Skip to main content

References to RFC 7296

These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.

Showing RFCs and active Internet-Drafts, sorted by reference type, then document name.

Document Title Status Type Downref
draft-antony-ipsecme-iekv2-beet-mode IKEv2 negotiation for Bound End-to-End Tunnel (BEET) mode ESP
References Referenced by
normatively references
draft-guo-ipsecme-ikev2-using-shangmi Using ShangMi in the Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
normatively references
draft-he-ipsecme-vpn-shared-ipsecsa Shared Use of IPsec Tunnel in a Multi-VPN Environment
References Referenced by
normatively references
draft-ietf-bess-bgp-sdwan-usage BGP Usage for SD-WAN Overlay Networks
References Referenced by
Informational normatively references
draft-ietf-ipsecme-diet-esp ESP Header Compression Profile
References Referenced by
normatively references
draft-ietf-ipsecme-g-ikev2 Group Key Management using IKEv2
References Referenced by
normatively references
draft-ietf-ipsecme-ikev2-auth-announce Announcing Supported Authentication Methods in IKEv2
References Referenced by
Proposed Standard normatively references
draft-ietf-ipsecme-ikev2-diet-esp-extension Internet Key Exchange version 2 (IKEv2) extension for the ESP Header Compression (EHC)
References Referenced by
normatively references
draft-ietf-ipsecme-ikev2-qr-alt Alternative Approach for Mixing Preshared Keys in IKEv2 for Post-quantum Security
References Referenced by
normatively references
draft-ietf-ipsecme-ikev2-sa-ts-payloads-opt IKEv2 Optional SA&TS Payloads in Child Exchange
References Referenced by
normatively references
draft-ietf-ipsecme-multi-sa-performance IKEv2 support for per-resource Child SAs
References Referenced by
Proposed Standard normatively references
draft-jeong-ipwave-security-privacy Basic Support for Security and Privacy in IP-Based Vehicular Networks
References Referenced by
normatively references
draft-kampanakis-ml-kem-ikev2 Post-quantum Hybrid Key Exchange with ML-KEM in the Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
normatively references
draft-mrossberg-ipsecme-multiple-sequence-counters Broadening the Scope of Encapsulating Security Payload (ESP) Protocol
References Referenced by
normatively references
draft-nir-ipsecme-big-payload A Larger Internet Key Exchange version 2 (IKEv2) Payload
References Referenced by
normatively references
draft-pan-ipsecme-anti-replay-notification IKEv2 Support for Anti-Replay Status Notification
References Referenced by
normatively references
draft-pwouters-ipsecme-child-pfs-info IKEv2 support for Child SA PFS policy notification
References Referenced by
normatively references
draft-smyslov-ipsecme-ikev2-cookie-revised Revised Cookie Processing in the IKEv2 Protocol
References Referenced by
normatively references
draft-smyslov-ipsecme-ikev2-reliable-transport Use of Reliable Transport in the Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
normatively references
draft-wang-hybrid-kem-ikev2-frodo Post-quantum Hybrid Key Exchange in the IKEv2 with ECDH, ML-KEM, and FrodoKE
References Referenced by
normatively references
RFC 7421 Analysis of the 64-bit Boundary in IPv6 Addressing
References Referenced by
Informational normatively references
RFC 7619 The NULL Authentication Method in the Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
Proposed Standard normatively references
RFC 7634 ChaCha20, Poly1305, and Their Use in the Internet Key Exchange Protocol (IKE) and IPsec
References Referenced by
Proposed Standard normatively references
RFC 7651 3GPP IP Multimedia Subsystems (IMS) Option for the Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
Informational normatively references
RFC 7652 Port Control Protocol (PCP) Authentication Mechanism
References Referenced by
Proposed Standard normatively references
RFC 7670 Generic Raw Public-Key Support for IKEv2
References Referenced by
Proposed Standard normatively references
RFC 7717 IKEv2-Derived Shared Secret Key for the One-Way Active Measurement Protocol (OWAMP) and Two-Way Active Measurement Protocol (TWAMP)
References Referenced by
Proposed Standard normatively references
RFC 7836 Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012
References Referenced by
Informational normatively references
RFC 8002 Host Identity Protocol Certificates
References Referenced by
Proposed Standard normatively references
RFC 8019 Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks
References Referenced by
Proposed Standard normatively references
RFC 8031 Curve25519 and Curve448 for the Internet Key Exchange Protocol Version 2 (IKEv2) Key Agreement
References Referenced by
Proposed Standard normatively references
RFC 8229 TCP Encapsulation of IKE and IPsec Packets
References Referenced by
Proposed Standard normatively references
RFC 8247 Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
Proposed Standard normatively references
RFC 8420 Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
Proposed Standard normatively references
RFC 8504 IPv6 Node Requirements
References Referenced by
Best Current Practice normatively references
RFC 8598 Split DNS Configuration for the Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
Proposed Standard normatively references
RFC 8750 Implicit Initialization Vector (IV) for Counter-Based Ciphers in Encapsulating Security Payload (ESP)
References Referenced by
Proposed Standard normatively references
RFC 8784 Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security
References Referenced by
Proposed Standard normatively references
RFC 8983 Internet Key Exchange Protocol Version 2 (IKEv2) Notification Status Types for IPv4/IPv6 Coexistence
References Referenced by
Proposed Standard normatively references
RFC 8994 An Autonomic Control Plane (ACP)
References Referenced by
Proposed Standard normatively references
RFC 9061 A YANG Data Model for IPsec Flow Protection Based on Software-Defined Networking (SDN)
References Referenced by
Proposed Standard normatively references
RFC 9206 Commercial National Security Algorithm (CNSA) Suite Cryptography for Internet Protocol Security (IPsec)
References Referenced by
Informational normatively references
RFC 9227 Using GOST Ciphers in the Encapsulating Security Payload (ESP) and Internet Key Exchange Version 2 (IKEv2) Protocols
References Referenced by
Informational normatively references
RFC 9242 Intermediate Exchange in the Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
Proposed Standard normatively references
RFC 9329 TCP Encapsulation of Internet Key Exchange Protocol (IKE) and IPsec Packets
References Referenced by
Proposed Standard normatively references
RFC 9333 Minimal IP Encapsulating Security Payload (ESP)
References Referenced by
Informational normatively references
RFC 9347 Aggregation and Fragmentation Mode for Encapsulating Security Payload (ESP) and Its Use for IP Traffic Flow Security (IP-TFS)
References Referenced by
Proposed Standard normatively references
RFC 9370 Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
Proposed Standard normatively references
RFC 9385 Using GOST Cryptographic Algorithms in the Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
Informational normatively references
RFC 9464 Internet Key Exchange Protocol Version 2 (IKEv2) Configuration for Encrypted DNS
References Referenced by
Proposed Standard normatively references
RFC 9478 Labeled IPsec Traffic Selector Support for the Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
Proposed Standard normatively references
draft-ietf-emu-aka-pfs Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)
References Referenced by
Proposed Standard informatively references
draft-ietf-lamps-pq-composite-kem Composite ML-KEM for Use in the Internet X.509 Public Key Infrastructure and CMS
References Referenced by
informatively references
draft-ietf-tsvwg-rfc6040update-shim Propagating Explicit Congestion Notification Across IP Tunnel Headers Separated by a Shim
References Referenced by
Proposed Standard informatively references
draft-ounsworth-pq-composite-sigs Composite ML-DSA for use in Internet PKI
References Referenced by
informatively references
draft-templin-6man-aero3 Automatic Extended Route Optimization (AERO)
References Referenced by
informatively references
draft-templin-6man-omni3 Transmission of IP Packets over Overlay Multilink Network (OMNI) Interfaces
References Referenced by
informatively references
draft-tschofenig-tls-extended-key-update Extended Key Update for Transport Layer Security (TLS) 1.3
References Referenced by
informatively references
draft-wang-secure-access-of-iot-terminals Technical Requirements for Secure Access and Management of IoT Smart Terminals
References Referenced by
informatively references
RFC 7539 ChaCha20 and Poly1305 for IETF Protocols
References Referenced by
Informational informatively references
RFC 7696 Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms
References Referenced by
Best Current Practice informatively references
RFC 7791 Cloning the IKE Security Association in the Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
Proposed Standard informatively references
RFC 7815 Minimal Internet Key Exchange Version 2 (IKEv2) Initiator Implementation
References Referenced by
Informational informatively references
RFC 7857 Updates to Network Address Translation (NAT) Behavioral Requirements
References Referenced by
Best Current Practice informatively references
RFC 8085 UDP Usage Guidelines
References Referenced by
Best Current Practice informatively references
RFC 8213 Security of Messages Exchanged between Servers and Relay Agents
References Referenced by
Proposed Standard informatively references
RFC 8221 Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)
References Referenced by
Proposed Standard informatively references
RFC 8387 Practical Considerations and Implementation Experiences in Securing Smart Object Networks
References Referenced by
Informational informatively references
RFC 8439 ChaCha20 and Poly1305 for IETF Protocols
References Referenced by
Informational informatively references
RFC 8576 Internet of Things (IoT) Security: State of the Art and Challenges
References Referenced by
Informational informatively references
RFC 8743 Multiple Access Management Services Multi-Access Management Services (MAMS)
References Referenced by
Informational informatively references
RFC 8894 Simple Certificate Enrolment Protocol
References Referenced by
Informational informatively references
RFC 8922 A Survey of the Interaction between Security Protocols and Transport Services
References Referenced by
Informational informatively references
RFC 9048 Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA')
References Referenced by
Informational informatively references
RFC 9147 The Datagram Transport Layer Security (DTLS) Protocol Version 1.3
References Referenced by
Proposed Standard informatively references
RFC 9365 IPv6 Wireless Access in Vehicular Environments (IPWAVE): Problem Statement and Use Cases
References Referenced by
Informational informatively references
RFC 9395 Deprecation of the Internet Key Exchange Version 1 (IKEv1) Protocol and Obsoleted Algorithms
References Referenced by
Proposed Standard informatively references