References to rfc4949
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Showing RFCs and active Internet-Drafts, sorted by reference type, then document name.
Document | Title | Status | Type | Downref |
---|---|---|---|---|
draft-hallambaker-mesh-dare |
Mathematical Mesh 3.0 Part III : Data At Rest Encryption (DARE)
References Referenced by |
normatively references | ||
draft-ietf-kitten-scram-2fa |
Extensions to Salted Challenge Response (SCRAM) for 2 factor authentication
References Referenced by |
normatively references | ||
draft-ietf-oauth-v2-1 |
The OAuth 2.1 Authorization Framework
References Referenced by |
normatively references | ||
draft-ip-address-privacy-considerations |
IP Address Privacy Considerations
References Referenced by |
normatively references | ||
draft-ip-address-privacy-considerations
As fyi36 |
IP Address Privacy Considerations
References Referenced by |
normatively references | ||
draft-irtf-pearg-ip-address-privacy-considerations |
IP Address Privacy Considerations
References Referenced by |
normatively references | ||
draft-krose-multicast-security |
Security and Privacy Considerations for Multicast Transports
References Referenced by |
normatively references | ||
draft-pep-general |
pretty Easy privacy (pEp): Privacy by Default
References Referenced by |
normatively references | ||
draft-pep-general
As fyi36 |
pretty Easy privacy (pEp): Privacy by Default
References Referenced by |
normatively references | ||
RFC 6341 |
Use Cases and Requirements for SIP-Based Media Recording (SIPREC)
References Referenced by |
Informational | normatively references | |
RFC 6341
As fyi36 |
Use Cases and Requirements for SIP-Based Media Recording (SIPREC)
References Referenced by |
Informational | normatively references | |
RFC 6749 |
The OAuth 2.0 Authorization Framework
References Referenced by |
Proposed Standard | normatively references | Downref |
RFC 7165 |
Use Cases and Requirements for JSON Object Signing and Encryption (JOSE)
References Referenced by |
Informational | normatively references | |
RFC 7435 |
Opportunistic Security: Some Protection Most of the Time
References Referenced by |
Informational | normatively references | |
RFC 7489 |
Domain-based Message Authentication, Reporting, and Conformance (DMARC)
References Referenced by |
Informational | normatively references | |
RFC 7489
As fyi36 |
Domain-based Message Authentication, Reporting, and Conformance (DMARC)
References Referenced by |
Informational | normatively references | |
RFC 7515 |
JSON Web Signature (JWS)
References Referenced by |
Proposed Standard | normatively references | Downref |
RFC 7516 |
JSON Web Encryption (JWE)
References Referenced by |
Proposed Standard | normatively references | Downref |
RFC 7517 |
JSON Web Key (JWK)
References Referenced by |
Proposed Standard | normatively references | Downref |
RFC 7518 |
JSON Web Algorithms (JWA)
References Referenced by |
Proposed Standard | normatively references | Downref |
RFC 7519 |
JSON Web Token (JWT)
References Referenced by |
Proposed Standard | normatively references | Downref |
RFC 7525 |
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
References Referenced by |
Best Current Practice | normatively references | Downref |
RFC 7590 |
Use of Transport Layer Security (TLS) in the Extensible Messaging and Presence Protocol (XMPP)
References Referenced by |
Proposed Standard | normatively references | Downref |
RFC 7590
As fyi36 |
Use of Transport Layer Security (TLS) in the Extensible Messaging and Presence Protocol (XMPP)
References Referenced by |
Proposed Standard | normatively references | Downref |
RFC 7712 |
Domain Name Associations (DNA) in the Extensible Messaging and Presence Protocol (XMPP)
References Referenced by |
Proposed Standard | normatively references | Downref |
RFC 8165 |
Design Considerations for Metadata Insertion
References Referenced by |
Informational | normatively references | |
RFC 8165
As fyi36 |
Design Considerations for Metadata Insertion
References Referenced by |
Informational | normatively references | |
RFC 8241 |
Interface to the Routing System (I2RS) Security-Related Requirements
References Referenced by |
Informational | normatively references | |
RFC 8241
As fyi36 |
Interface to the Routing System (I2RS) Security-Related Requirements
References Referenced by |
Informational | normatively references | |
draft-birkholz-rats-corim |
Concise Reference Integrity Manifest
References Referenced by |
informatively references | ||
draft-birkholz-rats-tuda |
Time-Based Uni-Directional Attestation
References Referenced by |
informatively references | ||
draft-birkholz-rats-tuda
As fyi36 |
Time-Based Uni-Directional Attestation
References Referenced by |
informatively references | ||
draft-ietf-ace-aif |
An Authorization Information Format (AIF) for ACE
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-ace-mqtt-tls-profile |
Message Queuing Telemetry Transport (MQTT)-TLS profile of Authentication and Authorization for Constrained Environments (ACE) Framework
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-ace-oauth-authz |
Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-ace-oauth-authz
As fyi36 |
Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-ace-oscore-profile |
OSCORE Profile of the Authentication and Authorization for Constrained Environments Framework
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-ace-oscore-profile
As fyi36 |
OSCORE Profile of the Authentication and Authorization for Constrained Environments Framework
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-acme-authority-token-tnauthlist |
TNAuthList profile of ACME Authority Token
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-acme-authority-token-tnauthlist
As fyi36 |
TNAuthList profile of ACME Authority Token
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-core-oscore-groupcomm |
Group OSCORE - Secure Group Communication for CoAP
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-cose-rfc8152bis-struct |
CBOR Object Signing and Encryption (COSE): Structures and Process
References Referenced by |
Internet Standard | informatively references | |
draft-ietf-cose-rfc8152bis-struct
As fyi36 |
CBOR Object Signing and Encryption (COSE): Structures and Process
References Referenced by |
Internet Standard | informatively references | |
draft-ietf-i2nsf-nsf-monitoring-data-model |
I2NSF NSF Monitoring Interface YANG Data Model
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-rats-architecture |
Remote Attestation Procedures Architecture
References Referenced by |
Informational | informatively references | |
draft-ietf-rats-eat |
The Entity Attestation Token (EAT)
References Referenced by |
informatively references | ||
draft-ietf-regext-rdap-openid |
Federated Authentication for the Registration Data Access Protocol (RDAP) using OpenID Connect
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-suit-firmware-encryption |
Firmware Encryption with SUIT Manifests
References Referenced by |
informatively references | ||
draft-ietf-teep-architecture |
Trusted Execution Environment Provisioning (TEEP) Architecture
References Referenced by |
Informational | informatively references | |
draft-ietf-uta-rfc7525bis |
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
References Referenced by |
Best Current Practice | informatively references | |
draft-irtf-hrpc-guidelines |
Guidelines for Human Rights Protocol and Architecture Considerations
References Referenced by |
informatively references | ||
draft-mcd-identifier-access-security |
Security Services for the Industrial Internet Identifier Data Access Protocol (IIIDAP)
References Referenced by |
informatively references | ||
draft-nakajima-crypto-asset-terminology |
Terminology for Cryptoassets
References Referenced by |
informatively references | ||
draft-nakajima-crypto-asset-terminology
As fyi36 |
Terminology for Cryptoassets
References Referenced by |
informatively references | ||
draft-richardson-t2trg-idevid-considerations |
A Taxonomy of operational security considerations for manufacturer installed keys and Trust Anchors
References Referenced by |
informatively references | ||
RFC 5042 |
Direct Data Placement Protocol (DDP) / Remote Direct Memory Access Protocol (RDMAP) Security
References Referenced by |
Proposed Standard | informatively references | |
RFC 5197 |
On the Applicability of Various Multimedia Internet KEYing (MIKEY) Modes and Extensions
References Referenced by |
Informational | informatively references | |
RFC 5217 |
Memorandum for Multi-Domain Public Key Infrastructure Interoperability
References Referenced by |
Informational | informatively references | |
RFC 5479 |
Requirements and Analysis of Media Security Management Protocols
References Referenced by |
Informational | informatively references | |
RFC 5479
As fyi36 |
Requirements and Analysis of Media Security Management Protocols
References Referenced by |
Informational | informatively references | |
RFC 5802 |
Salted Challenge Response Authentication Mechanism (SCRAM) SASL and GSS-API Mechanisms
References Referenced by |
Proposed Standard | informatively references | |
RFC 6029 |
A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem
References Referenced by |
Informational | informatively references | |
RFC 6029
As fyi36 |
A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem
References Referenced by |
Informational | informatively references | |
RFC 6092 |
Recommended Simple Security Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service
References Referenced by |
Informational | informatively references | |
RFC 6120 |
Extensible Messaging and Presence Protocol (XMPP): Core
References Referenced by |
Proposed Standard | informatively references | |
RFC 6125 |
Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)
References Referenced by |
Proposed Standard | informatively references | |
RFC 6280 |
An Architecture for Location and Location Privacy in Internet Applications
References Referenced by |
Best Current Practice | informatively references | |
RFC 6280
As fyi36 |
An Architecture for Location and Location Privacy in Internet Applications
References Referenced by |
Best Current Practice | informatively references | |
RFC 6711 |
An IANA Registry for Level of Assurance (LoA) Profiles
References Referenced by |
Informational | informatively references | |
RFC 6781 |
DNSSEC Operational Practices, Version 2
References Referenced by |
Informational | informatively references | |
RFC 6797 |
HTTP Strict Transport Security (HSTS)
References Referenced by |
Proposed Standard | informatively references | |
RFC 6862 |
Keying and Authentication for Routing Protocols (KARP) Overview, Threats, and Requirements
References Referenced by |
Informational | informatively references | |
RFC 6862
As fyi36 |
Keying and Authentication for Routing Protocols (KARP) Overview, Threats, and Requirements
References Referenced by |
Informational | informatively references | |
RFC 6943 |
Issues in Identifier Comparison for Security Purposes
References Referenced by |
Informational | informatively references | |
RFC 6973 |
Privacy Considerations for Internet Protocols
References Referenced by |
Informational | informatively references | |
RFC 7126 |
Recommendations on Filtering of IPv4 Packets Containing IPv4 Options
References Referenced by |
Best Current Practice | informatively references | |
RFC 7186 |
Security Threats for the Neighborhood Discovery Protocol (NHDP)
References Referenced by |
Informational | informatively references | |
RFC 7201 |
Options for Securing RTP Sessions
References Referenced by |
Informational | informatively references | |
RFC 7204 |
Requirements for Labeled NFS
References Referenced by |
Informational | informatively references | |
RFC 7258 |
Pervasive Monitoring Is an Attack
References Referenced by |
Best Current Practice | informatively references | |
RFC 7288 |
Reflections on Host Firewalls
References Referenced by |
Informational | informatively references | |
RFC 7321 |
Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)
References Referenced by |
Proposed Standard | informatively references | |
RFC 7397 |
Report from the Smart Object Security Workshop
References Referenced by |
Informational | informatively references | |
RFC 7416 |
A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs)
References Referenced by |
Informational | informatively references | |
RFC 7481 |
Security Services for the Registration Data Access Protocol (RDAP)
References Referenced by |
Internet Standard | informatively references | |
RFC 7624 |
Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement
References Referenced by |
Informational | informatively references | |
RFC 7672 |
SMTP Security via Opportunistic DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS)
References Referenced by |
Proposed Standard | informatively references | |
RFC 7754 |
Technical Considerations for Internet Service Blocking and Filtering
References Referenced by |
Informational | informatively references | |
RFC 7754
As fyi36 |
Technical Considerations for Internet Service Blocking and Filtering
References Referenced by |
Informational | informatively references | |
RFC 7804 |
Salted Challenge Response HTTP Authentication Mechanism
References Referenced by |
Experimental | informatively references | |
RFC 7804
As fyi36 |
Salted Challenge Response HTTP Authentication Mechanism
References Referenced by |
Experimental | informatively references | |
RFC 7861 |
Remote Procedure Call (RPC) Security Version 3
References Referenced by |
Proposed Standard | informatively references | |
RFC 7862 |
Network File System (NFS) Version 4 Minor Version 2 Protocol
References Referenced by |
Proposed Standard | informatively references | |
RFC 7877 |
Session Peering Provisioning Framework (SPPF)
References Referenced by |
Proposed Standard | informatively references | |
RFC 7877
As fyi36 |
Session Peering Provisioning Framework (SPPF)
References Referenced by |
Proposed Standard | informatively references | |
RFC 7985 |
Security Threats to Simplified Multicast Forwarding (SMF)
References Referenced by |
Informational | informatively references | |
RFC 8152 |
CBOR Object Signing and Encryption (COSE)
References Referenced by |
Proposed Standard | informatively references | |
RFC 8152
As fyi36 |
CBOR Object Signing and Encryption (COSE)
References Referenced by |
Proposed Standard | informatively references | |
RFC 8176 |
Authentication Method Reference Values
References Referenced by |
Proposed Standard | informatively references | |
RFC 8176
As fyi36 |
Authentication Method Reference Values
References Referenced by |
Proposed Standard | informatively references | |
RFC 8280 |
Research into Human Rights Protocol Considerations
References Referenced by |
Informational | informatively references | |
RFC 8280
As fyi36 |
Research into Human Rights Protocol Considerations
References Referenced by |
Informational | informatively references | |
RFC 8295 |
EST (Enrollment over Secure Transport) Extensions
References Referenced by |
Proposed Standard | informatively references | |
RFC 8551 |
Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
References Referenced by |
Proposed Standard | informatively references | |
RFC 8551
As fyi36 |
Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
References Referenced by |
Proposed Standard | informatively references | |
RFC 8612 |
DDoS Open Threat Signaling (DOTS) Requirements
References Referenced by |
Informational | informatively references | |
RFC 8612
As fyi36 |
DDoS Open Threat Signaling (DOTS) Requirements
References Referenced by |
Informational | informatively references | |
RFC 8793 |
Information-Centric Networking (ICN): Content-Centric Networking (CCNx) and Named Data Networking (NDN) Terminology
References Referenced by |
Informational | informatively references | |
RFC 8793
As fyi36 |
Information-Centric Networking (ICN): Content-Centric Networking (CCNx) and Named Data Networking (NDN) Terminology
References Referenced by |
Informational | informatively references | |
RFC 8953 |
Coordinating Attack Response at Internet Scale 2 (CARIS2) Workshop Report
References Referenced by |
Informational | informatively references | |
RFC 8953
As fyi36 |
Coordinating Attack Response at Internet Scale 2 (CARIS2) Workshop Report
References Referenced by |
Informational | informatively references | |
RFC 9066 |
Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Call Home
References Referenced by |
Proposed Standard | informatively references | |
RFC 9066
As fyi36 |
Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Call Home
References Referenced by |
Proposed Standard | informatively references | |
RFC 9118 |
Enhanced JSON Web Token (JWT) Claim Constraints for Secure Telephone Identity Revisited (STIR) Certificates
References Referenced by |
Proposed Standard | informatively references | |
RFC 9118
As fyi36 |
Enhanced JSON Web Token (JWT) Claim Constraints for Secure Telephone Identity Revisited (STIR) Certificates
References Referenced by |
Proposed Standard | informatively references | |
RFC 9153 |
Drone Remote Identification Protocol (DRIP) Requirements and Terminology
References Referenced by |
Informational | informatively references | |
RFC 9153
As fyi36 |
Drone Remote Identification Protocol (DRIP) Requirements and Terminology
References Referenced by |
Informational | informatively references | |
RFC 3060
As fyi36 |
Policy Core Information Model -- Version 1 Specification
References Referenced by |
Proposed Standard | Reference | Possible Downref |
RFC 3067
As fyi36 |
TERENA'S Incident Object Description and Exchange Format Requirements
References Referenced by |
Informational | Reference | |
RFC 3254
As fyi36 |
Definitions for talking about directories
References Referenced by |
Informational | Reference | |
RFC 3275
As fyi36 |
(Extensible Markup Language) XML-Signature Syntax and Processing
References Referenced by |
Draft Standard | Reference | Possible Downref |