References to rfc4253
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Showing RFCs and active Internet-Drafts, sorted by reference type, then document name.
| Document | Title | Status | Type | Downref |
|---|---|---|---|---|
| draft-ietf-netconf-crypto-types |
YANG Data Types and Groupings for Cryptography
References Referenced by |
Proposed Standard | normatively references | |
| draft-ietf-rats-tpm-based-network-device-attest |
TPM-based Network Device Remote Integrity Verification
References Referenced by |
Informational | normatively references | |
| RFC 4250 |
The Secure Shell (SSH) Protocol Assigned Numbers
References Referenced by |
Proposed Standard | normatively references | |
| RFC 4251 |
The Secure Shell (SSH) Protocol Architecture
References Referenced by |
Proposed Standard | normatively references | |
| RFC 4252 |
The Secure Shell (SSH) Authentication Protocol
References Referenced by |
Proposed Standard | normatively references | |
| RFC 4254 |
The Secure Shell (SSH) Connection Protocol
References Referenced by |
Proposed Standard | normatively references | |
| RFC 4255 |
Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints
References Referenced by |
Proposed Standard | normatively references | |
| RFC 4256 |
Generic Message Exchange Authentication for the Secure Shell Protocol (SSH)
References Referenced by |
Proposed Standard | normatively references | |
| RFC 4335 |
The Secure Shell (SSH) Session Channel Break Extension
References Referenced by |
Proposed Standard | normatively references | |
| RFC 4344 |
The Secure Shell (SSH) Transport Layer Encryption Modes
References Referenced by |
Proposed Standard | normatively references | |
| RFC 4345 |
Improved Arcfour Modes for the Secure Shell (SSH) Transport Layer Protocol
References Referenced by |
Proposed Standard | normatively references | |
| RFC 4419 |
Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol
References Referenced by |
Proposed Standard | normatively references | |
| RFC 4432 |
RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol
References Referenced by |
Proposed Standard | normatively references | |
| RFC 4462 |
Generic Security Service Application Program Interface (GSS-API) Authentication and Key Exchange for the Secure Shell (SSH) Protocol
References Referenced by |
Proposed Standard | normatively references | |
| RFC 4716 |
The Secure Shell (SSH) Public Key File Format
References Referenced by |
Informational | normatively references | |
| RFC 4742 |
Using the NETCONF Configuration Protocol over Secure SHell (SSH)
References Referenced by |
Proposed Standard | normatively references | |
| RFC 4819 |
Secure Shell Public Key Subsystem
References Referenced by |
Proposed Standard | normatively references | |
| RFC 5592 |
Secure Shell Transport Model for the Simple Network Management Protocol (SNMP)
References Referenced by |
Proposed Standard | normatively references | |
| RFC 5647 |
AES Galois Counter Mode for the Secure Shell Transport Layer Protocol
References Referenced by |
Informational | normatively references | |
| RFC 5656 |
Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer
References Referenced by |
Proposed Standard | normatively references | |
| RFC 6187 |
X.509v3 Certificates for Secure Shell Authentication
References Referenced by |
Proposed Standard | normatively references | |
| RFC 6239 |
Suite B Cryptographic Suites for Secure Shell (SSH)
References Referenced by |
Historic | normatively references | |
| RFC 6242 |
Using the NETCONF Protocol over Secure Shell (SSH)
References Referenced by |
Proposed Standard | normatively references | |
| RFC 6594 |
Use of the SHA-256 Algorithm with RSA, Digital Signature Algorithm (DSA), and Elliptic Curve DSA (ECDSA) in SSHFP Resource Records
References Referenced by |
Proposed Standard | normatively references | |
| RFC 6668 |
SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol
References Referenced by |
Proposed Standard | normatively references | |
| RFC 7076 |
P6R's Secure Shell Public Key Subsystem
References Referenced by |
Informational | normatively references | |
| RFC 7317 |
A YANG Data Model for System Management
References Referenced by |
Proposed Standard | normatively references | |
| RFC 7869 |
The "vnc" URI Scheme
References Referenced by |
Informational | normatively references | |
| RFC 8071 |
NETCONF Call Home and RESTCONF Call Home
References Referenced by |
Proposed Standard | normatively references | |
| RFC 8268 |
More Modular Exponentiation (MODP) Diffie-Hellman (DH) Key Exchange (KEX) Groups for Secure Shell (SSH)
References Referenced by |
Proposed Standard | normatively references | |
| RFC 8308 |
Extension Negotiation in the Secure Shell (SSH) Protocol
References Referenced by |
Proposed Standard | normatively references | |
| RFC 8332 |
Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell (SSH) Protocol
References Referenced by |
Proposed Standard | normatively references | |
| RFC 8572 |
Secure Zero Touch Provisioning (SZTP)
References Referenced by |
Proposed Standard | normatively references | |
| RFC 8635 |
Router Keying for BGPsec
References Referenced by |
Proposed Standard | normatively references | |
| RFC 8645 |
Re-keying Mechanisms for Symmetric Keys
References Referenced by |
Informational | normatively references | |
| RFC 8709 |
Ed25519 and Ed448 Public Key Algorithms for the Secure Shell (SSH) Protocol
References Referenced by |
Proposed Standard | normatively references | |
| RFC 8731 |
Secure Shell (SSH) Key Exchange Method Using Curve25519 and Curve448
References Referenced by |
Proposed Standard | normatively references | |
| RFC 9142 |
Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH)
References Referenced by |
Proposed Standard | normatively references | |
| RFC 9212 |
Commercial National Security Algorithm (CNSA) Suite Cryptography for Secure Shell (SSH)
References Referenced by |
Informational | normatively references | |
| draft-ietf-bier-te-arch |
Tree Engineering for Bit Index Explicit Replication (BIER-TE)
References Referenced by |
Proposed Standard | informatively references | |
| draft-ietf-netconf-ssh-client-server |
YANG Groupings for SSH Clients and SSH Servers
References Referenced by |
Proposed Standard | informatively references | |
| draft-irtf-t2trg-secure-bootstrapping |
Terminology and processes for initial security setup of IoT devices
References Referenced by |
informatively references | ||
| RFC 5114 |
Additional Diffie-Hellman Groups for Use with IETF Standards
References Referenced by |
Informational | informatively references | |
| RFC 6272 |
Internet Protocols for the Smart Grid
References Referenced by |
Informational | informatively references | |
| RFC 6476 |
Using Message Authentication Code (MAC) Encryption in the Cryptographic Message Syntax (CMS)
References Referenced by |
Proposed Standard | informatively references | |
| RFC 6518 |
Keying and Authentication for Routing Protocols (KARP) Design Guidelines
References Referenced by |
Informational | informatively references | |
| RFC 6872 |
The Common Log Format (CLF) for the Session Initiation Protocol (SIP): Framework and Information Model
References Referenced by |
Proposed Standard | informatively references | |
| RFC 7682 |
Considerations for Internet Routing Registries (IRRs) and Routing Policy Configuration
References Referenced by |
Informational | informatively references | |
| RFC 8547 |
TCP-ENO: Encryption Negotiation Option
References Referenced by |
Experimental | informatively references | |
| RFC 8758 |
Deprecating RC4 in Secure Shell (SSH)
References Referenced by |
Best Current Practice | informatively references | |
| RFC 8922 |
A Survey of the Interaction between Security Protocols and Transport Services
References Referenced by |
Informational | informatively references | |
| RFC 9055 |
Deterministic Networking (DetNet) Security Considerations
References Referenced by |
Informational | informatively references |