Authenticating BFD using HMAC-SHA-2 procedures
draft-ietf-bfd-hmac-sha-05

 
Document Type Expired Internet-Draft (bfd WG)
Last updated 2015-02-01 (latest revision 2014-07-31)
Stream IETF
Intended RFC status Proposed Standard
Formats
Expired & archived
plain text pdf html
Stream WG state WG Document Jan 2015
Document shepherd No shepherd assigned
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ietf-bfd-hmac-sha-05.txt

Abstract

This document describes the mechanism to authenticate Bidirectional Forwarding Detection (BFD) protocol packets using Hashed Message Authentication Mode (HMAC) with the SHA-256, SHA-384, and SHA-512 algorithms. The described mechanism uses the Generic Cryptographic Authentication and Generic Meticulous Cryptographic Authentication sections to carry the authentication data. This document updates, but does not supersede, the cryptographic authentication mechanism specified in RFC 5880.

Authors

Dacheng Zhang (zhangdacheng@huawei.com)
Manav Bhatia (manav.bhatia@alcatel-lucent.com)
Vishwas Manral (vishwas@ionosnetworks.com)
Mahesh Jethanandani (mjethanandani@gmail.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)