%% You should probably cite rfc8177 instead of this I-D. @techreport{ietf-rtgwg-yang-key-chain-24, number = {draft-ietf-rtgwg-yang-key-chain-24}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-rtgwg-yang-key-chain/24/}, author = {Acee Lindem and Yingzhen Qu and Derek M. Yeung and Ing-Wher (Helen) Chen and Zhaohui (Jeffrey) Zhang}, title = {{YANG Data Model for Key Chains}}, pagetotal = 25, year = 2017, month = apr, day = 29, abstract = {This document describes the key chain YANG data model. Key chains are commonly used for routing protocol authentication and other applications requiring symmetric keys. A key chain is a list containing one or more elements containing a Key ID, key string, send/accept lifetimes, and the associated authentication or encryption algorithm. By properly overlapping the send and accept lifetimes of multiple key chain elements, key strings and algorithms may be gracefully updated. By representing them in a YANG data model, key distribution can be automated.}, }