A Generic Mechanism to solve Inter-Session Replay Attacks for Routing and Signaling Protocols

Document Type Expired Internet-Draft (individual)
Authors Manav Bhatia  , Sam Hartman  , Dacheng Zhang 
Last updated 2011-03-06
Stream (None)
Intended RFC status (None)
Expired & archived
plain text html xml htmlized pdfized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


This draft proposes a common solution for routing protocols to enhance their capability in tolerating inter-session replay attacks when using manual keys for securing their protocol packets.


Manav Bhatia (manav.bhatia@alcatel-lucent.com)
Sam Hartman (hartmans@painless-security.com)
Dacheng Zhang (zhangdacheng@huawei.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)