{"title":"RADIUS Extensions for DHCP-Configured Services","authors":"M. Boucadair, T. Reddy.K, Alan DeKok","doi":"10.17487/rfc9445","DOIUrl":"https://doi.org/10.17487/rfc9445","url":null,"abstract":"","PeriodicalId":21471,"journal":{"name":"RFC","volume":"15 1","pages":"1-18"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89053683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lisong Xu, Sangtae Ha, I. Rhee, Vidhi Goel, L. Eggert
{"title":"CUBIC for Fast and Long-Distance Networks","authors":"Lisong Xu, Sangtae Ha, I. Rhee, Vidhi Goel, L. Eggert","doi":"10.17487/rfc9438","DOIUrl":"https://doi.org/10.17487/rfc9438","url":null,"abstract":"","PeriodicalId":21471,"journal":{"name":"RFC","volume":"46 1","pages":"1-28"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82940096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This document updates "Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)" (RFC 9202) by specifying that the profile applies to TLS as well as DTLS.
{"title":"Extension of the Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) to Transport Layer Security (TLS)","authors":"O. Bergmann, J. Mattsson, G. Selander","doi":"10.17487/rfc9430","DOIUrl":"https://doi.org/10.17487/rfc9430","url":null,"abstract":"This document updates \"Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)\" (RFC 9202) by specifying that the profile applies to TLS as well as DTLS.","PeriodicalId":21471,"journal":{"name":"RFC","volume":"49 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86729186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In general, linear network coding can improve the network communication performance in terms of throughput, latency, and reliability. BATched Sparse (BATS) code is a class of efficient linear network coding scheme with a matrix generalization of fountain codes as the outer code and batch-based linear network coding as the inner code. This document describes a baseline BATS coding scheme for communication through multi-hop networks and discusses the related research issues towards a more sophisticated BATS coding scheme. This document is a product of the Coding for Efficient Network Communications Research Group (NWCRG)
{"title":"BATched Sparse (BATS) Coding Scheme for Multi-hop Data Transport","authors":"Shenghao Yang, Xuan Huang, R. Yeung, J. Zao","doi":"10.17487/rfc9426","DOIUrl":"https://doi.org/10.17487/rfc9426","url":null,"abstract":"In general, linear network coding can improve the network communication performance in terms of throughput, latency, and reliability. BATched Sparse (BATS) code is a class of efficient linear network coding scheme with a matrix generalization of fountain codes as the outer code and batch-based linear network coding as the inner code. This document describes a baseline BATS coding scheme for communication through multi-hop networks and discusses the related research issues towards a more sophisticated BATS coding scheme. This document is a product of the Coding for Efficient Network Communications Research Group (NWCRG)","PeriodicalId":21471,"journal":{"name":"RFC","volume":"140 1","pages":"1-22"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82666445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Considerations on Application - Network Collaboration Using Path Signals","authors":"J. Arkko, T. Hardie, T. Pauly, M. Kühlewind","doi":"10.17487/rfc9419","DOIUrl":"https://doi.org/10.17487/rfc9419","url":null,"abstract":"","PeriodicalId":21471,"journal":{"name":"RFC","volume":"22 1","pages":"1-15"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83729357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mingliang Pei, H. Tschofenig, D. Thaler, David Wheeler
A Trusted Execution Environment (TEE) is an environment that enforces that any code within that environment cannot be tampered with, and that any data used by such code cannot be read or tampered with by any code outside that environment. This architecture document motivates the design and standardization of a protocol for managing the lifecycle of trusted applications running inside such a TEE.
{"title":"Trusted Execution Environment Provisioning (TEEP) Architecture","authors":"Mingliang Pei, H. Tschofenig, D. Thaler, David Wheeler","doi":"10.17487/rfc9397","DOIUrl":"https://doi.org/10.17487/rfc9397","url":null,"abstract":"A Trusted Execution Environment (TEE) is an environment that enforces\u0000that any code within that environment cannot be tampered with, and\u0000that any data used by such code cannot be read or tampered with by any\u0000code outside that environment. This architecture document motivates\u0000the design and standardization of a protocol for managing the\u0000lifecycle of trusted applications running inside such a TEE.","PeriodicalId":21471,"journal":{"name":"RFC","volume":"55 1","pages":"1-31"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79040766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The organizational separation between operators of TLS and DTLS endpoints and the certification authority can create limitations. For example, the lifetime of certificates, how they may be used, and the algorithms they support are ultimately determined by the Certification Authority (CA). This document describes a mechanism to overcome some of these limitations by enabling operators to delegate their own credentials for use in TLS and DTLS without breaking compatibility with peers that do not support this specification
{"title":"Delegated Credentials for TLS and DTLS","authors":"R. Barnes, S. Iyengar, N. Sullivan, E. Rescorla","doi":"10.17487/rfc9345","DOIUrl":"https://doi.org/10.17487/rfc9345","url":null,"abstract":"The organizational separation between operators of TLS and DTLS endpoints and the certification authority can create limitations. For example, the lifetime of certificates, how they may be used, and the algorithms they support are ultimately determined by the Certification Authority (CA). This document describes a mechanism to overcome some of these limitations by enabling operators to delegate their own credentials for use in TLS and DTLS without breaking compatibility with peers that do not support this specification","PeriodicalId":21471,"journal":{"name":"RFC","volume":"29 1","pages":"1-17"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73392210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}