{"title":"DNS Glue Requirements in Referral Responses","authors":"M. Andrews, S. Huque, P. Wouters, D. Wessels","doi":"10.17487/rfc9471","DOIUrl":"https://doi.org/10.17487/rfc9471","url":null,"abstract":"","PeriodicalId":21471,"journal":{"name":"RFC","volume":"53 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139346979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An Ethernet Virtual Private Network (EVPN) provides a unified control plane that solves the issues of Network Virtualization Edge (NVE) auto-discovery, tenant Media Access Control (MAC) / IP dissemination, and advanced features in a scablable way as required by Network Virtualization over Layer 3 (NVO3) networks. EVPN is a scalable solution for NVO3 networks and keeps the independence of the underlay IP Fabric, i.e., there is no need to enable Protocol Independent Multicast (PIM) in the underlay network and maintain multicast states for tenant Broadcast Domains. This document describes the use of EVPN for NVO3 networks and discusses its applicability to basic Layer 2 and Layer 3 connectivity requirements and to advanced features such as MAC Mobility, MAC Protection and Loop Protection, multihoming, Data Center Interconnect (DCI), and much more. No new EVPN procedures are introduced. Stream: RFC: Category: Published: ISSN: Authors: Internet Engineering Task Force (IETF) 9469 Informational September 2023 2070-1721 J. Rabadan, Ed. Nokia M. Bocci Nokia S. Boutros Ciena A. Sajassi Cisco
以太网虚拟专用网(EVPN)提供了一个统一的控制平面,以可扩展的方式解决了网络虚拟化边缘(NVE)自动发现、租户媒体访问控制(MAC)/IP 传播以及第三层网络虚拟化(NVO3)网络所需的高级功能等问题。EVPN 是适用于 NVO3 网络的可扩展解决方案,并保持底层 IP Fabric 的独立性,即无需在底层网络中启用协议独立组播 (PIM),也无需维护租户广播域的组播状态。本文档介绍了 EVPN 在 NVO3 网络中的应用,并讨论了它对基本第 2 层和第 3 层连接要求以及 MAC 移动性、MAC 保护和环路保护、多重归属、数据中心互连 (DCI) 等高级功能的适用性。没有介绍新的 EVPN 程序。流:RFC:类别出版: ISSNISSN: Authors:互联网工程任务组 (IETF) 9469 信息 2023 年 9 月 2070-1721 J. Rabadan, Ed.诺基亚 M. Bocci 诺基亚 S. Boutros Ciena A. Sajassi 思科
{"title":"Applicability of Ethernet Virtual Private Network (EVPN) to Network Virtualization over Layer 3 (NVO3) Networks","authors":"J. Rabadan, M. Bocci, Sami Boutros, A. Sajassi","doi":"10.17487/rfc9469","DOIUrl":"https://doi.org/10.17487/rfc9469","url":null,"abstract":"An Ethernet Virtual Private Network (EVPN) provides a unified control plane that solves the issues of Network Virtualization Edge (NVE) auto-discovery, tenant Media Access Control (MAC) / IP dissemination, and advanced features in a scablable way as required by Network Virtualization over Layer 3 (NVO3) networks. EVPN is a scalable solution for NVO3 networks and keeps the independence of the underlay IP Fabric, i.e., there is no need to enable Protocol Independent Multicast (PIM) in the underlay network and maintain multicast states for tenant Broadcast Domains. This document describes the use of EVPN for NVO3 networks and discusses its applicability to basic Layer 2 and Layer 3 connectivity requirements and to advanced features such as MAC Mobility, MAC Protection and Loop Protection, multihoming, Data Center Interconnect (DCI), and much more. No new EVPN procedures are introduced. Stream: RFC: Category: Published: ISSN: Authors: Internet Engineering Task Force (IETF) 9469 Informational September 2023 2070-1721 J. Rabadan, Ed. Nokia M. Bocci Nokia S. Boutros Ciena A. Sajassi Cisco","PeriodicalId":21471,"journal":{"name":"RFC","volume":"16 1","pages":"1-23"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139347025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SPAKE2+, an Augmented Password-Authenticated Key Exchange (PAKE) Protocol","authors":"Tim Taubert, Christopher A. Wood","doi":"10.17487/rfc9383","DOIUrl":"https://doi.org/10.17487/rfc9383","url":null,"abstract":"","PeriodicalId":21471,"journal":{"name":"RFC","volume":"192 1","pages":"1-25"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139344219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IPv6 Options for In Situ Operations, Administration, and Maintenance (IOAM)","authors":"S. Bhandari, F. Brockners","doi":"10.17487/rfc9486","DOIUrl":"https://doi.org/10.17487/rfc9486","url":null,"abstract":"","PeriodicalId":21471,"journal":{"name":"RFC","volume":"7 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139344522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and authorized creation of certificates for Voice over IP (VoIP) telephone providers to support Secure Telephone Identity (STI) using the TNAuthList defined by STI certificates.
本文件定义了自动证书管理环境(ACME)授权令牌的配置文件,用于为 IP 语音(VoIP)电话提供商自动授权创建证书,以使用 STI 证书定义的 TNAuthList 支持安全电话身份识别(STI)。
{"title":"TNAuthList Profile of Automated Certificate Management Environment (ACME) Authority Token","authors":"C. Wendt, D. Hancock, M. Barnes, J. Peterson","doi":"10.17487/rfc9448","DOIUrl":"https://doi.org/10.17487/rfc9448","url":null,"abstract":"This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and authorized creation of certificates for Voice over IP (VoIP) telephone providers to support Secure Telephone Identity (STI) using the TNAuthList defined by STI certificates.","PeriodicalId":21471,"journal":{"name":"RFC","volume":"31 1","pages":"1-15"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139346871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CBOR Object Signing and Encryption (COSE): AES-CTR and AES-CBC","authors":"R. Housley, H. Tschofenig","doi":"10.17487/rfc9459","DOIUrl":"https://doi.org/10.17487/rfc9459","url":null,"abstract":"","PeriodicalId":21471,"journal":{"name":"RFC","volume":"298 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139345375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Hong, C. Gomez, Y. Choi, A. Sangi, S. Chakrabarti
{"title":"Applicability and Use Cases for IPv6 over Networks of Resource-constrained Nodes (6lo)","authors":"Y. Hong, C. Gomez, Y. Choi, A. Sangi, S. Chakrabarti","doi":"10.17487/rfc9453","DOIUrl":"https://doi.org/10.17487/rfc9453","url":null,"abstract":"","PeriodicalId":21471,"journal":{"name":"RFC","volume":"9 1","pages":"1-24"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139346970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}