-specific information needed when sending Link Management Protocol (LMP) test messages.
 
RFC 4208 Generalized Multiprotocol Label Switching (GMPLS) User-Network Interface (UNI): Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Support for the Overlay Model
 
Authors:G. Swallow, J. Drake, H. Ishimatsu, Y. Rekhter.
Date:October 2005
Formats:txt html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4208
Generalized Multiprotocol Label Switching (GMPLS) defines both routing and signaling protocols for the creation of Label SwitchedPaths (LSPs) in various switching technologies. These protocols can be used to support a number of deployment scenarios. This memo addresses the application of GMPLS to the overlay model.
 
RFC 4209 Link Management Protocol (LMP) for Dense Wavelength Division Multiplexing (DWDM) Optical Line Systems
 
Authors:A. Fredette, Ed., J. Lang, Ed..
Date:October 2005
Formats:txt html json
Updated by:RFC 6898
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4209
The Link Management Protocol (LMP) is defined to manage traffic engineering (TE) links. In its present form, LMP focuses on peer nodes, i.e., nodes that peer in signaling and/or routing. This document proposes extensions to LMP to allow it to be used between a peer node and an adjacent optical line system (OLS). These extensions are intended to satisfy the "Optical Link InterfaceRequirements" described in a companion document.
 
RFC 4210 Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP)
 
Authors:C. Adams, S. Farrell, T. Kause, T. Mononen.
Date:September 2005
Formats:txt html json
Obsoletes:RFC 2510
Updated by:RFC 6712, RFC 9480, RFC 9481
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4210
This document describes the Internet X.509 Public Key Infrastructure(PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides on-line interactions between PKI components, including an exchange between a Certification Authority (CA) and a client system.
 
RFC 4211 Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)
 
Authors:J. Schaad.
Date:September 2005
Formats:txt html json
Obsoletes:RFC 2511
Updated by:RFC 9045
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4211
This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via aRegistration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol.
 
RFC 4212 Alternative Certificate Formats for the Public-Key Infrastructure Using X.509 (PKIX) Certificate Management Protocols
 
Authors:M. Blinov, C. Adams.
Date:October 2005
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4212
The Public-Key Infrastructure using X.509 (PKIX) Working Group of theInternet Engineering Task Force (IETF) has defined a number of certificate management protocols. These protocols are primarily focused on X.509v3 public-key certificates. However, it is sometimes desirable to manage certificates in alternative formats as well.This document specifies how such certificates may be requested using the Certificate Request Message Format (CRMF) syntax that is used by several different protocols. It also explains how alternative certificate formats may be incorporated into such popular protocols as PKIX Certificate Management Protocol (PKIX-CMP) and CertificateManagement Messages over CMS (CMC).
 
RFC 4213 Basic Transition Mechanisms for IPv6 Hosts and Routers
 
Authors:E. Nordmark, R. Gilligan.
Date:October 2005
Formats:txt json html
Obsoletes:RFC 2893
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4213
This document specifies IPv4 compatibility mechanisms that can be implemented by IPv6 hosts and routers. Two mechanisms are specified, dual stack and configured tunneling. Dual stack implies providing complete implementations of both versions of the Internet Protocol(IPv4 and IPv6), and configured tunneling provides a means to carryIPv6 packets over unmodified IPv4 routing infrastructures.

This document obsoletes RFC 2893.

 
RFC 4214 Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
 
Authors:F. Templin, T. Gleeson, M. Talwar, D. Thaler.
Date:October 2005
Formats:txt html json
Obsoleted by:RFC 5214
Status:EXPERIMENTAL
DOI:10.17487/RFC 4214
The Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) connectsIPv6 hosts/routers over IPv4 networks. ISATAP views the IPv4 network as a link layer for IPv6 and views other nodes on the network as potential IPv6 hosts/routers. ISATAP supports an automatic tunneling abstraction similar to the Non-Broadcast Multiple Access (NBMA) model.
 
RFC 4215 Analysis on IPv6 Transition in Third Generation Partnership Project (3GPP) Networks
 
Authors:J. Wiljakka, Ed..
Date:October 2005
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4215
This document analyzes the transition to IPv6 in Third GenerationPartnership Project (3GPP) packet networks. These networks are based on General Packet Radio Service (GPRS) technology, and the radio network architecture is based on Global System for MobileCommunications (GSM) or Universal Mobile Telecommunications System(UMTS)/Wideband Code Division Multiple Access (WCDMA) technology.

The focus is on analyzing different transition scenarios and applicable transition mechanisms and finding solutions for those transition scenarios. In these scenarios, the User Equipment (UE) connects to other nodes, e.g., in the Internet, and IPv6/IPv4 transition mechanisms are needed.

 
RFC 4216 MPLS Inter-Autonomous System (AS) Traffic Engineering (TE) Requirements
 
Authors:R. Zhang, Ed., J.-P. Vasseur, Ed..
Date:November 2005
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4216
This document discusses requirements for the support of inter-AS MPLSTraffic Engineering (MPLS TE). Its main objective is to present a set of requirements and scenarios which would result in general guidelines for the definition, selection, and specification development for any technical solution(s) meeting these requirements and supporting the scenarios.
 
RFC 4217 Securing FTP with TLS
 
Authors:P. Ford-Hutchinson.
Date:October 2005
Formats:txt json html
Updated by:RFC 8996
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4217
This document describes a mechanism that can be used by FTP clients and servers to implement security and authentication using the TLS protocol defined by RFC 2246, "The TLS Protocol Version 1.0.", and the extensions to the FTP protocol defined by RFC 2228, "FTP SecurityExtensions". It describes the subset of the extensions that are required and the parameters to be used, discusses some of the policy issues that clients and servers will need to take, considers some of the implications of those policies, and discusses some expected behaviours of implementations to allow interoperation. This document is intended to provide TLS support for FTP in a similar way to that provided for SMTP in RFC 2487, "SMTP Service Extension for SecureSMTP over Transport Layer Security", and HTTP in RFC 2817, "Upgrading to TLS Within HTTP/1.1.".

This specification is in accordance with RFC 959, "File TransferProtocol". It relies on RFC 2246, "The TLS Protocol Version 1.0.", and RFC 2228, "FTP Security Extensions".

 
RFC 4218 Threats Relating to IPv6 Multihoming Solutions
 
Authors:E. Nordmark, T. Li.
Date:October 2005
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4218
This document lists security threats related to IPv6 multihoming.Multihoming can introduce new opportunities to redirect packets to different, unintended IP addresses.

The intent is to look at how IPv6 multihoming solutions might make the Internet less secure; we examine threats that are inherent to allIPv6 multihoming solutions rather than study any specific proposed solution. The threats in this document build upon the threats discovered and discussed as part of the Mobile IPv6 work.

 
RFC 4219 Things Multihoming in IPv6 (MULTI6) Developers Should Think About
 
Authors:E. Lear.
Date:October 2005
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4219
This document specifies a set of questions that authors should be prepared to answer as part of a solution to multihoming with IPv6.The questions do not assume that multihoming is the only problem of interest, nor do they demand a more general solution.
 
RFC 4220 Traffic Engineering Link Management Information Base
 
Authors:M. Dubuc, T. Nadeau, J. Lang.
Date:November 2005
Formats:txt html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4220
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it describes managed objects for modeling TE links as described in the Link Bundling in MPLS Traffic Engineering (TE) document.
 
RFC 4221 Multiprotocol Label Switching (MPLS) Management Overview
 
Authors:T. Nadeau, C. Srinivasan, A. Farrel.
Date:November 2005
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4221
A range of Management Information Base (MIB) modules has been developed to help model and manage the various aspects ofMultiprotocol Label Switching (MPLS) networks. These MIB modules are defined in separate documents that focus on the specific areas of responsibility of the modules that they describe.

This document describes the management architecture for MPLS and indicates the interrelationships between the different MIB modules used for MPLS network management.

 
RFC 4222 Prioritized Treatment of Specific OSPF Version 2 Packets and Congestion Avoidance
 
Authors:G. Choudhury, Ed..
Date:October 2005
Formats:txt json html
Updated by:RFC 9454
Also:BCP 0112
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 4222
This document recommends methods that are intended to improve the scalability and stability of large networks using Open Shortest PathFirst (OSPF) Version 2 protocol. The methods include processing OSPFHellos and Link State Advertisement (LSA) Acknowledgments at a higher priority compared to other OSPF packets, and other congestion avoidance procedures.
 
RFC 4223 Reclassification of RFC 1863 to Historic
 
Authors:P. Savola.
Date:October 2005
Formats:txt json html
Obsoletes:RFC 1863
Status:INFORMATIONAL
DOI:10.17487/RFC 4223
This memo reclassifies RFC 1863, A BGP/IDRP Route Server alternative to a full mesh routing, to Historic status. This memo also obsoletesRFC 1863.
 
RFC 4224 RObust Header Compression (ROHC): ROHC over Channels That Can Reorder Packets
 
Authors:G. Pelletier, L-E. Jonsson, K. Sandlund.
Date:January 2006
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4224
RObust Header Compression (ROHC), RFC 3095, defines a framework for header compression, along with a number of compression protocols(profiles). One operating assumption for the profiles defined in RFC3095 is that the channel between compressor and decompressor is required to maintain packet ordering. This document discusses aspects of using ROHC over channels that can reorder packets. It provides guidelines on how to implement existing profiles over such channels, as well as suggestions for the design of new profiles.
 
RFC 4225 Mobile IP Version 6 Route Optimization Security Design Background
 
Authors:P. Nikander, J. Arkko, T. Aura, G. Montenegro, E. Nordmark.
Date:December 2005
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4225
This document is an account of the rationale behind the Mobile IPv6(MIPv6) Route Optimization security design. The purpose of this document is to present the thinking and to preserve the reasoning behind the Mobile IPv6 security design in 2001 - 2002.

The document has two target audiences: (1) helping MIPv6 implementors to better understand the design choices in MIPv6 security procedures, and (2) allowing people dealing with mobility or multi-homing to avoid a number of potential security pitfalls in their designs.

 
RFC 4226 HOTP: An HMAC-Based One-Time Password Algorithm
 
Authors:D. M'Raihi, M. Bellare, F. Hoornaert, D. Naccache, O. Ranen.
Date:December 2005
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4226
This document describes an algorithm to generate one-time password values, based on Hashed Message Authentication Code (HMAC). A security analysis of the algorithm is presented, and important parameters related to the secure deployment of the algorithm are discussed. The proposed algorithm can be used across a wide range of network applications ranging from remote Virtual Private Network(VPN) access, Wi-Fi network logon to transaction-oriented Web applications.

This work is a joint effort by the OATH (Open AuTHentication) membership to specify an algorithm that can be freely distributed to the technical community. The authors believe that a common and shared algorithm will facilitate adoption of two-factor authentication on the Internet by enabling interoperability across commercial and open-source implementations.

 
RFC 4227 Using the Simple Object Access Protocol (SOAP) in Blocks Extensible Exchange Protocol (BEEP)
 
Authors:E. O'Tuathail, M. Rose.
Date:January 2006
Formats:txt json html
Obsoletes:RFC 3288
Updated by:RFC 8553
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4227
This memo specifies a Simple Object Access Protocol (SOAP) binding to the Blocks Extensible Exchange Protocol (BEEP) core. A SOAP binding describes how SOAP messages are transmitted in the network.

The SOAP is an XML-based (eXtensible Markup Language) messaging protocol used to implement a wide variety of distributed messaging models. It defines a message format and describes a variety of message patterns, including, but not limited to, Remote ProcedureCalling (RPC), asynchronous event notification, unacknowledged messages, and forwarding via SOAP intermediaries.

 
RFC 4228 Requirements for an IETF Draft Submission Toolset
 
Authors:A. Rousskov.
Date:December 2005
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4228
This document specifies requirements for an IETF toolset to facilitate Internet-Draft submission, validation, and posting.
 
RFC 4229 HTTP Header Field Registrations
 
Authors:M. Nottingham, J. Mogul.
Date:December 2005
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4229
This document defines the initial contents of a permanent IANA registry for HTTP header fields and a provisional repository for HTTP header fields, per RFC 3864.
 
RFC 4230 RSVP Security Properties
 
Authors:H. Tschofenig, R. Graveman.
Date:December 2005
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4230
This document summarizes the security properties of RSVP. The goal of this analysis is to benefit from previous work done on RSVP and to capture knowledge about past activities.
 
RFC 4231 Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512
 
Authors:M. Nystrom.
Date:December 2005
Formats:txt html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4231
This document provides test vectors for the HMAC-SHA-224,HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 message authentication schemes. It also provides ASN.1 object identifiers and UniformResource Identifiers (URIs) to identify use of these schemes in protocols. The test vectors provided in this document may be used for conformance testing.
 
RFC 4233 Integrated Services Digital Network (ISDN) Q.921-User Adaptation Layer
 
Authors:K. Morneault, S. Rengasami, M. Kalla, G. Sidebottom.
Date:January 2006
Formats:txt json html
Obsoletes:RFC 3057
Updated by:RFC 5133
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4233
This document defines a protocol for backhauling of IntegratedServices Digital Network (ISDN) Q.921 User messages over IP using theStream Control Transmission Protocol (SCTP). This protocol would be used between a Signaling Gateway (SG) and Media Gateway Controller(MGC). It is assumed that the SG receives ISDN signaling over a standard ISDN interface.

This document obsoletes RFC 3057.

 
RFC 4234 Augmented BNF for Syntax Specifications: ABNF
 
Authors:D. Crocker, Ed., P. Overell.
Date:October 2005
Formats:txt html json
Obsoletes:RFC 2234
Obsoleted by:RFC 5234
Status:DRAFT STANDARD
DOI:10.17487/RFC 4234
Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form(BNF), called Augmented BNF (ABNF), has been popular among manyInternet specifications. The current specification documents ABNF.It balances compactness and simplicity, with reasonable representational power. The differences between standard BNF andABNF involve naming rules, repetition, alternatives, order- independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.
 
RFC 4235 An INVITE-Initiated Dialog Event Package for the Session Initiation Protocol (SIP)
 
Authors:J. Rosenberg, H. Schulzrinne, R. Mahy, Ed..
Date:November 2005
Formats:txt html json
Updated by:RFC 7463, RFC 8996
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4235
This document defines a dialog event package for the SIP Events architecture, along with a data format used in notifications for this package. The dialog package allows users to subscribe to another user and to receive notification of the changes in state of INVITE- initiated dialog usages in which the subscribed-to user is involved.
 
RFC 4236 HTTP Adaptation with Open Pluggable Edge Services (OPES)
 
Authors:A. Rousskov, M. Stecher.
Date:November 2005
Formats:txt json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4236
Open Pluggable Edge Services (OPES) framework documents several application-agnostic mechanisms such as OPES tracing, OPES bypass, and OPES callout protocol. This document extends those generic mechanisms for Hypertext Transfer Protocol (HTTP) adaptation.Together, application-agnostic OPES documents and this HTTP profile constitute a complete specification for HTTP adaptation with OPES.
 
RFC 4237 Voice Messaging Directory Service
 
Authors:G. Vaudreuil.
Date:October 2005
Formats:txt json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4237
This document provides details of the Voice Profile for Internet Mail(VPIM) directory service. The service provides the email address of the recipient that is given a telephone number. It optionally provides the spoken name of the recipient and the media capabilities of the recipient.

The VPIM directory Schema provides essential additional attributes to recreate the voice mail user experience using standardized directories. This user experience provides, at the time of addressing, basic assurances that the message will be delivered as intended. This document combines two earlier documents, one fromAnne Brown and one from Greg Vaudreuil, that define a voice messaging schema into a single working group submission.

 
RFC 4238 Voice Message Routing Service
 
Authors:G. Vaudreuil.
Date:October 2005
Formats:txt html json
Updated by:RFC 6118
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4238
Voice messaging is traditionally addressed using telephone number addressing. This document describes two techniques for routing voice messages based on a telephone number. The complete service uses theVoice Profile for Internet Mail (VPIM) Directory service to lookup aVPIM email address with a telephone number and confirm that the address is both valid and associated with the intended recipient.However, this service will take time to become widely deployed in the near term. This document also describes a basic send-and-pray service that routes and delivers messages using only the ENUM telephone number resolution service and the existing DNS mail routing facilities.
 
RFC 4239 Internet Voice Messaging (IVM)
 
Authors:S. McRae, G. Parsons.
Date:November 2005
Formats:txt html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4239
This document describes the carriage of voicemail messages overInternet mail as part of a unified messaging infrastructure.

The Internet Voice Messaging (IVM) concept described in this document is not a successor format to VPIM v2 (Voice Profile for Internet MailVersion 2), but rather an alternative specification for a different application.

 
RFC 4240 Basic Network Media Services with SIP
 
Authors:E. Burger, Ed., J. Van Dyke, A. Spitzer.
Date:December 2005
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4240
In SIP-based networks, there is a need to provide basic network media services. Such services include network announcements, user interaction, and conferencing services. These services are basic building blocks, from which one can construct interesting applications. In order to have interoperability between servers offering these building blocks (also known as Media Servers) and application developers, one needs to be able to locate and invoke such services in a well defined manner.

This document describes a mechanism for providing an interoperable interface between Application Servers, which provide application services to SIP-based networks, and Media Servers, which provide the basic media processing building blocks.

 
RFC 4241 A Model of IPv6/IPv4 Dual Stack Internet Access Service
 
Authors:Y. Shirasaki, S. Miyakawa, T. Yamasaki, A. Takenouchi.
Date:December 2005
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4241
This memo is a digest of the user network interface specification ofNTT Communications' dual stack ADSL access service, which provide aIPv6/IPv4 dual stack services to home users. In order to simplify user setup, these services have a mechanism to configure IPv6 specific parameters automatically. The memo focuses on two basic parameters: the prefix assigned to the user and the addresses ofIPv6 DNS servers, and it specifies a way to deliver these parameters to Customer Premises Equipment (CPE) automatically.
 
RFC 4242 Information Refresh Time Option for Dynamic Host Configuration Protocol for IPv6 (DHCPv6)
 
Authors:S. Venaas, T. Chown, B. Volz.
Date:November 2005
Formats:txt html json
Obsoleted by:RFC 8415
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4242
This document describes a Dynamic Host Configuration Protocol forIPv6 (DHCPv6) option for specifying an upper bound for how long a client should wait before refreshing information retrieved fromDHCPv6. It is used with stateless DHCPv6 as there are no addresses or other entities with lifetimes that can tell the client when to contact the DHCPv6 server to refresh its configuration.
 
RFC 4243 Vendor-Specific Information Suboption for the Dynamic Host Configuration Protocol (DHCP) Relay Agent Option
 
Authors:M. Stapp, R. Johnson, T. Palaniappan.
Date:December 2005
Formats:txt html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4243
This memo defines a new Vendor-Specific Information suboption for theDynamic Host Configuration Protocol's (DHCP) relay agent information option. The suboption allows a DHCP relay agent to include vendor- specific information in the DHCP messages it forwards, as configured by its administrator.
 
RFC 4244 An Extension to the Session Initiation Protocol (SIP) for Request History Information
 
Authors:M. Barnes, Ed..
Date:November 2005
Formats:txt json html
Obsoleted by:RFC 7044
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4244
This document defines a standard mechanism for capturing the history information associated with a Session Initiation Protocol (SIP) request. This capability enables many enhanced services by providing the information as to how and why a call arrives at a specific application or user. This document defines a new optional SIP header, History-Info, for capturing the history information in requests.
 
RFC 4245 High-Level Requirements for Tightly Coupled SIP Conferencing
 
Authors:O. Levin, R. Even.
Date:November 2005
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4245
This document examines a wide range of conferencing requirements for tightly coupled SIP conferences. Separate documents will map the requirements to existing protocol primitives, define new protocol extensions, and introduce new protocols as needed. Together, these documents will provide a guide for building interoperable SIP conferencing applications.
 
RFC 4246 International Standard Audiovisual Number (ISAN) URN Definition
 
Authors:M. Dolan.
Date:February 2006
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4246
The International Standard Audiovisual Number (ISAN) is a standard numbering system for the unique and international identification of audiovisual works. This document is the definition of the formalUniform Resource Name (URN) Namespace Identifier (NID) for ISAN.
 
RFC 4247 Requirements for Header Compression over MPLS
 
Authors:J. Ash, B. Goode, J. Hand, R. Zhang.
Date:November 2005
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4247
Voice over IP (VoIP) typically uses the encapsulation voice/RTP/UDP/IP. When MPLS labels are added, this becomes voice/RTP/UDP/IP/MPLS-labels. For an MPLS VPN, the packet header is typically 48 bytes, while the voice payload is often no more than 30 bytes, for example. Header compression can significantly reduce the overhead through various compression mechanisms, such as enhanced compressed RTP (ECRTP) and robust header compression (ROHC). We consider using MPLS to route compressed packets over an MPLS LabelSwitched Path (LSP) without compression/decompression cycles at each router. This approach can increase the bandwidth efficiency as well as processing scalability of the maximum number of simultaneous flows that use header compression at each router. In this document, we give a problem statement, goals and requirements, and an example scenario.
 
RFC 4248 The telnet URI Scheme
 
Authors:P. Hoffman.
Date:October 2005
Formats:txt json html
Obsoletes:RFC 1738
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4248
This document specifies the telnet Uniform Resource Identifier (URI) scheme that was originally specified in RFC 1738. The purpose of this document is to allow RFC 1738 to be made obsolete while keeping the information about the scheme on standards track.
 
RFC 4249 Implementer-Friendly Specification of Message and MIME-Part Header Fields and Field Components
 
Authors:B. Lilly.
Date:January 2006
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4249
Implementation of generators and parsers of header fields requires certain information about those fields. Interoperability is most likely when all such information is explicitly provided by the technical specification of the fields. Lacking such explicit information, implementers may guess, and interoperability may suffer.This memo identifies information useful to implementers of header field generators and parsers.
 
RFC 4250 The Secure Shell (SSH) Protocol Assigned Numbers
 
Authors:S. Lehtinen, C. Lonvick, Ed..
Date:January 2006
Formats:txt json html
Updated by:RFC 8268, RFC 9142, RFC 9519
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4250
This document defines the instructions to the IANA and the initial state of the IANA assigned numbers for the Secure Shell (SSH) protocol. It is intended only for the initialization of the IANA registries referenced in the set of SSH documents.
 
RFC 4251 The Secure Shell (SSH) Protocol Architecture
 
Authors:T. Ylonen, C. Lonvick, Ed..
Date:January 2006
Formats:txt json html
Updated by:RFC 8308, RFC 9141
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4251
The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: TheTransport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. TheUser Authentication Protocol authenticates the client to the server.The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents.
 
RFC 4252 The Secure Shell (SSH) Authentication Protocol
 
Authors:T. Ylonen, C. Lonvick, Ed..
Date:January 2006
Formats:txt html json
Updated by:RFC 8308, RFC 8332
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4252
The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods.Additional authentication methods are described in separate documents. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol.
 
RFC 4253 The Secure Shell (SSH) Transport Layer Protocol
 
Authors:T. Ylonen, C. Lonvick, Ed..
Date:January 2006
Formats:txt html json
Updated by:RFC 6668, RFC 8268, RFC 8308, RFC 8332, RFC 8709, RFC 8758, RFC 9142
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4253
The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.

This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP. The protocol can be used as a basis for a number of secure network services. It provides strong encryption, server authentication, and integrity protection. It may also provide compression.

Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.

This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement theSSH transport layer protocol.

 
RFC 4254 The Secure Shell (SSH) Connection Protocol
 
Authors:T. Ylonen, C. Lonvick, Ed..
Date:January 2006
Formats:txt json html
Updated by:RFC 8308
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4254
Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.

This document describes the SSH Connection Protocol. It provides interactive login sessions, remote execution of commands, forwardedTCP/IP connections, and forwarded X11 connections. All of these channels are multiplexed into a single encrypted tunnel.

The SSH Connection Protocol has been designed to run on top of theSSH transport layer and user authentication protocols.

 
RFC 4255 Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints
 
Authors:J. Schlyter, W. Griffin.
Date:January 2006
Formats:txt json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4255
This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC). The document defines a new DNS resource record that contains a standard SSH key fingerprint.
 
RFC 4256 Generic Message Exchange Authentication for the Secure Shell Protocol (SSH)
 
Authors:F. Cusack, M. Forssen.
Date:January 2006
Formats:txt html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4256
The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes a general purpose authentication method for theSSH protocol, suitable for interactive authentications where the authentication data should be entered via a keyboard (or equivalent alphanumeric input device). The major goal of this method is to allow the SSH client to support a whole class of authentication mechanism(s) without knowing the specifics of the actual authentication mechanism(s).
 
RFC 4257 Framework for Generalized Multi-Protocol Label Switching (GMPLS)-based Control of Synchronous Digital Hierarchy/Synchronous Optical Networking (SDH/SONET) Networks
 
Authors:G. Bernstein, E. Mannie, V. Sharma, E. Gray.
Date:December 2005
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4257
Generalized Multi-Protocol Label Switching (GMPLS) is a suite of protocol extensions to MPLS to make it generally applicable, to include, for example, control of non packet-based switching, and particularly, optical switching. One consideration is to use GMPLS protocols to upgrade the control plane of optical transport networks.This document illustrates this process by describing those extensions to GMPLS protocols that are aimed at controlling Synchronous DigitalHierarchy (SDH) or Synchronous Optical Networking (SONET) networks.SDH/SONET networks make good examples of this process for a variety of reasons. This document highlights extensions to GMPLS-related routing protocols to disseminate information needed in transport path computation and network operations, together with (G)MPLS protocol extensions required for the provisioning of transport circuits. New capabilities that an GMPLS control plane would bring to SDH/SONET networks, such as new restoration methods and multi-layer circuit establishment, are also discussed.
 
RFC 4258 Requirements for Generalized Multi-Protocol Label Switching (GMPLS) Routing for the Automatically Switched Optical Network (ASON)
 
Authors:D. Brungard, Ed..
Date:November 2005
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4258
The Generalized Multi-Protocol Label Switching (GMPLS) suite of protocols has been defined to control different switching technologies as well as different applications. These include support for requesting Time Division Multiplexing (TDM) connections including Synchronous Optical Network (SONET)/Synchronous DigitalHierarchy (SDH) and Optical Transport Networks (OTNs).

This document concentrates on the routing requirements placed on theGMPLS suite of protocols in order to support the capabilities and functionalities of an Automatically Switched Optical Network (ASON) as defined by the ITU-T.

 
RFC 4259 A Framework for Transmission of IP Datagrams over MPEG-2 Networks
 
Authors:M.-J. Montpetit, G. Fairhurst, H. Clausen, B. Collini-Nocker, H. Linder.
Date:November 2005
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4259
This document describes an architecture for the transport of IPDatagrams over ISO MPEG-2 Transport Streams (TS). The MPEG-2 TS has been widely accepted not only for providing digital TV services but also as a subnetwork technology for building IP networks. Examples of systems using MPEG-2 include the Digital Video Broadcast (DVB) andAdvanced Television Systems Committee (ATSC) Standards for DigitalTelevision.

The document identifies the need for a set of Internet standards defining the interface between the MPEG-2 Transport Stream and an IP subnetwork. It suggests a new encapsulation method for IP datagrams and proposes protocols to perform IPv6/IPv4 address resolution, to associate IP packets with the properties of the Logical Channels provided by an MPEG-2 TS.

 
RFC 4260 Mobile IPv6 Fast Handovers for 802.11 Networks
 
Authors:P. McCann.
Date:November 2005
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4260
This document describes how a Mobile IPv6 Fast Handover could be implemented on link layers conforming to the 802.11 suite of specifications.
 
RFC 4261 Common Open Policy Service (COPS) Over Transport Layer Security (TLS)
 
Authors:J. Walker, A. Kulkarni, Ed..
Date:December 2005
Formats:txt json html
Updates:RFC 2748
Updated by:RFC 8996
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4261
This document describes how to use Transport Layer Security (TLS) to secure Common Open Policy Service (COPS) connections over theInternet.

This document also updates RFC 2748 by modifying the contents of theClient-Accept message.

 
RFC 4262 X.509 Certificate Extension for Secure/Multipurpose Internet Mail Extensions (S/MIME) Capabilities
 
Authors:S. Santesson.
Date:December 2005
Formats:txt html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4262
This document defines a certificate extension for inclusion ofSecure/Multipurpose Internet Mail Extensions (S/MIME) Capabilities inX.509 public key certificates, as defined by RFC 3280. This certificate extension provides an optional method to indicate the cryptographic capabilities of an entity as a complement to the S/MIMECapabilities signed attribute in S/MIME messages according to RFC3851.
 
RFC 4263 Media Subtype Registration for Media Type text/troff
 
Authors:B. Lilly.
Date:January 2006
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4263
A text media subtype for tagging content consisting of juxtaposed text and formatting directives as used by the troff series of programs and for conveying information about the intended processing steps necessary to produce formatted output is described.
 
RFC 4264 BGP Wedgies
 
Authors:T. Griffin, G. Huston.
Date:November 2005
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4264
It has commonly been assumed that the Border Gateway Protocol (BGP) is a tool for distributing reachability information in a manner that creates forwarding paths in a deterministic manner. In this memo we will describe a class of BGP configurations for which there is more than one potential outcome, and where forwarding states other than the intended state are equally stable. Also, the stable state whereBGP converges may be selected by BGP in a non-deterministic manner.These stable, but unintended, BGP states are termed here "BGPWedgies".
 
RFC 4265 Definition of Textual Conventions for Virtual Private Network (VPN) Management
 
Authors:B. Schliesser, T. Nadeau.
Date:November 2005
Formats:txt json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4265
This document describes Textual Conventions used for managing VirtualPrivate Networks (VPNs).
 
RFC 4266 The gopher URI Scheme
 
Authors:P. Hoffman.
Date:November 2005
Formats:txt html json
Obsoletes:RFC 1738
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4266
This document specifies the gopher Uniform Resource Identifier (URI) scheme that was originally specified in RFC 1738. The purpose of this document is to allow RFC 1738 to be made obsolete while keeping the information about the scheme on standards track.
 
RFC 4267 The W3C Speech Interface Framework Media Types: application/voicexml+xml, application/ssml+xml, application/srgs, application/srgs+xml, application/ccxml+xml, and application/pls+xml
 
Authors:M. Froumentin.
Date:November 2005
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4267
This document defines the media types for the languages of the W3CSpeech Interface Framework, as designed by the Voice Browser WorkingGroup in the following specifications: the Voice Extensible MarkupLanguage (VoiceXML), the Speech Synthesis Markup Language (SSML), theSpeech Recognition Grammar Specification (SRGS), the Call Control XML(CCXML), and the Pronunciation Lexicon Specification (PLS).
 
RFC 4268 Entity State MIB
 
Authors:S. Chisholm, D. Perkins.
Date:November 2005
Formats:txt json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4268
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it describes extensions to the Entity MIB to provide information about the state of physical entities.

In addition, this memo defines a set of Textual Conventions to represent various states of an entity. The intent is that theseTextual Conventions will be imported and used in MIB modules that would otherwise define their own representations.

 
RFC 4269 The SEED Encryption Algorithm
 
Authors:H.J. Lee, S.J. Lee, J.H. Yoon, D.H. Cheon, J.I. Lee.
Date:December 2005
Formats:txt json html
Obsoletes:RFC 4009
Status:INFORMATIONAL
DOI:10.17487/RFC 4269
This document describes the SEED encryption algorithm, which has been adopted by most of the security systems in the Republic of Korea.Included are a description of the encryption and the key scheduling algorithm (Section 2), the S-boxes (Appendix A), and a set of test vectors (Appendix B).

This document obsoletes RFC 4009.

 
RFC 4270 Attacks on Cryptographic Hashes in Internet Protocols
 
Authors:P. Hoffman, B. Schneier.
Date:November 2005
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4270
Recent announcements of better-than-expected collision attacks in popular hash algorithms have caused some people to question whether common Internet protocols need to be changed, and if so, how. This document summarizes the use of hashes in many protocols, discusses how the collision attacks affect and do not affect the protocols, shows how to thwart known attacks on digital certificates, and discusses future directions for protocol designers.
 
RFC 4271 A Border Gateway Protocol 4 (BGP-4)
 
Authors:Y. Rekhter, Ed., T. Li, Ed., S. Hares, Ed..
Date:January 2006
Formats:txt json html
Obsoletes:RFC 1771
Updated by:RFC 6286, RFC 6608, RFC 6793, RFC 7606, RFC 7607, RFC 7705, RFC 8212, RFC 8654, RFC 9072
Status:DRAFT STANDARD
DOI:10.17487/RFC 4271
This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.

The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list ofAutonomous Systems (ASes) that reachability information traverses.This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.

BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation ofAS paths.

This document obsoletes RFC 1771.

 
RFC 4272 BGP Security Vulnerabilities Analysis
 
Authors:S. Murphy.
Date:January 2006
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4272
Border Gateway Protocol 4 (BGP-4), along with a host of other infrastructure protocols designed before the Internet environment became perilous, was originally designed with little consideration for protection of the information it carries. There are no mechanisms internal to BGP that protect against attacks that modify, delete, forge, or replay data, any of which has the potential to disrupt overall network routing behavior.

This document discusses some of the security issues with BGP routing data dissemination. This document does not discuss security issues with forwarding of packets.

 
RFC 4273 Definitions of Managed Objects for BGP-4
 
Authors:J. Haas, Ed., S. Hares, Ed..
Date:January 2006
Formats:txt html json
Obsoletes:RFC 1269, RFC 1657
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4273
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet communityIn particular, it describes managed objects used for managing theBorder Gateway Protocol Version 4 or lower.

The origin of this memo is from RFC 1269 "Definitions of ManagedObjects for the Border Gateway Protocol (Version 3)", which was updated to support BGP-4 in RFC 1657. This memo fixes errors introduced when the MIB module was converted to use the SMIv2 language. This memo also updates references to the current SNMP framework documents.

This memo is intended to document deployed implementations of thisMIB module in a historical context, to provide clarifications of some items, and to note errors where the MIB module fails to fully represent the BGP protocol. Work is currently in progress to replace this MIB module with a new one representing the current state of theBGP protocol and its extensions.

This document obsoletes RFC 1269 and RFC 1657.

 
RFC 4274 BGP-4 Protocol Analysis
 
Authors:D. Meyer, K. Patel.
Date:January 2006
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4274
The purpose of this report is to document how the requirements for publication of a routing protocol as an Internet Draft Standard have been satisfied by Border Gateway Protocol version 4 (BGP-4).

This report satisfies the requirement for "the second report", as described in Section 6.0 of RFC 1264. In order to fulfill the requirement, this report augments RFC 1774 and summarizes the key features of BGP-4, as well as analyzes the protocol with respect to scaling and performance.

 
RFC 4275 BGP-4 MIB Implementation Survey
 
Authors:S. Hares, D. Hares.
Date:January 2006
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4275
This document provides a survey of implementations of BGP-4 that support RFC 1657 MIB agents according to the BGP-4 v1 MIB specification.
 
RFC 4276 BGP-4 Implementation Report
 
Authors:S. Hares, A. Retana.
Date:January 2006
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4276
This document reports the results of the BGP-4 implementation survey.The survey had 259 questions about implementations' support of BGP-4 as specified in RFC 4271. After a brief summary of the results, each response is listed. This document contains responses from the four implementers that completed the survey (Alcatel, Cisco, Laurel, andNextHop) and brief information from three that did not (Avici, DataConnection Ltd., and Nokia).

The editors did not use exterior means to verify the accuracy of the information submitted by the respondents. The respondents are experts with the products they reported on.

 
RFC 4277 Experience with the BGP-4 Protocol
 
Authors:D. McPherson, K. Patel.
Date:January 2006
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4277
The purpose of this memo is to document how the requirements for publication of a routing protocol as an Internet Draft Standard have been satisfied by Border Gateway Protocol version 4 (BGP-4).

This report satisfies the requirement for "the second report", as described in Section 6.0 of RFC 1264. In order to fulfill the requirement, this report augments RFC 1773 and describes additional knowledge and understanding gained in the time between when the protocol was made a Draft Standard and when it was submitted forStandard.

 
RFC 4278 Standards Maturity Variance Regarding the TCP MD5 Signature Option (RFC 2385) and the BGP-4 Specification
 
Authors:S. Bellovin, A. Zinin.
Date:January 2006
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4278
The IETF Standards Process requires that all normative references for a document be at the same or higher level of standardization. RFC2026 section 9.1 allows the IESG to grant a variance to the standard practices of the IETF. This document explains why the IESG is considering doing so for the revised version of the BGP-4 specification, which refers normatively to RFC 2385, "Protection ofBGP Sessions via the TCP MD5 Signature Option". RFC 2385 will remain at the Proposed Standard level.
 
RFC 4279 Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)
 
Authors:P. Eronen, Ed., H. Tschofenig, Ed..
Date:December 2005
Formats:txt json html
Updated by:RFC 8996
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4279
This document specifies three sets of new ciphersuites for theTransport Layer Security (TLS) protocol to support authentication based on pre-shared keys (PSKs). These pre-shared keys are symmetric keys, shared in advance among the communicating parties. The first set of ciphersuites uses only symmetric key operations for authentication. The second set uses a Diffie-Hellman exchange authenticated with a pre-shared key, and the third set combines public key authentication of the server with pre-shared key authentication of the client.
 
RFC 4280 Dynamic Host Configuration Protocol (DHCP) Options for Broadcast and Multicast Control Servers
 
Authors:K. Chowdhury, P. Yegani, L. Madour.
Date:November 2005
Formats:txt json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4280
This document defines new options to discover the Broadcast andMulticast Service (BCMCS) controller in an IP network. BCMCS is being developed for Third generation (3G) cellular telephone networks. Users of the service interact with a controller in the network via the Mobile Node (MN) to derive information required to receive Broadcast and Multicast Service. Dynamic Host ConfigurationProtocol can be used to configure the MN to access a particular controller. This document defines the related options and option codes.
 
RFC 4281 The Codecs Parameter for "Bucket" Media Types
 
Authors:R. Gellens, D. Singer, P. Frojdh.
Date:November 2005
Formats:txt json html
Obsoleted by:RFC 6381
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4281
Several MIME type/subtype combinations exist that can contain different media formats. A receiving agent thus needs to examine the details of such media content to determine if the specific elements can be rendered given an available set of codecs. Especially when the end system has limited resources, or the connection to the end system has limited bandwidth, it would be helpful to know from theContent-Type alone if the content can be rendered.

This document adds a new parameter, "codecs", to various type/subtype combinations to allow for unambiguous specification of the codecs indicated by the media formats contained within.

By labeling content with the specific codecs indicated to render the contained media, receiving systems can determine if the codecs are supported by the end system, and if not, can take appropriate action(such as rejecting the content, sending notification of the situation, transcoding the content to a supported type, fetching and installing the required codecs, further inspection to determine if it will be sufficient to support a subset of the indicated codecs, etc.)

 
RFC 4282 The Network Access Identifier
 
Authors:B. Aboba, M. Beadles, J. Arkko, P. Eronen.
Date:December 2005
Formats:txt html json
Obsoletes:RFC 2486
Obsoleted by:RFC 7542
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4282
In order to provide roaming services, it is necessary to have a standardized method for identifying users. This document defines the syntax for the Network Access Identifier (NAI), the user identity submitted by the client during network authentication. "Roaming" may be loosely defined as the ability to use any one of multiple InternetService Providers (ISPs), while maintaining a formal, customer-vendor relationship with only one. Examples of where roaming capabilities might be required include ISP "confederations" and ISP-provided corporate network access support. This document is a revised version of RFC 2486, which originally defined NAIs. Enhancements include international character set and privacy support, as well as a number of corrections to the original RFC.
 
RFC 4283 Mobile Node Identifier Option for Mobile IPv6 (MIPv6)
 
Authors:A. Patel, K. Leung, M. Khalil, H. Akhtar, K. Chowdhury.
Date:November 2005
Formats:txt html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4283
Mobile IPv6 (MIPv6) defines a new Mobility header that is used by mobile nodes, correspondent nodes, and home agents in all messaging related to the creation and management of bindings. Mobile IPv6 nodes need the capability to identify themselves using an identity other than the default home IP address. Some examples of identifiers include Network Access Identifier (NAI), Fully Qualified Domain Name(FQDN), International Mobile Station Identifier (IMSI), and MobileSubscriber Number (MSISDN). This document defines a new mobility option that can be used by Mobile IPv6 entities to identify themselves in messages containing a mobility header.
 
RFC 4284 Identity Selection Hints for the Extensible Authentication Protocol (EAP)
 
Authors:F. Adrangi, V. Lortz, F. Bari, P. Eronen.
Date:January 2006
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4284
The Extensible Authentication Protocol (EAP) is defined in RFC 3748.This document defines a mechanism that allows an access network to provide identity selection hints to an EAP peer -- the end of the link that responds to the authenticator. The purpose is to assist the EAP peer in selecting an appropriate Network Access Identifier(NAI). This is useful in situations where the peer does not receive a lower-layer indication of what network it is connecting to, or when there is no direct roaming relationship between the access network and the peer's home network. In the latter case, authentication is typically accomplished via a mediating network such as a roaming consortium or broker.

The mechanism defined in this document is limited in its scalability.It is intended for access networks that have a small to moderate number of direct roaming partners.

 
RFC 4285 Authentication Protocol for Mobile IPv6
 
Authors:A. Patel, K. Leung, M. Khalil, H. Akhtar, K. Chowdhury.
Date:January 2006
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4285
IPsec is specified as the means of securing signaling messages between the Mobile Node and Home Agent for Mobile IPv6 (MIPv6).MIPv6 signaling messages that are secured include the Binding Updates and Acknowledgement messages used for managing the bindings between aMobile Node and its Home Agent. This document proposes an alternate method for securing MIPv6 signaling messages between Mobile Nodes andHome Agents. The alternate method defined here consists of aMIPv6-specific mobility message authentication option that can be added to MIPv6 signaling messages.
 
RFC 4286 Multicast Router Discovery
 
Authors:B. Haberman, J. Martin.
Date:December 2005
Formats:txt html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4286
The concept of Internet Group Management Protocol (IGMP) andMulticast Listener Discovery (MLD) snooping requires the ability to identify the location of multicast routers. Since snooping is not standardized, there are many mechanisms in use to identify the multicast routers. However, this can lead to interoperability issues between multicast routers and snooping switches from different vendors.

This document introduces a general mechanism that allows for the discovery of multicast routers. This new mechanism, Multicast RouterDiscovery (MRD), introduces a standardized means of identifying multicast routers without a dependency on particular multicast routing protocols.

 
RFC 4287 The Atom Syndication Format
 
Authors:M. Nottingham, Ed., R. Sayre, Ed..
Date:December 2005
Formats:txt html json
Updated by:RFC 5988
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4287
This document specifies Atom, an XML-based Web content and metadata syndication format.
 
RFC 4288 Media Type Specifications and Registration Procedures
 
Authors:N. Freed, J. Klensin.
Date:December 2005
Formats:txt json html
Obsoletes:RFC 2048
Obsoleted by:RFC 6838
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 4288
This document defines procedures for the specification and registration of media types for use in MIME and other Internet protocols.
 
RFC 4289 Multipurpose Internet Mail Extensions (MIME) Part Four: Registration Procedures
 
Authors:N. Freed, J. Klensin.
Date:December 2005
Formats:txt json html
Obsoletes:RFC 2048
Also:BCP 0013
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 4289
This document specifies IANA registration procedures for MIME external body access types and content-transfer-encodings.
 
RFC 4290 Suggested Practices for Registration of Internationalized Domain Names (IDN)
 
Authors:J. Klensin.
Date:December 2005
Formats:txt json html
Status:INFORMATIONAL
DOI:10.17487/RFC 4290
This document explores the issues in the registration of internationalized domain names (IDNs). The basic IDN definition allows a very large number of possible characters in domain names, and this richness may lead to serious user confusion about similar- looking names. To avoid this confusion, the IDN registration process must impose rules that disallow some otherwise-valid name combinations. This document suggests a set of mechanisms that registries might use to define and implement such rules for a broad range of languages, including adaptation of methods developed forChinese, Japanese, and Korean domain names.
 
RFC 4291 IP Version 6 Addressing Architecture
 
Authors:R. Hinden, S. Deering.
Date:February 2006
Formats:txt json html
Obsoletes:RFC 3513
Updated by:RFC 5952, RFC 6052, RFC 7136, RFC 7346, RFC 7371, RFC 8064
Status:DRAFT STANDARD
DOI:10.17487/RFC 4291
This specification defines the addressing architecture of the IPVersion 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and anIPv6 node's required addresses.

This document obsoletes RFC 3513, "IP Version 6 AddressingArchitecture".

 
RFC 4292 IP Forwarding Table MIB
 
Authors:B. Haberman.
Date:April 2006
Formats:txt html json
Obsoletes:RFC 2096
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4292
This document defines a portion of the Management Information Base(MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects related to the forwarding of Internet Protocol (IP) packets in an IP version- independent manner. This document obsoletes RFC 2096.
 
RFC 4293 Management Information Base for the Internet Protocol (IP)
 
Authors:S. Routhier, Ed..
Date:April 2006
Formats:txt html json
Obsoletes:RFC 2011, RFC 2465, RFC 2466
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4293
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it describes managed objects used for implementations of the Internet Protocol (IP) in an IP version independent manner.This memo obsoletes RFCs 2011, 2465, and 2466.
 
RFC 4294 IPv6 Node Requirements
 
Authors:J. Loughney, Ed..
Date:April 2006
Formats:txt json html
Obsoleted by:RFC 6434
Updated by:RFC 5095
Status:INFORMATIONAL
DOI:10.17487/RFC 4294
This document defines requirements for IPv6 nodes. It is expected that IPv6 will be deployed in a wide range of devices and situations.Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments.
 
RFC 4295 Mobile IPv6 Management Information Base
 
Authors:G. Keeni, K. Koide, K. Nagami, S. Gundavelli.
Date:April 2006
Formats:txt json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4295
This memo defines a portion of the Management Information Base (MIB), the Mobile-IPv6 MIB, for use with network management protocols in theInternet community. In particular, the Mobile-IPv6 MIB will be used to monitor and control the mobile node, home agent, and correspondent node functions of a Mobile IPv6 (MIPv6) entity.
 
RFC 4296 The Architecture of Direct Data Placement (DDP) and Remote Direct Memory Access (RDMA) on Internet Protocols
 
Authors:S. Bailey, T. Talpey.
Date:December 2005
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4296
This document defines an abstract architecture for Direct DataPlacement (DDP) and Remote Direct Memory Access (RDMA) protocols to run on Internet Protocol-suite transports. This architecture does not necessarily reflect the proper way to implement such protocols, but is, rather, a descriptive tool for defining and understanding the protocols. DDP allows the efficient placement of data into buffers designated by Upper Layer Protocols (e.g., RDMA). RDMA provides the semantics to enable Remote Direct Memory Access between peers in a way consistent with application requirements.
 
RFC 4297 Remote Direct Memory Access (RDMA) over IP Problem Statement
 
Authors:A. Romanow, J. Mogul, T. Talpey, S. Bailey.
Date:December 2005
Formats:txt html json
Status:INFORMATIONAL
DOI:10.17487/RFC 4297
Overhead due to the movement of user data in the end-system networkI/O processing path at high speeds is significant, and has limited the use of Internet protocols in interconnection networks, and theInternet itself -- especially where high bandwidth, low latency, and/or low overhead are required by the hosted application.

This document examines this overhead, and addresses an architectural,IP-based "copy avoidance" solution for its elimination, by enablingRemote Direct Memory Access (RDMA).

 
RFC 4298 RTP Payload Format for BroadVoice Speech Codecs
 
Authors:J.-H. Chen, W. Lee, J. Thyssen.
Date:December 2005
Formats:txt json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4298
This document describes the RTP payload format for the BroadVoice(R) narrowband and wideband speech codecs. The narrowband codec, calledBroadVoice16, or BV16, has been selected by CableLabs as a mandatory codec in PacketCable 1.5 and has a CableLabs specification. The document also provides specifications for the use of BroadVoice withMIME and the Session Description Protocol (SDP).