SEcure Neighbor Discovery (SEND)
draft-arkko-send-ndopt-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Jari Arkko | ||
Last updated | 2003-06-19 | ||
Replaces | draft-ietf-send-ipsec | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
IPv6 nodes use the Neighbor Discovery (ND) protocol to discover other nodes on the link, to determine each other's link-layer addresses, to find routers and to maintain reachability information about the paths to active neighbors. If not secured, ND protocol is vulnerable to various attacks. This document specifies security mechanisms for ND. Contrary to the original ND specifications, these mechanisms do not make use of IPsec. The purpose of this draft is to present an alternative to the current approach in the Working Group.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)