Internet Documents

RFCs

RFCs All DocumentsSTDs Internet Standards DocumentsBCPs Best Current Practice DocumentsFYIs Informational Documents
 

PROPOSEDDRAFTSTANDARDEXPMTLBCPINFOHISTORICUPDATEDOBSOLETEDUNKNOWN

 
RFC 3 Documentation conventions
 
Authors:S.D. Crocker.
Date:April 1969
Formats:txt json html
Obsoleted by:RFC 0010
Status:UNKNOWN
DOI:10.17487/RFC 0003
 
 
RFC 10 Documentation conventions
 
Authors:S.D. Crocker.
Date:July 1969
Formats:txt json html
Obsoletes:RFC 0003
Obsoleted by:RFC 0016
Updated by:RFC 0024, RFC 0027, RFC 0030
Status:UNKNOWN
DOI:10.17487/RFC 0010
 
 
RFC 11 Implementation of the Host - Host Software Procedures in GORDO
 
Authors:G. Deloche.
Date:August 1969
Formats:txt json pdf html
Obsoleted by:RFC 0033
Status:UNKNOWN
DOI:10.17487/RFC 0011
 
 
RFC 16 M.I.T
 
Authors:S. Crocker.
Date:August 1969
Formats:txt html json
Obsoletes:RFC 0010
Obsoleted by:RFC 0024
Updated by:RFC 0024, RFC 0027, RFC 0030
Status:UNKNOWN
DOI:10.17487/RFC 0016
 
 
RFC 61 Note on Interprocess Communication in a Resource Sharing Computer Network
 
Authors:D.C. Walden.
Date:July 1970
Formats:txt html json
Obsoleted by:RFC 0062
Status:UNKNOWN
DOI:10.17487/RFC 0061
 
 
RFC 66 NIC - third level ideas and other noise
 
Authors:S.D. Crocker.
Date:August 1970
Formats:txt json html
Obsoleted by:RFC 0123
Updated by:RFC 0080, RFC 0093
Status:UNKNOWN
DOI:10.17487/RFC 0066
 
 
RFC 80 Protocols and Data Formats
 
Authors:E. Harslem, J.F. Heafner.
Date:December 1970
Formats:txt html json
Obsoleted by:RFC 0123
Updates:RFC 0066
Updated by:RFC 0093
Status:UNKNOWN
DOI:10.17487/RFC 0080
 
 
RFC 88 NETRJS: A third level protocol for Remote Job Entry
 
Authors:R.T. Braden, S.M. Wolfe.
Date:January 1971
Formats:txt html json
Obsoleted by:RFC 0189
Status:UNKNOWN
DOI:10.17487/RFC 0088
 
 
RFC 95 Distribution of NWG/RFC's through the NIC
 
Authors:S. Crocker.
Date:February 1971
Formats:txt html json
Obsoleted by:RFC 0155
Status:UNKNOWN
DOI:10.17487/RFC 0095
 
 
RFC 123 Proffered Official ICP
 
Authors:S.D. Crocker.
Date:April 1971
Formats:txt html json
Obsoletes:RFC 0066, RFC 0080
Obsoleted by:RFC 0165
Updates:RFC 0098, RFC 0101
Updated by:RFC 0127, RFC 0143, RFC 0148
Status:UNKNOWN
DOI:10.17487/RFC 0123
 
 
RFC 127 Comments on RFC 123
 
Authors:J. Postel.
Date:April 1971
Formats:txt html json
Obsoleted by:RFC 0145
Updates:RFC 0123
Updated by:RFC 0151
Status:UNKNOWN
DOI:10.17487/RFC 0127
 
 
RFC 132 Typographical Error in RFC 107
 
Authors:J.E. White.
Date:April 1971
Formats:txt html json
Obsoleted by:RFC 0154
Updates:RFC 0107
Status:UNKNOWN
DOI:10.17487/RFC 0132
 
 
RFC 143 Regarding proffered official ICP
 
Authors:W. Naylor, J. Wong, C. Kline, J. Postel.
Date:May 1971
Formats:txt json html
Obsoleted by:RFC 0165
Updates:RFC 0123, RFC 0145
Status:UNKNOWN
DOI:10.17487/RFC 0143
 
 
RFC 145 Initial Connection Protocol Control Commands
 
Authors:J. Postel.
Date:May 1971
Formats:txt html ps pdf json
Obsoletes:RFC 0127
Obsoleted by:RFC 0165
Updated by:RFC 0143
Status:UNKNOWN
DOI:10.17487/RFC 0145
 
 
RFC 155 ARPA Network mailing lists
 
Authors:J.B. North.
Date:May 1971
Formats:txt html json
Obsoletes:RFC 0095
Obsoleted by:RFC 0168
Status:UNKNOWN
DOI:10.17487/RFC 0155
 
 
RFC 158 Telnet Protocol: A Proposed Document
 
Authors:T.C. O'Sullivan.
Date:May 1971
Formats:txt html pdf json
Obsoleted by:RFC 0495
Updates:RFC 0139
Updated by:RFC 0318
Also:RFC 0393
Status:UNKNOWN
DOI:10.17487/RFC 0158
 
 
RFC 160 RFC brief list
 
Authors:Network Information Center. Stanford Research Institute.
Date:May 1971
Formats:txt html json
Obsoleted by:RFC 0200, RFC 0999
Updates:NIC_6716
Status:UNKNOWN
DOI:10.17487/RFC 0160
 
 
RFC 168 ARPA Network mailing lists
 
Authors:J.B. North.
Date:May 1971
Formats:txt html json
Obsoletes:RFC 0155
Obsoleted by:RFC 0211
Status:UNKNOWN
DOI:10.17487/RFC 0168
 
 
RFC 170 RFC List by Number
 
Authors:Network Information Center. Stanford Research Institute.
Date:June 1971
Formats:txt html json
Obsoleted by:RFC 0200
Status:UNKNOWN
DOI:10.17487/RFC 0170
 
 
RFC 171 The Data Transfer Protocol
 
Authors:A. Bhushan, B. Braden, W. Crowther, E. Harslem, J. Heafner, A. McKenize, J. Melvin, B. Sundberg, D. Watson, J. White.
Date:June 1971
Formats:txt html json
Obsoleted by:RFC 0264
Updates:RFC 0114
Updated by:RFC 0238
Status:UNKNOWN
DOI:10.17487/RFC 0171
 
 
RFC 172 The File Transfer Protocol
 
Authors:A. Bhushan, B. Braden, W. Crowther, E. Harslem, J. Heafner, A. McKenzie, J. Melvin, B. Sundberg, D. Watson, J. White.
Date:June 1971
Formats:txt json html
Obsoleted by:RFC 0265
Updates:RFC 0114
Updated by:RFC 0238
Status:UNKNOWN
DOI:10.17487/RFC 0172
 
 
RFC 189 Interim NETRJS specifications
 
Authors:R.T. Braden.
Date:July 1971
Formats:txt html json
Obsoletes:RFC 0088
Obsoleted by:RFC 0599
Updated by:RFC 0283
Status:UNKNOWN
DOI:10.17487/RFC 0189
 
 
RFC 193 NETWORK CHECKOUT
 
Authors:E. Harslem, J.F. Heafner.
Date:July 1971
Formats:txt json html
Obsoleted by:RFC 0198
Updated by:RFC 0198
Status:UNKNOWN
DOI:10.17487/RFC 0193
 
 
RFC 196 Mail Box Protocol
 
Authors:R.W. Watson.
Date:July 1971
Formats:txt json html
Obsoleted by:RFC 0221
Status:UNKNOWN
DOI:10.17487/RFC 0196
 
 
RFC 198 Site Certification - Lincoln Labs 360/67
 
Authors:J.F. Heafner.
Date:July 1971
Formats:txt html json
Obsoletes:RFC 0193
Obsoleted by:RFC 0214
Updates:RFC 0193
Status:UNKNOWN
DOI:10.17487/RFC 0198
 
 
RFC 200 RFC list by number
 
Authors:J.B. North.
Date:August 1971
Formats:txt html json
Obsoletes:RFC 0170, RFC 0160
Obsoleted by:NIC_7724
Status:UNKNOWN
DOI:10.17487/RFC 0200
 
 
RFC 207 September Network Working Group meeting
 
Authors:A. Vezza.
Date:August 1971
Formats:txt json html
Obsoleted by:RFC 0212
Status:UNKNOWN
DOI:10.17487/RFC 0207
 
 
RFC 211 ARPA Network Mailing Lists
 
Authors:J.B. North.
Date:August 1971
Formats:txt pdf html json
Obsoletes:RFC 0168
Obsoleted by:RFC 0300
Status:UNKNOWN
DOI:10.17487/RFC 0211
 
 
RFC 221 Mail Box Protocol: Version 2
 
Authors:R.W. Watson.
Date:August 1971
Formats:txt html json
Obsoletes:RFC 0196
Obsoleted by:RFC 0278
Status:UNKNOWN
DOI:10.17487/RFC 0221
 
 
RFC 226 Standardization of host mnemonics
 
Authors:P.M. Karp.
Date:September 1971
Formats:txt json html
Obsoleted by:RFC 0247
Status:UNKNOWN
DOI:10.17487/RFC 0226
 
 
RFC 229 Standard host names
 
Authors:J. Postel.
Date:September 1971
Formats:txt html json
Obsoleted by:RFC 0236
Status:UNKNOWN
DOI:10.17487/RFC 0229
 
 
RFC 235 Site status
 
Authors:E. Westheimer.
Date:September 1971
Formats:txt html json
Obsoleted by:RFC 0240
Status:UNKNOWN
DOI:10.17487/RFC 0235
 
 
RFC 237 NIC view of standard host names
 
Authors:R.W. Watson.
Date:October 1971
Formats:txt json html
Obsoleted by:RFC 0273
Status:UNKNOWN
DOI:10.17487/RFC 0237
 
 
RFC 240 Site Status
 
Authors:A.M. McKenzie.
Date:September 1971
Formats:txt json html
Obsoletes:RFC 0235
Obsoleted by:RFC 0252
Status:UNKNOWN
DOI:10.17487/RFC 0240
 
 
RFC 243 Network and data sharing bibliography
 
Authors:A.P. Mullery.
Date:October 1971
Formats:txt html json
Obsoleted by:RFC 0290
Status:UNKNOWN
DOI:10.17487/RFC 0243
 
 
RFC 252 Network host status
 
Authors:E. Westheimer.
Date:October 1971
Formats:txt html json
Obsoletes:RFC 0240
Obsoleted by:RFC 0255
Status:UNKNOWN
DOI:10.17487/RFC 0252
 
 
RFC 255 Status of network hosts
 
Authors:E. Westheimer.
Date:October 1971
Formats:txt json html
Obsoletes:RFC 0252
Obsoleted by:RFC 0266
Status:UNKNOWN
DOI:10.17487/RFC 0255
 
 
RFC 264 The Data Transfer Protocol
 
Authors:A. Bhushan, B. Braden, W. Crowther, E. Harslem, J. Heafner, A. McKenize, B. Sundberg, D. Watson, J. White.
Date:January 1972
Formats:txt json html
Obsoletes:RFC 0171
Obsoleted by:RFC 0354
Updated by:RFC 0310
Also:RFC 0265
Status:UNKNOWN
DOI:10.17487/RFC 0264
 
 
RFC 265 The File Transfer Protocol
 
Authors:A. Bhushan, B. Braden, W. Crowther, E. Harslem, J. Heafner, A. McKenzie, J. Melvin, B. Sundberg, D. Watson, J. White.
Date:November 1971
Formats:txt json html
Obsoletes:RFC 0172
Obsoleted by:RFC 0354
Updated by:RFC 0281, RFC 0294, RFC 0310
Also:RFC 0264
Status:UNKNOWN
DOI:10.17487/RFC 0265
 
 
RFC 266 Network host status
 
Authors:E. Westheimer.
Date:November 1971
Formats:txt html json
Obsoletes:RFC 0255
Obsoleted by:RFC 0267
Status:UNKNOWN
DOI:10.17487/RFC 0266
 
 
RFC 267 Network Host Status
 
Authors:E. Westheimer.
Date:November 1971
Formats:txt html json
Obsoletes:RFC 0266
Obsoleted by:RFC 0287
Status:UNKNOWN
DOI:10.17487/RFC 0267
 
 
RFC 287 Status of Network Hosts
 
Authors:E. Westheimer.
Date:December 1971
Formats:txt html json
Obsoletes:RFC 0267
Obsoleted by:RFC 0288
Status:UNKNOWN
DOI:10.17487/RFC 0287
 
 
RFC 288 Network host status
 
Authors:E. Westheimer.
Date:January 1972
Formats:txt json html
Obsoletes:RFC 0287
Obsoleted by:RFC 0293
Updated by:RFC 0293
Status:UNKNOWN
DOI:10.17487/RFC 0288
 
 
RFC 289 What we hope is an official list of host names
 
Authors:R.W. Watson.
Date:December 1971
Formats:txt json html
Obsoleted by:RFC 0384
Status:UNKNOWN
DOI:10.17487/RFC 0289
 
 
RFC 292 Graphics Protocol: Level 0 only
 
Authors:J.C. Michener, I.W. Cotton, K.C. Kelley, D.E. Liddle, E. Meyer.
Date:January 1972
Formats:txt html json
Obsoleted by:RFC 0493
Status:UNKNOWN
DOI:10.17487/RFC 0292
 
 
RFC 293 Network Host Status
 
Authors:E. Westheimer.
Date:January 1972
Formats:txt html json
Obsoletes:RFC 0288
Obsoleted by:RFC 0298
Updates:RFC 0288
Status:UNKNOWN
DOI:10.17487/RFC 0293
 
 
RFC 298 Network host status
 
Authors:E. Westheimer.
Date:February 1972
Formats:txt json html
Obsoletes:RFC 0293
Obsoleted by:RFC 0306
Status:UNKNOWN
DOI:10.17487/RFC 0298
 
 
RFC 300 ARPA Network mailing lists
 
Authors:J.B. North.
Date:January 1972
Formats:txt json html
Obsoletes:RFC 0211
Obsoleted by:RFC 0303
Status:UNKNOWN
DOI:10.17487/RFC 0300
 
 
RFC 303 ARPA Network mailing lists
 
Authors:Network Information Center. Stanford Research Institute.
Date:March 1972
Formats:txt html json
Obsoletes:RFC 0300
Obsoleted by:RFC 0329
Status:UNKNOWN
DOI:10.17487/RFC 0303
 
 
RFC 306 Network host status
 
Authors:E. Westheimer.
Date:February 1972
Formats:txt html json
Obsoletes:RFC 0298
Obsoleted by:RFC 0315
Status:UNKNOWN
DOI:10.17487/RFC 0306
 
 
RFC 315 Network Host Status
 
Authors:E. Westheimer.
Date:March 1972
Formats:txt json html
Obsoletes:RFC 0306
Obsoleted by:RFC 0319
Status:UNKNOWN
DOI:10.17487/RFC 0315
 
 
RFC 317 Official Host-Host Protocol Modification: Assigned Link Numbers
 
Authors:J. Postel.
Date:March 1972
Formats:txt html json
Obsoleted by:RFC 0604
Status:UNKNOWN
DOI:10.17487/RFC 0317
 
 
RFC 326 Network Host Status
 
Authors:E. Westheimer.
Date:April 1972
Formats:txt html json
Obsoleted by:RFC 0330
Updates:RFC 0319
Status:UNKNOWN
DOI:10.17487/RFC 0326
 
 
RFC 329 ARPA Network Mailing Lists
 
Authors:Network Information Center. Stanford Research Institute.
Date:May 1972
Formats:txt json html
Obsoletes:RFC 0303
Obsoleted by:RFC 0363
Status:UNKNOWN
DOI:10.17487/RFC 0329
 
 
RFC 331 IMP System Change Notification
 
Authors:J.M. McQuillan.
Date:April 1972
Formats:txt json html
Obsoleted by:RFC 0343
Status:UNKNOWN
DOI:10.17487/RFC 0331
 
 
RFC 332 Network Host Status
 
Authors:E. Westheimer.
Date:April 1972
Formats:txt html json
Obsoleted by:RFC 0342
Updates:RFC 0330
Status:UNKNOWN
DOI:10.17487/RFC 0332
 
 
RFC 342 Network Host Status
 
Authors:E. Westheimer.
Date:May 1972
Formats:txt json html
Obsoletes:RFC 0332
Obsoleted by:RFC 0344
Status:UNKNOWN
DOI:10.17487/RFC 0342
 
 
RFC 343 IMP System change notification
 
Authors:A.M. McKenzie.
Date:May 1972
Formats:txt json html
Obsoletes:RFC 0331
Obsoleted by:RFC 0359
Status:UNKNOWN
DOI:10.17487/RFC 0343
 
 
RFC 344 Network Host Status
 
Authors:E. Westheimer.
Date:May 1972
Formats:txt html json
Obsoletes:RFC 0342
Obsoleted by:RFC 0353
Status:UNKNOWN
DOI:10.17487/RFC 0344
 
 
RFC 349 Proposed Standard Socket Numbers
 
Authors:J. Postel.
Date:May 1972
Formats:txt html json
Obsoleted by:RFC 0433
Also:RFC 0204, RFC 0322
Status:UNKNOWN
DOI:10.17487/RFC 0349
 
 
RFC 353 Network host status
 
Authors:E. Westheimer.
Date:June 1972
Formats:txt json html
Obsoletes:RFC 0344
Obsoleted by:RFC 0362
Status:UNKNOWN
DOI:10.17487/RFC 0353
 
 
RFC 354 File Transfer Protocol
 
Authors:A.K. Bhushan.
Date:July 1972
Formats:txt html json
Obsoletes:RFC 0264, RFC 0265
Obsoleted by:RFC 0542
Updated by:RFC 0385, RFC 0454, RFC 0683
Status:UNKNOWN
DOI:10.17487/RFC 0354
 
 
RFC 360 Proposed Remote Job Entry Protocol
 
Authors:C. Holland.
Date:June 1972
Formats:txt html pdf json
Obsoleted by:RFC 0407
Status:UNKNOWN
DOI:10.17487/RFC 0360
 
 
RFC 362 Network Host Status
 
Authors:E. Westheimer.
Date:June 1972
Formats:txt json html
Obsoletes:RFC 0353
Obsoleted by:RFC 0366
Status:UNKNOWN
DOI:10.17487/RFC 0362
 
 
RFC 363 ARPA Network mailing lists
 
Authors:Network Information Center. Stanford Research Institute.
Date:August 1972
Formats:txt json html
Obsoletes:RFC 0329
Obsoleted by:RFC 0402
Status:UNKNOWN
DOI:10.17487/RFC 0363
 
 
RFC 366 Network Host Status
 
Authors:E. Westheimer.
Date:July 1972
Formats:txt json html
Obsoletes:RFC 0362
Obsoleted by:RFC 0367
Status:UNKNOWN
DOI:10.17487/RFC 0366
 
 
RFC 367 Network host status
 
Authors:E. Westheimer.
Date:July 1972
Formats:txt json html
Obsoletes:RFC 0366
Obsoleted by:RFC 0370
Status:UNKNOWN
DOI:10.17487/RFC 0367
 
 
RFC 378 Traffic statistics (July 1972)
 
Authors:A.M. McKenzie.
Date:August 1972
Formats:txt html json
Obsoleted by:RFC 0391
Status:UNKNOWN
DOI:10.17487/RFC 0378
 
 
RFC 389 UCLA Campus Computing Network Liaison Staff for ARPA Network
 
Authors:B. Noble.
Date:August 1972
Formats:txt html json
Obsoleted by:RFC 0423
Status:UNKNOWN
DOI:10.17487/RFC 0389
 
 
RFC 399 SMFS Login and Logout
 
Authors:M. Krilanovich.
Date:September 1972
Formats:txt html json
Obsoleted by:RFC 0431
Updates:RFC 0122
Status:UNKNOWN
DOI:10.17487/RFC 0399
 
 
RFC 433 Socket number list
 
Authors:J. Postel.
Date:December 1972
Formats:txt json html
Obsoletes:RFC 0349
Obsoleted by:RFC 0503
Status:UNKNOWN
DOI:10.17487/RFC 0433
 
 
RFC 434 IMP/TIP memory retrofit schedule
 
Authors:A.M. McKenzie.
Date:January 1973
Formats:txt html json
Obsoleted by:RFC 0447
Status:UNKNOWN
DOI:10.17487/RFC 0434
 
 
RFC 447 IMP/TIP memory retrofit schedule
 
Authors:A.M. McKenzie.
Date:January 1973
Formats:txt html json
Obsoletes:RFC 0434
Obsoleted by:RFC 0476
Status:UNKNOWN
DOI:10.17487/RFC 0447
 
 
RFC 503 Socket number list
 
Authors:N. Neigus, J. Postel.
Date:April 1973
Formats:txt html json
Obsoletes:RFC 0433
Obsoleted by:RFC 0739
Status:UNKNOWN
DOI:10.17487/RFC 0503
 
 
RFC 542 File Transfer Protocol
 
Authors:N. Neigus.
Date:August 1973
Formats:txt json html
Obsoletes:RFC 0354
Obsoleted by:RFC 0765
Updated by:RFC 0614, RFC 0640
Also:RFC 0454, RFC 0495
Status:UNKNOWN
DOI:10.17487/RFC 0542
 
 
RFC 599 Update on NETRJS
 
Authors:R.T. Braden.
Date:December 1973
Formats:txt html json
Obsoletes:RFC 0189
Obsoleted by:RFC 0740
Status:UNKNOWN
DOI:10.17487/RFC 0599
 
 
RFC 604 Assigned link numbers
 
Authors:J. Postel.
Date:December 1973
Formats:txt html json
Obsoletes:RFC 0317
Obsoleted by:RFC 0739
Status:UNKNOWN
DOI:10.17487/RFC 0604
Modifies official host-host protocol. Replaces RFC 377.
 
RFC 607 Comments on the File Transfer Protocol
 
Authors:M. Krilanovich, G. Gregg.
Date:January 1974
Formats:txt json html
Obsoleted by:RFC 0624
Updated by:RFC 0614
Status:UNKNOWN
DOI:10.17487/RFC 0607
An old version; see RFC 624; see also RFCs 614, 542 and 640.
 
RFC 608 Host names on-line
 
Authors:M.D. Kudlick.
Date:January 1974
Formats:txt html json
Obsoleted by:RFC 0810
Status:UNKNOWN
DOI:10.17487/RFC 0608
Response to RFC 606; see also RFCs 627, 625 and 623.
 
RFC 615 Proposed Network Standard Data Pathname syntax
 
Authors:D. Crocker.
Date:March 1974
Formats:txt html json
Obsoleted by:RFC 0645
Status:UNKNOWN
DOI:10.17487/RFC 0615
 
 
RFC 633 IMP/TIP preventive maintenance schedule
 
Authors:A.M. McKenzie.
Date:March 1974
Formats:txt json html
Obsoleted by:RFC 0638
Status:UNKNOWN
DOI:10.17487/RFC 0633
An old version; see RFC 638.
 
RFC 651 Revised Telnet status option
 
Authors:D. Crocker.
Date:October 1974
Formats:txt json html
Obsoleted by:RFC 0859
Status:UNKNOWN
DOI:10.17487/RFC 0651
 
 
RFC 675 Specification of Internet Transmission Control Program
 
Authors:V. Cerf, Y. Dalal, C. Sunshine.
Date:December 1974
Formats:txt json html
Obsoleted by:RFC 7805
Status:HISTORIC
DOI:10.17487/RFC 0675
The first detailed specification of TCP; see RFC 793.
 
RFC 687 IMP/Host and Host/IMP Protocol changes
 
Authors:D.C. Walden.
Date:June 1975
Formats:txt html json
Obsoleted by:RFC 0704
Updated by:RFC 0690
Status:UNKNOWN
DOI:10.17487/RFC 0687
Addressing hosts on more than 63 IMPs, and other backwards compatible expansions; see also RFCs 690 and 692.
 
RFC 698 Telnet extended ASCII option
 
Authors:T. Mock.
Date:July 1975
Formats:txt json html
Obsoleted by:RFC 5198
Status:PROPOSED STANDARD
DOI:10.17487/RFC 0698
Describes an option to allow transmission of a special kind of extended ASCII used at the Stanford AI and MIT AI Labs.
 
RFC 721 Out-of-Band Control Signals in a Host-to-Host Protocol
 
Authors:L.L. Garlick.
Date:September 1976
Formats:txt json html
Obsoleted by:RFC 7805
Status:HISTORIC
DOI:10.17487/RFC 0721
 
 
RFC 724 Proposed official standard for the format of ARPA Network messages
 
Authors:D. Crocker, K.T. Pogran, J. Vittal, D.A. Henderson.
Date:May 1977
Formats:txt json html
Obsoleted by:RFC 0733
Status:UNKNOWN
DOI:10.17487/RFC 0724
 
 
RFC 729 Telnet byte macro option
 
Authors:D. Crocker.
Date:May 1977
Formats:txt json html
Obsoleted by:RFC 0735
Status:UNKNOWN
DOI:10.17487/RFC 0729
 
 
RFC 731 Telnet Data Entry Terminal option
 
Authors:J.D. Day.
Date:June 1977
Formats:txt json html
Obsoleted by:RFC 0732
Status:UNKNOWN
DOI:10.17487/RFC 0731
 
 
RFC 733 Standard for the format of ARPA network text messages
 
Authors:D. Crocker, J. Vittal, K.T. Pogran, D.A. Henderson.
Date:November 1977
Formats:txt html json
Obsoletes:RFC 0724
Obsoleted by:RFC 0822
Status:UNKNOWN
DOI:10.17487/RFC 0733
 
 
RFC 739 Assigned numbers
 
Authors:J. Postel.
Date:November 1977
Formats:txt json html
Obsoletes:RFC 0604, RFC 0503
Obsoleted by:RFC 0750
Status:HISTORIC
DOI:10.17487/RFC 0739
 
 
RFC 742 NAME/FINGER Protocol
 
Authors:K. Harrenstien.
Date:December 1977
Formats:txt json html
Obsoleted by:RFC 1288, RFC 1196, RFC 1194
Status:UNKNOWN
DOI:10.17487/RFC 0742
 
 
RFC 750 Assigned numbers
 
Authors:J. Postel.
Date:September 1978
Formats:txt html json
Obsoletes:RFC 0739
Obsoleted by:RFC 0755
Status:HISTORIC
DOI:10.17487/RFC 0750
 
 
RFC 755 Assigned numbers
 
Authors:J. Postel.
Date:May 1979
Formats:txt html json
Obsoletes:RFC 0750
Obsoleted by:RFC 0758
Status:HISTORIC
DOI:10.17487/RFC 0755
 
 
RFC 758 Assigned numbers
 
Authors:J. Postel.
Date:August 1979
Formats:txt html json
Obsoletes:RFC 0755
Obsoleted by:RFC 0762
Status:HISTORIC
DOI:10.17487/RFC 0758
 
 
RFC 760 DoD standard Internet Protocol
 
Authors:J. Postel.
Date:January 1980
Formats:txt html json
Obsoletes:IEN123
Obsoleted by:RFC 0791
Updated by:RFC 0777
Status:UNKNOWN
DOI:10.17487/RFC 0760
 
 
RFC 761 DoD standard Transmission Control Protocol
 
Authors:J. Postel.
Date:January 1980
Formats:txt html json
Obsoleted by:RFC 0793, RFC 7805
Status:HISTORIC
DOI:10.17487/RFC 0761
 
 
RFC 762 Assigned numbers
 
Authors:J. Postel.
Date:January 1980
Formats:txt json html
Obsoletes:RFC 0758
Obsoleted by:RFC 0770
Status:HISTORIC
DOI:10.17487/RFC 0762
 
 
RFC 764 Telnet Protocol specification
 
Authors:J. Postel.
Date:June 1980
Formats:txt html json
Obsoleted by:RFC 0854
Status:UNKNOWN
DOI:10.17487/RFC 0764
 
 
RFC 765 File Transfer Protocol specification
 
Authors:J. Postel.
Date:June 1980
Formats:txt html json
Obsoletes:RFC 0542
Obsoleted by:RFC 0959
Status:UNKNOWN
DOI:10.17487/RFC 0765
 
 
RFC 766 Internet Protocol Handbook: Table of contents
 
Authors:J. Postel.
Date:July 1980
Formats:txt json html
Obsoleted by:RFC 0774
Status:UNKNOWN
DOI:10.17487/RFC 0766
 
 
RFC 770 Assigned numbers
 
Authors:J. Postel.
Date:September 1980
Formats:txt html json
Obsoletes:RFC 0762
Obsoleted by:RFC 0776
Status:HISTORIC
DOI:10.17487/RFC 0770
 
 
RFC 772 Mail Transfer Protocol
 
Authors:S. Sluizer, J. Postel.
Date:September 1980
Formats:txt json html
Obsoleted by:RFC 0780
Status:UNKNOWN
DOI:10.17487/RFC 0772
 
 
RFC 776 Assigned numbers
 
Authors:J. Postel.
Date:January 1981
Formats:txt json html
Obsoletes:RFC 0770
Obsoleted by:RFC 0790
Status:HISTORIC
DOI:10.17487/RFC 0776
 
 
RFC 777 Internet Control Message Protocol
 
Authors:J. Postel.
Date:April 1981
Formats:txt json html
Obsoleted by:RFC 0792
Updates:RFC 0760
Status:UNKNOWN
DOI:10.17487/RFC 0777
 
 
RFC 780 Mail Transfer Protocol
 
Authors:S. Sluizer, J. Postel.
Date:May 1981
Formats:txt html json
Obsoletes:RFC 0772
Obsoleted by:RFC 0788
Status:UNKNOWN
DOI:10.17487/RFC 0780
 
 
RFC 783 TFTP Protocol (revision 2)
 
Authors:K.R. Sollins.
Date:June 1981
Formats:txt json html
Obsoletes:IEN133
Obsoleted by:RFC 1350
Status:UNKNOWN
DOI:10.17487/RFC 0783
 
 
RFC 788 Simple Mail Transfer Protocol
 
Authors:J. Postel.
Date:November 1981
Formats:txt html json
Obsoletes:RFC 0780
Obsoleted by:RFC 0821
Status:UNKNOWN
DOI:10.17487/RFC 0788
 
 
RFC 790 Assigned numbers
 
Authors:J. Postel.
Date:September 1981
Formats:txt html json
Obsoletes:RFC 0776
Obsoleted by:RFC 0820
Status:HISTORIC
DOI:10.17487/RFC 0790
 
 
RFC 793 Transmission Control Protocol
 
Authors:J. Postel.
Date:September 1981
Formats:txt json html
Obsoletes:RFC 0761
Obsoleted by:RFC 9293
Updated by:RFC 1122, RFC 3168, RFC 6093, RFC 6528
Status:INTERNET STANDARD
DOI:10.17487/RFC 0793
 
 
RFC 802 ARPANET 1822L Host Access Protocol
 
Authors:A.G. Malis.
Date:November 1981
Formats:txt html json
Obsoleted by:RFC 0851
Status:UNKNOWN
DOI:10.17487/RFC 0802
This document proposed two major changes to the current ARPANET host access protocol. The first change will allow hosts to use logical addressing (i.e., host addresses that are independent of their physical location on the ARPANET) to communicate with each other, and the second will allow a host to shorten the amount of time that it may be blocked by its IMP after it presents a message to the network (currently, the IMP can block further input from a host for up to 15 seconds). See RFCs 852 and 851.
 
RFC 806 Proposed Federal Information Processing Standard: Specification for message format for computer based message systems
 
Authors:National Bureau of Standards.
Date:September 1981
Formats:txt html json
Obsoleted by:RFC 0841
Status:UNKNOWN
DOI:10.17487/RFC 0806
This RFC deals with Computer Based Message systems which provides a basis for interaction between different CBMS by defining the format of messages passed between them. This RFC is replaced by RFC 841.
 
RFC 810 DoD Internet host table specification
 
Authors:E.J. Feinler, K. Harrenstien, Z. Su, V. White.
Date:March 1982
Formats:txt json html
Obsoletes:RFC 0608
Obsoleted by:RFC 0952
Status:UNKNOWN
DOI:10.17487/RFC 0810
This RFC specifies a new host table format applicable to both ARPANET and Internet needs. In addition to host name to host address translation and selected protocol information, we have also included network and gateway name to address correspondence, and host operating system information. This RFC obsoletes the host table described in RFC 608.
 
RFC 811 Hostnames Server
 
Authors:K. Harrenstien, V. White, E.J. Feinler.
Date:March 1982
Formats:txt json html
Obsoleted by:RFC 0953
Status:UNKNOWN
DOI:10.17487/RFC 0811
This RFC gives a description of what the Hostnames Server is and how to access it. The function of this particular server is to deliver machine-readable name/address information describing networks, gateways, hosts, and eventually domains, within the internet environment.
 
RFC 812 NICNAME/WHOIS
 
Authors:K. Harrenstien, V. White.
Date:March 1982
Formats:txt html json
Obsoleted by:RFC 0954, RFC 3912
Status:UNKNOWN
DOI:10.17487/RFC 0812
This RFC gives a description of what the NICNAME/WHOIS Server is and how to access it. This server together with the corresponding Identification Data Base provides online directory look-up equivalent to the ARPANET Directory.
 
RFC 813 Window and Acknowledgement Strategy in TCP
 
Authors:D.D. Clark.
Date:July 1982
Formats:txt html json
Obsoleted by:RFC 7805
Status:HISTORIC
DOI:10.17487/RFC 0813
This RFC describes implementation strategies to deal with two mechanisms in TCP, the window and the acknowledgement. It also presents a particular set of algorithms which have received testing in the field, and which appear to work properly with each other. With more experience, these algorithms may become part of the formal specification, until such time their use is recommended.
 
RFC 816 Fault isolation and recovery
 
Authors:D.D. Clark.
Date:July 1982
Formats:txt html json
Obsoleted by:RFC 7805
Status:HISTORIC
DOI:10.17487/RFC 0816
This RFC describes the portion of fault isolation and recovery which is the responsibility of the host.
 
RFC 820 Assigned numbers
 
Authors:J. Postel.
Date:August 1982
Formats:txt json html
Obsoletes:RFC 0790
Obsoleted by:RFC 0870
Status:HISTORIC
DOI:10.17487/RFC 0820
This RFC is an old version, see RFC 870.
 
RFC 821 Simple Mail Transfer Protocol
 
Authors:J. Postel.
Date:August 1982
Formats:txt json html
Obsoletes:RFC 0788
Obsoleted by:RFC 2821
Also:STD 0010
Status:INTERNET STANDARD
DOI:10.17487/RFC 0821
The objective of Simple Mail Transfer Protocol (SMTP) is to transfer mail reliably and efficiently. SMTP is independent of the particular transmission subsystem and requires only a reliable ordered data stream channel. Obsoletes RFC 788, 780, and 772.
 
RFC 822 STANDARD FOR THE FORMAT OF ARPA INTERNET TEXT MESSAGES
 
Authors:D. Crocker.
Date:August 1982
Formats:txt html json
Obsoletes:RFC 0733
Obsoleted by:RFC 2822
Updated by:RFC 1123, RFC 2156, RFC 1327, RFC 1138, RFC 1148
Also:STD 0011
Status:INTERNET STANDARD
DOI:10.17487/RFC 0822
This document revises the specifications in RFC 733, in order to serve the needs of the larger and more complex ARPA Internet. Some of RFC 733's features failed to gain adequate acceptance. In order to simplify the standard and the software that follows it, these features have been removed. A different addressing scheme is used, to handle the case of internetwork mail; and the concept of re-transmission has been introduced. Obsoletes RFC 733, NIC 41952.
 
RFC 825 Request for comments on Requests For Comments
 
Authors:J. Postel.
Date:November 1982
Formats:txt json html
Obsoleted by:RFC 1111, RFC 1543, RFC 2223
Status:UNKNOWN
DOI:10.17487/RFC 0825
This RFC is intended to clarify the status of RFCs and to provide some guidance for the authors of RFCs in the future. It is in a sense a specification for RFCs.
 
RFC 832 Who talks TCP?
 
Authors:D. Smallberg.
Date:December 1982
Formats:txt html json
Obsoleted by:RFC 0833
Status:UNKNOWN
DOI:10.17487/RFC 0832
This RFC is a survey of hosts to identify the implementation status of Telnet, FTP, and Mail on TCP. The list of hosts was taken from the NIC hostname table of 2-Dec-82. The tests were run on 7-Dec-82.
 
RFC 833 Who talks TCP?
 
Authors:D. Smallberg.
Date:December 1982
Formats:txt html json
Obsoletes:RFC 0832
Obsoleted by:RFC 0834
Status:UNKNOWN
DOI:10.17487/RFC 0833
This RFC is a survey of hosts to identify the implementation status of Telnet, FTP, and Mail on TCP. The list of hosts was taken from the NIC hostname table of 2-Dec-82. The tests were run on 14-Dec-82.
 
RFC 834 Who talks TCP?
 
Authors:D. Smallberg.
Date:December 1982
Formats:txt json html
Obsoletes:RFC 0833
Obsoleted by:RFC 0835
Status:UNKNOWN
DOI:10.17487/RFC 0834
This RFC is a survey of hosts to identify the implementation status of Telnet, FTP, and Mail on TCP. The list of hosts was taken from the NIC hostname table of 2-Dec-82. The tests were run on 22-Dec-82.
 
RFC 835 Who talks TCP?
 
Authors:D. Smallberg.
Date:December 1982
Formats:txt json html
Obsoletes:RFC 0834
Obsoleted by:RFC 0836
Status:UNKNOWN
DOI:10.17487/RFC 0835
This RFC is a survey of hosts to identify the implementation status of Telnet, FTP, and Mail on TCP. The list of hosts was taken from the NIC hostname table of 2-Dec-82. The tests were run on 28-Dec-82 through 5-Jan-83.
 
RFC 836 Who talks TCP?
 
Authors:D. Smallberg.
Date:January 1983
Formats:txt html json
Obsoletes:RFC 0835
Obsoleted by:RFC 0837
Status:UNKNOWN
DOI:10.17487/RFC 0836
This RFC is a survey of hosts to identify the implementation status of Telnet, FTP, and Mail on TCP. The list of hosts was taken from the NIC hostname table of 20-Dec-82. The tests were run on 4-Jan-83 through 5-Jan-83.
 
RFC 837 Who talks TCP?
 
Authors:D. Smallberg.
Date:January 1983
Formats:txt html json
Obsoletes:RFC 0836
Obsoleted by:RFC 0838
Status:UNKNOWN
DOI:10.17487/RFC 0837
This RFC is a survey of hosts to identify the implementation status of Telnet, FTP, and Mail on TCP. The list of hosts was taken from the NIC hostname table of 31-Dec-82. The tests were run on 11-Jan-83.
 
RFC 838 Who talks TCP?
 
Authors:D. Smallberg.
Date:January 1983
Formats:txt json html
Obsoletes:RFC 0837
Obsoleted by:RFC 0839
Status:UNKNOWN
DOI:10.17487/RFC 0838
This RFC is a survey of hosts to identify the implementation status of Telnet, FTP, and Mail on TCP. The list of hosts was taken from the NIC hostname table of 31-Dec-82. The tests were run on 18-Jan-83.
 
RFC 839 Who talks TCP?
 
Authors:D. Smallberg.
Date:January 1983
Formats:txt json html
Obsoletes:RFC 0838
Obsoleted by:RFC 0842
Status:UNKNOWN
DOI:10.17487/RFC 0839
This RFC is a survey of hosts to identify the implementation status of Telnet, FTP, and Mail on TCP. The list of hosts was taken from the NIC hostname table of 31-Dec-82. The tests were run on 25-Jan-83.
 
RFC 840 Official protocols
 
Authors:J. Postel.
Date:April 1983
Formats:txt html json
Obsoleted by:RFC 0880
Status:HISTORIC
DOI:10.17487/RFC 0840
This RFC has been revised, see RFC 880.
 
RFC 842 Who talks TCP? - survey of 1 February 83
 
Authors:D. Smallberg.
Date:February 1983
Formats:txt json html
Obsoletes:RFC 0839
Obsoleted by:RFC 0843
Status:UNKNOWN
DOI:10.17487/RFC 0842
This RFC is a survey of hosts to identify the implementation status of Telnet, FTP, and Mail on TCP. The list of hosts was taken from the NIC hostname table of 28-Jan-83. The tests were run on 1-Feb-83 and on 2-Feb-83 ISI-VAXA.ARPA.
 
RFC 843 Who talks TCP? - survey of 8 February 83
 
Authors:D. Smallberg.
Date:February 1983
Formats:txt json html
Obsoletes:RFC 0842
Obsoleted by:RFC 0845
Updated by:RFC 0844
Status:UNKNOWN
DOI:10.17487/RFC 0843
This RFC is a survey of hosts to identify the implementation status of Telnet, FTP, and Mail on TCP. The list of hosts was taken from the NIC hostname table of 3-Feb-83. The tests were run on 8-Feb-83 and on 9-Feb-83 from ISI-VAXA.ARPA.
 
RFC 845 Who talks TCP? - survey of 15 February 1983
 
Authors:D. Smallberg.
Date:February 1983
Formats:txt html json
Obsoletes:RFC 0843
Obsoleted by:RFC 0846
Status:UNKNOWN
DOI:10.17487/RFC 0845
This RFC is a survey of hosts to identify the implementation status of Telnet, FTP, and Mail on TCP. The list of hosts was taken from the NIC hostname table of 3-Feb-83. The tests were run on 15-Feb-83 from ISI-VAXA.ARPA.
 
RFC 846 Who talks TCP? - survey of 22 February 1983
 
Authors:D. Smallberg.
Date:February 1983
Formats:txt json html
Obsoletes:RFC 0845
Obsoleted by:RFC 0847
Status:UNKNOWN
DOI:10.17487/RFC 0846
This RFC is a survey of hosts to identify the implementation status of Telnet, FTP, and Mail on TCP. The list of hosts was taken from the NIC hostname table of 18-Feb-83. The tests were run on 22-Feb-83 from ISI-VAXA.ARPA.
 
RFC 850 Standard for interchange of USENET messages
 
Authors:M.R. Horton.
Date:June 1983
Formats:txt html json
Obsoleted by:RFC 1036
Status:UNKNOWN
DOI:10.17487/RFC 0850
This memo is distributed as an RFC only to make this information easily accessible to researchers in the ARPA community. It does not specify an Internet standard. This RFC defines the standard format for interchange of Network News articles among USENET sites. It describes the format for articles themselves, and gives partial standards for transmission of news. The news transmission is not entirely standardized in order to give a good deal of flexibility to the individual hosts to choose transmission hardware and software, whether to batch news and so on.
 
RFC 851 ARPANET 1822L Host Access Protocol
 
Authors:A.G. Malis.
Date:April 1983
Formats:txt html json
Obsoletes:RFC 0802
Obsoleted by:RFC 0878
Status:UNKNOWN
DOI:10.17487/RFC 0851
This RFC specifies the ARPANET 1822L Host Access Protocol, which is a successor to the existing 1822 Host Access Protocol. 1822L allows ARPANET hosts to use logical names as well as 1822's physical port locations to address each other. This RFC is also being presented as a solicitation of comments on 1822L, especially from host network software implementers and maintainers. Obsoletes RFC 802.
 
RFC 870 Assigned numbers
 
Authors:J.K. Reynolds, J. Postel.
Date:October 1983
Formats:txt html json
Obsoletes:RFC 0820
Obsoleted by:RFC 0900
Status:HISTORIC
DOI:10.17487/RFC 0870
This RFC documents the list of numbers assigned for networks, protocols, etc. Obsoletes RFCs 820, 790, 776, 770, 762, 758, 755, 750, 739, 604.
 
RFC 877 Standard for the transmission of IP datagrams over public data networks
 
Authors:J.T. Korb.
Date:September 1983
Formats:txt json html
Obsoleted by:RFC 1356
Status:UNKNOWN
DOI:10.17487/RFC 0877
This RFC specifies a standard adopted by CSNET, the VAN gateway, and other organizations for the transmission of IP datagrams over the X.25-based public data networks.
 
RFC 879 The TCP Maximum Segment Size and Related Topics
 
Authors:J. Postel.
Date:November 1983
Formats:txt html json
Obsoleted by:RFC 7805, RFC 9293
Updated by:RFC 6691
Status:HISTORIC
DOI:10.17487/RFC 0879
This RFC discusses the TCP Maximum Segment Size Option and related topics. The purposes is to clarify some aspects of TCP and its interaction with IP. This memo is a clarification to the TCP specification, and contains information that may be considered as "advice to implementers".
 
RFC 880 Official protocols
 
Authors:J.K. Reynolds, J. Postel.
Date:October 1983
Formats:txt html json
Obsoletes:RFC 0840
Obsoleted by:RFC 0901
Status:HISTORIC
DOI:10.17487/RFC 0880
This RFC identifies the documents specifying the official protocols used in the ARPA Internet. Annotations identify any revisions or changes planned. Obsoletes RFC 840.
 
RFC 882 Domain names: Concepts and facilities
 
Authors:P. Mockapetris.
Date:November 1983
Formats:txt json html
Obsoleted by:RFC 1034, RFC 1035
Updated by:RFC 0973
Status:UNKNOWN
DOI:10.17487/RFC 0882
This RFC introduces domain style names, their use for ARPA Internet mail and host address support, and the protocol and servers used to implement domain name facilities.
 
RFC 883 Domain names: Implementation specification
 
Authors:P. Mockapetris.
Date:November 1983
Formats:txt json html
Obsoleted by:RFC 1034, RFC 1035
Updated by:RFC 0973
Status:UNKNOWN
DOI:10.17487/RFC 0883
This RFC discusses the implementation of domain name servers and resolvers, specifies the format of transactions, and discusses the use of domain names in the context of existing mail systems and other network software.
 
RFC 884 Telnet terminal type option
 
Authors:M. Solomon, E. Wimmers.
Date:December 1983
Formats:txt html json
Obsoleted by:RFC 0930
Status:UNKNOWN
DOI:10.17487/RFC 0884
This RFC specifies a standard for the ARPA Internet community. It specifies a method for exchanging terminal type information in the Telnet protocol.
 
RFC 892 ISO Transport Protocol specification
 
Authors:International Organization for Standardization.
Date:December 1983
Formats:txt json html
Obsoleted by:RFC 0905
Status:UNKNOWN
DOI:10.17487/RFC 0892
This is a draft version of the transport protocol being standardized by the ISO. This version also appeared in the ACM SIGCOMM Computer Communication Review (V.12, N.3-4) July-October 1982. This version is now out of date.
 
RFC 896 Congestion Control in IP/TCP Internetworks
 
Authors:J. Nagle.
Date:January 1984
Formats:txt json html
Obsoleted by:RFC 7805
Status:HISTORIC
DOI:10.17487/RFC 0896
This memo discusses some aspects of congestion control in IP/TCP Internetworks. It is intended to stimulate thought and further discussion of this topic. While some specific suggestions are made for improved congestion control implementation, this memo does not specify any standards.
 
RFC 900 Assigned Numbers
 
Authors:J.K. Reynolds, J. Postel.
Date:June 1984
Formats:txt html json
Obsoletes:RFC 0870
Obsoleted by:RFC 0923
Status:HISTORIC
DOI:10.17487/RFC 0900
This RFC specifies parameter values use in the Internet family of protocols, such as network numbers, well known ports, protocol types, and version numbers. This memo is an official status report on the protocol parameters used in the Internet protocol system. See RFC-990 and 997.
 
RFC 901 Official ARPA-Internet protocols
 
Authors:J.K. Reynolds, J. Postel.
Date:June 1984
Formats:txt html json
Obsoletes:RFC 0880
Obsoleted by:RFC 0924
Status:UNKNOWN
DOI:10.17487/RFC 0901
This RFC identifies the documents specifying the official protocols used in the ARPA-Internet. Annotations identify any revisions or changes planned. This memo is an official status report on the protocols used in the DARPA research community. See RFC-991.
 
RFC 912 Authentication service
 
Authors:M. St. Johns.
Date:September 1984
Formats:txt json html
Obsoleted by:RFC 0931
Status:UNKNOWN
DOI:10.17487/RFC 0912
This memo describes a proposed authentication protocol for verifying the identity of a user of a TCP connection. Given a TCP port number pair, it returns a character string which identifies the owner of that connection on the server's system. Suggested uses include automatic identification and verification of a user during an FTP session, additional verification of a TAC dial up user, and access verification for a generalized network file server.
 
RFC 918 Post Office Protocol
 
Authors:J.K. Reynolds.
Date:October 1984
Formats:txt html json
Obsoleted by:RFC 0937
Status:UNKNOWN
DOI:10.17487/RFC 0918
This RFC suggests a simple method for workstations to dynamically access mail from a mailbox server. The intent of the Post Office Protocol (POP) is to allow a user's workstation to access mail from a mailbox server. It is expected that mail will be posted from the workstation to the mailbox server via the Simple Mail Transfer Protocol (SMTP). This RFC specifies a proposed protocol for the ARPA-Internet community, and requests discussion and suggestions for improvement. The status of this protocol is experimental, and this protocol is dependent upon TCP.
 
RFC 923 Assigned numbers
 
Authors:J.K. Reynolds, J. Postel.
Date:October 1984
Formats:txt json html
Obsoletes:RFC 0900
Obsoleted by:RFC 0943
Status:HISTORIC
DOI:10.17487/RFC 0923
This RFC documents the currently assigned values from several series of numbers used in network protocol implementations. This edition of Assigned Numbers obsoletes RFC-900 and earlier editions. This memo is an official status report on the numbers used in protocols in the ARPA-Internet community. See RFC-990, and 997.
 
RFC 924 Official ARPA-Internet protocols for connecting personal computers to the Internet
 
Authors:J.K. Reynolds, J. Postel.
Date:October 1984
Formats:txt html json
Obsoletes:RFC 0901
Obsoleted by:RFC 0944
Status:UNKNOWN
DOI:10.17487/RFC 0924
This RFC identifies the documents specifying the official protocols used in the Internet. This edition of Official ARPA-Internet Protocols obsoletes RFC-900 and earlier editions. This memo is an official status report on the protocols used in the ARPA-Internet community. See RFC-991.
 
RFC 926 Protocol for providing the connectionless mode network services
 
Authors:International Organization for Standardization.
Date:December 1984
Formats:txt json html
Obsoleted by:RFC 0994
Status:UNKNOWN
DOI:10.17487/RFC 0926
This note is the draft ISO protocol roughly similar to the DOD Internet Protocol. This document has been prepared by retyping the text of ISO DIS 8473 of May 1984, which is currently undergoing voting within ISO as a Draft International Standard (DIS). This document is distributred as an RFC for information only. It does not specify a standard for the ARPA-Internet.
 
RFC 930 Telnet terminal type option
 
Authors:M. Solomon, E. Wimmers.
Date:January 1985
Formats:txt html json
Obsoletes:RFC 0884
Obsoleted by:RFC 1091
Status:UNKNOWN
DOI:10.17487/RFC 0930
This RFC specifies a standard for the ARPA Internet community. Hosts on the ARPA Internet that exchange terminal type information within the Telnet protocol are expected to adopt and implement this standard. This standard supersedes RFC-884. The only change is to specify that the TERMINAL-TYPE IS sub-negotiation should be sent only in response to the TERMINAL-TYPE SEND sub-negotiation.
 
RFC 931 Authentication server
 
Authors:M. St. Johns.
Date:January 1985
Formats:txt html json
Obsoletes:RFC 0912
Obsoleted by:RFC 1413
Status:UNKNOWN
DOI:10.17487/RFC 0931
This RFC suggests a proposed protocol for the ARPA-Internet community, and requests discussion and suggestions for improvements. This is the second draft of this proposal (superseding RFC-912) and incorporates a more formal description of the syntax for the request and response dialog, as well as a change to specify the type of user identification returned.
 
RFC 943 Assigned numbers
 
Authors:J.K. Reynolds, J. Postel.
Date:April 1985
Formats:txt html json
Obsoletes:RFC 0923
Obsoleted by:RFC 0960
Status:HISTORIC
DOI:10.17487/RFC 0943
This Network Working Group Request for Comments documents the currently assigned values from several series of numbers used in network protocol implementations. This RFC will be updated periodically, and in any case current information can be obtained from Joyce Reynolds. The assignment of numbers is also handled by Joyce. If you are developing a protocol or application that will require the use of a link, socket, port, protocol, network number, etc., please contact Joyce to receive a number assignment. This memo is an official status report on the numbers used in protocols in the ARPA-Internet community. See RFC-990 and 997.
 
RFC 944 Official ARPA-Internet protocols
 
Authors:J.K. Reynolds, J. Postel.
Date:April 1985
Formats:txt json html
Obsoletes:RFC 0924
Obsoleted by:RFC 0961
Status:UNKNOWN
DOI:10.17487/RFC 0944
This RFC identifies the documents specifying the official protocols used in the Internet. This edition of Official ARPA-Internet Protocols obsoletes RFC-924 and earlier editions. This RFC will be updated periodically, and current information can be obtained from Joyce Reynolds. This memo is an official status report on the protocols used in the ARPA-Internet community. See RFC-991.
 
RFC 945 DoD statement on the NRC report
 
Authors:J. Postel.
Date:May 1985
Formats:txt json html
Obsoleted by:RFC 1039
Status:UNKNOWN
DOI:10.17487/RFC 0945
In May 1983 the National Research Council (NRC) was asked jointly by DoD and NBS to study the issues and recommend a course of action. The final report of the NRC committee was published in February 1985 (see RFC-942). The enclosed letter is from Donald C. Latham (ASDC3I) to DCA transmitting the NRC report and requesting specific actions relative to the recommendations of the report. This RFC reproduces a letter from the Assistant Secretary of Defense for Command, Control, Communications, and Intelligence (ASDC3I) to the Director of the Defense Communications Agency (DCA). This letter is distributed for information only.
 
RFC 948 Two methods for the transmission of IP datagrams over IEEE 802.3 networks
 
Authors:I. Winston.
Date:June 1985
Formats:txt json html
Obsoleted by:RFC 1042
Status:UNKNOWN
DOI:10.17487/RFC 0948
This RFC describes two methods of encapsulating Internet Protocol (IP) datagrams on an IEEE 802.3 network. This RFC suggests a proposed protocol for the ARPA-Internet community, and requests discussion and suggestions for improvements.
 
RFC 954 NICNAME/WHOIS
 
Authors:K. Harrenstien, M.K. Stahl, E.J. Feinler.
Date:October 1985
Formats:txt json html
Obsoletes:RFC 0812
Obsoleted by:RFC 3912
Status:DRAFT STANDARD
DOI:10.17487/RFC 0954
This RFC is the official specification of the NICNAME/WHOIS protocol. This memo describes the protocol and the service. This is an update of RFC-812.
 
RFC 958 Network Time Protocol (NTP)
 
Authors:D.L. Mills.
Date:September 1985
Formats:txt json html
Obsoleted by:RFC 1059, RFC 1119, RFC 1305
Status:UNKNOWN
DOI:10.17487/RFC 0958
This document describes the Network Time Protocol (NTP), a protocol for synchronizing a set of network clocks using a set of distributed clients and servers. NTP is built on the User Datagram Protocol (UDP), which provides a connectionless transport mechanism. It is evolved from the Time Protocol and the ICMP Timestamp message and is a suitable replacement for both. This RFC suggests a proposed protocol for the ARPA-Internet community, and requests discussion and suggestions for improvements.
 
RFC 960 Assigned numbers
 
Authors:J.K. Reynolds, J. Postel.
Date:December 1985
Formats:txt json html
Obsoletes:RFC 0943
Obsoleted by:RFC 0990
Status:HISTORIC
DOI:10.17487/RFC 0960
This memo documents the currently assigned values from several series of numbers used in network protocol implementations. This edition of Assigned Numbers updates and obsoletes RFC-943. This memo is an official status report on the numbers used in protocols in the ARPA-Internet community. See RFC-990 and 997.
 
RFC 961 Official ARPA-Internet protocols
 
Authors:J.K. Reynolds, J. Postel.
Date:December 1985
Formats:txt json html
Obsoletes:RFC 0944
Obsoleted by:RFC 0991
Status:UNKNOWN
DOI:10.17487/RFC 0961
This memo identifies the documents specifying the official protocols used in the Internet, and comments on any revisions or changes planned. This edition of the Official Protocols updates and obsoletes RFC-944. This memo is an official status report on the protocols used in the ARPA-Internet community. See RFC-991.
 
RFC 966 Host groups: A multicast extension to the Internet Protocol
 
Authors:S.E. Deering, D.R. Cheriton.
Date:December 1985
Formats:txt html json
Obsoleted by:RFC 0988
Status:UNKNOWN
DOI:10.17487/RFC 0966
This RFC defines a model of service for Internet multicasting and proposes an extension to the Internet Protocol (IP) to support such a multicast service. Discussion and suggestions for improvements are requested. See RFC-988.
 
RFC 969 NETBLT: A bulk data transfer protocol
 
Authors:D.D. Clark, M.L. Lambert, L. Zhang.
Date:December 1985
Formats:txt json html
Obsoleted by:RFC 0998
Status:UNKNOWN
DOI:10.17487/RFC 0969
This RFC suggests a proposed protocol for the ARPA-Internet community, and requests discussion and suggestions for improvements. This is a preliminary discussion of the Network Block Transfer (NETBLT) protocol. NETBLT is intended for the rapid transfer of a large quantity of data between computers. It provides a transfer that is reliable and flow controlled, and is structured to provide maximum throughput over a wide variety of networks. This description is published for discussion and comment, and does not constitute a standard. As the proposal may change, implementation of this document is not advised. See RFC-998.
 
RFC 973 Domain system changes and observations
 
Authors:P. Mockapetris.
Date:January 1986
Formats:txt html json
Obsoleted by:RFC 1034, RFC 1035
Updates:RFC 0882, RFC 0883
Status:UNKNOWN
DOI:10.17487/RFC 0973
This RFC documents updates to Domain Name System specifications RFC-882 and RFC-883, suggests some operational guidelines, and discusses some experiences and problem areas in the present system.
 
RFC 974 Mail routing and the domain system
 
Authors:C. Partridge.
Date:January 1986
Formats:txt json html
Obsoleted by:RFC 2821
Also:STD 0010
Status:HISTORIC
DOI:10.17487/RFC 0974
This RFC presents a description of how mail systems on the Internet are expected to route messages based on information from the domain system. This involves a discussion of how mailers interpret MX RRs, which are used for message routing.
 
RFC 977 Network News Transfer Protocol
 
Authors:B. Kantor, P. Lapsley.
Date:February 1986
Formats:txt html json
Obsoleted by:RFC 3977
Status:PROPOSED STANDARD
DOI:10.17487/RFC 0977
NNTP specifies a protocol for the distribution, inquiry, retrieval, and posting of news articles using a reliable stream-based transmission of news among the ARPA-Internet community. NNTP is designed so that news articles are stored in a central database allowing a subscriber to select only those items he wishes to read. Indexing, cross-referencing, and expiration of aged messages are also provided. This RFC suggests a proposed protocol for the ARPA-Internet community, and requests discussion and suggestions for improvements.
 
RFC 983 ISO transport arrives on top of the TCP
 
Authors:D.E. Cass, M.T. Rose.
Date:April 1986
Formats:txt html json
Obsoleted by:RFC 1006
Status:UNKNOWN
DOI:10.17487/RFC 0983
This memo describes a proposed protocol standard for the ARPA Internet community. The CCITT and the ISO have defined various session, presentation, and application recommendations which have been adopted by the international community and numerous vendors. To the largest extent possible, it is desirable to offer these higher level services directly in the ARPA Internet, without disrupting existing facilities. This permits users to develop expertise with ISO and CCITT applications which previously were not available in the ARPA Internet. The intention is that hosts in the ARPA-Internet that choose to implement ISO TSAP services on top of the TCP be expected to adopt and implement this standard. Suggestions for improvement are encouraged.
 
RFC 984 PCMAIL: A distributed mail system for personal computers
 
Authors:D.D. Clark, M.L. Lambert.
Date:May 1986
Formats:txt json html
Obsoleted by:RFC 0993
Status:UNKNOWN
DOI:10.17487/RFC 0984
This document is a preliminary discussion of the design of a personal-computer-based distributed mail system. Pcmail is a distributed mail system that provides mail service to an arbitrary number of users, each of which owns one or more personal computers (PCs). The system is divided into two halves. The first consists of a single entity called the "repository". The repository is a storage center for incoming mail. Mail for a Pcmail user can arrive externally from the Internet or internally from other repository users. The repository also maintains a stable copy of each user's mail state. The repository is therefore typically a computer with a large amount of disk storage. It is published for discussion and comment, and does not constitute a standard. As the proposal may change, implementation of this document is not advised. See RFC-993.
 
RFC 985 Requirements for Internet gateways - draft
 
Authors:National Science Foundation, Network Technical Advisory Group.
Date:May 1986
Formats:txt json html
Obsoleted by:RFC 1009
Status:UNKNOWN
DOI:10.17487/RFC 0985
This RFC summarizes the requirements for gateways to be used on networks supporting the DARPA Internet protocols. While it applies specifically to National Science Foundation research programs, the requirements are stated in a general context and are believed applicable throughout the Internet community. The purpose of this document is to present guidance for vendors offering products that might be used or adapted for use in an Internet application. It enumerates the protocols required and gives references to RFCs and other documents describing the current specification.
 
RFC 986 Guidelines for the use of Internet-IP addresses in the ISO Connectionless-Mode Network Protocol
 
Authors:R. Callon, H.W. Braun.
Date:June 1986
Formats:txt html json
Obsoleted by:RFC 1069
Status:UNKNOWN
DOI:10.17487/RFC 0986
This RFC suggests a method to allow the existing IP addressing, including the IP protocol field, to be used for the ISO Connectionless Network Protocol (CLNP). This is a draft solution to one of the problems inherent in the use of "ISO-grams" in the DOD Internet. Related issues will be discussed in subsequent RFCs. This RFC suggests a proposed protocol for the ARPA-Internet community, and requests discussion and suggestions for improvements.
 
RFC 987 Mapping between X.400 and RFC 822
 
Authors:S.E. Kille.
Date:June 1986
Formats:txt html json
Obsoleted by:RFC 2156, RFC 1327
Updated by:RFC 1026, RFC 1138, RFC 1148
Status:UNKNOWN
DOI:10.17487/RFC 0987
The X.400 series protocols have been defined by CCITT to provide an Interpersonal Messaging Service (IPMS), making use of a store and forward Message Transfer Service. It is expected that this standard will be implemented very widely. This document describes a set of mappings which will enable interworking between systems operating the X.400 protocols and systems using RFC-822 mail protocol or protocols derived from RFC-822. This RFC suggests a proposed protocol for the ARPA-Internet community, and requests discussion and suggestions for improvements.
 
RFC 988 Host extensions for IP multicasting
 
Authors:S.E. Deering.
Date:July 1986
Formats:txt json html
Obsoletes:RFC 0966
Obsoleted by:RFC 1054, RFC 1112
Status:UNKNOWN
DOI:10.17487/RFC 0988
This memo specifies the extensions required of a host implementation of the Internet Protocol (IP) to support internetwork multicasting. This specification supersedes that given in RFC-966, and constitutes a proposed protocol standard for IP multicasting in the ARPA-Internet. The reader is directed to RFC-966 for a discussion of the motivation and rationale behind the multicasting extension specified here.
 
RFC 989 Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures
 
Authors:J. Linn.
Date:February 1987
Formats:txt json html
Obsoleted by:RFC 1040, RFC 1113
Status:UNKNOWN
DOI:10.17487/RFC 0989
This RFC suggests a proposed protocol for the Internet community and requests discussion and suggestions for improvements. This RFC is the outgrowth of a series of IAB Privacy Task Force meetings and of internal working papers distributed for those meetings. This RFC defines message encipherment and authentication procedures, as the initial phase of an effort to provide privacy enhancement services for electronic mail transfer in the Internet. It is intended that the procedures defined here be compatible with a wide range of key management approaches, including both conventional (symmetric) and public-key (asymmetric) approaches for encryption of data encrypting keys. Use of conventional cryptography for message text encryption and/or authentication is anticipated.
 
RFC 990 Assigned numbers
 
Authors:J.K. Reynolds, J. Postel.
Date:November 1986
Formats:txt json html
Obsoletes:RFC 0960
Obsoleted by:RFC 1010
Updated by:RFC 0997
Status:HISTORIC
DOI:10.17487/RFC 0990
This Network Working Group Request for Comments documents the currently assigned values from several series of numbers used in network protocol implementations. This memo is an official status report on the numbers used in protocols in the ARPA-Internet community. See RFC-997. Obsoletes RFC-960, 943, 923 and 900.
 
RFC 991 Official ARPA-Internet protocols
 
Authors:J.K. Reynolds, J. Postel.
Date:November 1986
Formats:txt json html
Obsoletes:RFC 0961
Obsoleted by:RFC 1011
Status:UNKNOWN
DOI:10.17487/RFC 0991
This RFC identifies the documents specifying the official protocols used in the Internet. Comments indicate any revisions or changes planned. This memo is an official status report on the numbers used in protocols in the ARPA-Internet community. Obsoletes RFC-961, 944 and 924.
 
RFC 993 PCMAIL: A distributed mail system for personal computers
 
Authors:D.D. Clark, M.L. Lambert.
Date:December 1986
Formats:txt html json
Obsoletes:RFC 0984
Obsoleted by:RFC 1056
Status:UNKNOWN
DOI:10.17487/RFC 0993
This document is a discussion of the Pcmail workstation-based distributed mail system. It is a revision of the design published in NIC RFC-984. The revision is based on discussion and comment fromm a variety of sources, as well as further research into the design of interactive Pcmail clients and the use of client code on machines other than IBM PCs. As this design may change, implementation of this document is not advised. Obsoletes RFC-984.
 
RFC 997 Internet numbers
 
Authors:J.K. Reynolds, J. Postel.
Date:March 1987
Formats:txt html json
Obsoleted by:RFC 1020, RFC 1117
Updates:RFC 0990
Status:UNKNOWN
DOI:10.17487/RFC 0997
This memo is an official status report on the network numbers used in the Internet community. As of 1-Mar-87 the Network Information Center (NIC) at SRI International has assumed responsibility for assignment of Network Numbers and Autonomous System Numbers. This RFC documents the current assignments of these numbers at the time of this transfer of responsibility. Obsoletes RFC-990, 960, 943, 923 and 900.
 
RFC 999 Requests For Comments summary notes: 900-999
 
Authors:A. Westine, J. Postel.
Date:April 1987
Formats:txt json html
Obsoletes:RFC 0160
Obsoleted by:RFC 1000
Status:UNKNOWN
DOI:10.17487/RFC 0999
 
 
RFC 1009 Requirements for Internet gateways
 
Authors:R.T. Braden, J. Postel.
Date:June 1987
Formats:txt html json
Obsoletes:RFC 0985
Obsoleted by:RFC 1812
Status:HISTORIC
DOI:10.17487/RFC 1009
This RFC summarizes the requirements for gateways to be used between networks supporting the Internet protocols. This document is a formal statement of the requirements to be met by gateways used in the Internet system. As such, it is an official specification for the Internet community.
 
RFC 1010 Assigned numbers
 
Authors:J.K. Reynolds, J. Postel.
Date:May 1987
Formats:txt html json
Obsoletes:RFC 0990
Obsoleted by:RFC 1060
Status:HISTORIC
DOI:10.17487/RFC 1010
This memo is an official status report on the numbers used in protocols in the Internet community. It documents the currently assigned values from several series of numbers including link, socket, port, and protocol, used in network protocol implementations.
 
RFC 1020 Internet numbers
 
Authors:S. Romano, M.K. Stahl.
Date:November 1987
Formats:txt html json
Obsoletes:RFC 0997
Obsoleted by:RFC 1062, RFC 1117, RFC 1166
Status:UNKNOWN
DOI:10.17487/RFC 1020
This RFC is a list of the Assigned IP Network Numbers and EGP Autonomous System Numbers. This RFC obsoletes RFC-997.
 
RFC 1023 HEMS monitoring and control language
 
Authors:G. Trewitt, C. Partridge.
Date:October 1987
Formats:txt json html
Obsoleted by:RFC 1076
Status:UNKNOWN
DOI:10.17487/RFC 1023
This RFC specifies the High-Level Entity Management System (HEMS) Monitoring and Control Language. This language defines the requests and replies used in HEMS. This memo assumes knowledge of the HEMS system described in RFC-1021, and of the ISO data encoding standard, ASN.1.
 
RFC 1026 Addendum to RFC 987: (Mapping between X.400 and RFC-822)
 
Authors:S.E. Kille.
Date:September 1987
Formats:txt json html
Obsoleted by:RFC 2156, RFC 1327
Updates:RFC 0987
Updated by:RFC 1138, RFC 1148
Status:UNKNOWN
DOI:10.17487/RFC 1026
This memo suggest a proposed protocol for the Internet community, and request discussion and suggestions for improvements.
 
RFC 1036 Standard for interchange of USENET messages
 
Authors:M.R. Horton, R. Adams.
Date:December 1987
Formats:txt json html
Obsoletes:RFC 0850
Obsoleted by:RFC 5536, RFC 5537
Status:UNKNOWN
DOI:10.17487/RFC 1036
This RFC defines the standard format for the interchange of network News messages among USENET hosts. It updates and replaces RFC-850, reflecting version B2.11 of the News program. This memo is distributed as an RFC to make this information easily accessible to the Internet community. It does not specify an Internet standard.
 
RFC 1038 Draft revised IP security option
 
Authors:M. St. Johns.
Date:January 1988
Formats:txt html json
Obsoleted by:RFC 1108
Status:UNKNOWN
DOI:10.17487/RFC 1038
This memo is a pre-publication draft of the revised Internet Protocol Security Option. This RFC reflects the version as approved by the Protocol Standards Steering group, and is provided for informational purposes only. The final version of this document will be available from Navy publications and should not differ from this document in any major fashion. This document will be published as a change to the MIL- STD 1777, "Internet Protocol".
 
RFC 1040 Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures
 
Authors:J. Linn.
Date:January 1988
Formats:txt json html
Obsoletes:RFC 0989
Obsoleted by:RFC 1113
Status:UNKNOWN
DOI:10.17487/RFC 1040
This RFC is the Outgrowth of a series of IAB Privacy Task Force meetings and of internal working papers distributed for those meetings. This memo defines message encipherment and authentication procedures, as the initial phase of an effort to provide privacy enhancement services for electronic mail transfer in the Internet. Detailed key management mechanisms to support these procedures will be defined in a subsequent RFC. As a goal of this initial phase, it is intended that the procedures defined here be compatible with a wide range of key management approaches, including both conventional (symmetric) and public-key (asymmetric) approaches for encryption of data encrypting keys. Use of conventional cryptography for message text encryption and/or integrity check computation is anticipated.
 
RFC 1048 BOOTP vendor information extensions
 
Authors:P.A. Prindeville.
Date:February 1988
Formats:txt json html
Obsoleted by:RFC 1084, RFC 1395, RFC 1497, RFC 1533
Status:UNKNOWN
DOI:10.17487/RFC 1048
This memo proposes an addition to the Bootstrap Protocol (BOOTP). Comments and suggestions for improvements are sought.
 
RFC 1050 RPC: Remote Procedure Call Protocol specification
 
Authors:Sun Microsystems.
Date:April 1988
Formats:txt json html
Obsoleted by:RFC 1057
Status:HISTORIC
DOI:10.17487/RFC 1050
This memo specifies a message protocol used in implementing Sun's Remote Procedure Call (RPC) package. This RFC describes a standard that Sun Microsystems and others are using and is one they wish to propose for the Internet's consideration. It is not an Internet standard at this time.
 
RFC 1051 Standard for the transmission of IP datagrams and ARP packets over ARCNET networks
 
Authors:P.A. Prindeville.
Date:March 1988
Formats:txt json html
Obsoleted by:RFC 1201
Status:HISTORIC
DOI:10.17487/RFC 1051
This memo specifies a standard method of encapsulating Internet Protocol (IP) and Address Resolution Protocol (ARP) datagrams on an ARCNET. This RFC is a standard protocol for the Internet community.
 
RFC 1054 Host extensions for IP multicasting
 
Authors:S.E. Deering.
Date:May 1988
Formats:txt json html
Obsoletes:RFC 0988
Obsoleted by:RFC 1112
Status:UNKNOWN
DOI:10.17487/RFC 1054
This memo specifies the extensions required of a host implementation of the Internet Protocol (IP) to support multicasting. IP multicasting is the transmission of an IP datagram to a "host group", a set hosts identified by a single IP destination address. A multicast datagram is delivered to all members of its destination host group with the same "best-efforts" reliability as regular unicast IP datagrams. It is proposed as a standard for IP multicasting in the Internet. This specification is a major revision of RFC-988.
 
RFC 1059 Network Time Protocol (version 1) specification and implementation
 
Authors:D.L. Mills.
Date:July 1988
Formats:txt json html
Obsoletes:RFC 0958
Obsoleted by:RFC 1119, RFC 1305
Status:UNKNOWN
DOI:10.17487/RFC 1059
This memo describes the Network Time Protocol (NTP), specifies its formal structure and summarizes information useful for its implementation. NTP provides the mechanisms to synchronize time and coordinate time distribution in a large, diverse internet operating at rates from mundane to lightwave. It uses a returnable-time design in which a distributed subnet of time servers operating in a self- organizing, hierarchical master-slave configuration synchronizes logical clocks within the subnet and to national time standards via wire or radio. The servers can also redistribute reference time via local routing algorithms and time daemons. The NTP architectures, algorithms and protocols which have evolved over several years of implementation and refinement are described in this document. The prototype system, which has been in regular operation in the Internet for the last two years, is described in an Appendix along with performance data which shows that timekeeping accuracy throughout most portions of the Internet can be ordinarily maintained to within a few tens of milliseconds, even the cases of failure or disruption of clocks, time servers or nets. This is a Draft Standard for an Elective protocol.
 
RFC 1060 Assigned numbers
 
Authors:J.K. Reynolds, J. Postel.
Date:March 1990
Formats:txt json html
Obsoletes:RFC 1010
Obsoleted by:RFC 1340
Updated by:RFC 1349
Status:HISTORIC
DOI:10.17487/RFC 1060
This memo is a status report on the parameters (i.e., numbers and keywords) used in protocols in the Internet community. Distribution of this memo is unlimited.
 
RFC 1062 Internet numbers
 
Authors:S. Romano, M.K. Stahl, M. Recker.
Date:August 1988
Formats:txt html json
Obsoletes:RFC 1020
Obsoleted by:RFC 1117, RFC 1166
Status:UNKNOWN
DOI:10.17487/RFC 1062
This memo is an official status report on the network numbers and gateway autonomous system numbers used in the Internet community.
 
RFC 1063 IP MTU discovery options
 
Authors:J.C. Mogul, C.A. Kent, C. Partridge, K. McCloghrie.
Date:July 1988
Formats:txt html json
Obsoleted by:RFC 1191
Status:UNKNOWN
DOI:10.17487/RFC 1063
A pair of IP options that can be used to learn the minimum MTU of a path through an internet is described, along with its possible uses. This is a proposal for an Experimental protocol.
 
RFC 1064 Interactive Mail Access Protocol: Version 2
 
Authors:M.R. Crispin.
Date:July 1988
Formats:txt json html
Obsoleted by:RFC 1176, RFC 1203
Status:UNKNOWN
DOI:10.17487/RFC 1064
This memo suggests a method for workstations to dynamically access mail from a mailbox server ("respository"). This RFC specifies a standard for the SUMEX-AIM community and a proposed experimental protocol for the Internet community. Discussion and suggestions for improvement are requested.
 
RFC 1065 Structure and identification of management information for TCP/IP-based internets
 
Authors:K. McCloghrie, M.T. Rose.
Date:August 1988
Formats:txt json html
Obsoleted by:RFC 1155
Status:INTERNET STANDARD
DOI:10.17487/RFC 1065
This RFC provides the common definitions for the structure and identification of management information for TCP/IP-based internets. In particular, together with its companion memos, which describe the initial management information base along with the initial network management protocol, these documents provide a simple, working architecture and system for managing TCP/IP-based internets and in particular, the Internet. This memo specifies a draft standard for the Internet community. TCP/IP implementation in the Internet which are network manageable are expected to adopt and implement this specification.
 
RFC 1066 Management Information Base for network management of TCP/IP-based internets
 
Authors:K. McCloghrie, M.T. Rose.
Date:August 1988
Formats:txt html json
Obsoleted by:RFC 1156
Status:UNKNOWN
DOI:10.17487/RFC 1066
This RFC provides the initial version of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets in the short-term. In particular, together with its companion memos which describe the structure of management information along with the initial network management protocol, these documents provide a simple, workable architecture and system for managing TCP/IP-based internets, and in particular, the Internet. This memo specifies a draft standard for the Internet community. TCP/IP implementations in the Internet which are network manageable are expected to adopt and implement this specification.
 
RFC 1067 Simple Network Management Protocol
 
Authors:J.D. Case, M. Fedor, M.L. Schoffstall, J. Davin.
Date:August 1988
Formats:txt html json
Obsoleted by:RFC 1098
Status:UNKNOWN
DOI:10.17487/RFC 1067
This RFC defines a simple protocol by which management information for a network element may be inspected or altered by logically remote users. In particular, together with its companion memos which describe the structure of management information along with the initial management information base, these documents provide a simple, workable architecture and system for managing TCP/IP-based internets and in particular, the Internet. This memo specifies a draft standard for the Internet community. TCP/IP implementations in the Internet which are network manageable are expected to adopt and implement this specification.
 
RFC 1072 TCP extensions for long-delay paths
 
Authors:V. Jacobson, R.T. Braden.
Date:October 1988
Formats:txt html json
Obsoleted by:RFC 1323, RFC 2018, RFC 6247
Status:HISTORIC
DOI:10.17487/RFC 1072
This RFC proposes a set of extensions to the TCP protocol to provide efficient operation over a path with a high bandwidth*delay product. These extensions are not proposed as an Internet standard at this time. Instead, they are intended as a basis for further experimentation and research on transport protocol performance.
 
RFC 1078 TCP port service Multiplexer (TCPMUX)
 
Authors:M. Lottor.
Date:November 1988
Formats:txt json html
Obsoleted by:RFC 7805
Status:HISTORIC
DOI:10.17487/RFC 1078
This RFC proposes an Internet standard which can be used by future TCP services instead of using 'well-known ports'.
 
RFC 1080 Telnet remote flow control option
 
Authors:C.L. Hedrick.
Date:November 1988
Formats:txt json html
Obsoleted by:RFC 1372
Status:UNKNOWN
DOI:10.17487/RFC 1080
This RFC specifies a standard for the Internet community. Hosts on the Internet that do remote flow control within the Telnet protocol are expected to adopt and implement this standard.
 
RFC 1081 Post Office Protocol: Version 3
 
Authors:M.T. Rose.
Date:November 1988
Formats:txt json html
Obsoleted by:RFC 1225
Status:UNKNOWN
DOI:10.17487/RFC 1081
This memo suggests a simple method for workstations to dynamically access mail from a mailbox server. This RFC specifies a proposed protocol for the Internet community, and requests discussion and suggestions for improvements.
 
RFC 1083 IAB official protocol standards
 
Authors:Defense Advanced Research Projects Agency, Internet Activities Board.
Date:December 1988
Formats:txt html json
Obsoleted by:RFC 1100
Status:HISTORIC
DOI:10.17487/RFC 1083
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Activities Board (IAB). An overview of the standards procedures is presented first, followed by discussions of the standardization process and the RFC document series, then the explanation of the terms is presented, the lists of protocols in each stage of standardization follows, and finally pointers to references and contacts for further information. This memo is issued quarterly, please be sure the copy you are reading is dated within the last three months.
 
RFC 1084 BOOTP vendor information extensions
 
Authors:J.K. Reynolds.
Date:December 1988
Formats:txt json html
Obsoletes:RFC 1048
Obsoleted by:RFC 1395, RFC 1497, RFC 1533
Status:UNKNOWN
DOI:10.17487/RFC 1084
This RFC is a slight revision and extension of RFC-1048 by Philip Prindeville. This memo will be updated as additional tags are are defined. This edition introduces Tag 13 for Boot File Size. Comments and suggestions for improvements are sought.
 
RFC 1089 SNMP over Ethernet
 
Authors:M. Schoffstall, C. Davin, M. Fedor, J. Case.
Date:February 1989
Formats:txt json html
Obsoleted by:RFC 4789
Status:UNKNOWN
DOI:10.17487/RFC 1089
This memo describes an experimental method by which the Simple Network Management Protocol (SNMP) can be used over Ethernet MAC layer framing instead of the Internet UDP/IP protocol stack. This specification is useful for LAN based network elements that support no higher layer protocols beyond the MAC sub-layer.
 
RFC 1095 Common Management Information Services and Protocol over TCP/IP (CMOT)
 
Authors:U.S. Warrier, L. Besaw.
Date:April 1989
Formats:txt json html
Obsoleted by:RFC 1189
Status:UNKNOWN
DOI:10.17487/RFC 1095
This memo defines a network management architecture that uses the International Organization for Standardization's (ISO) Common Management Information Services/Common Management Information Protocol (CMIS/CMIP) in a TCP/IP environment. This architecture provides a means by which control and monitoring information can be exchanged between a manager and a remote network element. In particular, this memo defines the means for implementing the Draft International Standard (DIS) version of CMIS/CMIP on top of Internet transport protocols for the purpose of carrying management information defined in the Internet-standard management information base. DIS CMIS/CMIP is suitable for deployment in TCP/IP networks while CMIS/CMIP moves toward becoming an International Standard. Together with the relevant ISO standards and the companion RFCs that describe the initial structure of management information and management information base, these documents provide the basis for a comprehensive architecture and system for managing TCP/IP- based internets, and in particular the Internet.
 
RFC 1098 Simple Network Management Protocol (SNMP)
 
Authors:J.D. Case, M. Fedor, M.L. Schoffstall, J. Davin.
Date:April 1989
Formats:txt json html
Obsoletes:RFC 1067
Obsoleted by:RFC 1157
Status:UNKNOWN
DOI:10.17487/RFC 1098
This RFC is a re-release of RFC 1067, with a changed "Status of this Memo" section. This memo defines a simple protocol by which management information for a network element may be inspected or altered by logically remote users. In particular, together with its companion memos which describe the structure of management information along with the initial management information base, these documents provide a simple, workable architecture and system for managing TCP/IP-based internets and in particular the Internet.
 
RFC 1100 IAB official protocol standards
 
Authors:Defense Advanced Research Projects Agency, Internet Activities Board.
Date:April 1989
Formats:txt json html
Obsoletes:RFC 1083
Obsoleted by:RFC 1130
Status:HISTORIC
DOI:10.17487/RFC 1100
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Activities Board (IAB). An overview of the standards procedures is presented first, followed by discussions of the standardization process and the RFC document series, then the explanation of the terms is presented, the lists of protocols in each stage of standardization follows, and finally pointers to references and contacts for further information. This memo is issued quarterly, please be sure the copy you are reading is dated within the last three months. Current copies may be obtained from the Network Information Center or from the Internet Assigned Numbers Authority (see the contact information at the end of this memo). Do not use this memo after 31-July-89.
 
RFC 1103 Proposed standard for the transmission of IP datagrams over FDDI Networks
 
Authors:D. Katz.
Date:June 1989
Formats:txt html json
Obsoleted by:RFC 1188
Status:UNKNOWN
DOI:10.17487/RFC 1103
This RFC specifies a method of encapsulating the Internet Protocol (IP) datagrams and Address Resolution Protocol (ARP) requests and replies on Fiber Distributed Data Interface (FDDI) Networks. [STANDARDS-TRACK]
 
RFC 1105 Border Gateway Protocol (BGP)
 
Authors:K. Lougheed, Y. Rekhter.
Date:June 1989
Formats:txt json html
Obsoleted by:RFC 1163
Status:EXPERIMENTAL
DOI:10.17487/RFC 1105
This RFC outlines a specific approach for the exchange of network reachability information between Autonomous Systems. Updated by RFCs 1163 and 1164. [STANDARDS-TRACK]
 
RFC 1106 TCP big window and NAK options
 
Authors:R. Fox.
Date:June 1989
Formats:txt html json
Obsoleted by:RFC 6247
Status:HISTORIC
DOI:10.17487/RFC 1106
Two extensions to the TCP protocol are described in this RFC in order to provide a more efficient operation over a network with a high bandwidth*delay product. The main issue that still needs to be solved is congestion versus noise. This issue is touched on in this memo, but further research is still needed on the applicability of the extensions in the Internet as a whole infrastructure and not just high bandwidth*delay product networks. Even with this outstanding issue, this document does describe the use of these options in the isolated satellite network environment to help facilitate more efficient use of this special medium to help off load bulk data transfers from links needed for interactive use.
 
RFC 1110 Problem with the TCP big window option
 
Authors:A.M. McKenzie.
Date:August 1989
Formats:txt json html
Obsoleted by:RFC 6247
Status:HISTORIC
DOI:10.17487/RFC 1110
The TCP Big Window option discussed in RFC 1106 will not work properly in an Internet environment which has both a high bandwidth * delay product and the possibility of disordering and duplicating packets. In such networks, the window size must not be increased without a similar increase in the sequence number space. Therefore, a different approach to big windows should be taken in the Internet.
 
RFC 1111 Request for comments on Request for Comments: Instructions to RFC authors
 
Authors:J. Postel.
Date:August 1989
Formats:txt json html
Obsoletes:RFC 0825
Obsoleted by:RFC 1543, RFC 2223
Status:INFORMATIONAL
DOI:10.17487/RFC 1111
This RFC specifies a standard for the Internet community. Authors of RFCs are expected to adopt and implement this standard.
 
RFC 1113 Privacy enhancement for Internet electronic mail: Part I - message encipherment and authentication procedures
 
Authors:J. Linn.
Date:August 1989
Formats:txt html json
Obsoletes:RFC 0989, RFC 1040
Obsoleted by:RFC 1421
Status:HISTORIC
DOI:10.17487/RFC 1113
This RFC specifies features for private electronic mail based on encryption technology. [STANDARDS-TRACK]
 
RFC 1114 Privacy enhancement for Internet electronic mail: Part II - certificate-based key management
 
Authors:S.T. Kent, J. Linn.
Date:August 1989
Formats:txt json html
Obsoleted by:RFC 1422
Status:HISTORIC
DOI:10.17487/RFC 1114
This RFC specifies the key management aspects of Privacy Enhanced Mail. [STANDARDS-TRACK]
 
RFC 1115 Privacy enhancement for Internet electronic mail: Part III - algorithms, modes, and identifiers
 
Authors:J. Linn.
Date:August 1989
Formats:txt json html
Obsoleted by:RFC 1423
Status:HISTORIC
DOI:10.17487/RFC 1115
This RFC provides definitions, references, and citations for algorithms, usage modes, and associated identifiers used in RFC-1113 and RFC-1114 in support of privacy-enhanced electronic mail. [STANDARDS-TRACK]
 
RFC 1116 Telnet Linemode option
 
Authors:D.A. Borman.
Date:August 1989
Formats:txt html json
Obsoleted by:RFC 1184
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1116
Hosts on the Internet that support Linemode within the Telnet protocol are expected to adopt and implement this protocol. Obsoleted by RFC 1184. [STANDARDS-TRACK]
 
RFC 1117 Internet numbers
 
Authors:S. Romano, M.K. Stahl, M. Recker.
Date:August 1989
Formats:txt html json
Obsoletes:RFC 1062, RFC 1020, RFC 0997
Obsoleted by:RFC 1166
Status:INFORMATIONAL
DOI:10.17487/RFC 1117
This memo is an official status report on the network numbers and the autonomous system numbers used in the Internet community.
 
RFC 1119 Network Time Protocol (version 2) specification and implementation
 
Authors:D.L. Mills.
Date:September 1989
Formats:txt ps json pdf html
Obsoletes:RFC 0958, RFC 1059
Obsoleted by:RFC 1305
Status:INTERNET STANDARD
DOI:10.17487/RFC 1119
This document describes the Network Time Protocol (NTP), specifies its formal structure and summarizes information useful for its implementation. NTP provides the mechanisms to synchronize time and coordinate time distribution in a large, diverse internet operating at rates from mundane to lightwave. It uses a returnable-time design in which a distributed subnet of time servers operating in a self- organizing, hierarchical-master-slave configuration synchronizes local clocks within the subnet and to national time standards via wire or radio. The servers can also redistribute reference time via local routing algorithms and time daemons. [STANDARDS-TRACK]
 
RFC 1120 Internet Activities Board
 
Authors:V. Cerf.
Date:September 1989
Formats:txt json html
Obsoleted by:RFC 1160
Status:INFORMATIONAL
DOI:10.17487/RFC 1120
This RFC provides a history and description of the Internet Activities Board (IAB) and its subsidiary organizations. This memo is for informational use and does not constitute a standard.
 
RFC 1130 IAB official protocol standards
 
Authors:Defense Advanced Research Projects Agency, Internet Activities Board.
Date:October 1989
Formats:txt json html
Obsoletes:RFC 1100
Obsoleted by:RFC 1140
Status:HISTORIC
DOI:10.17487/RFC 1130
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Activities Board (IAB).
 
RFC 1131 OSPF specification
 
Authors:J. Moy.
Date:October 1989
Formats:txt json ps html pdf
Obsoleted by:RFC 1247
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1131
This RFC is the specification of the Open Shortest Path First (OSPF) Internet routing protocol. OSPF is in the class of Internal Gateway Protocols (IGPs) for distributing routing information between gateways of a single Autonomous System. This routing protocol is based on the link-state approach (in contrast to the distance-vector approach). This specification was developed by the OSPF Working Group of the Internet Engineering Task Force. [STANDARDS-TRACK]
 
RFC 1134 Point-to-Point Protocol: A proposal for multi-protocol transmission of datagrams over Point-to-Point links
 
Authors:D. Perkins.
Date:November 1989
Formats:txt json html
Obsoleted by:RFC 1171
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1134
The Point-to-Point Protocol (PPP) provides a method for transmitting datagrams over serial point-to-point links. PPP is composed of three parts:

1. A method for encapsulating datagrams over serial links.

2. An extensible Link Control Protocol (LCP).

3. A family of Network Control Protocols (NCP) for establishing and configuring different network-layer protocols.

This document defines the encapsulation scheme, the basic LCP, and anNCP for establishing and configuring the Internet Protocol (IP)(called the IP Control Protocol, IPCP).

The options and facilities used by the LCP and the IPCP are defined in separate documents. Control protocols for configuring and utilizing other network-layer protocols besides IP (e.g., DECNET,OSI) are expected to be developed as needed.

 
RFC 1138 Mapping between X.400(1988) / ISO 10021 and RFC 822
 
Authors:S.E. Kille.
Date:December 1989
Formats:txt json html
Obsoleted by:RFC 2156, RFC 1327
Updates:RFC 1026, RFC 0987, RFC 0822
Updated by:RFC 1148
Status:EXPERIMENTAL
DOI:10.17487/RFC 1138
Ths RFC suggests an electronic mail protocol mapping for the Internet community and UK Academic Community, and requests discussion and suggestions for improvements. This memo does not specify an Internet standard. This memo updates RFCs 822, 987, and 1026.
 
RFC 1139 Echo function for ISO 8473
 
Authors:R.A. Hagens.
Date:January 1990
Formats:txt json html
Obsoleted by:RFC 1574, RFC 1575
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1139
This memo defines an echo function for the connection-less network layer protocol. Two mechanisms are introduced that may be used to implement the echo function. The first mechanism is recommended as an interim solution for the Internet community. The second mechanism will be progressed to the ANSI X3S3.3 working group for consideration as a work item.

When an ISO standard is adopted that provides functionality similar to that described by this memo, then this memo will become obsolete and superceded by the ISO standard.

 
RFC 1140 IAB official protocol standards
 
Authors:Defense Advanced Research Projects Agency, Internet Activities Board.
Date:May 1990
Formats:txt html json
Obsoletes:RFC 1130
Obsoleted by:RFC 1200
Status:HISTORIC
DOI:10.17487/RFC 1140
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Activities Board (IAB). This memo is issued quarterly, please be sure the copy you are reading is dated within the last three months. Current copies may be obtained from the Network Information Center or from the Internet Assigned Numbers Authority. Do not use this edition after 31-Aug-90.
 
RFC 1142 OSI IS-IS Intra-domain Routing Protocol
 
Authors:D. Oran, Ed..
Date:February 1990
Formats:txt ps json html pdf
Obsoleted by:RFC 7142
Status:HISTORIC
DOI:10.17487/RFC 1142
This RFC is a republication of ISO DP 10589 as a service to the Internet community. This is not an Internet standard.
 
RFC 1145 TCP alternate checksum options
 
Authors:J. Zweig, C. Partridge.
Date:February 1990
Formats:txt html json
Obsoleted by:RFC 1146, RFC 6247
Status:HISTORIC
DOI:10.17487/RFC 1145
This memo is suggests a pair of TCP options to allow use of alternate data checksum algorithms in the TCP header. The use of these options is experimental, and not recommended for production use.
 
RFC 1146 TCP alternate checksum options
 
Authors:J. Zweig, C. Partridge.
Date:March 1990
Formats:txt json html
Obsoletes:RFC 1145
Obsoleted by:RFC 6247
Status:HISTORIC
DOI:10.17487/RFC 1146
This memo is suggests a pair of TCP options to allow use of alternate data checksum algorithms in the TCP header. The use of these options is experimental, and not recommended for production use. Note: This RFC corrects errors introduced in the editing process in RFC 1145.
 
RFC 1147 FYI on a Network Management Tool Catalog: Tools for Monitoring and Debugging TCP/IP Internets and Interconnected Devices
 
Authors:R.H. Stine.
Date:April 1990
Formats:txt pdf json ps html
Obsoleted by:RFC 1470
Status:INFORMATIONAL
DOI:10.17487/RFC 1147
The goal of this FYI memo is to provide practical information to site administrators and network managers. This memo provides information for the Internet community. It does not specify any standard. It is not a statement of IAB policy or recommendations. [Also FYI 2.] This catalog contains descriptions of several tools available to assist network managers in debugging and maintaining TCP/IP internets and interconnected communications resources. Entries in the catalog tell what a tool does, how it works, and how it can be obtained.
 
RFC 1148 Mapping between X.400(1988) / ISO 10021 and RFC 822
 
Authors:S.E. Kille.
Date:March 1990
Formats:txt html json
Obsoleted by:RFC 2156, RFC 1327
Updates:RFC 1026, RFC 0987, RFC 1138, RFC 0822
Status:EXPERIMENTAL
DOI:10.17487/RFC 1148
This RFC suggests an electronic mail protocol mapping for the Internet community and UK Academic Community, and requests discussion and suggestions for improvements. This memo does not specify an Internet standard. This edition includes material lost in editing.
 
RFC 1150 FYI on FYI: Introduction to the FYI Notes
 
Authors:G.S. Malkin, J.K. Reynolds.
Date:March 1990
Formats:txt html json
Obsoleted by:RFC 6360
Status:HISTORIC
DOI:10.17487/RFC 1150
This memo is the first in a new sub-series of RFCs called FYIs (For Your Information). This memo provides information for the Internet community. It does not specify any standard. [Also FYI 1.]
 
RFC 1154 Encoding header field for internet messages
 
Authors:D. Robinson, R. Ullmann.
Date:April 1990
Formats:txt html json
Obsoleted by:RFC 1505
Status:EXPERIMENTAL
DOI:10.17487/RFC 1154
This RFC proposes an elective experimental Encoding header field to permit the mailing of multi-part, multi-structured messages. The use of Encoding updates RFC 1049 (Content-Type), and is a suggested update to RFCs 1113, 1114, and 1115 (Privacy Enhancement).
 
RFC 1158 Management Information Base for network management of TCP/IP-based internets: MIB-II
 
Authors:M.T. Rose.
Date:May 1990
Formats:txt html json
Obsoleted by:RFC 1213
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1158
This memo defines the second version of the Management Information Base (MIB-II) for use with network management protocols in TCP/IP- based internets. In particular, together with its companion memos which describe the structure of management information (RFC 1155) along with the network management protocol (RFC 1157) for TCP/IP- based internets, these documents provide a simple, workable architecture and system for managing TCP/IP-based internets and in particular the Internet community. This document on MIB-II incorporates all of the technical content of RFC 1156 on MIB-I and extends it, without loss of compatibilty. [STANDARDS-TRACK]
 
RFC 1159 Message Send Protocol
 
Authors:R. Nelson.
Date:June 1990
Formats:txt html json
Obsoleted by:RFC 1312
Status:EXPERIMENTAL
DOI:10.17487/RFC 1159
This RFC suggests an Experimental Protocol for the Internet community. Hosts on the Internet that choose to implement a Message Send Protocol may experiment with this protocol.
 
RFC 1161 SNMP over OSI
 
Authors:M.T. Rose.
Date:June 1990
Formats:txt html json
Obsoleted by:RFC 1418
Status:EXPERIMENTAL
DOI:10.17487/RFC 1161
This memo defines an experimental means for running the Simple Network Management Protocol (SNMP) over OSI transports. This memo does not specify a standard for the Internet community,
 
RFC 1162 Connectionless Network Protocol (ISO 8473) and End System to Intermediate System (ISO 9542) Management Information Base
 
Authors:G. Satz.
Date:June 1990
Formats:txt json html
Obsoleted by:RFC 1238
Status:EXPERIMENTAL
DOI:10.17487/RFC 1162
This memo defines an experimental portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. This memo does not specify a standard for the Internet community.
 
RFC 1163 Border Gateway Protocol (BGP)
 
Authors:K. Lougheed, Y. Rekhter.
Date:June 1990
Formats:txt json html
Obsoletes:RFC 1105
Obsoleted by:RFC 1267
Status:HISTORIC
DOI:10.17487/RFC 1163
This RFC, together with its companion RFC-1164, "Application of the Border Gateway Protocol in the Internet", specify an inter-autonomous system routing protocol for the Internet. [STANDARDS-TRACK]
 
RFC 1164 Application of the Border Gateway Protocol in the Internet
 
Authors:J.C. Honig, D. Katz, M. Mathis, Y. Rekhter, J.Y. Yu.
Date:June 1990
Formats:txt html json
Obsoleted by:RFC 1268
Status:HISTORIC
DOI:10.17487/RFC 1164
This RFC, together with its companion RFC-1163, "A Border Gateway Protocol (BGP)", specify an inter-autonomous system routing protocol for the Internet. [STANDARDS-TRACK]
 
RFC 1171 Point-to-Point Protocol for the transmission of multi-protocol datagrams over Point-to-Point links
 
Authors:D. Perkins.
Date:July 1990
Formats:txt html json
Obsoletes:RFC 1134
Obsoleted by:RFC 1331
Status:DRAFT STANDARD
DOI:10.17487/RFC 1171
The Point-to-Point Protocol (PPP) provides a method for transmitting datagrams over serial point-to-point links. PPP is composed of three parts:

1. A method for encapsulating datagrams over serial links.

2. An extensible Link Control Protocol (LCP).

3. A family of Network Control Protocols (NCP) for establishing and configuring different network-layer protocols.

This document defines the encapsulation scheme, the basic LCP, and anNCP for establishing and configuring the Internet Protocol (IP)(called the IP Control Protocol, IPCP).

The options and facilities used by the LCP and the IPCP are defined in separate documents. Control protocols for configuring and utilizing other network-layer protocols besides IP (e.g., DECNET,OSI) are expected to be developed as needed.

 
RFC 1172 Point-to-Point Protocol (PPP) initial configuration options
 
Authors:D. Perkins, R. Hobby.
Date:July 1990
Formats:txt json html
Obsoleted by:RFC 1331, RFC 1332
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1172
The Point-to-Point Protocol (PPP) provides a method for transmitting datagrams over serial point-to-point links. PPP is composed of

1) a method for encapsulating datagrams over serial links,2) an extensible Link Control Protocol (LCP), and3) a family of Network Control Protocols (NCP) for establishing and configuring different network-layer protocols.

The PPP encapsulating scheme, the basic LCP, and an NCP for controlling and establishing the Internet Protocol (IP) (called theIP Control Protocol, IPCP) are defined in The Point-to-Point Protocol(PPP) [1].

This document defines the intial options used by the LCP and IPCP. It also defines a method of Link Quality Monitoring and a simple authentication scheme.

 
RFC 1177 FYI on Questions and Answers: Answers to commonly asked "new internet user" questions
 
Authors:G.S. Malkin, A.N. Marine, J.K. Reynolds.
Date:August 1990
Formats:txt json html
Obsoleted by:RFC 1206
Status:INFORMATIONAL
DOI:10.17487/RFC 1177
This FYI RFC is one of three FYI's called, "Questions and Answers" (Q/A), produced by the User Services Working Group (USWG) of the Internet Engineering Task Force (IETF). The goal is to document the most commonly asked questions and answers in the Internet. This memo provides information for the Internet community. It does not specify any standard. [Also FYI 4.]
 
RFC 1185 TCP Extension for High-Speed Paths
 
Authors:V. Jacobson, R.T. Braden, L. Zhang.
Date:October 1990
Formats:txt html json
Obsoleted by:RFC 1323
Status:EXPERIMENTAL
DOI:10.17487/RFC 1185
This memo describes an Experimental Protocol extension to TCP for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "IAB Official Protocol Standards" for the standardization state and status of this protocol.
 
RFC 1186 MD4 Message Digest Algorithm
 
Authors:R.L. Rivest.
Date:October 1990
Formats:txt json html
Obsoleted by:RFC 1320
Status:INFORMATIONAL
DOI:10.17487/RFC 1186
This RFC is the specification of the MD4 Digest Algorithm. If you are going to implement MD4, it is suggested you do it this way. This memo is for informational use and does not constitute a standard.
 
RFC 1190 Experimental Internet Stream Protocol: Version 2 (ST-II)
 
Authors:C. Topolcic.
Date:October 1990
Formats:txt html json
Obsoletes:IEN119
Obsoleted by:RFC 1819
Status:EXPERIMENTAL
DOI:10.17487/RFC 1190
This memo defines a revised version of the Internet Stream Protocol, originally defined in IEN-119 [8], based on results from experiments with the original version, and subsequent requests, discussion, and suggestions for improvements. This is a Limited-Use Experimental Protocol. Please refer to the current edition of the "IAB Official Protocol Standards" for the standardization state and status of this protocol.
 
RFC 1194 Finger User Information Protocol
 
Authors:D.P. Zimmerman.
Date:November 1990
Formats:txt html json
Obsoletes:RFC 0742
Obsoleted by:RFC 1196, RFC 1288
Status:DRAFT STANDARD
DOI:10.17487/RFC 1194
This memo describes the Finger User Information Protocol. This is a simple protocol which provides an interface to a remote user information program.

Based on RFC 742, a description of the original Finger protocol, this memo attempts to clarify the expected communication between the two ends of a Finger connection. It also tries not to invalidate the many existing implementations or add unnecessary restrictions to the original protocol definition.

 
RFC 1196 Finger User Information Protocol
 
Authors:D.P. Zimmerman.
Date:December 1990
Formats:txt json html
Obsoletes:RFC 1194, RFC 0742
Obsoleted by:RFC 1288
Status:DRAFT STANDARD
DOI:10.17487/RFC 1196
This memo describes the Finger User Information Protocol. This is a simple protocol which provides an interface to a remote user information program.

Based on RFC 742, a description of the original Finger protocol, this memo attempts to clarify the expected communication between the two ends of a Finger connection. It also tries not to invalidate the many existing implementations or add unnecessary restrictions to the original protocol definition. This edition corrects and clarifies in a minor way, RFC 1194.

 
RFC 1200 IAB official protocol standards
 
Authors:Defense Advanced Research Projects Agency, Internet Activities Board.
Date:April 1991
Formats:txt html json
Obsoletes:RFC 1140
Obsoleted by:RFC 1250
Status:HISTORIC
DOI:10.17487/RFC 1200
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Activities Board (IAB). An overview of the standards procedures is presented first, followed by discussions of the standardization process and the RFC document series, then the explanation of the terms is presented, the lists of protocols in each stage of standardization follows, and finally pointers to references and contacts for further information.
 
RFC 1206 FYI on Questions and Answers: Answers to commonly asked "new Internet user" questions
 
Authors:G.S. Malkin, A.N. Marine.
Date:February 1991
Formats:txt json html
Obsoletes:RFC 1177
Obsoleted by:RFC 1325
Status:INFORMATIONAL
DOI:10.17487/RFC 1206
This FYI RFC is one of two FYI's called, "Questions and Answers" (Q/A). The goal is to document the most commonly asked questions and answers in the Internet. This memo provides information for the Internet community. It does not specify any standard. [FYI 4]
 
RFC 1218 Naming scheme for c=US
 
Authors:North American Directory Forum.
Date:April 1991
Formats:txt html json
Obsoleted by:RFC 1255, RFC 1417
Status:INFORMATIONAL
DOI:10.17487/RFC 1218
This RFC is a near-verbatim copy of a document, known as NADF-123, which has been produced by the North American Directory Forum (NADF). As a part of its charter, the NADF must reach agreement as to how entries are named in the public portions of the North American Directory. This memo provides information for the Internet community. It does not specify an Internet standard.
 
RFC 1220 Point-to-Point Protocol extensions for bridging
 
Authors:F. Baker.
Date:April 1991
Formats:txt html json
Obsoleted by:RFC 1638
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1220
This document defines an extension of the Internet Point-to-Point Protocol (PPP) described in RFC 1171, targeting the use of Point-to- Point lines for Remote Bridging. [STANDARDS-TRACK]
 
RFC 1225 Post Office Protocol: Version 3
 
Authors:M.T. Rose.
Date:May 1991
Formats:txt html json
Obsoletes:RFC 1081
Obsoleted by:RFC 1460
Status:DRAFT STANDARD
DOI:10.17487/RFC 1225
This memo suggests a simple method for workstations to dynamically access mail from a mailbox server. [STANDARDS-TRACK]
 
RFC 1228 SNMP-DPI: Simple Network Management Protocol Distributed Program Interface
 
Authors:G. Carpenter, B. Wijnen.
Date:May 1991
Formats:txt html json
Obsoleted by:RFC 1592
Status:EXPERIMENTAL
DOI:10.17487/RFC 1228
This RFC describes a protocol that International Business Machines Corporation (IBM) has been implementing in most of its SNMP agents to allow dynamic extension of supported MIBs. This is an Experimental Protocol for the Internet community. It does not specify an Internet standard.
 
RFC 1229 Extensions to the generic-interface MIB
 
Authors:K. McCloghrie.
Date:May 1991
Formats:txt html json
Obsoleted by:RFC 1573
Updated by:RFC 1239
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1229
This RFC contains definitions of managed objects used as experimental extensions to the generic interfaces structure of MIB-II. [STANDARDS- TRACK]
 
RFC 1231 IEEE 802.5 Token Ring MIB
 
Authors:K. McCloghrie, R. Fox, E. Decker.
Date:May 1991
Formats:txt html json
Obsoleted by:RFC 1743, RFC 1748
Updated by:RFC 1239
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1231
This memo defines an experimental portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, this memo defines managed objects used for managing subnetworks which use the IEEE 802.5 Token Ring technology described in 802.5 Token Ring Access Method and Physical Layer Specifications, IEEE Standard 802.5-1989. [STANDARDS-TRACK]
 
RFC 1232 Definitions of managed objects for the DS1 Interface type
 
Authors:F. Baker, C.P. Kolb.
Date:May 1991
Formats:txt json html
Obsoleted by:RFC 1406
Updated by:RFC 1239
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1232
 
 
RFC 1233 Definitions of managed objects for the DS3 Interface type
 
Authors:T.A. Cox, K. Tesink.
Date:May 1991
Formats:txt json html
Obsoleted by:RFC 1407
Updated by:RFC 1239
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1233
This memo defines objects for managing DS3 Interface objects for use with the SNMP protocol. [STANDARDS-TRACK]
 
RFC 1237 Guidelines for OSI NSAP Allocation in the Internet
 
Authors:R. Colella, E. Gardner, R. Callon.
Date:July 1991
Formats:txt json pdf html ps
Obsoleted by:RFC 1629
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1237
This paper provides guidelines for allocating NSAPs in the Internet.[STANDARDS-TRACK]
 
RFC 1243 AppleTalk Management Information Base
 
Authors:S. Waldbusser.
Date:July 1991
Formats:txt html json
Obsoleted by:RFC 1742
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1243
This memo defines objects for managing AppleTalk objects for use with the SNMP protocol. [STANDARDS-TRACK]
 
RFC 1244 Site Security Handbook
 
Authors:J.P. Holbrook, J.K. Reynolds.
Date:July 1991
Formats:txt json html
Obsoleted by:RFC 2196
Status:INFORMATIONAL
DOI:10.17487/RFC 1244
This FYI RFC is a first attempt at providing Internet users guidance on how to deal with security issues in the Internet. This FYI RFC provides information for the Internet community. It does not specify an Internet standard. [FYI 8]
 
RFC 1247 OSPF Version 2
 
Authors:J. Moy.
Date:July 1991
Formats:txt html pdf json ps
Obsoletes:RFC 1131
Obsoleted by:RFC 1583
Updated by:RFC 1349
Also:RFC 1245, RFC 1246
Status:DRAFT STANDARD
DOI:10.17487/RFC 1247
This memo documents version 2 of the OSPF protocol. OSPF is a link- state based routing protocol. [STANDARDS-TRACK]
 
RFC 1248 OSPF Version 2 Management Information Base
 
Authors:F. Baker, R. Coltun.
Date:July 1991
Formats:txt json html
Obsoleted by:RFC 1252
Updated by:RFC 1349
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1248
This memo defines an experimental portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing OSPF Version 2. [STANDARDS-TRACK]
 
RFC 1250 IAB Official Protocol Standards
 
Authors:J. Postel.
Date:August 1991
Formats:txt json html
Obsoletes:RFC 1200
Obsoleted by:RFC 2200, RFC 1280
Status:HISTORIC
DOI:10.17487/RFC 1250
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Activities Board (IAB). This memo provides information for the Internet community. It does not specify an Internet standard.
 
RFC 1251 Who's Who in the Internet: Biographies of IAB, IESG and IRSG Members
 
Authors:G. Malkin.
Date:August 1991
Formats:txt json html
Obsoleted by:RFC 1336
Status:INFORMATIONAL
DOI:10.17487/RFC 1251
This FYI RFC contains biographical information about members of the Internet Activities Board (IAB), the Internet Engineering Steering Group (IESG) of the Internet Engineering Task Force (IETF), and the the Internet Research Steering Group (IRSG) of the Internet Research Task Force (IRTF). This memo provides information for the Internet community. It does not specify an Internet standard. [FYI 9]
 
RFC 1252 OSPF Version 2 Management Information Base
 
Authors:F. Baker, R. Coltun.
Date:August 1991
Formats:txt html json
Obsoletes:RFC 1248
Obsoleted by:RFC 1253
Also:RFC 1245, RFC 1247
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1252
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing OSPF Version 2. [STANDARDS- TRACK]
 
RFC 1253 OSPF Version 2 Management Information Base
 
Authors:F. Baker, R. Coltun.
Date:August 1991
Formats:txt html json
Obsoletes:RFC 1252
Obsoleted by:RFC 1850
Also:RFC 1245, RFC 1246, RFC 1247
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1253
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing OSPF Version 2. [STANDARDS- TRACK]
 
RFC 1255 A Naming Scheme for c=US
 
Authors:The North American Directory Forum.
Date:September 1991
Formats:txt json html
Obsoletes:RFC 1218
Obsoleted by:RFC 1417
Status:INFORMATIONAL
DOI:10.17487/RFC 1255
This memo documents the NADF's agreement as to how entries are named in the public portions of the North American Directory. This memo provides information for the Internet community. It does not specify an Internet standard.
 
RFC 1258 BSD Rlogin
 
Authors:B. Kantor.
Date:September 1991
Formats:txt json html
Obsoleted by:RFC 1282
Status:INFORMATIONAL
DOI:10.17487/RFC 1258
The rlogin facility provides a remote-echoed, locally flow-controlled virtual terminal with proper flushing of output.This memo documents an existing protocol and common implementation that is extensively used on the Internet. This memo provides information for the Internet community. It does not specify an Internet standard.
 
RFC 1264 Internet Engineering Task Force Internet Routing Protocol Standardization Criteria
 
Authors:R.M. Hinden.
Date:October 1991
Formats:txt json html
Obsoleted by:RFC 4794
Status:HISTORIC
DOI:10.17487/RFC 1264
This informational RFC presents procedures for creating and documenting Internet standards on routing protocols. These procedures have been established by the Internet Activities Board (IAB) in consultation with the Internet Engineering Steering Group (IESG). This memo provides information for the Internet community. It does not specifiy an Internet standard.
 
RFC 1268 Application of the Border Gateway Protocol in the Internet
 
Authors:Y. Rekhter, P. Gross.
Date:October 1991
Formats:txt json html
Obsoletes:RFC 1164
Obsoleted by:RFC 1655
Status:HISTORIC
DOI:10.17487/RFC 1268
This document, together with its companion document, "A BorderGateway Protocol (BGP-3)", define an inter-autonomous system routing protocol for the Internet. "A Border Gateway Protocol (BGP-3)" defines the BGP protocol specification, and this document describes the usage of the BGP in the Internet.

Information about the progress of BGP can be monitored and/or reported on the BGP mailing list (iwg@rice.edu).

 
RFC 1269 Definitions of Managed Objects for the Border Gateway Protocol: Version 3
 
Authors:S. Willis, J.W. Burruss.
Date:October 1991
Formats:txt json html
Obsoleted by:RFC 4273
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1269
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing the Border Gateway Protocol. [STANDARDS-TRACK]
 
RFC 1271 Remote Network Monitoring Management Information Base
 
Authors:S. Waldbusser.
Date:November 1991
Formats:txt json html
Obsoleted by:RFC 1757
Updated by:RFC 1513
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1271
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing remote network monitoring devices. [STANDARDS-TRACK]
 
RFC 1274 The COSINE and Internet X.500 Schema
 
Authors:P. Barker, S. Kille.
Date:November 1991
Formats:txt json html
Obsoleted by:RFC 4524
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1274
This document suggests an X.500 Directory Schema, or NamingArchitecture, for use in the COSINE and Internet X.500 pilots. The schema is independent of any specific implementation. As well as indicating support for the standard object classes and attributes, a large number of generally useful object classes and attributes are also defined. An appendix to this document includes a machine processable version of the schema.

This document also proposes a mechanism for allowing the schema to evolve in line with emerging requirements. Proformas to support this process are included.

Corrections and additions to the schema should be sent to na- update@cs.ucl.ac.uk list, as described within.

 
RFC 1280 IAB Official Protocol Standards
 
Authors:J. Postel.
Date:March 1992
Formats:txt json html
Obsoletes:RFC 1250
Obsoleted by:RFC 1360
Status:HISTORIC
DOI:10.17487/RFC 1280
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Activities Board (IAB). This memo provides information for the Internet community. It does not specify an Internet standard.
 
RFC 1283 SNMP over OSI
 
Authors:M. Rose.
Date:December 1991
Formats:txt html json
Obsoleted by:RFC 1418
Status:EXPERIMENTAL
DOI:10.17487/RFC 1283
This memo describes mappings from the SNMP onto both the COTS and the CLTS. This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet Standard.
 
RFC 1284 Definitions of Managed Objects for the Ethernet-like Interface Types
 
Authors:J. Cook, Ed..
Date:December 1991
Formats:txt json html
Obsoleted by:RFC 1398
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1284
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing ethernet-like objects. [STANDARDS-TRACK]
 
RFC 1286 Definitions of Managed Objects for Bridges
 
Authors:E. Decker, P. Langille, A. Rijsinghani, K. McCloghrie.
Date:December 1991
Formats:txt html json
Obsoleted by:RFC 1493, RFC 1525
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1286
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP based internets. In particular it defines objects for managing bridges based on the IEEE 802.1d draft standard between Local Area Network (LAN) segments. This memo is an extension to the SNMP MIB. [STANDARDS-TRACK]
 
RFC 1289 DECnet Phase IV MIB Extensions
 
Authors:J. Saperia.
Date:December 1991
Formats:txt json html
Obsoleted by:RFC 1559
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1289
This memo defines a set of DECnet Phase IV extensions that have been created for the Internet MIB. When used in conjunction with the structure of management information (RFC 1155), the management information base for network management of TCP/IP-based internets(RFC 1213) and the Simple Network Management Protocol (RFC 1157), it will be possible to provide integrated network management of combinedTCP/IP and DECnet Phase IV based internets. This document was produced by the DECnet Phase IV MIB working group of the InternetEngineering Task Force (IETF).
 
RFC 1290 There's Gold in them thar Networks! or Searching for Treasure in all the Wrong Places
 
Authors:J. Martin.
Date:December 1991
Formats:txt json html
Obsoleted by:RFC 1402
Status:INFORMATIONAL
DOI:10.17487/RFC 1290
This document was presented at the 1991 ACM SIGUCCS User ServicesConference. It appears here in its updated form.

There is a wealth of information on the network. In fact, so much information, that you could spend your entire life browsing. This paper will present some of the "gold nuggets" of information and file repositories on the network that could be of use to end users.

The ultimate goal is to make the route to these sources of information invisible to the user. At present, this is not easy to do. I will explain some of the techniques that can be used to make these nuggets easier to pick up so that we can all be richer.

 
RFC 1292 A Catalog of Available X.500 Implementations
 
Authors:R. Lang, R. Wright.
Date:January 1992
Formats:txt html json
Obsoleted by:RFC 1632
Status:INFORMATIONAL
DOI:10.17487/RFC 1292
The goal of this document is to provide information regarding the availability and capability of implementations of X.500. Comments and critiques of this document, and new or updated descriptions ofX.500 implementations are welcome. Send them to the DirectoryInformation Services Infrastructure (DISI) Working Group(disi@merit.edu) or to the editors.
 
RFC 1293 Inverse Address Resolution Protocol
 
Authors:T. Bradley, C. Brown.
Date:January 1992
Formats:txt html json
Obsoleted by:RFC 2390
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1293
This memo describes additions to ARP that will allow a station to request a protocol address corresponding to a given hardware address. [STANDARDS-TRACK]
 
RFC 1294 Multiprotocol Interconnect over Frame Relay
 
Authors:T. Bradley, C. Brown, A. Malis.
Date:January 1992
Formats:txt json html
Obsoleted by:RFC 1490, RFC 2427
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1294
This memo describes an encapsulation method for carrying network interconnect traffic over a Frame Relay backbone. It covers aspects of both Bridging and Routing. [STANDARDS-TRACK]
 
RFC 1295 User Bill of Rights for entries and listings in the Public Directory
 
Authors:The North American Directory Forum.
Date:January 1992
Formats:txt json html
Obsoleted by:RFC 1417
Status:INFORMATIONAL
DOI:10.17487/RFC 1295
This RFC is a near-verbatim copy of a document, known as NADF-265, which has been produced by the North American Directory Forum (NADF).

User Bill of Rights for entries and listings in the Public Directory

The mission of the North American Directory Forum is to provide interconnected electronic directories which empower users with unprecedented access to public information. To address significant security and privacy issues, the North American Directory Forum introduces the following "User Bill of Rights" for entries in thePublic Directory. As a user, you have:

I. The right not to be listed.

II. The right to have you or your agent informed when your entry is created.

III. The right to examine your entry.

IV. The right to correct inaccurate information in your entry.

V. The right to remove specific information from your entry.

VI. The right to be assured that your listing in thePublic Directory will comply with US or Canadian law regulating privacy or access information.

VII. The right to expect timely fulfillment of these rights.

 
RFC 1298 SNMP over IPX
 
Authors:R. Wormley, S. Bostock.
Date:February 1992
Formats:txt json html
Obsoleted by:RFC 1420
Status:INFORMATIONAL
DOI:10.17487/RFC 1298
This memo defines a convention for encapsulating Simple NetworkManagement Protocol (SNMP) [1] packets over the transport mechanism provided via the Internetwork Packet Exchange (IPX) protocol [2].
 
RFC 1304 Definitions of Managed Objects for the SIP Interface Type
 
Authors:T. Cox, Ed., K. Tesink, Ed..
Date:February 1992
Formats:txt json html
Obsoleted by:RFC 1694
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1304
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.In particular, it defines objects for managing SIP (SMDS InterfaceProtocol) objects.
 
RFC 1305 Network Time Protocol (Version 3) Specification, Implementation and Analysis
 
Authors:D. Mills.
Date:March 1992
Formats:txt json tar html pdf
Obsoletes:RFC 0958, RFC 1059, RFC 1119
Obsoleted by:RFC 5905
Status:DRAFT STANDARD
DOI:10.17487/RFC 1305
This document describes the Network Time Protocol (NTP), specifies its formal structure and summarizes information useful for its implementation. [STANDARDS-TRACK]
 
RFC 1310 The Internet Standards Process
 
Authors:L. Chapin.
Date:March 1992
Formats:txt json html
Obsoleted by:RFC 1602
Status:INFORMATIONAL
DOI:10.17487/RFC 1310
This memo documents the process currently used for the standardization of Internet protocols and procedures. [STANDARDS-TRACK]
 
RFC 1315 Management Information Base for Frame Relay DTEs
 
Authors:C. Brown, F. Baker, C. Carvalho.
Date:April 1992
Formats:txt json html
Obsoleted by:RFC 2115
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1315
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.In particular, it defines objects for managing Frame Relay.
 
RFC 1316 Definitions of Managed Objects for Character Stream Devices
 
Authors:B. Stewart.
Date:April 1992
Formats:txt html json
Obsoleted by:RFC 1658
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1316
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP based internets. In particular it defines objects for the management of character stream devices. [STANDARDS-TRACK]
 
RFC 1317 Definitions of Managed Objects for RS-232-like Hardware Devices
 
Authors:B. Stewart.
Date:April 1992
Formats:txt html json
Obsoleted by:RFC 1659
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1317
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP based internets. In particular, it defines objects for the management of RS-232-like devices. [STANDARDS-TRACK]
 
RFC 1318 Definitions of Managed Objects for Parallel-printer-like Hardware Devices
 
Authors:B. Stewart.
Date:April 1992
Formats:txt json html
Obsoleted by:RFC 1660
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1318
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP based internets. In particular, it defines objects for the management of parallel-printer- like devices. [STANDARDS-TRACK]
 
RFC 1319 The MD2 Message-Digest Algorithm
 
Authors:B. Kaliski.
Date:April 1992
Formats:txt json html
Obsoleted by:RFC 6149
Status:HISTORIC
DOI:10.17487/RFC 1319
This document describes the MD2 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.
 
RFC 1320 The MD4 Message-Digest Algorithm
 
Authors:R. Rivest.
Date:April 1992
Formats:txt json html
Obsoletes:RFC 1186
Obsoleted by:RFC 6150
Status:HISTORIC
DOI:10.17487/RFC 1320
This document describes the MD4 message-digest algorithm [1]. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.
 
RFC 1323 TCP Extensions for High Performance
 
Authors:V. Jacobson, R. Braden, D. Borman.
Date:May 1992
Formats:txt html json
Obsoletes:RFC 1072, RFC 1185
Obsoleted by:RFC 7323
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1323
This memo presents a set of TCP extensions to improve performance over large bandwidth*delay product paths and to provide reliable operation over very high-speed paths. It defines new TCP options for scaled windows and timestamps, which are designed to provide compatible interworking with TCP's that do not implement the extensions. The timestamps are used for two distinct mechanisms:RTTM (Round Trip Time Measurement) and PAWS (Protect Against WrappedSequences). Selective acknowledgments are not included in this memo.

This memo combines and supersedes RFC-1072 and RFC-1185, adding additional clarification and more detailed specification. Appendix C summarizes the changes from the earlier RFCs.

 
RFC 1325 FYI on Questions and Answers Answers to Commonly asked "New Internet User" Questions
 
Authors:G. Malkin, A. Marine.
Date:May 1992
Formats:txt json html
Obsoletes:RFC 1206
Obsoleted by:RFC 1594
Status:INFORMATIONAL
DOI:10.17487/RFC 1325
This FYI RFC is one of two FYI's called, "Questions and Answers"(Q/A), produced by the User Services Working Group of the InternetEngineering Task Force (IETF). The goal is to document the most commonly asked questions and answers in the Internet.
 
RFC 1327 Mapping between X.400(1988) / ISO 10021 and RFC 822
 
Authors:S. Hardcastle-Kille.
Date:May 1992
Formats:txt html json
Obsoletes:RFC 0987, RFC 1026, RFC 1138, RFC 1148
Obsoleted by:RFC 2156
Updates:RFC 0822
Updated by:RFC 1495
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1327
This document describes a set of mappings which will enable interworking between systems operating the CCITT X.400 1988)Recommendations on Message Handling Systems / ISO IEC 10021 MessageOriented Text Interchange Systems (MOTIS) [CCITT/ISO88a], and systems using the RFC 822 mail protocol [Crocker82a] or protocols derived from RFC 822. The approach aims to maximise the services offered across the boundary, whilst not requiring unduly complex mappings.The mappings should not require any changes to end systems. This document is a revision based on RFCs 987, 1026, 1138, and 1148[Kille86a,Kille87a] which it obsoletes.

This document specifies a mapping between two protocols. This specification should be used when this mapping is performed on theDARPA Internet or in the UK Academic Community. This specification may be modified in the light of implementation experience, but no substantial changes are expected.

 
RFC 1331 The Point-to-Point Protocol (PPP) for the Transmission of Multi-protocol Datagrams over Point-to-Point Links
 
Authors:W. Simpson.
Date:May 1992
Formats:txt json html
Obsoletes:RFC 1171, RFC 1172
Obsoleted by:RFC 1548
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1331
The Point-to-Point Protocol (PPP) provides a method for transmitting datagrams over serial point-to-point links. PPP is comprised of three main components:

1. A method for encapsulating datagrams over serial links.

2. A Link Control Protocol (LCP) for establishing, configuring, and testing the data-link connection.

3. A family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols.

This document defines the PPP encapsulation scheme, together with thePPP Link Control Protocol (LCP), an extensible option negotiation protocol which is able to negotiate a rich assortment of configuration parameters and provides additional management functions.

This RFC is a product of the Point-to-Point Protocol Working Group of the Internet Engineering Task Force (IETF). Comments on this memo should be submitted to the ietf-ppp@ucdavis.edu mailing list.

 
RFC 1333 PPP Link Quality Monitoring
 
Authors:W. Simpson.
Date:May 1992
Formats:txt html json
Obsoleted by:RFC 1989
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1333
The Point-to-Point Protocol (PPP) [1] provides a standard method of encapsulating Network Layer protocol information over point-to-point links. PPP also defines an extensible Link Control Protocol, which allows negotiation of a Quality Protocol for continuous monitoring of the viability of the link.

This document defines a protocol for generating Link-Quality-Reports.

This RFC is a product of the Point-to-Point Protocol Working Group of the Internet Engineering Task Force (IETF). Comments on this memo should be submitted to the ietf-ppp@ucdavis.edu mailing list.

 
RFC 1334 PPP Authentication Protocols
 
Authors:B. Lloyd, W. Simpson.
Date:October 1992
Formats:txt json html
Obsoleted by:RFC 1994
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1334
The Point-to-Point Protocol (PPP) [1] provides a standard method of encapsulating Network Layer protocol information over point-to-point links. PPP also defines an extensible Link Control Protocol, which allows negotiation of an Authentication Protocol for authenticating its peer before allowing Network Layer protocols to transmit over the link.

This document defines two protocols for Authentication: the PasswordAuthentication Protocol and the Challenge-Handshake AuthenticationProtocol. This memo is the product of the Point-to-Point ProtocolWorking Group of the Internet Engineering Task Force (IETF).Comments on this memo should be submitted to the ietf-ppp@ucdavis.edu mailing list.

 
RFC 1338 Supernetting: an Address Assignment and Aggregation Strategy
 
Authors:V. Fuller, T. Li, J. Yu, K. Varadhan.
Date:June 1992
Formats:txt json html
Obsoleted by:RFC 1519
Status:INFORMATIONAL
DOI:10.17487/RFC 1338
This memo discusses strategies for address assignment of the existingIP address space with a view to conserve the address space and stem the explosive growth of routing tables in default-route-free routers run by transit routing domain providers.
 
RFC 1340 Assigned Numbers
 
Authors:J. Reynolds, J. Postel.
Date:July 1992
Formats:txt html json
Obsoletes:RFC 1060
Obsoleted by:RFC 1700
Status:HISTORIC
DOI:10.17487/RFC 1340
This Network Working Group Request for Comments documents the currently assigned values from several series of numbers used in network protocol implementations. This memo is a status report on the parameters (i.e., numbers and keywords) used in protocols in the Internet community.
 
RFC 1341 MIME (Multipurpose Internet Mail Extensions): Mechanisms for Specifying and Describing the Format of Internet Message Bodies
 
Authors:N. Borenstein, N. Freed.
Date:June 1992
Formats:txt html pdf json ps
Obsoleted by:RFC 1521
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1341
This document redefines the format of message bodies to allow multi-part textual and non-textual message bodies to be represented and exchanged without loss of information. [STANDARDS-TRACK]
 
RFC 1342 Representation of Non-ASCII Text in Internet Message Headers
 
Authors:K. Moore.
Date:June 1992
Formats:txt json html
Obsoleted by:RFC 1522
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1342
This memo describes an extension to the message format defined in [1](known to the IETF Mail Extensions Working Group as "RFC 1341"), to allow the representation of character sets other than ASCII in RFC822 message headers. The extensions described were designed to be highly compatible with existing Internet mail handling software, and to be easily implemented in mail readers that support RFC 1341.
 
RFC 1348 DNS NSAP RRs
 
Authors:B. Manning.
Date:July 1992
Formats:txt html json
Obsoleted by:RFC 1637
Updates:RFC 1034, RFC 1035
Status:EXPERIMENTAL
DOI:10.17487/RFC 1348
This RFC defines the format of two new Resource Records (RRs) for the Domain Name System (DNS), and reserves corresponding DNS type mnemonic and numerical codes. This memo defines an Experimental Protocol for the Internet community.
 
RFC 1349 Type of Service in the Internet Protocol Suite
 
Authors:P. Almquist.
Date:July 1992
Formats:txt html json
Obsoleted by:RFC 2474
Updates:RFC 1248, RFC 1247, RFC 1195, RFC 1123, RFC 1122, RFC 1060, RFC 0791
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1349
This memo changes and clarifies some aspects of the semantics of the Type of Service octet in the Internet Protocol (IP) header. [STANDARDS-TRACK]
 
RFC 1354 IP Forwarding Table MIB
 
Authors:F. Baker.
Date:July 1992
Formats:txt html json
Obsoleted by:RFC 2096
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1354
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.In particular, it defines objects for managing routes in the IPInternet.

It is proposed that the ipRouteTable defined by MIB-II (RFC 1213) be deprecated and replaced with this table. This adds the ability to set or display multi-path routes, and varying routes by network management policy.

 
RFC 1357 A Format for E-mailing Bibliographic Records
 
Authors:D. Cohen.
Date:July 1992
Formats:txt json html
Obsoleted by:RFC 1807
Status:INFORMATIONAL
DOI:10.17487/RFC 1357
This memo defines a format for E-mailing bibliographic records of technical reports. It is intended to accelerate the dissemination of information about new Computer Science Technical Reports (CS-TR).
 
RFC 1358 Charter of the Internet Architecture Board (IAB)
 
Authors:L. Chapin.
Date:August 1992
Formats:txt html json
Obsoleted by:RFC 1601
Status:INFORMATIONAL
DOI:10.17487/RFC 1358
The Internet Architecture Board (IAB) shall be constituted and shall operate as a technical advisory group of the Internet Society. This memo provides information for the Internet community. It does not specify an Internet standard.
 
RFC 1360 IAB Official Protocol Standards
 
Authors:J. Postel.
Date:September 1992
Formats:txt html json
Obsoletes:RFC 1280
Obsoleted by:RFC 1410
Status:HISTORIC
DOI:10.17487/RFC 1360
 
 
RFC 1361 Simple Network Time Protocol (SNTP)
 
Authors:D. Mills.
Date:August 1992
Formats:txt html json
Obsoleted by:RFC 1769
Also:RFC 1305
Status:INFORMATIONAL
DOI:10.17487/RFC 1361
This memorandum describes the Simple Network Time Protocol (SNTP), which is an adaptation of the Network Time Protocol (NTP) used to synchronize computer clocks in the Internet. SNTP can be used when the ultimate performance of the full NTP implementation described inRFC-1305 is not needed or justified. It involves no change to the current or previous NTP specification versions or known implementations, but rather a clarification of certain design features of NTP which allow operation in a simple, stateless RPC mode with accuracy and reliability expectations similar to the UDP/TIME protocol described in RFC-868.

This memorandum does not obsolete or update any RFC. A working knowledge of RFC-1305 is not required for an implementation of SNTP.

 
RFC 1362 Novell IPX over Various WAN Media (IPXWAN)
 
Authors:M. Allen.
Date:September 1992
Formats:txt json html
Obsoleted by:RFC 1634
Status:INFORMATIONAL
DOI:10.17487/RFC 1362
This document describes how Novell IPX operates over various WAN media. Specifically, it describes the common "IPX WAN" protocolNovell uses to exchange necessary router to router information prior to exchanging standard IPX routing information and traffic over WAN datalinks.
 
RFC 1364 BGP OSPF Interaction
 
Authors:K. Varadhan.
Date:September 1992
Formats:txt html json
Obsoleted by:RFC 1403
Also:RFC 1247, RFC 1267
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1364
This memo defines the various criteria to be used when designingAutonomous System Border Routers (ASBR) that will run BGP with otherASBRs external to the AS and OSPF as its IGP.
 
RFC 1366 Guidelines for Management of IP Address Space
 
Authors:E. Gerich.
Date:October 1992
Formats:txt json html
Obsoleted by:RFC 1466
Status:INFORMATIONAL
DOI:10.17487/RFC 1366
This document has been reviewed by the Federal Engineering Task Force(FEPG) on behalf of the Federal Networking Council (FNC), the co- chairs of the International Engineering Planning Group (IEPG), and the Reseaux IP Europeens (RIPE). There was general consensus by those groups to support the recommendations proposed in this document for management of the IP address space.
 
RFC 1367 Schedule for IP Address Space Management Guidelines
 
Authors:C. Topolcic.
Date:October 1992
Formats:txt json html
Obsoleted by:RFC 1467
Status:INFORMATIONAL
DOI:10.17487/RFC 1367
This memo suggests a schedule for the implementation of the IP network number allocation plan described in RFC 1366. This memo provides information for the Internet community. It does not specify an Internet standard.
 
RFC 1368 Definition of Managed Objects for IEEE 802.3 Repeater Devices
 
Authors:D. McMaster, K. McCloghrie.
Date:October 1992
Formats:txt html json
Obsoleted by:RFC 1516
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1368
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.In particular, it defines objects for managing IEEE 802.3 10Mb/second baseband repeaters, sometimes referred to as "hubs."
 
RFC 1374 IP and ARP on HIPPI
 
Authors:J. Renwick, A. Nicholson.
Date:October 1992
Formats:txt html json
Obsoleted by:RFC 2834
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1374
The ANSI X3T9.3 committee has drafted a proposal for the encapsulation of IEEE 802.2 LLC PDUs and, by implication, IP onHIPPI. Another X3T9.3 draft describes the operation of HIPPI physical switches. X3T9.3 chose to leave HIPPI networking issues largely outside the scope of their standards; this document discusses methods of using of ANSI standard HIPPI hardware and protocols in the context of the Internet, including the use of HIPPI switches as LANs and interoperation with other networks.
 
RFC 1376 The PPP DECnet Phase IV Control Protocol (DNCP)
 
Authors:S. Senum.
Date:November 1992
Formats:txt json html
Obsoleted by:RFC 1762
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1376
The Point-to-Point Protocol (PPP) [1] provides a standard method of encapsulating Network Layer protocol information over point-to-point links. PPP also defines an extensible Link Control Protocol, and proposes a family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols.

This document defines the NCP for establishing and configuringDigital's DNA Phase IV Routing protocol (DECnet Phase IV) over PPP.This document applies only to DNA Phase IV Routing messages (both data and control), and not to other DNA Phase IV protocols (MOP, LAT, etc.).

 
RFC 1379 Extending TCP for Transactions -- Concepts
 
Authors:R. Braden.
Date:November 1992
Formats:txt html json
Obsoleted by:RFC 6247
Updated by:RFC 1644
Status:HISTORIC
DOI:10.17487/RFC 1379
This memo discusses extension of TCP to provide transaction-oriented service, without altering its virtual-circuit operation. This extension would fill the large gap between connection-oriented TCP and datagram-based UDP, allowing TCP to efficiently perform many applications for which UDP is currently used. A separate memo contains a detailed functional specification for this proposed extension.

This work was supported in part by the National Science Foundation under Grant Number NCR-8922231.

 
RFC 1384 Naming Guidelines for Directory Pilots
 
Authors:P. Barker, S.E. Hardcastle-Kille.
Date:January 1993
Formats:txt ps html pdf json
Obsoleted by:RFC 1617, RTR_0011
Status:INFORMATIONAL
DOI:10.17487/RFC 1384
Deployment of a Directory will benefit from following certain guidelines. This document defines a number of naming guidelines.Alignment to these guidelines is recommended for directory pilots.
 
RFC 1385 EIP: The Extended Internet Protocol
 
Authors:Z. Wang.
Date:November 1992
Formats:txt html json
Obsoleted by:RFC 6814
Status:HISTORIC
DOI:10.17487/RFC 1385
EIP can substantially reduce the amount of modifications needed to the current Internet systems and greatly ease the difficulties of transition. This is an "idea" paper and discussion is strongly encouraged on Big-Internet@munnari.oz.au. This memo provides information for the Internet community. It does not specify an Internet standard.
 
RFC 1386 The US Domain
 
Authors:A. Cooper, J. Postel.
Date:December 1992
Formats:txt json html
Obsoleted by:RFC 1480
Status:INFORMATIONAL
DOI:10.17487/RFC 1386
This is a description of the US Top Level Domains on the Internet. This memo provides information for the Internet community. It does not specify an Internet standard.
 
RFC 1387 RIP Version 2 Protocol Analysis
 
Authors:G. Malkin.
Date:January 1993
Formats:txt json html
Obsoleted by:RFC 1721
Status:INFORMATIONAL
DOI:10.17487/RFC 1387
As required by Routing Protocol Criteria (RFC 1264), this report documents the key features of the RIP-2 protocol and the current implementation experience.
 
RFC 1388 RIP Version 2 Carrying Additional Information
 
Authors:G. Malkin.
Date:January 1993
Formats:txt html json
Obsoleted by:RFC 1723
Updates:RFC 1058
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1388
This document specifies an extension of the Routing InformationProtocol (RIP), as defined in [1], to expand the amount of useful information carried in RIP packets and to add a measure of security.A companion document will define the SNMP MIB objects for RIP-2 [2].
 
RFC 1389 RIP Version 2 MIB Extensions
 
Authors:G. Malkin, F. Baker.
Date:January 1993
Formats:txt html json
Obsoleted by:RFC 1724
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1389
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.In particular, it defines objects for managing RIP Version 2.
 
RFC 1391 The Tao of the IETF: A Guide for New Attendees of the Internet Engineering Task Force
 
Authors:G. Malkin.
Date:January 1993
Formats:txt html json
Obsoleted by:RFC 1539
Status:INFORMATIONAL
DOI:10.17487/RFC 1391
Over the last two years, the attendance at Internet Engineering TaskForce (IETF) Plenary meetings has grown phenomenally. Approximately38% of the attendees are new to the IETF at each meeting. About 33% of those go on to become regular attendees. When the meetings were smaller, it wasn't very difficult for a newcomer to get to know people and get into the swing of things. Today, however, a newcomer meets many more new people, some previously known only as the authors of Request For Comments (RFC) documents or thought provoking email messages.

The purpose of this For Your Information (FYI) RFC is to explain to the newcomers how the IETF works. This will give them a warm, fuzzy feeling and enable them to make the meeting more productive for everyone. This FYI will also provide the mundane bits of information which everyone who attends an IETF meeting should know.

 
RFC 1392 Internet Users' Glossary
 
Authors:G. Malkin, T. LaQuey Parker.
Date:January 1993
Formats:txt json html
Obsoleted by:RFC 1983
Status:INFORMATIONAL
DOI:10.17487/RFC 1392
There are many networking glossaries in existence. This glossary concentrates on terms which are specific to the Internet. Naturally, there are entries for some basic terms and acronyms because other entries refer to them.
 
RFC 1393 Traceroute Using an IP Option
 
Authors:G. Malkin.
Date:January 1993
Formats:txt json html
Obsoleted by:RFC 6814
Status:HISTORIC
DOI:10.17487/RFC 1393
Traceroute serves as a valuable network debugging tool. The way in which it is currently implemented has the advantage of being automatically supported by all of the routers. It's two problems are the number of packets it generates and the amount of time it takes to run.

This document specifies a new IP option and ICMP message type which duplicates the functionality of the existing traceroute method while generating fewer packets and completing in a shorter time.

 
RFC 1395 BOOTP Vendor Information Extensions
 
Authors:J. Reynolds.
Date:January 1993
Formats:txt html json
Obsoletes:RFC 1084, RFC 1048
Obsoleted by:RFC 1497, RFC 1533
Updates:RFC 0951
Status:DRAFT STANDARD
DOI:10.17487/RFC 1395
This RFC is a slight revision and extension of RFC-1048 by Philip Prindeville, who should be credited with the original work in this memo. This memo will be updated as additional tags are defined. This edition introduces Tag 14 for Merit Dump File, Tag 15 for Domain Name, Tag 16 for Swap Server and Tag 17 for Root Path. This memo is a status report on the vendor information extensions used int the Bootstrap Protocol (BOOTP).
 
RFC 1398 Definitions of Managed Objects for the Ethernet-Like Interface Types
 
Authors:F. Kastenholz.
Date:January 1993
Formats:txt html json
Obsoletes:RFC 1284
Obsoleted by:RFC 1623
Status:DRAFT STANDARD
DOI:10.17487/RFC 1398
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.In particular, it defines objects for managing ethernet-like objects.
 
RFC 1404 A Model for Common Operational Statistics
 
Authors:B. Stockman.
Date:January 1993
Formats:txt html json
Obsoleted by:RFC 1857
Status:INFORMATIONAL
DOI:10.17487/RFC 1404
This memo describes a model for operational statistics in theInternet. It gives recommendations for metrics, measurements, polling periods, storage formats and presentation formats.
 
RFC 1405 Mapping between X.400(1984/1988) and Mail-11 (DECnet mail)
 
Authors:C. Allocchio.
Date:January 1993
Formats:txt html json
Obsoleted by:RFC 2162
Status:EXPERIMENTAL
DOI:10.17487/RFC 1405
This document describes a set of mappings which will enable inter working between systems operating the CCITT X.400 ( 1984 / 1988 )Recommendations on Message Handling Systems, and systems running theMail-11 (also known as DECnet mail) protocol. The specifications are valid within DECnet Phase IV addressing and routing scheme.

The complete scenario of X.400 / RFC822 / Mail-11 is also considered, in order to cover the possible complex cases arising in multiple gateway translations.

This document covers mainly the O/R address to DECnet from/to address mapping (and vice versa); other mappings are based on RFC 1327 and its eventual future updates.

This is a combined effort of COSINE S2.2, the RARE MSG Working Group, and the IETF X.400 Ops Working Group.

 
RFC 1406 Definitions of Managed Objects for the DS1 and E1 Interface Types
 
Authors:F. Baker, Ed., J. Watt, Ed..
Date:January 1993
Formats:txt json html
Obsoletes:RFC 1232
Obsoleted by:RFC 2495
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1406
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.In particular, it defines objects for managing DS1 Interfaces -- including both T1 and E1 (a.k.a., CEPT 2 Mbit/s) links.

This document entirely replaces RFC 1232, which contains a fundamental error: many objects are encoded as Counters that must be encoded as INTEGERs or Gauges. The magnitude of the change required is sufficient that virtually every object changed. Therefore, theMIB documented in RFC 1232 should not be implemented.

 
RFC 1407 Definitions of Managed Objects for the DS3/E3 Interface Type
 
Authors:T. Cox, K. Tesink.
Date:January 1993
Formats:txt json html
Obsoletes:RFC 1233
Obsoleted by:RFC 2496
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1407
This memo defines an extension to the Management Information Base(MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing DS3 and E3Interfaces. This document is a companion document with Definitions of Managed Objects for the DS1 Interface Type.

This document entirely replaces RFC 1233, which contains a fundamental error: many objects are encoded as Counters that must be encoded as INTEGERs or Gauges. The magnitude of the change required is sufficient that virtually every object changed. Therefore, theMIB documented in RFC 1233 should not be implemented.

 
RFC 1409 Telnet Authentication Option
 
Authors:D. Borman, Ed..
Date:January 1993
Formats:txt html json
Obsoleted by:RFC 1416
Status:EXPERIMENTAL
DOI:10.17487/RFC 1409
This memo defines an Experimental Protocol for the Internet community.
 
RFC 1410 IAB Official Protocol Standards
 
Authors:J. Postel, Ed..
Date:March 1993
Formats:txt html json
Obsoletes:RFC 1360
Obsoleted by:RFC 1500
Status:HISTORIC
DOI:10.17487/RFC 1410
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Architecture Board (IAB).
 
RFC 1416 Telnet Authentication Option
 
Authors:D. Borman, Ed..
Date:February 1993
Formats:txt json html
Obsoletes:RFC 1409
Obsoleted by:RFC 2941
Status:EXPERIMENTAL
DOI:10.17487/RFC 1416
This RFC 1416 replaces RFC 1409, which has an important typographical error in the example on page 6 (one occurance of "REPLY" should be "IS"). This memo defines an Experimental Protocol for the Internet community.
 
RFC 1417 NADF Standing Documents: A Brief Overview
 
Authors:The North American Directory Forum.
Date:February 1993
Formats:txt json html
Obsoletes:RFC 1295, RFC 1255, RFC 1218
Obsoleted by:RFC 1758
Status:INFORMATIONAL
DOI:10.17487/RFC 1417
The purpose of this document is to provide a brief overview of the NADF's Standing Document series. This memo provides information for the Internet community. It does not specify an Internet standard.
 
RFC 1425 SMTP Service Extensions
 
Authors:J. Klensin, N. Freed, Ed., M. Rose, E. Stefferud, D. Crocker.
Date:February 1993
Formats:txt html json
Obsoleted by:RFC 1651
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1425
This memo defines a framework for extending the SMTP service by defining a means whereby a server SMTP can inform a client SMTP as to the service extensions it supports. [STANDARDS-TRACK]
 
RFC 1426 SMTP Service Extension for 8bit-MIMEtransport
 
Authors:J. Klensin, N. Freed, Ed., M. Rose, E. Stefferud, D. Crocker.
Date:February 1993
Formats:txt json html
Obsoleted by:RFC 1652
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1426
This memo defines an extension to the SMTP service whereby an SMTP content body containing octets outside of the US ASCII octet range (hex
 
RFC 1427 SMTP Service Extension for Message Size Declaration
 
Authors:J. Klensin, N. Freed, Ed., K. Moore.
Date:February 1993
Formats:txt json html
Obsoleted by:RFC 1653
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1427
This memo defines an extension to the SMTP service whereby an SMTP client and server may interact to give the server an opportunity to decline to accept a message (perhaps temporarily) based on the client's estimate of the message size. [STANDARDS-TRACK]
 
RFC 1434 Data Link Switching: Switch-to-Switch Protocol
 
Authors:R. Dixon, D. Kushi.
Date:March 1993
Formats:txt ps html json pdf
Obsoleted by:RFC 1795
Status:INFORMATIONAL
DOI:10.17487/RFC 1434
This RFC describes IBM's support of Data Link Switching over TCP/IP.The RFC is being distributed to members of the Internet community in order to solicit their reactions to the proposals contained in it.While the issues discussed may not be directly relevant to the research problems of the Internet, they may be interesting to a number of researchers and implementors.

Any questions or comments relative to the contents of this RFC should be sent to the following Internet address: dlsw@ralvma.vnet.ibm.com.

 
RFC 1442 Structure of Management Information for version 2 of the Simple Network Management Protocol (SNMPv2)
 
Authors:J. Case, K. McCloghrie, M. Rose, S. Waldbusser.
Date:April 1993
Formats:txt html json
Obsoleted by:RFC 1902
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1442
Management information is viewed as a collection of managed objects, residing in a virtual information store, termed the Management Information Base (MIB). Collections of related objects are defined in MIB modules. These modules are written using a subset of OSI's Abstract Syntax Notation One (ASN.1) [1]. It is the purpose of this document, the Structure of Management Information (SMI), to define that subset. [STANDARDS-TRACK]
 
RFC 1443 Textual Conventions for version 2 of the Simple Network Management Protocol (SNMPv2)
 
Authors:J. Case, K. McCloghrie, M. Rose, S. Waldbusser.
Date:April 1993
Formats:txt html json
Obsoleted by:RFC 1903
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1443
It is the purpose of this document to define the initial set of textual conventions available to all MIB modules. [STANDARDS-TRACK]
 
RFC 1444 Conformance Statements for version 2 of the Simple Network Management Protocol (SNMPv2)
 
Authors:J. Case, K. McCloghrie, M. Rose, S. Waldbusser.
Date:April 1993
Formats:txt json html
Obsoleted by:RFC 1904
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1444
It may be useful to define the acceptable lower-bounds of implementation, along with the actual level of implementation achieved. It is the purpose of this document to define the notation used for these purposes. [STANDARDS-TRACK]
 
RFC 1448 Protocol Operations for version 2 of the Simple Network Management Protocol (SNMPv2)
 
Authors:J. Case, K. McCloghrie, M. Rose, S. Waldbusser.
Date:April 1993
Formats:txt json html
Obsoleted by:RFC 1905
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1448
It is the purpose of this document, Protocol Operations for SNMPv2, to define the operations of the protocol with respect to the sending and receiving of the PDUs. [STANDARDS-TRACK]
 
RFC 1449 Transport Mappings for version 2 of the Simple Network Management Protocol (SNMPv2)
 
Authors:J. Case, K. McCloghrie, M. Rose, S. Waldbusser.
Date:April 1993
Formats:txt json html
Obsoleted by:RFC 1906
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1449
It is the purpose of this document to define how the SNMPv2 maps onto an initial set of transport domains. [STANDARDS-TRACK]
 
RFC 1450 Management Information Base for version 2 of the Simple Network Management Protocol (SNMPv2)
 
Authors:J. Case, K. McCloghrie, M. Rose, S. Waldbusser.
Date:April 1993
Formats:txt json html
Obsoleted by:RFC 1907
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1450
It is the purpose of this document to define managed objects which describe the behavior of a SNMPv2 entity. [STANDARDS-TRACK]
 
RFC 1452 Coexistence between version 1 and version 2 of the Internet-standard Network Management Framework
 
Authors:J. Case, K. McCloghrie, M. Rose, S. Waldbusser.
Date:April 1993
Formats:txt html json
Obsoleted by:RFC 1908
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1452
The purpose of this document is to describe coexistence between version 2 of the Internet-standard Network Management Framework, termed the SNMP version 2 framework (SNMPv2) [1], and the original Internet-standard Network Management Framework (SNMPv1). [STANDARDS-TRACK]
 
RFC 1455 Physical Link Security Type of Service
 
Authors:D. Eastlake 3rd.
Date:May 1993
Formats:txt json html
Obsoleted by:RFC 2474
Status:EXPERIMENTAL
DOI:10.17487/RFC 1455
This RFC documents an experimental protocol providing a Type ofService (TOS) to request maximum physical link security. This is an addition to the types of service enumerated in RFC 1349: Type ofService in the Internet Protocol Suite. The new TOS requests the network to provide what protection it can against surreptitious observation by outside agents of traffic so labeled. The purpose is protection against traffic analysis and as an additional possible level of data confidentiality. This TOS is consistent with all other defined types of service for IP version 4 in that it is based on link level characteristics and will not provide any particular guaranteed level of service.
 
RFC 1460 Post Office Protocol - Version 3
 
Authors:M. Rose.
Date:June 1993
Formats:txt json html
Obsoletes:RFC 1225
Obsoleted by:RFC 1725
Status:DRAFT STANDARD
DOI:10.17487/RFC 1460
This memo is a revision to RFC 1225, a Draft Standard. [STANDARDS- TRACK]
 
RFC 1466 Guidelines for Management of IP Address Space
 
Authors:E. Gerich.
Date:May 1993
Formats:txt html json
Obsoletes:RFC 1366
Obsoleted by:RFC 2050
Status:INFORMATIONAL
DOI:10.17487/RFC 1466
This document has been reviewed by the Federal Engineering PlanningGroup (FEPG) on behalf of the Federal Networking Council (FNC), the co-chairs of the Intercontinental Engineering Planning Group (IEPG), and the Reseaux IP Europeens (RIPE). There was general consensus by those groups to support the recommendations proposed in this document for management of the IP address space.
 
RFC 1475 TP/IX: The Next Internet
 
Authors:R. Ullmann.
Date:June 1993
Formats:txt json html
Obsoleted by:RFC 6814
Status:HISTORIC
DOI:10.17487/RFC 1475
The first version of this memo, describing a possible next generation of Internet protocols, was written by the present author in the summer and fall of 1989, and circulated informally, including to theIESG, in December 1989. A further informal note on the addressing, called "Toasternet Part II", was circulated on the IETF mail list during March of 1992.
 
RFC 1483 Multiprotocol Encapsulation over ATM Adaptation Layer 5
 
Authors:J. Heinanen.
Date:July 1993
Formats:txt html json
Obsoleted by:RFC 2684
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1483
This memo describes two encapsulations methods for carrying network interconnect traffic over ATM AAL5. The first method allows multiplexing of multiple protocols over a single ATM virtual circuit whereas the second method assumes that each protocol is carried over a separate ATM virtual circuit.
 
RFC 1484 Using the OSI Directory to achieve User Friendly Naming (OSI-DS 24 (v1.2))
 
Authors:S. Hardcastle-Kille.
Date:July 1993
Formats:txt json html
Obsoleted by:RFC 1781, RFC 3494
Status:HISTORIC
DOI:10.17487/RFC 1484
The OSI Directory has user friendly naming as a goal. A simple minded usage of the directory does not achieve this. Two aspects not achieved are: o A user oriented notation o Guessability

This proposal sets out some conventions for representing names in a friendly manner, and shows how this can be used to achieve really friendly naming. This then leads to a specification of a format for representing names, and to procedures to resolve them. This leads to a specification which allows directory names to be communicated between humans. The format in this specification is identical to that defined in [HK93], and it is intended that these specifications are compatible. Please send comments to the author or to the discussion group: <osi-ds@CS.UCL.AC.UK&rt;.

 
RFC 1485 A String Representation of Distinguished Names (OSI-DS 23 (v5))
 
Authors:S. Hardcastle-Kille.
Date:July 1993
Formats:txt json html
Obsoleted by:RFC 1779, RFC 3494
Status:HISTORIC
DOI:10.17487/RFC 1485
The OSI Directory uses distinguished names as the primary keys to entries in the directory. Distinguished Names are encoded in ASN.1.When a distinguished name is communicated between to users not using a directory protocol (e.g., in a mail message), there is a need to have a user-oriented string representation of distinguished name. This specification defines a string format for representing names, which is designed to give a clean representation of commonly used names, whilst being able to represent any distinguished name. Please send comments to the author or to the discussion group <osi-ds@CS.UCL.AC.UK&rt;.
 
RFC 1486 An Experiment in Remote Printing
 
Authors:M. Rose, C. Malamud.
Date:July 1993
Formats:txt html json
Obsoleted by:RFC 1528, RFC 1529
Status:EXPERIMENTAL
DOI:10.17487/RFC 1486
This memo describes a technique for "remote printing" using the Internet mail infrastructure. In particular, this memo focuses on the case in which remote printers are connected to the international telephone network. This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard.
 
RFC 1487 X.500 Lightweight Directory Access Protocol
 
Authors:W. Yeong, T. Howes, S. Kille.
Date:July 1993
Formats:txt html json
Obsoleted by:RFC 1777, RFC 3494
Status:HISTORIC
DOI:10.17487/RFC 1487
The protocol described in this document is designed to provide access to the Directory while not incurring the resource requirements of theDirectory Access Protocol (DAP). This protocol is specifically targeted at simple management applications and browser applications that provide simple read/write interactive access to the Directory, and is intended to be a complement to the DAP itself.

Key aspects of LDAP are:

- Protocol elements are carried directly over TCP or other transport, bypassing much of the session/presentation overhead.

- Many protocol data elements are encoding as ordinary strings (e.g.,Distinguished Names).

- A lightweight BER encoding is used to encode all protocol elements.

 
RFC 1488 The X.500 String Representation of Standard Attribute Syntaxes
 
Authors:T. Howes, S. Kille, W. Yeong, C. Robbins.
Date:July 1993
Formats:txt json html
Obsoleted by:RFC 1778
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1488
The Lightweight Directory Access Protocol (LDAP) [9] requires that the contents of AttributeValue fields in protocol elements be octet strings. This document defines the requirements that must be satisfied by encoding rules used to render Directory attribute syntaxes into a form suitable for use in the LDAP, then goes on to define the encoding rules for the standard set of attribute syntaxes defined in [1,2] and [3].
 
RFC 1490 Multiprotocol Interconnect over Frame Relay
 
Authors:T. Bradley, C. Brown, A. Malis.
Date:July 1993
Formats:txt json html
Obsoletes:RFC 1294
Obsoleted by:RFC 2427
Status:DRAFT STANDARD
DOI:10.17487/RFC 1490
This memo describes an encapsulation method for carrying network interconnect traffic over a Frame Relay backbone. It covers aspects of both Bridging and Routing. Additionally, it describes a simple fragmentation procedure for carrying large frames over a frame relay network with a smaller MTU.

Systems with the ability to transfer both the encapsulation method described in this document, and others must have a priori knowledge of which virtual circuits will carry which encapsulation method and this encapsulation must only be used over virtual circuits that have been explicitly configured for its use.

 
RFC 1493 Definitions of Managed Objects for Bridges
 
Authors:E. Decker, P. Langille, A. Rijsinghani, K. McCloghrie.
Date:July 1993
Formats:txt html json
Obsoletes:RFC 1286
Obsoleted by:RFC 4188
Status:DRAFT STANDARD
DOI:10.17487/RFC 1493
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP based internets.In particular it defines objects for managing MAC bridges based on the IEEE 802.1D-1990 standard between Local Area Network (LAN) segments. Provisions are made for support of transparent bridging.Provisions are also made so that these objects apply to bridges connected by subnetworks other than LAN segments.
 
RFC 1495 Mapping between X.400 and RFC-822 Message Bodies
 
Authors:H. Alvestrand, S. Kille, R. Miles, M. Rose, S. Thompson.
Date:August 1993
Formats:txt json html
Obsoleted by:RFC 2156
Updates:RFC 1327
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1495
Since the introduction of X.400(84), there has been work ongoing for defining mappings between MHS and RFC-822. The most recent work in this area is RFC-1327 [3], which focuses primarily on translation of envelope and headers. This document is complimentary to RFC-1327 as it focuses on translation of the message body. [STANDARDS-TRACK]
 
RFC 1497 BOOTP Vendor Information Extensions
 
Authors:J. Reynolds.
Date:August 1993
Formats:txt html json
Obsoletes:RFC 1395, RFC 1084, RFC 1048
Obsoleted by:RFC 1533
Updates:RFC 0951
Status:DRAFT STANDARD
DOI:10.17487/RFC 1497
This RFC is a slight revision and extension of RFC-1048 by Philip Prindeville, who should be credited with the original work in this memo. This memo is a status report on the vendor information extensions used in the Bootstrap Protocol (BOOTP).
 
RFC 1500 Internet Official Protocol Standards
 
Authors:J. Postel.
Date:August 1993
Formats:txt json html
Obsoletes:RFC 1410
Obsoleted by:RFC 1540
Status:HISTORIC
DOI:10.17487/RFC 1500
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Activities Board (IAB). [STANDARDS-TRACK]
 
RFC 1508 Generic Security Service Application Program Interface
 
Authors:J. Linn.
Date:September 1993
Formats:txt json html
Obsoleted by:RFC 2078
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1508
This Generic Security Service Application Program Interface (GSS-API) definition provides security services to callers in a generic fashion, supportable with a range of underlying mechanisms and technologies and hence allowing source-level portability of applications to different environments. This specification definesGSS-API services and primitives at a level independent of underlying mechanism and programming language environment, and is to be complemented by other, related specifications: documents defining specific parameter bindings for particular language environments documents defining token formats, protocols, and procedures to be implemented in order to realize GSS-API services atop particular security mechanisms
 
RFC 1509 Generic Security Service API : C-bindings
 
Authors:J. Wray.
Date:September 1993
Formats:txt json html
Obsoleted by:RFC 2744
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1509
This document specifies C language bindings for the Generic SecurityService Application Program Interface (GSS-API), which is described at a language-independent conceptual level in other documents.

The Generic Security Service Application Programming Interface (GSS-API) provides security services to its callers, and is intended for implementation atop alternative underlying cryptographic mechanisms.Typically, GSS-API callers will be application protocols into which security enhancements are integrated through invocation of services provided by the GSS-API. The GSS-API allows a caller application to authenticate a principal identity associated with a peer application, to delegate rights to a peer, and to apply security services such as confidentiality and integrity on a per-message basis.

 
RFC 1510 The Kerberos Network Authentication Service (V5)
 
Authors:J. Kohl, C. Neuman.
Date:September 1993
Formats:txt json html
Obsoleted by:RFC 4120, RFC 6649
Status:HISTORIC
DOI:10.17487/RFC 1510
This document gives an overview and specification of Version 5 of the protocol for the Kerberos network authentication system. Version 4, described elsewhere [1,2], is presently in production use at MIT'sProject Athena, and at other Internet sites.
 
RFC 1514 Host Resources MIB
 
Authors:P. Grillo, S. Waldbusser.
Date:September 1993
Formats:txt json html
Obsoleted by:RFC 2790
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1514
This memo defines a MIB for use with managing host systems. The term"host" is construed to mean any computer that communicates with other similar computers attached to the internet and that is directly used by one or more human beings. Although this MIB does not necessarily apply to devices whose primary function is communications services(e.g., terminal servers, routers, bridges, monitoring equipment), such relevance is not explicitly precluded. This MIB instruments attributes common to all internet hosts including, for example, both personal computers and systems that run variants of Unix.
 
RFC 1515 Definitions of Managed Objects for IEEE 802.3 Medium Attachment Units (MAUs)
 
Authors:D. McMaster, K. McCloghrie, S. Roberts.
Date:September 1993
Formats:txt json html
Obsoleted by:RFC 3636
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1515
This document defines a portion of the Management Information Base(MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing IEEE 802.3Medium Attachment Units (MAUs).
 
RFC 1516 Definitions of Managed Objects for IEEE 802.3 Repeater Devices
 
Authors:D. McMaster, K. McCloghrie.
Date:September 1993
Formats:txt html json
Obsoletes:RFC 1368
Obsoleted by:RFC 2108
Status:DRAFT STANDARD
DOI:10.17487/RFC 1516
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it defines objects for managing IEEE 802.3 10Mb/second baseband repeaters, sometimes referred to as "hubs."
 
RFC 1519 Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy
 
Authors:V. Fuller, T. Li, J. Yu, K. Varadhan.
Date:September 1993
Formats:txt json html
Obsoletes:RFC 1338
Obsoleted by:RFC 4632
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1519
This memo discusses strategies for address assignment of the existingIP address space with a view to conserve the address space and stem the explosive growth of routing tables in default-route-free routers.
 
RFC 1521 MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies
 
Authors:N. Borenstein, N. Freed.
Date:September 1993
Formats:txt pdf ps json html
Obsoletes:RFC 1341
Obsoleted by:RFC 2045, RFC 2046, RFC 2047, RFC 2048, RFC 2049
Updated by:RFC 1590
Status:DRAFT STANDARD
DOI:10.17487/RFC 1521
STD 11, RFC 822 defines a message representation protocol which specifies considerable detail about message headers, but which leaves the message content, or message body, as flat ASCII text. This document redefines the format of message bodies to allow multi-part textual and non-textual message bodies to be represented and exchanged without loss of information. This is based on earlier work documented in RFC 934 and STD 11, RFC 1049, but extends and revises that work. Because RFC 822 said so little about message bodies, this document is largely orthogonal to (rather than a revision of) RFC822.

In particular, this document is designed to provide facilities to include multiple objects in a single message, to represent body text in character sets other than US-ASCII, to represent formatted multi- font text messages, to represent non-textual material such as images and audio fragments, and generally to facilitate later extensions defining new types of Internet mail for use by cooperating mail agents.

This document does NOT extend Internet mail header fields to permit anything other than US-ASCII text data. Such extensions are the subject of a companion document [RFC-1522].

This document is a revision of RFC 1341. Significant differences from RFC 1341 are summarized in Appendix H.

 
RFC 1522 MIME (Multipurpose Internet Mail Extensions) Part Two: Message Header Extensions for Non-ASCII Text
 
Authors:K. Moore.
Date:September 1993
Formats:txt html json
Obsoletes:RFC 1342
Obsoleted by:RFC 2045, RFC 2046, RFC 2047, RFC 2048, RFC 2049
Status:DRAFT STANDARD
DOI:10.17487/RFC 1522
This memo describes an extension to the message format defined in RFC1521 [1], to allow the representation of character sets other thanASCII in RFC 822 (STD 11) message headers. The extensions described were designed to be highly compatible with existing Internet mail handling software, and to be easily implemented in mail readers that support RFC 1521.
 
RFC 1523 The text/enriched MIME Content-type
 
Authors:N. Borenstein.
Date:September 1993
Formats:txt html json
Obsoleted by:RFC 1563, RFC 1896
Status:INFORMATIONAL
DOI:10.17487/RFC 1523
MIME [RFC-1341, RFC-1521] defines a format and general framework for the representation of a wide variety of data types in Internet mail.This document defines one particular type of MIME data, the text/enriched type, a refinement of the "text/richtext" type defined in RFC 1341. The text/enriched MIME type is intended to facilitate the wider interoperation of simple enriched text across a wide variety of hardware and software platforms.
 
RFC 1528 Principles of Operation for the TPC.INT Subdomain: Remote Printing -- Technical Procedures
 
Authors:C. Malamud, M. Rose.
Date:October 1993
Formats:txt json html
Obsoletes:RFC 1486
Obsoleted by:RFC 9121
Status:HISTORIC
DOI:10.17487/RFC 1528
This memo describes a technique for "remote printing" using the Internet mail infrastructure. In particular, this memo focuses on the case in which remote printers are connected to the international telephone network. This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard.
 
RFC 1531 Dynamic Host Configuration Protocol
 
Authors:R. Droms.
Date:October 1993
Formats:txt json html
Obsoleted by:RFC 1541
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1531
The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing configuration information to hosts on a TCP/IP network.DHCP is based on the Bootstrap Protocol (BOOTP) [7], adding the capability of automatic allocation of reusable network addresses and additional configuration options [19]. DHCP captures the behavior ofBOOTP relay agents [7, 23], and DHCP participants can interoperate with BOOTP participants [9].
 
RFC 1532 Clarifications and Extensions for the Bootstrap Protocol
 
Authors:W. Wimer.
Date:October 1993
Formats:txt html json
Obsoleted by:RFC 1542
Updates:RFC 0951
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1532
Some aspects of the BOOTP protocol were rather loosely defined in its original specification. In particular, only a general description was provided for the behavior of "BOOTP relay agents" (originally called BOOTP forwarding agents"). The client behavior description also suffered in certain ways. This memo attempts to clarify and strengthen the specification in these areas.

In addition, new issues have arisen since the original specification was written. This memo also attempts to address some of these.

 
RFC 1533 DHCP Options and BOOTP Vendor Extensions
 
Authors:S. Alexander, R. Droms.
Date:October 1993
Formats:txt html json
Obsoletes:RFC 1497, RFC 1395, RFC 1084, RFC 1048
Obsoleted by:RFC 2132
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1533
The Dynamic Host Configuration Protocol (DHCP) [1] provides a framework for passing configuration information to hosts on a TCP/IP network. Configuration parameters and other control information are carried in tagged data items that are stored in the "options" field of the DHCP message. The data items themselves are also called"options."

This document specifies the current set of DHCP options. This document will be periodically updated as new options are defined.Each superseding document will include the entire current list of valid options.

All of the vendor information extensions defined in RFC 1497 [2] may be used as DHCP options. The definitions given in RFC 1497 are included in this document, which supersedes RFC 1497. All of theDHCP options defined in this document, except for those specific toDHCP as defined in section 9, may be used as BOOTP vendor information extensions.

 
RFC 1537 Common DNS Data File Configuration Errors
 
Authors:P. Beertema.
Date:October 1993
Formats:txt html json
Obsoleted by:RFC 1912
Status:INFORMATIONAL
DOI:10.17487/RFC 1537
This memo describes errors often found in DNS data files. It points out common mistakes system administrators tend to make and why they often go unnoticed for long periods of time.
 
RFC 1539 The Tao of IETF - A Guide for New Attendees of the Internet Engineering Task Force
 
Authors:G. Malkin.
Date:October 1993
Formats:txt json html
Obsoletes:RFC 1391
Obsoleted by:RFC 1718
Status:INFORMATIONAL
DOI:10.17487/RFC 1539
Over the last two years, the attendance at Internet Engineering TaskForce (IETF) Plenary meetings has grown phenomenally. Approximately38% of the attendees are new to the IETF at each meeting. About 33% of those go on to become regular attendees. When the meetings were smaller, it wasn't very difficult for a newcomer to get to know people and get into the swing of things. Today, however, a newcomer meets many more new people, some previously known only as the authors of Request For Comments (RFC) documents or thought provoking email messages.

The purpose of this For Your Information (FYI) RFC is to explain to the newcomers how the IETF works. This will give them a warm, fuzzy feeling and enable them to make the meeting more productive for everyone. This FYI will also provide the mundane bits of information which everyone who attends an IETF meeting should know.

 
RFC 1540 Internet Official Protocol Standards
 
Authors:J. Postel.
Date:October 1993
Formats:txt html json
Obsoletes:RFC 1500
Obsoleted by:RFC 1600
Status:HISTORIC
DOI:10.17487/RFC 1540
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Activities Board (IAB). [STANDARDS-TRACK]
 
RFC 1541 Dynamic Host Configuration Protocol
 
Authors:R. Droms.
Date:October 1993
Formats:txt html json
Obsoletes:RFC 1531
Obsoleted by:RFC 2131
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1541
The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing configuration information to hosts on a TCP/IP network.DHCP is based on the Bootstrap Protocol (BOOTP) [7], adding the capability of automatic allocation of reusable network addresses and additional configuration options [19]. DHCP captures the behavior ofBOOTP relay agents [7, 23], and DHCP participants can interoperate with BOOTP participants [9]. Due to some errors introduced into RFC1531 in the editorial process, this memo is reissued as RFC 1541.
 
RFC 1543 Instructions to RFC Authors
 
Authors:J. Postel.
Date:October 1993
Formats:txt json html
Obsoletes:RFC 1111, RFC 0825
Obsoleted by:RFC 2223
Status:INFORMATIONAL
DOI:10.17487/RFC 1543
This Request for Comments (RFC) provides information about the preparation of RFCs, and certain policies relating to the publication of RFCs. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.
 
RFC 1544 The Content-MD5 Header Field
 
Authors:M. Rose.
Date:November 1993
Formats:txt html json
Obsoleted by:RFC 1864
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1544
This memo specifies an optional header field, Content-MD5, for use with MIME-conformant messages.
 
RFC 1545 FTP Operation Over Big Address Records (FOOBAR)
 
Authors:D. Piscitello.
Date:November 1993
Formats:txt html json
Obsoleted by:RFC 1639
Status:EXPERIMENTAL
DOI:10.17487/RFC 1545
This paper describes a convention for specifying longer addresses in the PORT command.
 
RFC 1548 The Point-to-Point Protocol (PPP)
 
Authors:W. Simpson.
Date:December 1993
Formats:txt html json
Obsoletes:RFC 1331
Obsoleted by:RFC 1661
Updated by:RFC 1570
Status:DRAFT STANDARD
DOI:10.17487/RFC 1548
The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP is comprised of three main components:

1. A method for encapsulating multi-protocol datagrams.

2. A Link Control Protocol (LCP) for establishing, configuring, and testing the data-link connection.

3. A family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols.

This document defines the PPP organization and methodology, and thePPP encapsulation, together with an extensible option negotiation mechanism which is able to negotiate a rich assortment of configuration parameters and provides additional management functions. The PPP Link Control Protocol (LCP) is described in terms of this mechanism.

This document is the product of the Point-to-Point Protocol WorkingGroup of the Internet Engineering Task Force (IETF). Comments should be submitted to the ietf-ppp@ucdavis.edu mailing list.

 
RFC 1549 PPP in HDLC Framing
 
Authors:W. Simpson, Ed..
Date:December 1993
Formats:txt html json
Obsoleted by:RFC 1662
Status:DRAFT STANDARD
DOI:10.17487/RFC 1549
The Point-to-Point Protocol (PPP) [1] provides a standard method for transporting multi-protocol datagrams over point-to-point links.

This document describes the use of HDLC for framing PPP encapsulated packets. This document is the product of the Point-to-Point ProtocolWorking Group of the Internet Engineering Task Force (IETF).Comments should be submitted to the ietf-ppp@ucdavis.edu mailing list.

 
RFC 1551 Novell IPX Over Various WAN Media (IPXWAN)
 
Authors:M. Allen.
Date:December 1993
Formats:txt html json
Obsoleted by:RFC 1634
Status:INFORMATIONAL
DOI:10.17487/RFC 1551
This document describes how Novell IPX operates over various WAN media. Specifically, it describes the common "IPX WAN" protocolNovell uses to exchange necessary router to router information prior to exchanging standard IPX routing information and traffic over WAN datalinks. This document supercedes RFC 1362 and adds capability forUnnumbered RIP links, On-demand statically routed links and client to router connectivity.
 
RFC 1558 A String Representation of LDAP Search Filters
 
Authors:T. Howes.
Date:December 1993
Formats:txt html json
Obsoleted by:RFC 1960
Status:INFORMATIONAL
DOI:10.17487/RFC 1558
The Lightweight Directory Access Protocol (LDAP) [1] defines a network representation of a search filter transmitted to an LDAP server. Some applications may find it useful to have a common way of representing these search filters in a human-readable form. This document defines a human-readable string format for representing LDAP search filters.
 
RFC 1563 The text/enriched MIME Content-type
 
Authors:N. Borenstein.
Date:January 1994
Formats:txt json ps pdf html
Obsoletes:RFC 1523
Obsoleted by:RFC 1896
Status:INFORMATIONAL
DOI:10.17487/RFC 1563
MIME [RFC-1341, RFC-1521] defines a format and general framework for the representation of a wide variety of data types in Internet mail.This document defines one particular type of MIME data, the text/enriched type, a refinement of the "text/richtext" type defined in RFC 1341. The text/enriched MIME type is intended to facilitate the wider interoperation of simple enriched text across a wide variety of hardware and software platforms.
 
RFC 1565 Network Services Monitoring MIB
 
Authors:S. Kille, N. Freed.
Date:January 1994
Formats:txt html json
Obsoleted by:RFC 2248
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1565
This document defines a MIB which contains the elements common to the monitoring of any network service application. This information includes a table of all monitorable network service applications, a count of the associations (connections) to each application, and basic information about the parameters and status of each application-related association. [STANDARDS-TRACK]
 
RFC 1566 Mail Monitoring MIB
 
Authors:S. Kille, N. Freed.
Date:January 1994
Formats:txt json html
Obsoleted by:RFC 2249, RFC 2789
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1566
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, this memo extends the basic Network Services Monitoring MIB to allow monitoring of Message Transfer Agents (MTAs). It may also be used to monitor MTA components within gateways. [STANDARDS-TRACK]
 
RFC 1567 X.500 Directory Monitoring MIB
 
Authors:G. Mansfield, S. Kille.
Date:January 1994
Formats:txt json html
Obsoleted by:RFC 2605
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1567
This document defines a portion of the Management Information Base(MIB). It defines the MIB for monitoring Directory System Agents(DSA), a component of the OSI Directory. This MIB will be used in conjunction with the APPLICATION-MIB for monitoring DSAs.
 
RFC 1568 Simple Network Paging Protocol - Version 1(b)
 
Authors:A. Gwinn.
Date:January 1994
Formats:txt html json
Obsoleted by:RFC 1645
Status:INFORMATIONAL
DOI:10.17487/RFC 1568
This RFC suggests a simple way for delivering both alphanumeric and numeric pages (one-way) to radio paging terminals. Gateways supporting this protocol, as well as SMTP, have been in use for several months in one nationwide paging firm. One other paging firm is in the process of adopting it.

Earlier versions of this specification were reviewed by IESG members and the IETF's "822 Extensions" Working Group. They preferred an alternate strategy, as discussed under "Relationship to Other IETFWork", below.

 
RFC 1569 Principles of Operation for the TPC.INT Subdomain: Radio Paging -- Technical Procedures
 
Authors:M. Rose.
Date:January 1994
Formats:txt html json
Obsoleted by:RFC 1703
Status:INFORMATIONAL
DOI:10.17487/RFC 1569
This memo describes a technique for radio paging using the Internet mail infrastructure. In particular, this memo focuses on the case in which radio pagers are identified via the international telephone network. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.
 
RFC 1573 Evolution of the Interfaces Group of MIB-II
 
Authors:K. McCloghrie, F. Kastenholz.
Date:January 1994
Formats:txt json html
Obsoletes:RFC 1229
Obsoleted by:RFC 2233
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1573
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects used for managing Network Interfaces. [STANARDS-TRACK]
 
RFC 1577 Classical IP and ARP over ATM
 
Authors:M. Laubach.
Date:January 1994
Formats:txt json html
Obsoleted by:RFC 2225
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1577
This memo defines an initial application of classical IP and ARP in an Asynchronous Transfer Mode (ATM) network environment configured as a Logical IP Subnetwork (LIS) as described in Section 3. This memo does not preclude the subsequent development of ATM technology into areas other than a LIS; specifically, as single ATM networks grow to replace many ethernet local LAN segments and as these networks become globally connected, the application of IP and ARP will be treated differently. This memo considers only the application of ATM as a direct replacement for the "wires" and local LAN segments connectingIP end-stations ("members") and routers operating in the "classical"LAN-based paradigm. Issues raised by MAC level bridging and LAN emulation are beyond the scope of this paper.

This memo introduces general ATM technology and nomenclature.Readers are encouraged to review the ATM Forum and ITU-TS (formerlyCCITT) references for more detailed information about ATM implementation agreements and standards.

 
RFC 1578 FYI on Questions and Answers - Answers to Commonly Asked "Primary and Secondary School Internet User" Questions
 
Authors:J. Sellers.
Date:February 1994
Formats:txt html json
Obsoleted by:RFC 1941
Status:INFORMATIONAL
DOI:10.17487/RFC 1578
The goal of this FYI RFC, produced by the Internet School Networking(ISN) group in the User Services Area of the Internet EngineeringTask Force (IETF), is to document the questions most commonly asked about the Internet by those in the primary and secondary school community, and to provide pointers to sources which answer those questions. It is directed at educators, school media specialists, and school administrators who are recently connected to the Internet, who are accessing the Internet via dial-up or another means which is not a direct connection, or who are considering an Internet connection as a resource for their schools.
 
RFC 1583 OSPF Version 2
 
Authors:J. Moy.
Date:March 1994
Formats:txt pdf json ps html
Obsoletes:RFC 1247
Obsoleted by:RFC 2178
Status:DRAFT STANDARD
DOI:10.17487/RFC 1583
This memo documents version 2 of the OSPF protocol. OSPF is a link-state routing protocol. It is designed to be run internal to a single Autonomous System. Each OSPF router maintains an identical database describing the Autonomous System's topology. From this database, a routing table is calculated by constructing a shortest- path tree.

OSPF recalculates routes quickly in the face of topological changes, utilizing a minimum of routing protocol traffic. OSPF provides support for equal-cost multipath. Separate routes can be calculated for each IP Type of Service. An area routing capability is provided, enabling an additional level of routing protection and a reduction in routing protocol traffic. In addition, all OSPF routing protocol exchanges are authenticated.

OSPF Version 2 was originally documented in RFC 1247. The differences between RFC 1247 and this memo are explained in AppendixE. The differences consist of bug fixes and clarifications, and are backward-compatible in nature. Implementations of RFC 1247 and of this memo will interoperate.

Please send comments to ospf@gated.cornell.edu.

 
RFC 1587 The OSPF NSSA Option
 
Authors:R. Coltun, V. Fuller.
Date:March 1994
Formats:txt json html
Obsoleted by:RFC 3101
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1587
This document describes a new optional type of OSPF area, somewhat humorously referred to as a "not-so-stubby" area (or NSSA). NSSAs are similar to the existing OSPF stub area configuration option but have the additional capability of importing AS external routes in a limited fashion. [STANDARDS-TRACK]
 
RFC 1590 Media Type Registration Procedure
 
Authors:J. Postel.
Date:March 1994
Formats:txt html json
Obsoleted by:RFC 2045, RFC 2046, RFC 2047, RFC 2048, RFC 2049
Updates:RFC 1521
Status:INFORMATIONAL
DOI:10.17487/RFC 1590
Several protocols allow the use of data representing different"media" such as text, images, audio, and video, and within such media different encoding styles, such as (in video) jpeg, gif, ief, and tiff. The Multimedia Internet Message Extensions (MIME) protocol [1] defined several initial types of multimedia data objects, and a procedure for registering additional types with the Internet AssignedNumbers Authority (IANA). Several questions have been raised about the requirements and administrative procedure for registering MIME content-type and subtypes, and the use of these Media Types for other applications. This document addresses these issues and specifies a procedure for the registration of new Media Types (content- type/subtypes). It also generalizes the scope of use of these MediaTypes to make it appropriate to use the same registrations and specifications with other applications.
 
RFC 1594 FYI on Questions and Answers - Answers to Commonly asked "New Internet User" Questions
 
Authors:A. Marine, J. Reynolds, G. Malkin.
Date:March 1994
Formats:txt html json
Obsoletes:RFC 1325
Obsoleted by:RFC 2664
Status:INFORMATIONAL
DOI:10.17487/RFC 1594
This FYI RFC is one of two FYI's called, "Questions and Answers"(Q/A), produced by the User Services Working Group of the InternetEngineering Task Force (IETF). The goal is to document the most commonly asked questions and answers in the Internet.
 
RFC 1595 Definitions of Managed Objects for the SONET/SDH Interface Type
 
Authors:T. Brown, K. Tesink.
Date:March 1994
Formats:txt html json
Obsoleted by:RFC 2558
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1595
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.In particular, it defines objects for managing Synchronous OpticalNetwork/Synchronous Digital Hierarchy (SONET/SDH) objects. This document is a companion document with Definitions of Managed Objects for the DS1/E1 and DS3/E3 Interface Types, RFC1406 [14] and RFC1407[13].

This memo specifies a MIB module in a manner that is both compliant to the SNMPv2 SMI, and semantically identical to the peer SNMPv1 definitions.

 
RFC 1596 Definitions of Managed Objects for Frame Relay Service
 
Authors:T. Brown, Ed..
Date:March 1994
Formats:txt json html
Obsoleted by:RFC 1604
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1596
This memo defines an extension to the Management Information Base(MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing the FrameRelay Service.
 
RFC 1597 Address Allocation for Private Internets
 
Authors:Y. Rekhter, B. Moskowitz, D. Karrenberg, G. de Groot.
Date:March 1994
Formats:txt json html
Obsoleted by:RFC 1918
Status:INFORMATIONAL
DOI:10.17487/RFC 1597
This RFC describes methods to preserve IP address space by not allocating globally unique IP addresses to hosts private to an enterprise while still permitting full network layer connectivity between all hosts inside an enterprise as well as between all public hosts of different enterprises. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.
 
RFC 1600 Internet Official Protocol Standards
 
Authors:J. Postel.
Date:March 1994
Formats:txt html json
Obsoletes:RFC 1540
Obsoleted by:RFC 1610
Status:HISTORIC
DOI:10.17487/RFC 1600
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Architecture Board (IAB). [STANDARDS-TRACK]
 
RFC 1601 Charter of the Internet Architecture Board (IAB)
 
Authors:C. Huitema.
Date:March 1994
Formats:txt html json
Obsoletes:RFC 1358
Obsoleted by:RFC 2850
Status:INFORMATIONAL
DOI:10.17487/RFC 1601
This memo documents the composition, selection, roles, and organization of the Internet Architecture Board and its subsidiary organizations.
 
RFC 1602 The Internet Standards Process -- Revision 2
 
Authors:Internet Architecture Board, Internet Engineering Steering Group.
Date:March 1994
Formats:txt json html
Obsoletes:RFC 1310
Obsoleted by:RFC 2026
Updated by:RFC 1871
Status:INFORMATIONAL
DOI:10.17487/RFC 1602
This document is a revision of RFC 1310, which defined the official procedures for creating and documenting Internet Standards.

This revision (revision 2) includes the following major changes:

(a) The new management structure arising from the POISED WorkingGroup is reflected. These changes were agreed to by the IETF plenary and by the IAB and IESG in November 1992 and accepted by the ISOC Board of Trustees at their December 1992 meeting.

(b) Prototype status is added to the non-standards track maturity levels (Section 2.4.1).

(c) The Intellectual Property Rights section is completely revised, in accordance with legal advice. Section 5 of this document replaces Sections 5 and 6 of RFC-1310. The new section 5 has been reviewed by legal counsel to the Internet Society.

(d) An appeals procedure is added (Section 3.6).

(e) The wording of sections 1 and 1.2 has been changed to clarify the relationships that exist between the Internet Society and the IAB, the IESG, the IETF, and the Internet Standards process.

(f) An Appendix B has been added, listing the contact points for theRFC editor, the IANA, the IESG, the IAB and the ISOC. The"future issues" are now listed in Appendix C.

 
RFC 1603 IETF Working Group Guidelines and Procedures
 
Authors:E. Huizer, D. Crocker.
Date:March 1994
Formats:txt json html
Obsoleted by:RFC 2418
Updated by:RFC 1871
Status:INFORMATIONAL
DOI:10.17487/RFC 1603
The Internet Engineering Task Force (IETF) has responsibility for developing and reviewing specifications intended as InternetStandards. IETF activities are organized into working groups (WGs).This document describes the guidelines and procedures for formation and operation of IETF working groups. It describes the formal relationship between IETF participants WG and the InternetEngineering Steering Group (IESG). The basic duties of IETF participants, including WG Chair and IESG Area Directors are defined.
 
RFC 1604 Definitions of Managed Objects for Frame Relay Service
 
Authors:T. Brown, Ed..
Date:March 1994
Formats:txt html json
Obsoletes:RFC 1596
Obsoleted by:RFC 2954
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1604
This memo defines an extension to the Management Information Base(MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing the FrameRelay Service.
 
RFC 1610 Internet Official Protocol Standards
 
Authors:J. Postel.
Date:July 1994
Formats:txt html json
Obsoletes:RFC 1600
Obsoleted by:RFC 1720
Status:HISTORIC
DOI:10.17487/RFC 1610
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Architecture Board (IAB). [STANDARDS-TRACK]
 
RFC 1619 PPP over SONET/SDH
 
Authors:W. Simpson.
Date:May 1994
Formats:txt html json
Obsoleted by:RFC 2615
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1619
The Point-to-Point Protocol (PPP) [1] provides a standard method for transporting multi-protocol datagrams over point-to-point links.This document describes the use of PPP over Synchronous OpticalNetwork (SONET) and Synchronous Digital Heirarchy (SDH) circuits.

This document is the product of the Point-to-Point Protocol WorkingGroup of the Internet Engineering Task Force (IETF). Comments should be submitted to the ietf-ppp@merit.edu mailing list.

 
RFC 1623 Definitions of Managed Objects for the Ethernet-like Interface Types
 
Authors:F. Kastenholz.
Date:May 1994
Formats:txt json html
Obsoletes:RFC 1398
Obsoleted by:RFC 1643
Status:HISTORIC
DOI:10.17487/RFC 1623
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it defines objects for managing ethernet-like objects. [STANDARDS-TRACK]
 
RFC 1626 Default IP MTU for use over ATM AAL5
 
Authors:R. Atkinson.
Date:May 1994
Formats:txt json html
Obsoleted by:RFC 2225
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1626
There are a number of good reasons to have a reasonably large default MTU value for IP over ATM AAL5. This paper presents the default IP MIU for use over ATM AAL5. [STANDARDS-TRACK]
 
RFC 1627 Network 10 Considered Harmful (Some Practices Shouldn't be Codified)
 
Authors:E. Lear, E. Fair, D. Crocker, T. Kessler.
Date:July 1994
Formats:txt json html
Obsoleted by:RFC 1918
Status:INFORMATIONAL
DOI:10.17487/RFC 1627
This document restates the arguments for maintaining a unique address space. Concerns for Internet architecture and operations, as well as IETF procedure, are explored. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.
 
RFC 1631 The IP Network Address Translator (NAT)
 
Authors:K. Egevang, P. Francis.
Date:May 1994
Formats:txt html json
Obsoleted by:RFC 3022
Status:INFORMATIONAL
DOI:10.17487/RFC 1631
The two most compelling problems facing the IP Internet are IP address depletion and scaling in routing. Long-term and short-term solutions to these problems are being developed. The short-term solution is CIDR (Classless InterDomain Routing). The long-term solutions consist of various proposals for new internet protocols with larger addresses.

It is possible that CIDR will not be adequate to maintain the IPInternet until the long-term solutions are in place. This memo proposes another short-term solution, address reuse, that complementsCIDR or even makes it unnecessary. The address reuse solution is to place Network Address Translators (NAT) at the borders of stub domains. Each NAT box has a table consisting of pairs of local IP addresses and globally unique addresses. The IP addresses inside the stub domain are not globally unique. They are reused in other domains, thus solving the address depletion problem. The globally unique IP addresses are assigned according to current CIDR address allocation schemes. CIDR solves the scaling problem. The main advantage of NAT is that it can be installed without changes to routers or hosts. This memo presents a preliminary design for NAT, and discusses its pros and cons.

 
RFC 1632 A Revised Catalog of Available X.500 Implementations
 
Authors:A. Getchell, Ed., S. Sataluri, Ed..
Date:May 1994
Formats:txt json html
Obsoletes:RFC 1292
Obsoleted by:RFC 2116
Status:INFORMATIONAL
DOI:10.17487/RFC 1632
This document is the result of a survey that gathered new or updated descriptions of currently available implementations of X.500, including commercial products and openly available offerings. This document is a revision of RFC 1292. We contacted each contributor inRFC 1292 and requested an update and published the survey template in several mailing lists and obtained new product descriptions.

This document contains detailed description of twenty six (26) X.500 implementations - DSAs, DUAs, and DUA interfaces.

 
RFC 1637 DNS NSAP Resource Records
 
Authors:B. Manning, R. Colella.
Date:June 1994
Formats:txt json html
Obsoletes:RFC 1348
Obsoleted by:RFC 1706
Status:EXPERIMENTAL
DOI:10.17487/RFC 1637
The Internet is moving towards the deployment of an OSI lower layers infrastructure. This infrastructure comprises the connectionless network protocol (CLNP) and supporting routing protocols. Also required as part of this infrastructure is support in the Domain NameSystem (DNS) for mapping between names and NSAP addresses.

This document defines the format of one new Resource Record (RR) for the DNS for domain name-to-NSAP mapping. The RR may be used with anyNSAP address format. This document supercedes RFC 1348.

NSAP-to-name translation is accomplished through use of the PTR RR(see STD 13, RFC 1035 for a description of the PTR RR). This paper describes how PTR RRs are used to support this translation.

 
RFC 1638 PPP Bridging Control Protocol (BCP)
 
Authors:F. Baker, R. Bowen.
Date:June 1994
Formats:txt html json
Obsoletes:RFC 1220
Obsoleted by:RFC 2878
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1638
The Point-to-Point Protocol (PPP) [6] provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP defines an extensible Link Control Protocol, and proposes a family ofNetwork Control Protocols for establishing and configuring different network-layer protocols.

This document defines the Network Control Protocol for establishing and configuring Remote Bridging for PPP links.

 
RFC 1642 UTF-7 - A Mail-Safe Transformation Format of Unicode
 
Authors:D. Goldsmith, M. Davis.
Date:July 1994
Formats:txt html pdf ps json
Obsoleted by:RFC 2152
Status:EXPERIMENTAL
DOI:10.17487/RFC 1642
The Unicode Standard, version 1.1, and ISO/IEC 10646-1:1993(E) jointly define a 16 bit character set (hereafter referred to asUnicode) which encompasses most of the world's writing systems.However, Internet mail (STD 11, RFC 822) currently supports only 7- bit US ASCII as a character set. MIME (RFC 1521 and RFC 1522) extendsInternet mail to support different media types and character sets, and thus could support Unicode in mail messages. MIME neither definesUnicode as a permitted character set nor specifies how it would be encoded, although it does provide for the registration of additional character sets over time.

This document describes a new transformation format of Unicode that contains only 7-bit ASCII characters and is intended to be readable by humans in the limiting case that the document consists of characters from the US-ASCII repertoire. It also specifies how this transformation format is used in the context of RFC 1521, RFC 1522, and the document "Using Unicode with MIME".

 
RFC 1643 Definitions of Managed Objects for the Ethernet-like Interface Types
 
Authors:F. Kastenholz.
Date:July 1994
Formats:txt html json
Obsoletes:RFC 1623
Obsoleted by:RFC 3638
Status:HISTORIC
DOI:10.17487/RFC 1643
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it defines objects for managing ethernet-like objects. [STANDARDS-TRACK]
 
RFC 1644 T/TCP -- TCP Extensions for Transactions Functional Specification
 
Authors:R. Braden.
Date:July 1994
Formats:txt json html
Obsoleted by:RFC 6247
Updates:RFC 1379
Status:HISTORIC
DOI:10.17487/RFC 1644
This memo specifies T/TCP, an experimental TCP extension for efficient transaction-oriented (request/response) service. This backwards-compatible extension could fill the gap between the current connection-oriented TCP and the datagram-based UDP.

This work was supported in part by the National Science Foundation under Grant Number NCR-8922231.

 
RFC 1645 Simple Network Paging Protocol - Version 2
 
Authors:A. Gwinn.
Date:July 1994
Formats:txt json html
Obsoletes:RFC 1568
Obsoleted by:RFC 1861
Status:INFORMATIONAL
DOI:10.17487/RFC 1645
This RFC suggests a simple way for delivering both alphanumeric and numeric pages (one-way) to radio paging terminals. Gateways supporting this protocol, as well as SMTP, have been in use for several months for nationwide paging and messaging. In addition, email filters and SNPP client software for Unix and Windows are available at no cost. Please contact the author for more information.

Earlier versions of this specification were reviewed by IESG members and the "822 Extensions" Working Group. They preferred an alternate strategy, as discussed under "Relationship to Other IETF Work", below.

 
RFC 1647 TN3270 Enhancements
 
Authors:B. Kelly.
Date:July 1994
Formats:txt html json
Obsoleted by:RFC 2355
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1647
This document describes a protocol that more fully supports 3270 devices than do the existing tn3270 practices. Specifically, it defines a method of emulating both the terminal and printer members of the 3270 family of devices via Telnet; it provides for the ability of a Telnet client to request that it be assigned a specific device- name (also referred to as "LU name" or "network name"); finally, it adds support for a variety of functions such as the ATTN key, theSYSREQ key, and SNA response handling.

This protocol would be negotiated and implemented under a new TelnetOption and would be unrelated to the Telnet 3270 Regime Option as defined in RFC 1041 [1].

 
RFC 1650 Definitions of Managed Objects for the Ethernet-like Interface Types using SMIv2
 
Authors:F. Kastenholz.
Date:August 1994
Formats:txt json html
Obsoleted by:RFC 2358
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1650
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it defines objects for managing ethernet-like objects. [STANDARDS-TRACK]
 
RFC 1651 SMTP Service Extensions
 
Authors:J. Klensin, N. Freed, M. Rose, E. Stefferud, D. Crocker.
Date:July 1994
Formats:txt json html
Obsoletes:RFC 1425
Obsoleted by:RFC 1869
Status:DRAFT STANDARD
DOI:10.17487/RFC 1651
This memo defines a framework for extending the SMTP service by defining a means whereby a server SMTP can inform a client SMTP as to the service extensions it supports. [STANDARDS-TRACK]
 
RFC 1652 SMTP Service Extension for 8bit-MIMEtransport
 
Authors:J. Klensin, N. Freed, M. Rose, E. Stefferud, D. Crocker.
Date:July 1994
Formats:txt html json
Obsoletes:RFC 1426
Obsoleted by:RFC 6152
Status:DRAFT STANDARD
DOI:10.17487/RFC 1652
This memo defines an extension to the SMTP service whereby an SMTP content body consisting of text containing octets outside of the US-ASCII octet range (hex 00-7F) may be relayed using SMTP.
 
RFC 1653 SMTP Service Extension for Message Size Declaration
 
Authors:J. Klensin, N. Freed, K. Moore.
Date:July 1994
Formats:txt html json
Obsoletes:RFC 1427
Obsoleted by:RFC 1870
Status:DRAFT STANDARD
DOI:10.17487/RFC 1653
This memo defines an extension to the SMTP service whereby an SMTP client and server may interact to give the server an opportunity to decline to accept a message (perhaps temporarily) based on the client's estimate of the message size.
 
RFC 1654 A Border Gateway Protocol 4 (BGP-4)
 
Authors:Y. Rekhter, Ed., T. Li, Ed..
Date:July 1994
Formats:txt json html
Obsoleted by:RFC 1771
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1654
This document defines an inter-autonomous system routing protocol for the Internet. [STANDARDS-TRACK]
 
RFC 1655 Application of the Border Gateway Protocol in the Internet
 
Authors:Y. Rekhter, Ed., P. Gross, Ed..
Date:July 1994
Formats:txt json html
Obsoletes:RFC 1268
Obsoleted by:RFC 1772
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1655
This document, together with its companion document, "A BorderGateway Protocol 4 (BGP-4)", define an inter-autonomous system routing protocol for the Internet. "A Border Gateway Protocol 4(BGP-4)" defines the BGP protocol specification, and this document describes the usage of the BGP in the Internet.

Information about the progress of BGP can be monitored and/or reported on the BGP mailing list (bgp@ans.net).

 
RFC 1656 BGP-4 Protocol Document Roadmap and Implementation Experience
 
Authors:P. Traina.
Date:July 1994
Formats:txt html json
Obsoleted by:RFC 1773
Status:INFORMATIONAL
DOI:10.17487/RFC 1656
Border Gateway Protocol v4 (BGP-4) [1] is an inter-Autonomous System routing protocol. It is built on experience gained with BGP as defined in RFC-1267 [2] and BGP usage in the connected Internet as described in RFC-1268 [3]. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.
 
RFC 1657 Definitions of Managed Objects for the Fourth Version of the Border Gateway Protocol (BGP-4) using SMIv2
 
Authors:S. Willis, J. Burruss, J. Chu, Ed..
Date:July 1994
Formats:txt html json
Obsoleted by:RFC 4273
Status:DRAFT STANDARD
DOI:10.17487/RFC 1657
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects used for managing the Border Gateway Protocol Version 4 or lower [1, 2]. [STANDARDS-TRACK]
 
RFC 1664 Using the Internet DNS to Distribute RFC1327 Mail Address Mapping Tables
 
Authors:C. Allocchio, A. Bonito, B. Cole, S. Giordano, R. Hagens.
Date:August 1994
Formats:txt json html
Obsoleted by:RFC 2163
Status:EXPERIMENTAL
DOI:10.17487/RFC 1664
This memo defines how to store in the Internet Domain Name System the mapping information needed by e-mail gateways and other tools to mapRFC822 domain names into X.400 O/R names and vice versa. Mapping information can be managed in a distributed rather than a centralised way. Gateways located on Internet hosts can retrieve the mapping information querying the DNS instead of having fixed tables which need to be centrally updated and distributed. This memo is a joint effort of X400 operation working group (x400ops) and RARE Mail andMessaging working group (WG-MSG).
 
RFC 1665 Definitions of Managed Objects for SNA NAUs using SMIv2
 
Authors:Z. Kielczewski, Ed., D. Kostick, Ed., K. Shih, Ed..
Date:July 1994
Formats:txt json html
Obsoleted by:RFC 1666
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1665
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it defines objects for managing the configuration, monitoring and control of Physical Units (PUs) and Logical Units (LUs) in an SNA environment. [STANDARDS-TRACK]
 
RFC 1693 An Extension to TCP : Partial Order Service
 
Authors:T. Connolly, P. Amer, P. Conrad.
Date:November 1994
Formats:txt html json
Obsoleted by:RFC 6247
Status:HISTORIC
DOI:10.17487/RFC 1693
This RFC introduces a new transport mechanism for TCP based upon partial ordering. The aim is to present the concepts of partial ordering and promote discussions on its usefulness in network communications. Distribution of this memo is unlimited.
 
RFC 1695 Definitions of Managed Objects for ATM Management Version 8.0 using SMIv2
 
Authors:M. Ahmed, Ed., K. Tesink, Ed..
Date:August 1994
Formats:txt json html
Obsoleted by:RFC 2515
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1695
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes objects used for managing ATM-based interfaces, devices, networks and services. [STANDARDS-TRACK]
 
RFC 1700 Assigned Numbers
 
Authors:J. Reynolds, J. Postel.
Date:October 1994
Formats:txt json html
Obsoletes:RFC 1340
Obsoleted by:RFC 3232
Status:HISTORIC
DOI:10.17487/RFC 1700
This RFC is a snapshot of the ongoing process of the assignment of protocol parameters for the Internet protocol suite. To make the current information readily available the assignments are kept up-to- date in a set of online text files. This memo is a status report on the parameters (i.e., numbers and keywords) used in protocols in the Internet community.
 
RFC 1714 Referral Whois Protocol (RWhois)
 
Authors:S. Williamson, M. Kosters.
Date:November 1994
Formats:txt ps json pdf html
Obsoleted by:RFC 2167
Status:INFORMATIONAL
DOI:10.17487/RFC 1714
This memo describes version 1.0 of the client/server interaction ofRWhois. RWhois provides a distributed system for the display of hierarchical information. This system is hierarchical by design, allowing for the reduction of a query, and the referral of the user closer to the maintainer of the information.
 
RFC 1716 Towards Requirements for IP Routers
 
Authors:P. Almquist, F. Kastenholz.
Date:November 1994
Formats:txt html json
Obsoleted by:RFC 1812
Status:INFORMATIONAL
DOI:10.17487/RFC 1716
The goal of this work is to replace RFC-1009, Requirements for Internet Gateways ([INTRO:1]) with a new document. It defines and discusses requirements for devices which perform the network layer forwarding function of the Internet protocol suite. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.
 
RFC 1717 The PPP Multilink Protocol (MP)
 
Authors:K. Sklower, B. Lloyd, G. McGregor, D. Carr.
Date:November 1994
Formats:txt html json
Obsoleted by:RFC 1990
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1717
This document proposes a method for splitting, recombining and sequencing datagrams across multiple logical data links. This work was originally motivated by the desire to exploit multiple bearer channels in ISDN, but is equally applicable to any situation in which multiple PPP links connect two systems, including async links. This is accomplished by means of new PPP [2] options and protocols.
 
RFC 1718 The Tao of IETF - A Guide for New Attendees of the Internet Engineering Task Force
 
Authors:IETF Secretariat, G. Malkin.
Date:November 1994
Formats:txt json html
Obsoletes:RFC 1539
Obsoleted by:RFC 3160
Status:INFORMATIONAL
DOI:10.17487/RFC 1718
Over the last two years, the attendance at Internet Engineering TaskForce (IETF) plenary meetings has grown phenomenally. Approximately one third of the attendees are new to the IETF at each meeting, and many of those go on to become regular attendees. When the meetings were smaller, it wasn't very difficult for a newcomer to get into the swing of things. Today, however, a newcomer meets many more new people, some previously known only as the authors of documents or thought provoking e-mail messages.

The purpose of this For Your Information (FYI) RFC is to explain to the newcomers how the IETF works. This will give them a warm, fuzzy feeling and enable them to make the meeting more productive for everyone. This FYI will also provide the mundane bits of information which everyone who attends an IETF meeting should know.

 
RFC 1720 Internet Official Protocol Standards
 
Authors:J. Postel.
Date:November 1994
Formats:txt json html
Obsoletes:RFC 1610
Obsoleted by:RFC 1780
Status:HISTORIC
DOI:10.17487/RFC 1720
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Architecture Board (IAB). [STANDARDS-TRACK]
 
RFC 1723 RIP Version 2 - Carrying Additional Information
 
Authors:G. Malkin.
Date:November 1994
Formats:txt html json
Obsoletes:RFC 1388
Obsoleted by:RFC 2453
Updates:RFC 1058
Status:INTERNET STANDARD
DOI:10.17487/RFC 1723
This document specifies an extension of the Routing InformationProtocol (RIP), as defined in [1,2], to expand the amount of useful information carried in RIP messages and to add a measure of security.This memo obsoletes RFC 1388, which specifies an update to the"Routing Information Protocol" STD 34, RFC 1058.

The RIP-2 protocol analysis is documented in RFC 1721 [4].

The RIP-2 applicability statement is document in RFC 1722 [5].

The RIP-2 MIB description is defined in RFC 1724 [3]. This memo obsoletes RFC 1389.

 
RFC 1725 Post Office Protocol - Version 3
 
Authors:J. Myers, M. Rose.
Date:November 1994
Formats:txt json html
Obsoletes:RFC 1460
Obsoleted by:RFC 1939
Status:INTERNET STANDARD
DOI:10.17487/RFC 1725
This memo is a revision to RFC 1460, a Draft Standard. [STANDARDS-TRACK]
 
RFC 1730 Internet Message Access Protocol - Version 4
 
Authors:M. Crispin.
Date:December 1994
Formats:txt json html
Obsoleted by:RFC 2060, RFC 2061
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1730
The Internet Message Access Protocol, Version 4 (IMAP4) allows a client to access and manipulate electronic mail messages on a server.IMAP4 permits manipulation of remote message folders, called"mailboxes", in a way that is functionally equivalent to local mailboxes. IMAP4 also provides the capability for an offline client to resynchronize with the server (see also [IMAP-DISC]).

IMAP4 includes operations for creating, deleting, and renaming mailboxes; checking for new messages; permanently removing messages; setting and clearing flags; RFC 822 and MIME parsing; searching; and selective fetching of message attributes, texts, and portions thereof. Messages in IMAP4 are accessed by the use of numbers.These numbers are either message sequence numbers (relative position from 1 to the number of messages in the mailbox) or unique identifiers (immutable, strictly ascending values assigned to each message, but which are not necessarily contiguous).

IMAP4 supports a single server. A mechanism for supporting multipleIMAP4 servers is discussed in [IMSP].

IMAP4 does not specify a means of posting mail; this function is handled by a mail transfer protocol such as [SMTP].

IMAP4 is designed to be upwards compatible from the [IMAP2] protocol.Compatibility issues are discussed in [IMAP-COMPAT].

 
RFC 1734 POP3 AUTHentication command
 
Authors:J. Myers.
Date:December 1994
Formats:txt json html
Obsoleted by:RFC 5034
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1734
This document describes the optional AUTH command, for indicating an authentication mechanism to the server, performing an authentication protocol exchange, and optionally negotiating a protection mechanism for subsequent protocol interactions. [STANDARDS-TRACK]
 
RFC 1738 Uniform Resource Locators (URL)
 
Authors:T. Berners-Lee, L. Masinter, M. McCahill.
Date:December 1994
Formats:txt json html
Obsoleted by:RFC 4248, RFC 4266
Updated by:RFC 1808, RFC 2368, RFC 2396, RFC 3986, RFC 6196, RFC 6270, RFC 8089
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1738
This document specifies a Uniform Resource Locator (URL), the syntax and semantics of formalized information for location and access of resources via the Internet.
 
RFC 1739 A Primer On Internet and TCP/IP Tools
 
Authors:G. Kessler, S. Shepard.
Date:December 1994
Formats:txt json html
Obsoleted by:RFC 2151
Status:INFORMATIONAL
DOI:10.17487/RFC 1739
This memo is an introductory guide to some of the TCP/IP and Internet tools and utilities that allow users to access the wide variety of information on the network, from determining if a particular host is up to viewing a multimedia thesis on foreign policy. It also describes discussion lists accessible from the Internet, ways to obtain Internet documents, and resources that help users weave their way through the Internet. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.
 
RFC 1743 IEEE 802.5 MIB using SMIv2
 
Authors:K. McCloghrie, E. Decker.
Date:December 1994
Formats:txt json html
Obsoletes:RFC 1231
Obsoleted by:RFC 1748
Status:DRAFT STANDARD
DOI:10.17487/RFC 1743
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects used for managing subnetworks which use the IEEE 802.5 Token Ring technology described in 802.5 Token Ring Access Method and Physical Layer Specifications, IEEE Standard 802.5-1989. [STANDARDS-TRACK]
 
RFC 1750 Randomness Recommendations for Security
 
Authors:D. Eastlake 3rd, S. Crocker, J. Schiller.
Date:December 1994
Formats:txt html json
Obsoleted by:RFC 4086
Status:INFORMATIONAL
DOI:10.17487/RFC 1750
Security systems today are built on increasingly strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. The sophisticated attacker of these security systems may find it easier to reproduce the environment that produced the secret quantities, searching the resulting small set of possibilities, than to locate the quantities in the whole of the number space.

Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This paper points out many pitfalls in using traditional pseudo-random number generation techniques for choosing such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available. And it gives examples of how large such quantities need to be for some particular applications.

 
RFC 1757 Remote Network Monitoring Management Information Base
 
Authors:S. Waldbusser.
Date:February 1995
Formats:txt json html
Obsoletes:RFC 1271
Obsoleted by:RFC 2819
Status:DRAFT STANDARD
DOI:10.17487/RFC 1757
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.In particular, it defines objects for managing remote network monitoring devices.
 
RFC 1759 Printer MIB
 
Authors:R. Smith, F. Wright, T. Hastings, S. Zilles, J. Gyllenskog.
Date:March 1995
Formats:txt html json
Obsoleted by:RFC 3805
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1759
A printer is the physical device that takes media from an input source, produces marks on that media according to some page description or page control language and puts the result in some output destination, possibly with finishing applied. The information needed in the management of the physical printer and the management of a printing job overlap highly and many of the tasks in each management area require the same or similar information. [STANDARDS-TRACK]
 
RFC 1766 Tags for the Identification of Languages
 
Authors:H. Alvestrand.
Date:March 1995
Formats:txt json html
Obsoleted by:RFC 3066, RFC 3282
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1766
This document describes a language tag for use in cases where it is desired to indicate the language used in an information object.

It also defines a Content-language: header, for use in the case where one desires to indicate the language of something that has RFC-822- like headers, like MIME body parts or Web documents, and a new parameter to the Multipart/Alternative type, to aid in the usage of the Content-Language: header.

 
RFC 1769 Simple Network Time Protocol (SNTP)
 
Authors:D. Mills.
Date:March 1995
Formats:txt html json
Obsoletes:RFC 1361
Obsoleted by:RFC 2030, RFC 4330
Status:INFORMATIONAL
DOI:10.17487/RFC 1769
This memorandum describes the Simple Network Time Protocol (SNTP), which is an adaptation of the Network Time Protocol (NTP) used to synchronize computer clocks in the Internet. SNTP can be used when the ultimate performance of the full NTP implementation described inRFC-1305 is not needed or justified. It can operate in both unicast modes (point to point) and broadcast modes (point to multipoint). It can also operate in IP multicast mode where this service is available. SNTP involves no change to the current or previous NTP specification versions or known implementations, but rather a clarification of certain design features of NTP which allow operation in a simple, stateless remote-procedure call (RPC) mode with accuracy and reliability expectations similar to the UDP/TIME protocol described in RFC-868.

This memorandum obsoletes RFC-1361 of the same title. Its purpose is to explain the protocol model for operation in broadcast mode, to provide additional clarification in some places and to correct a few typographical errors. A working knowledge of the NTP Version 3 specification RFC-1305 is not required for an implementation of SNTP.Distribution of this memorandum is unlimited.

 
RFC 1770 IPv4 Option for Sender Directed Multi-Destination Delivery
 
Authors:C. Graff.
Date:March 1995
Formats:txt html json
Obsoleted by:RFC 6814
Status:HISTORIC
DOI:10.17487/RFC 1770
This memo defines an IPv4 option to provide a sender directed multi- destination delivery mechanism called Selective Directed BroadcastMode (SDBM). The SDBM provides unreliable UDP delivery to a set ofIP addresses included in the option field of an IPv4 datagram. Data reliability if required will be provided by the application layer.This approach was developed to support sender directed multi- destination delivery to sparsely populated groups with no additional control traffic. This approach will find application in the extremely bandwidth constrained tactical military environment, as well as in some commercial applications requiring sender control of data delivery.
 
RFC 1771 A Border Gateway Protocol 4 (BGP-4)
 
Authors:Y. Rekhter, T. Li.
Date:March 1995
Formats:txt html json
Obsoletes:RFC 1654
Obsoleted by:RFC 4271
Status:DRAFT STANDARD
DOI:10.17487/RFC 1771
This document, together with its companion document, "Application of the Border Gateway Protocol in the Internet", define an inter- autonomous system routing protocol for the Internet.
 
RFC 1777 Lightweight Directory Access Protocol
 
Authors:W. Yeong, T. Howes, S. Kille.
Date:March 1995
Formats:txt json html
Obsoletes:RFC 1487
Obsoleted by:RFC 3494
Status:HISTORIC
DOI:10.17487/RFC 1777
The protocol described in this document is designed to provide access to the X.500 Directory while not incurring the resource requirements of the Directory Access Protocol (DAP). This protocol is specifically targeted at simple management applications and browser applications that provide simple read/write interactive access to the X.500Directory, and is intended to be a complement to the DAP itself.

Key aspects of LDAP are:

- Protocol elements are carried directly over TCP or other transport, bypassing much of the session/presentation overhead.

- Many protocol data elements are encoding as ordinary strings (e.g.,Distinguished Names).

- A lightweight BER encoding is used to encode all protocol elements.

 
RFC 1778 The String Representation of Standard Attribute Syntaxes
 
Authors:T. Howes, S. Kille, W. Yeong, C. Robbins.
Date:March 1995
Formats:txt html json
Obsoletes:RFC 1488
Obsoleted by:RFC 3494
Updated by:RFC 2559
Status:HISTORIC
DOI:10.17487/RFC 1778
The Lightweight Directory Access Protocol (LDAP) [9] requires that the contents of AttributeValue fields in protocol elements be octet strings. This document defines the requirements that must be satisfied by encoding rules used to render X.500 Directory attribute syntaxes into a form suitable for use in the LDAP, then goes on to define the encoding rules for the standard set of attribute syntaxes defined in [1,2] and [3].
 
RFC 1779 A String Representation of Distinguished Names
 
Authors:S. Kille.
Date:March 1995
Formats:txt html json
Obsoletes:RFC 1485
Obsoleted by:RFC 2253, RFC 3494
Status:HISTORIC
DOI:10.17487/RFC 1779
The OSI Directory uses distinguished names as the primary keys to entries in the directory. Distinguished Names are encoded in ASN.1.When a distinguished name is communicated between to users not using a directory protocol (e.g., in a mail message), there is a need to have a user-oriented string representation of distinguished name.This specification defines a string format for representing names, which is designed to give a clean representation of commonly used names, whilst being able to represent any distinguished name.
 
RFC 1780 Internet Official Protocol Standards
 
Authors:J. Postel, Ed..
Date:March 1995
Formats:txt html json
Obsoletes:RFC 1720
Obsoleted by:RFC 1800
Status:HISTORIC
DOI:10.17487/RFC 1780
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Architecture Board (IAB). [STANDARDS-TRACK]
 
RFC 1781 Using the OSI Directory to Achieve User Friendly Naming
 
Authors:S. Kille.
Date:March 1995
Formats:txt html json
Obsoletes:RFC 1484
Obsoleted by:RFC 3494
Status:HISTORIC
DOI:10.17487/RFC 1781
The OSI Directory has user friendly naming as a goal. A simple minded usage of the directory does not achieve this. Two aspects not achieved are: o A user oriented notation o Guessability

This proposal sets out some conventions for representing names in a friendly manner, and shows how this can be used to achieve really friendly naming. This then leads to a specification of a standard format for representing names, and to procedures to resolve them.This leads to a specification which allows directory names to be communicated between humans. The format in this specification is identical to that defined in [5], and it is intended that these specifications are compatible.

 
RFC 1782 TFTP Option Extension
 
Authors:G. Malkin, A. Harkin.
Date:March 1995
Formats:txt json html
Obsoleted by:RFC 2347
Updates:RFC 1350
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1782
The Trivial File Transfer Protocol [1] is a simple, lock-step, file transfer protocol which allows a client to get or put a file onto a remote host. This document describes a simple extension to TFTP to allow option negotiation prior to the file transfer.
 
RFC 1783 TFTP Blocksize Option
 
Authors:G. Malkin, A. Harkin.
Date:March 1995
Formats:txt json html
Obsoleted by:RFC 2348
Updates:RFC 1350
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1783
The Trivial File Transfer Protocol [1] is a simple, lock-step, file transfer protocol which allows a client to get or put a file onto a remote host. One of its primary uses is the booting of diskless nodes on a Local Area Network. TFTP is used because it is very simple to implement in a small node's limited ROM space. However, the choice of a 512-byte blocksize is not the most efficient for use on a LAN whose MTU may 1500 bytes or greater.

This document describes a TFTP option which allows the client and server to negotiate a blocksize more applicable to the network medium. The TFTP Option Extension mechanism is described in [2].

 
RFC 1784 TFTP Timeout Interval and Transfer Size Options
 
Authors:G. Malkin, A. Harkin.
Date:March 1995
Formats:txt html json
Obsoleted by:RFC 2349
Updates:RFC 1350
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1784
The Trivial File Transfer Protocol [1] is a simple, lock-step, file transfer protocol which allows a client to get or put a file onto a remote host.

This document describes two TFTP options. The first allows the client and server to negotiate the Timeout Interval. The second allows the side receiving the file to determine the ultimate size of the transfer before it begins. The TFTP Option Extension mechanism is described in [2].

This document assumes that the reader is familiar with the terminology and notation of both [1] and [2].

 
RFC 1788 ICMP Domain Name Messages
 
Authors:W. Simpson.
Date:April 1995
Formats:txt html json
Obsoleted by:RFC 6918
Status:HISTORIC
DOI:10.17487/RFC 1788
This document specifies ICMP messages for learning the FullyQualified Domain Name associated with an IP address.
 
RFC 1798 Connection-less Lightweight X.500 Directory Access Protocol
 
Authors:A. Young.
Date:June 1995
Formats:txt html json
Obsoleted by:RFC 3352
Status:HISTORIC
DOI:10.17487/RFC 1798
The protocol described in this document is designed to provide access to the Directory while not incurring the resource requirements of the Directory Access Protocol (DAP). [STANDARDS-TRACK]
 
RFC 1800 Internet Official Protocol Standards
 
Authors:J. Postel, Ed..
Date:July 1995
Formats:txt json html
Obsoletes:RFC 1780
Obsoleted by:RFC 1880
Status:HISTORIC
DOI:10.17487/RFC 1800
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Architecture Board (IAB). [STANDARDS-TRACK]
 
RFC 1806 Communicating Presentation Information in Internet Messages: The Content-Disposition Header
 
Authors:R. Troost, S. Dorner.
Date:June 1995
Formats:txt html json
Obsoleted by:RFC 2183
Status:EXPERIMENTAL
DOI:10.17487/RFC 1806
This memo provides a mechanism whereby messages conforming to the[RFC 1521] ("MIME") specification can convey presentational information. It specifies a new "Content-Disposition" header, optional and valid for any [RFC 1521] entity ("message" or "body part"). Two values for this header are described in this memo; one for the ordinary linear presentation of the body part, and another to facilitate the use of mail to transfer files. It is expected that more values will be defined in the future, and procedures are defined for extending this set of values.

This document is intended as an extension to [RFC 1521]. As such, the reader is assumed to be familiar with [RFC 1521], and [RFC 822]. The information presented herein supplements but does not replace that found in those documents.

 
RFC 1808 Relative Uniform Resource Locators
 
Authors:R. Fielding.
Date:June 1995
Formats:txt json html
Obsoleted by:RFC 3986
Updates:RFC 1738
Updated by:RFC 2368, RFC 2396
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1808
A Uniform Resource Locator (URL) is a compact representation of the location and access method for a resource available via the Internet.When embedded within a base document, a URL in its absolute form may contain a great deal of information which is already known from the context of that base document's retrieval, including the scheme, network location, and parts of the url-path. In situations where the base URL is well-defined and known to the parser (human or machine), it is useful to be able to embed URL references which inherit that context rather than re-specifying it in every instance. This document defines the syntax and semantics for such Relative UniformResource Locators.
 
RFC 1811 U.S
 
Authors:Government Internet Domain Names. Federal Networking Council.
Date:June 1995
Formats:txt json html
Obsoleted by:RFC 1816
Status:INFORMATIONAL
DOI:10.17487/RFC 1811
This document describes the registration policies for the top-level domain ".GOV". Thus far, Federal Agencies and their subsidiaries have registered without any guidance. This has resulted in multiple registrations for Federal Agencies and naming schemes that do not facilitate responsiveness to the public. This document fixes this by restricting registrations to coincide with the approved structure of the US government. The document cited, FIPS 95-1, provides a standard recognized structure into which domain registrations for top-level domains. The IANA requires that an organization/country apply for and get a 2 letter code from ISO/ITU (e.g., US for UnitedStates) for additional top-level registration.

As a side effect, this reduces the number of .GOV level registrations and reduces the workload on the Internic.

 
RFC 1816 U.S
 
Authors:Government Internet Domain Names. Federal Networking Council.
Date:August 1995
Formats:txt html json
Obsoletes:RFC 1811
Obsoleted by:RFC 2146
Status:INFORMATIONAL
DOI:10.17487/RFC 1816
This memo provides an update and clarification to RFC 1811. This document describes the registration policies for the top-level domain".GOV". Thus far, Federal Agencies and their subsidiaries have registered without any guidance. This has resulted in multiple registrations for Federal Agencies and naming schemes that do not facilitate responsiveness to the public. This document fixes this by restricting registrations to coincide with the approved structure of the US government. The document cited, FIPS 95-1, provides a standard recognized structure into which domain registrations for.GOV can be fit. This policy is exactly comparable to that for the top-level domains. The IANA requires that an organization/country apply for and get a 2 letter code from ISO/ITU (e.g., US for UnitedStates) for additional top-level registration.

As a side effect, this reduces the number of .GOV level registrations and reduces the workload on the Internic.

 
RFC 1820 Multimedia E-mail (MIME) User Agent Checklist
 
Authors:E. Huizer.
Date:August 1995
Formats:txt json html
Obsoleted by:RFC 1844
Status:INFORMATIONAL
DOI:10.17487/RFC 1820
This document presents a checklist to facilitate evaluation of MIME capable User Agents. Access to a MIME test-responder, that generates test-messages is described.
 
RFC 1825 Security Architecture for the Internet Protocol
 
Authors:R. Atkinson.
Date:August 1995
Formats:txt json html
Obsoleted by:RFC 2401
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1825
This memo describes the security mechanisms for IP version 4 (IPv4) and IP version 6 (IPv6) and the services that they provide. [STANDARDS- TRACK]
 
RFC 1826 IP Authentication Header
 
Authors:R. Atkinson.
Date:August 1995
Formats:txt html json
Obsoleted by:RFC 2402
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1826
This document describes a mechanism for providing cryptographic authentication for IPv4 and IPv6 datagrams. [STANDARDS-TRACK]
 
RFC 1827 IP Encapsulating Security Payload (ESP)
 
Authors:R. Atkinson.
Date:August 1995
Formats:txt html json
Obsoleted by:RFC 2406
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1827
This document describes the IP Encapsulating Security Payload (ESP). ESP is a mechanism for providing integrity and confidentiality to IP datagrams. [STANDARDS-TRACK]
 
RFC 1830 SMTP Service Extensions for Transmission of Large and Binary MIME Messages
 
Authors:G. Vaudreuil.
Date:August 1995
Formats:txt json html
Obsoleted by:RFC 3030
Status:EXPERIMENTAL
DOI:10.17487/RFC 1830
This memo defines two extensions to the SMTP service. The first service enables a SMTP client and server to negotiate the use of an alternate DATA command "BDAT" for efficiently sending large MIME messages. The second extension takes advantage of the BDAT command to permit the negotiated sending of unencoded binary data. This memo defines an Experimental Protocol for the Internet community.
 
RFC 1831 RPC: Remote Procedure Call Protocol Specification Version 2
 
Authors:R. Srinivasan.
Date:August 1995
Formats:txt json html
Obsoleted by:RFC 5531
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1831
This document describes the ONC Remote Procedure Call (ONC RPC Version 2) protocol as it is currently deployed and accepted. [STANDARDS-TRACK]
 
RFC 1832 XDR: External Data Representation Standard
 
Authors:R. Srinivasan.
Date:August 1995
Formats:txt html json
Obsoleted by:RFC 4506
Status:DRAFT STANDARD
DOI:10.17487/RFC 1832
This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted. [STANDARDS-TRACK]
 
RFC 1836 Representing the O/R Address hierarchy in the X.500 Directory Information Tree
 
Authors:S. Kille.
Date:August 1995
Formats:txt html json
Obsoleted by:RFC 2294
Status:EXPERIMENTAL
DOI:10.17487/RFC 1836
This document defines a representation of the O/R Address hierarchy in the Directory Information Tree [6, 1]. This is useful for a range of purposes, including:
 
RFC 1837 Representing Tables and Subtrees in the X.500 Directory
 
Authors:S. Kille.
Date:August 1995
Formats:txt html json
Obsoleted by:RFC 2293
Status:EXPERIMENTAL
DOI:10.17487/RFC 1837
This document defines techniques for representing two types of information mapping in the OSI Directory [1].

1. Mapping from a key to a value (or set of values), as might be done in a table lookup.

2. Mapping from a distinguished name to an associated value (or values), where the values are not defined by the owner of the entry. This is achieved by use of a directory subtree.

These techniques were developed for supporting MHS use of Directory[2], but are specified separately as they have more general applicability.

 
RFC 1838 Use of the X.500 Directory to support mapping between X.400 and RFC 822 Addresses
 
Authors:S. Kille.
Date:August 1995
Formats:txt json html
Obsoleted by:RFC 2164
Status:EXPERIMENTAL
DOI:10.17487/RFC 1838
This document defines how to use directory to support the mapping between X.400 O/R Addresses and mailboxes defined in RFC 1327 [2].
 
RFC 1849 "Son of 1036": News Article Format and Transmission
 
Authors:H. Spencer.
Date:March 2010
Formats:txt html json
Obsoleted by:RFC 5536, RFC 5537
Status:HISTORIC
DOI:10.17487/RFC 1849
By the early 1990s, it had become clear that RFC 1036, then the specification for the Interchange of USENET Messages, was badly in need of repair. This "Internet-Draft-to-be", though never formally published at that time, was widely circulated and became the de facto standard for implementors of News Servers and User Agents, rapidly acquiring the nickname "Son of 1036". Indeed, under that name, it could fairly be described as the best-known Internet Draft (n)ever published, and it formed the starting point for the recently adoptedProposed Standards for Netnews.

It is being published now in order to provide the historical background out of which those standards have grown. Present-day implementors should be aware that it is NOT NOW APPROPRIATE for use in current implementations.

 
RFC 1850 OSPF Version 2 Management Information Base
 
Authors:F. Baker, R. Coltun.
Date:November 1995
Formats:txt html json
Obsoletes:RFC 1253
Obsoleted by:RFC 4750
Status:DRAFT STANDARD
DOI:10.17487/RFC 1850
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.In particular, it defines objects for managing the Open Shortest PathFirst Routing Protocol.
 
RFC 1852 IP Authentication using Keyed SHA
 
Authors:P. Metzger, W. Simpson.
Date:September 1995
Formats:txt json html
Obsoleted by:RFC 2841
Status:EXPERIMENTAL
DOI:10.17487/RFC 1852
This document describes the use of keyed SHA with the IPAuthentication Header.
 
RFC 1854 SMTP Service Extension for Command Pipelining
 
Authors:N. Freed.
Date:October 1995
Formats:txt html json
Obsoleted by:RFC 2197
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1854
This memo defines an extension to the SMTP service whereby a server can indicate the extent of its ability to accept multiple commands in a single TCP send operation. Using a single TCP send operation for multiple commands can improve SMTP performance significantly.
 
RFC 1860 Variable Length Subnet Table For IPv4
 
Authors:T. Pummill, B. Manning.
Date:October 1995
Formats:txt html json
Obsoleted by:RFC 1878
Status:INFORMATIONAL
DOI:10.17487/RFC 1860
This document itemizes the potential values for IPv4 subnets.Additional information is provided for Hex and Decmial values, classfull equivalents, and number of addresses available within the indicated block. We appreciate inputs from Bruce Pinsky (cisco) andDaniel Karrenberg (RIPE).
 
RFC 1863 A BGP/IDRP Route Server alternative to a full mesh routing
 
Authors:D. Haskin.
Date:October 1995
Formats:txt json html
Obsoleted by:RFC 4223
Status:HISTORIC
DOI:10.17487/RFC 1863
This document describes the use and detailed design of Route Servers for dissemination of routing information among BGP/IDRP speaking routers.

The intention of the proposed technique is to reduce overhead and management complexity of maintaining numerous direct BGP/IDRP sessions which otherwise might be required or desired among routers within a single routing domain as well as among routers in different domains that are connected to a common switched fabric (e.g. an ATM cloud).

 
RFC 1866 Hypertext Markup Language - 2.0
 
Authors:T. Berners-Lee, D. Connolly.
Date:November 1995
Formats:txt json html
Obsoleted by:RFC 2854
Status:HISTORIC
DOI:10.17487/RFC 1866
The Hypertext Markup Language (HTML) is a simple markup language used to create hypertext documents that are platform independent. HTML documents are SGML documents with generic semantics that are appropriate for representing information from a wide range of domains. HTML markup can represent hypertext news, mail, documentation, and hypermedia; menus of options; database query results; simple structured documents with in-lined graphics; and hypertext views of existing bodies of information.

HTML has been in use by the World Wide Web (WWW) global information initiative since 1990. This specification roughly corresponds to the capabilities of HTML in common use prior to June 1994. HTML is an application of ISO Standard 8879:1986 Information Processing Text andOffice Systems; Standard Generalized Markup Language (SGML).

The "text/html" Internet Media Type (RFC 1590) and MIME Content Type(RFC 1521) is defined by this specification.

 
RFC 1867 Form-based File Upload in HTML
 
Authors:E. Nebel, L. Masinter.
Date:November 1995
Formats:txt json html
Obsoleted by:RFC 2854
Status:HISTORIC
DOI:10.17487/RFC 1867
Since file-upload is a feature that will benefit many applications, this proposes an extension to HTML to allow information providers to express file upload requests uniformly, and a MIME compatible representation for file upload responses. This memo defines an Experimental Protocol for the Internet community.
 
RFC 1869 SMTP Service Extensions
 
Authors:J. Klensin, N. Freed, M. Rose, E. Stefferud, D. Crocker.
Date:November 1995
Formats:txt html json
Obsoletes:RFC 1651
Obsoleted by:RFC 2821
Also:STD 0010
Status:INTERNET STANDARD
DOI:10.17487/RFC 1869
This memo defines a framework for extending the SMTP service by defining a means whereby a server SMTP can inform a client SMTP as to the service extensions it supports. [STANDARDS-TRACK]
 
RFC 1871 Addendum to RFC 1602 -- Variance Procedure
 
Authors:J. Postel.
Date:November 1995
Formats:txt html json
Obsoleted by:RFC 2026
Updates:RFC 1602, RFC 1603
Status:HISTORIC
DOI:10.17487/RFC 1871
This document describes a modification to the IETF procedures to allow an escape from a situation where the existing procedures are not working or do not seem to apply. This is a modification to the procedures of RFC 1602 and 1603.
 
RFC 1872 The MIME Multipart/Related Content-type
 
Authors:E. Levinson.
Date:December 1995
Formats:txt json html
Obsoleted by:RFC 2112
Status:EXPERIMENTAL
DOI:10.17487/RFC 1872
The Multipart/Related content-type provides a common mechanism for representing objects that are aggregates of related MIME body parts.This document defines the Multipart/Related content-type and provides examples of its use.
 
RFC 1880 Internet Official Protocol Standards
 
Authors:J. Postel, Ed..
Date:November 1995
Formats:txt html json
Obsoletes:RFC 1800
Obsoleted by:RFC 1920
Status:HISTORIC
DOI:10.17487/RFC 1880
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Architecture Board (IAB). [STANDARDS-TRACK]
 
RFC 1883 Internet Protocol, Version 6 (IPv6) Specification
 
Authors:S. Deering, R. Hinden.
Date:December 1995
Formats:txt json html
Obsoleted by:RFC 2460
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1883
This document specifies version 6 of the Internet Protocol (IPv6), also sometimes referred to as IP Next Generation or IPng.
 
RFC 1884 IP Version 6 Addressing Architecture
 
Authors:R. Hinden, Ed., S. Deering, Ed..
Date:December 1995
Formats:txt html json
Obsoleted by:RFC 2373
Status:HISTORIC
DOI:10.17487/RFC 1884
This specification defines the addressing architecture of the IPVersion 6 protocol [IPV6]. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and anIPv6 nodes required addresses.
 
RFC 1885 Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6)
 
Authors:A. Conta, S. Deering.
Date:December 1995
Formats:txt html json
Obsoleted by:RFC 2463
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1885
This document specifies a set of Internet Control Message Protocol(ICMP) messages for use with version 6 of the Internet Protocol(IPv6). The Internet Group Management Protocol (IGMP) messages specified in STD 5, RFC 1112 have been merged into ICMP, for IPv6, and are included in this document.
 
RFC 1886 DNS Extensions to support IP version 6
 
Authors:S. Thomson, C. Huitema.
Date:December 1995
Formats:txt json html
Obsoleted by:RFC 3596
Updated by:RFC 2874, RFC 3152
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1886
This document defines the changes that need to be made to the DomainName System to support hosts running IP version 6 (IPv6). The changes include a new resource record type to store an IPv6 address, a new domain to support lookups based on an IPv6 address, and updated definitions of existing query types that return Internet addresses as part of additional section processing. The extensions are designed to be compatible with existing applications and, in particular, DNS implementations themselves.
 
RFC 1888 OSI NSAPs and IPv6
 
Authors:J. Bound, B. Carpenter, D. Harrington, J. Houldsworth, A. Lloyd.
Date:August 1996
Formats:txt html json
Obsoleted by:RFC 4048
Updated by:RFC 4548
Status:HISTORIC
DOI:10.17487/RFC 1888
This document recommends that network implementors who have planned or deployed an OSI NSAP addressing plan, and who wish to deploy or transition to IPv6, should redesign a native IPv6 addressing plan to meet their needs. However, it also defines a set of mechanisms for the support of OSI NSAP addressing in an IPv6 network. These mechanisms are the ones that MUST be used if such support is required. This document also defines a mapping of IPv6 addresses within the OSI address format, should this be required.
 
RFC 1889 RTP: A Transport Protocol for Real-Time Applications
 
Authors:Audio-Video Transport Working Group, H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson.
Date:January 1996
Formats:txt html json
Obsoleted by:RFC 3550
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1889
This memorandum describes RTP, the real-time transport protocol. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. RTP does not address resource reservation and does not guarantee quality-of- service for real-time services. The data transport is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. RTP and RTCP are designed to be independent of the underlying transport and network layers. The protocol supports the use of RTP-level translators and mixers.
 
RFC 1890 RTP Profile for Audio and Video Conferences with Minimal Control
 
Authors:Audio-Video Transport Working Group, H. Schulzrinne.
Date:January 1996
Formats:txt html json
Obsoleted by:RFC 3551
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1890
This memo describes a profile for the use of the real-time transport protocol (RTP), version 2, and the associated control protocol, RTCP, within audio and video multiparticipant conferences with minimal control. It provides interpretations of generic fields within the RTP specification suitable for audio and video conferences. In particular, this document defines a set of default mappings from payload type numbers to encodings.

The document also describes how audio and video data may be carried within RTP. It defines a set of standard encodings and their names when used within RTP. However, the encoding definitions are independent of the particular transport mechanism used. The descriptions provide pointers to reference implementations and the detailed standards. This document is meant as an aid for implementors of audio, video and other real-time multimedia applications.

 
RFC 1891 SMTP Service Extension for Delivery Status Notifications
 
Authors:K. Moore.
Date:January 1996
Formats:txt html json
Obsoleted by:RFC 3461
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1891
This memo defines an extension to the SMTP service, which allows an SMTP client to specify (a) that delivery status notifications (DSNs) should be generated under certain conditions, (b) whether such notifications should return the contents of the message, and (c) additional information, to be returned with a DSN, that allows the sender to identify both the recipient(s) for which the DSN was issued, and the transaction in which the original message was sent. [STANDARDS-TRACK]
 
RFC 1892 The Multipart/Report Content Type for the Reporting of Mail System Administrative Messages
 
Authors:G. Vaudreuil.
Date:January 1996
Formats:txt json html
Obsoleted by:RFC 3462
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1892
The Multipart/Report MIME content-type is a general "family" or "container" type for electronic mail reports of any kind. Although this memo defines only the use of the Multipart/Report content-type with respect to delivery status reports, mail processing programs will benefit if a single content-type is used to for all kinds of reports. [STANDARDS-TRACK]
 
RFC 1893 Enhanced Mail System Status Codes
 
Authors:G. Vaudreuil.
Date:January 1996
Formats:txt json html
Obsoleted by:RFC 3463
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1893
There currently is not a standard mechanism for the reporting of mail system errors except for the limited set offered by SMTP and the system specific text descriptions sent in mail messages. There is a pressing need for a rich machine readable status code for use in delivery status notifications [DSN]. This document proposes a new set of status codes for this purpose. [STANDARDS-TRACK]
 
RFC 1894 An Extensible Message Format for Delivery Status Notifications
 
Authors:K. Moore, G. Vaudreuil.
Date:January 1996
Formats:txt html json
Obsoleted by:RFC 3464
Updated by:RFC 2852
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1894
This memo defines a MIME content-type that may be used by a message transfer agent (MTA) or electronic mail gateway to report the result of an attempt to deliver a message to one or more recipients. This content-type is intended as a machine-processable replacement for the various types of delivery status notifications currently used inInternet electronic mail.

Because many messages are sent between the Internet and other messaging systems (such as X.400 or the so-called "LAN-based" systems), the DSN protocol is designed to be useful in a multi- protocol messaging environment. To this end, the protocol described in this memo provides for the carriage of "foreign" addresses and error codes, in addition to those normally used in Internet mail.Additional attributes may also be defined to support "tunneling" of foreign notifications through Internet mail.

Any questions, comments, and reports of defects or ambiguities in this specification may be sent to the mailing list for the NOTARY working group of the IETF, using the address<notifications@cs.utk.edu&rt;. Requests to subscribe to the mailing list should be addressed to <notifications-request@cs.utk.edu&rt;.Implementors of this specification are encouraged to subscribe to the mailing list, so that they will quickly be informed of any problems which might hinder interoperability.

NOTE: This document is a Proposed Standard. If and when this protocol is submitted for Draft Standard status, any normative text(phrases containing SHOULD, SHOULD NOT, MUST, MUST NOT, or MAY) in this document will be re-evaluated in light of implementation experience, and are thus subject to change.

 
RFC 1897 IPv6 Testing Address Allocation
 
Authors:R. Hinden, J. Postel.
Date:January 1996
Formats:txt json html
Obsoleted by:RFC 2471
Status:EXPERIMENTAL
DOI:10.17487/RFC 1897
This document describes an allocation plan for IPv6 addresses to be used in testing IPv6 prototype software. This document specifies an Experimental protocol for the Internet community.
 
RFC 1902 Structure of Management Information for Version 2 of the Simple Network Management Protocol (SNMPv2)
 
Authors:J. Case, K. McCloghrie, M. Rose, S. Waldbusser.
Date:January 1996
Formats:txt json html
Obsoletes:RFC 1442
Obsoleted by:RFC 2578
Status:DRAFT STANDARD
DOI:10.17487/RFC 1902
It is the purpose of this document, the Structure of Management Information (SMI), to define that adapted subset, and to assign a set of associated administrative values. [STANDARDS-TRACK]
 
RFC 1903 Textual Conventions for Version 2 of the Simple Network Management Protocol (SNMPv2)
 
Authors:J. Case, K. McCloghrie, M. Rose, S. Waldbusser.
Date:January 1996
Formats:txt json html
Obsoletes:RFC 1443
Obsoleted by:RFC 2579
Status:DRAFT STANDARD
DOI:10.17487/RFC 1903
It is the purpose of this document to define the initial set of textual conventions available to all MIB modules. [STANDARDS-TRACK]
 
RFC 1904 Conformance Statements for Version 2 of the Simple Network Management Protocol (SNMPv2)
 
Authors:J. Case, K. McCloghrie, M. Rose, S. Waldbusser.
Date:January 1996
Formats:txt html json
Obsoletes:RFC 1444
Obsoleted by:RFC 2580
Status:DRAFT STANDARD
DOI:10.17487/RFC 1904
It may be useful to define the acceptable lower-bounds of implementation, along with the actual level of implementation achieved. It is the purpose of this document to define the notation used for these purposes. [STANDARDS-TRACK]
 
RFC 1905 Protocol Operations for Version 2 of the Simple Network Management Protocol (SNMPv2)
 
Authors:J. Case, K. McCloghrie, M. Rose, S. Waldbusser.
Date:January 1996
Formats:txt html json
Obsoletes:RFC 1448
Obsoleted by:RFC 3416
Status:DRAFT STANDARD
DOI:10.17487/RFC 1905
It is the purpose of this document, Protocol Operations for SNMPv2, to define the operations of the protocol with respect to the sending and receiving of the PDUs. [STANDARDS-TRACK]
 
RFC 1906 Transport Mappings for Version 2 of the Simple Network Management Protocol (SNMPv2)
 
Authors:J. Case, K. McCloghrie, M. Rose, S. Waldbusser.
Date:January 1996
Formats:txt json html
Obsoletes:RFC 1449
Obsoleted by:RFC 3417
Status:DRAFT STANDARD
DOI:10.17487/RFC 1906
It is the purpose of this document to define how the SNMPv2 maps onto an initial set of transport domains. [STANDARDS-TRACK]
 
RFC 1907 Management Information Base for Version 2 of the Simple Network Management Protocol (SNMPv2)
 
Authors:J. Case, K. McCloghrie, M. Rose, S. Waldbusser.
Date:January 1996
Formats:txt json html
Obsoletes:RFC 1450
Obsoleted by:RFC 3418
Status:DRAFT STANDARD
DOI:10.17487/RFC 1907
It is the purpose of this document to define managed objects which describe the behavior of a SNMPv2 entity. [STANDARDS-TRACK]
 
RFC 1908 Coexistence between Version 1 and Version 2 of the Internet-standard Network Management Framework
 
Authors:J. Case, K. McCloghrie, M. Rose, S. Waldbusser.
Date:January 1996
Formats:txt html json
Obsoletes:RFC 1452
Obsoleted by:RFC 2576
Status:DRAFT STANDARD
DOI:10.17487/RFC 1908
The purpose of this document is to describe coexistence between version 2 of the Internet-standard Network Management Framework [1-6], termed the SNMP version 2 framework (SNMPv2), and the original Internet- standard Network Management Framework (SNMPv1>. [STANDARDS-TRACK]
 
RFC 1911 Voice Profile for Internet Mail
 
Authors:G. Vaudreuil.
Date:February 1996
Formats:txt html json
Obsoleted by:RFC 2421, RFC 2422, RFC 2423
Status:EXPERIMENTAL
DOI:10.17487/RFC 1911
The following document is a profile of the Internet standard MIME and ESMTP protocols for use as a digital voice networking protocol. This memo defines an Experimental Protocol for the Internet community.
 
RFC 1920 Internet Official Protocol Standards
 
Authors:J. Postel.
Date:March 1996
Formats:txt html json
Obsoletes:RFC 1880
Obsoleted by:RFC 2000
Status:HISTORIC
DOI:10.17487/RFC 1920
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Architecture Board (IAB). [STANDARDS-TRACK]
 
RFC 1933 Transition Mechanisms for IPv6 Hosts and Routers
 
Authors:R. Gilligan, E. Nordmark.
Date:April 1996
Formats:txt json html
Obsoleted by:RFC 2893
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1933
This document specifies IPv4 compatibility mechanisms that can be implemented by IPv6 hosts and routers. These mechanisms include providing complete implementations of both versions of the InternetProtocol (IPv4 and IPv6), and tunneling IPv6 packets over IPv4 routing infrastructures. They are designed to allow IPv6 nodes to maintain complete compatibility with IPv4, which should greatly simplify the deployment of IPv6 in the Internet, and facilitate the eventual transition of the entire Internet to IPv6.
 
RFC 1938 A One-Time Password System
 
Authors:N. Haller, C. Metz.
Date:May 1996
Formats:txt html json
Obsoleted by:RFC 2289
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1938
This document describes a one-time password authentication system (OTP). [STANDARDS-TRACK]
 
RFC 1942 HTML Tables
 
Authors:D. Raggett.
Date:May 1996
Formats:txt html json
Obsoleted by:RFC 2854
Status:HISTORIC
DOI:10.17487/RFC 1942
The HyperText Markup Language (HTML) is a simple markup language used to create hypertext documents that are portable from one platform to another. HTML documents are SGML documents with generic semantics that are appropriate for representing information from a wide range of applications. This specification extends HTML to support a wide variety of tables. The model is designed to work well with associated style sheets, but does not require them. It also supports rendering to braille, or speech, and exchange of tabular data with databases and spreadsheets. The HTML table model embodies certain aspects of the CALS table model, e.g. the ability to group table rows into thead, tbody and tfoot sections, plus the ability to specify cell alignment compactly for sets of cells according to the context.
 
RFC 1944 Benchmarking Methodology for Network Interconnect Devices
 
Authors:S. Bradner, J. McQuaid.
Date:May 1996
Formats:txt json html
Obsoleted by:RFC 2544
Status:INFORMATIONAL
DOI:10.17487/RFC 1944
This document discusses and defines a number of tests that may be used to describe the performance characteristics of a network interconnecting device. In addition to defining the tests this document also describes specific formats for reporting the results of the tests. Appendix A lists the tests and conditions that we believe should be included for specific cases and gives additional information about testing practices. Appendix B is a reference listing of maximum frame rates to be used with specific frame sizes on various media and Appendix C gives some examples of frame formats to be used in testing.
 
RFC 1948 Defending Against Sequence Number Attacks
 
Authors:S. Bellovin.
Date:May 1996
Formats:txt json html
Obsoleted by:RFC 6528
Status:INFORMATIONAL
DOI:10.17487/RFC 1948
IP spoofing attacks based on sequence number spoofing have become a serious threat on the Internet (CERT Advisory CA-95:01). While ubiquitous crypgraphic authentication is the right answer, we propose a simple modification to TCP implementations that should be a very substantial block to the current wave of attacks.
 
RFC 1959 An LDAP URL Format
 
Authors:T. Howes, M. Smith.
Date:June 1996
Formats:txt json html
Obsoleted by:RFC 2255
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1959
This document describes a format for an LDAP Uniform Resource Locator which will allow Internet clients to have direct access to the LDAP protocol. [STANDARDS-TRACK]
 
RFC 1960 A String Representation of LDAP Search Filters
 
Authors:T. Howes.
Date:June 1996
Formats:txt json html
Obsoletes:RFC 1558
Obsoleted by:RFC 2254
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1960
The Lightweight Directory Access Protocol (LDAP) [1] defines a network representation of a search filter transmitted to an LDAP server. Some applications may find it useful to have a common way of representing these search filters in a human-readable form. This document defines a human-readable string format for representing LDAP search filters. [STANDARDS-TRACK]
 
RFC 1965 Autonomous System Confederations for BGP
 
Authors:P. Traina.
Date:June 1996
Formats:txt json html
Obsoleted by:RFC 3065
Status:EXPERIMENTAL
DOI:10.17487/RFC 1965
Border Gateway Protocol [1] is an inter-autonomous system routing protocol designed for TCP/IP networks.

This document describes an extension to BGP which may be used to create a confederation of autonomous systems which is represented as one single autonomous system to BGP peers external to the confederation.

The intention of this extension is to aid in policy administration and reduce the management complexity of maintaining a large autonomous system.

The extension this document describes is widely deployed in theInternet today.

 
RFC 1966 BGP Route Reflection An alternative to full mesh IBGP
 
Authors:T. Bates, R. Chandra.
Date:June 1996
Formats:txt html json
Obsoleted by:RFC 4456
Updated by:RFC 2796
Status:EXPERIMENTAL
DOI:10.17487/RFC 1966
The Border Gateway Protocol [1] is an inter-autonomous system routing protocol designed for TCP/IP internets. BGP deployments are configured such that that all BGP speakers within a single AS must be fully meshed so that any external routing information must be re- distributed to all other routers within that AS. This represents a serious scaling problem that has been well documented with several alternatives proposed [2,3].

This document describes the use and design of a method known as"Route Reflection" to alleviate the the need for "full mesh" IBGP.

 
RFC 1969 The PPP DES Encryption Protocol (DESE)
 
Authors:K. Sklower, G. Meyer.
Date:June 1996
Formats:txt json html
Obsoleted by:RFC 2419
Status:INFORMATIONAL
DOI:10.17487/RFC 1969
The Point-to-Point Protocol (PPP) [1] provides a standard method for transporting multi-protocol datagrams over point-to-point links.

The PPP Encryption Control Protocol (ECP) [2] provides a method to negotiate and utilize encryption protocols over PPP encapsulated links.

This document provides specific details for the use of the DES standard [5, 6] for encrypting PPP encapsulated packets.

 
RFC 1970 Neighbor Discovery for IP Version 6 (IPv6)
 
Authors:T. Narten, E. Nordmark, W. Simpson.
Date:August 1996
Formats:txt json html
Obsoleted by:RFC 2461
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1970
This document specifies the Neighbor Discovery protocol for IPVersion 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers and to maintain reachability information about the paths to active neighbors.
 
RFC 1971 IPv6 Stateless Address Autoconfiguration
 
Authors:S. Thomson, T. Narten.
Date:August 1996
Formats:txt json html
Obsoleted by:RFC 2462
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1971
This document specifies the steps a host takes in deciding how to autoconfigure its interfaces in IP version 6. The autoconfiguration process includes creating a link-local address and verifying its uniqueness on a link, determining what information should be autoconfigured (addresses, other information, or both), and in the case of addresses, whether they should be obtained through the stateless mechanism, the stateful mechanism, or both. This document defines the process for generating a link-local address, the process for generating site-local and global addresses via stateless address autoconfiguration, and the Duplicate Address Detection procedure. The details of autoconfiguration using the stateful protocol are specified elsewhere.
 
RFC 1972 A Method for the Transmission of IPv6 Packets over Ethernet Networks
 
Authors:M. Crawford.
Date:August 1996
Formats:txt html json
Obsoleted by:RFC 2464
Status:PROPOSED STANDARD
DOI:10.17487/RFC 1972
This memo specifies the frame format for transmission of IPv6 [IPV6] packets and the method of forming IPv6 link-local addresses on Ethernet networks. [STANDARDS-TRACK]
 
RFC 1980 A Proposed Extension to HTML : Client-Side Image Maps
 
Authors:J. Seidman.
Date:August 1996
Formats:txt json html
Obsoleted by:RFC 2854
Status:HISTORIC
DOI:10.17487/RFC 1980
The markup language known as "HTML/2.0" provides for image maps.Image maps are document elements which allow clicking different areas of an image to reference different network resources, as specified byUniform Identifier (URIs). The image map capability in HTML/2.0 is limited in several ways, such as the restriction that it only works with documents served via the "HTTP" protocol, and the lack of a viable fallback for users of text-only browsers. This document specifies an extension to the HTML language, referred to as "Client-Side Image Maps," which resolves these limitations.
 
RFC 1981 Path MTU Discovery for IP version 6
 
Authors:J. McCann, S. Deering, J. Mogul.
Date:August 1996
Formats:txt json html
Obsoleted by:RFC 8201
Status:DRAFT STANDARD
DOI:10.17487/RFC 1981
This document describes Path MTU Discovery for IP version 6. It is largely derived from RFC 1191, which describes Path MTU Discovery forIP version 4.
 
RFC 1991 PGP Message Exchange Formats
 
Authors:D. Atkins, W. Stallings, P. Zimmermann.
Date:August 1996
Formats:txt json html
Obsoleted by:RFC 4880
Status:INFORMATIONAL
DOI:10.17487/RFC 1991
This document describes the format of "PGP files", i.e., messages that have been encrypted and/or signed with PGP. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.
 
RFC 2000 Internet Official Protocol Standards
 
Authors:J. Postel, Ed..
Date:February 1997
Formats:txt json html
Obsoletes:RFC 1920
Obsoleted by:RFC 2200
Status:HISTORIC
DOI:10.17487/RFC 2000
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Architecture Board (IAB). This memo is an Internet Standard.
 
RFC 2001 TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms
 
Authors:W. Stevens.
Date:January 1997
Formats:txt json html
Obsoleted by:RFC 2581
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2001
Modern implementations of TCP contain four intertwined algorithms that have never been fully documented as Internet standards: slow start, congestion avoidance, fast retransmit, and fast recovery. [2] and [3] provide some details on these algorithms, [4] provides examples of the algorithms in action, and [5] provides the source code for the 4.4BSD implementation. RFC 1122 requires that a TCP must implement slow start and congestion avoidance (Section 4.2.2.15 of [1]), citing [2] as the reference, but fast retransmit and fast recovery were implemented after RFC 1122. The purpose of this document is to document these four algorithms for the Internet.
 
RFC 2002 IP Mobility Support
 
Authors:C. Perkins, Ed..
Date:October 1996
Formats:txt html json
Obsoleted by:RFC 3220
Updated by:RFC 2290
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2002
This document specifies protocol enhancements that allow transparent routing of IP datagrams to mobile nodes in the Internet. Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which provides information about its current point of attachment to the Internet. The protocol provides for registering the care-of address with a home agent. The home agent sends datagrams destined for the mobile node through a tunnel to the care- of address. After arriving at the end of the tunnel, each datagram is then delivered to the mobile node.
 
RFC 2010 Operational Criteria for Root Name Servers
 
Authors:B. Manning, P. Vixie.
Date:October 1996
Formats:txt json html
Obsoleted by:RFC 2870
Status:INFORMATIONAL
DOI:10.17487/RFC 2010
This document specifies the operational requirements of root name servers, including host hardware capacities, name server software revisions, network connectivity, and physical environment.
 
RFC 2011 SNMPv2 Management Information Base for the Internet Protocol using SMIv2
 
Authors:K. McCloghrie, Ed..
Date:November 1996
Formats:txt json html
Obsoleted by:RFC 4293
Updates:RFC 1213
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2011
This document is the MIB module which defines managed objects for managing implementations of the Internet Protocol (IP) and its associated Internet Control Message Protocol (ICMP). [STANDARDS-TRACK]
 
RFC 2012 SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2
 
Authors:K. McCloghrie, Ed..
Date:November 1996
Formats:txt html json
Obsoleted by:RFC 4022
Updates:RFC 1213
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2012
This document is the MIB module which defines managed objects for managing implementations of the Transmission Control Protocol (TCP). [STANDARDS-TRACK]
 
RFC 2013 SNMPv2 Management Information Base for the User Datagram Protocol using SMIv2
 
Authors:K. McCloghrie, Ed..
Date:November 1996
Formats:txt html json
Obsoleted by:RFC 4113
Updates:RFC 1213
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2013
This document is the MIB module which defines managed objects for managing implementations of the User Datagram Protocol (UDP). [STANDARDS-TRACK]
 
RFC 2019 Transmission of IPv6 Packets Over FDDI
 
Authors:M. Crawford.
Date:October 1996
Formats:txt json html
Obsoleted by:RFC 2467
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2019
This memo specifies the MTU and frame format for transmission of IPv6 [IPV6] packets on FDDI networks, including a method for MTU determination in the presence of 802.1d bridges to other media. [STANDARDS-TRACK]
 
RFC 2021 Remote Network Monitoring Management Information Base Version 2 using SMIv2
 
Authors:S. Waldbusser.
Date:January 1997
Formats:txt json html
Obsoleted by:RFC 4502
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2021
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.In particular, it defines objects for managing remote network monitoring devices.
 
RFC 2023 IP Version 6 over PPP
 
Authors:D. Haskin, E. Allen.
Date:October 1996
Formats:txt html json
Obsoleted by:RFC 2472
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2023
The Point-to-Point Protocol (PPP) [1] provides a standard method of encapsulating Network Layer protocol information over point-to-point links. PPP also defines an extensible Link Control Protocol, and proposes a family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols.

This document defines the method for transmission of IP Version 6 [2] packets over PPP links as well as the Network Control Protocol (NCP) for establishing and configuring the IPv6 over PPP. It also specifies the method of forming IPv6 link-local addresses on PPP links.

 
RFC 2027 IAB and IESG Selection, Confirmation, and Recall Process: Operation of the Nominating and Recall Committees
 
Authors:J. Galvin.
Date:October 1996
Formats:txt html json
Obsoleted by:RFC 2282
Status:INFORMATIONAL
DOI:10.17487/RFC 2027
The process by which the members of the IAB and IESG are selected, confirmed, and recalled has been exercised four times since its formal creation. The evolution of the process has relied principally on oral tradition as a means by which the lessons learned could be passed on to successive committees. This document is a self- consistent, organized compilation of the process as it is known today.
 
RFC 2028 The Organizations Involved in the IETF Standards Process
 
Authors:R. Hovey, S. Bradner.
Date:October 1996
Formats:txt json html
Obsoleted by:RFC 9281
Updated by:RFC 3668, RFC 3979, RFC 8717
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 2028
This document describes the individuals and organizations involved in the IETF. This includes descriptions of the IESG, the IETF WorkingGroups and the relationship between the IETF and the InternetSociety.
 
RFC 2030 Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI
 
Authors:D. Mills.
Date:October 1996
Formats:txt json html
Obsoletes:RFC 1769
Obsoleted by:RFC 4330
Status:INFORMATIONAL
DOI:10.17487/RFC 2030
This memorandum describes the Simple Network Time Protocol (SNTP)Version 4, which is an adaptation of the Network Time Protocol (NTP) used to synchronize computer clocks in the Internet. SNTP can be used when the ultimate performance of the full NTP implementation described in RFC-1305 is not needed or justified. When operating with current and previous NTP and SNTP versions, SNTP Version 4 involves no changes to the NTP specification or known implementations, but rather a clarification of certain design features of NTP which allow operation in a simple, stateless remote-procedure call (RPC) mode with accuracy and reliability expectations similar to the UDP/TIME protocol described in RFC-868.

The only significant protocol change in SNTP Version 4 over previous versions of NTP and SNTP is a modified header interpretation to accommodate Internet Protocol Version 6 (IPv6) [DEE96] and OSI[COL94] addressing. However, SNTP Version 4 includes certain optional extensions to the basic Version 3 model, including an anycast mode and an authentication scheme designed specifically for multicast and anycast modes. While the anycast mode extension is described in this document, the authentication scheme extension will be described in another document to be published later. Until such time that a definitive specification is published, these extensions should be considered provisional.

This memorandum obsoletes RFC-1769, which describes SNTP Version 3.Its purpose is to correct certain inconsistencies in the previous document and to clarify header formats and protocol operations for current NTP Version 3 (IPv4) and proposed NTP Version 4 (IPv6 andOSI), which are also used for SNTP. A working knowledge of the NTPVersion 3 specification RFC-1305 is not required for an implementation of SNTP.

 
RFC 2031 IETF-ISOC relationship
 
Authors:E. Huizer.
Date:October 1996
Formats:txt json html
Obsoleted by:RFC 8712
Status:INFORMATIONAL
DOI:10.17487/RFC 2031
This memo summarises the issues on IETF - ISOC relationships as the have been discussed by the Poised Working Group. The purpose of the document is to gauge consensus on these issues. And to allow further discussions where necessary.
 
RFC 2032 RTP Payload Format for H.261 Video Streams
 
Authors:T. Turletti, C. Huitema.
Date:October 1996
Formats:txt html json
Obsoleted by:RFC 4587
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2032
This memo describes a scheme to packetize an H.261 video stream for transport using the Real-time Transport Protocol, RTP, with any of the underlying protocols that carry RTP. [STANDARDS-TRACK]
 
RFC 2035 RTP Payload Format for JPEG-compressed Video
 
Authors:L. Berc, W. Fenner, R. Frederick, S. McCanne.
Date:October 1996
Formats:txt json html
Obsoleted by:RFC 2435
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2035
This memo describes the RTP payload format for JPEG video streams.The packet format is optimized for real-time video streams where codec parameters change rarely from frame to frame.

This document is a product of the Audio-Video Transport working group within the Internet Engineering Task Force. Comments are solicited and should be addressed to the working group's mailing list at rem- conf@es.net and/or the author(s).

 
RFC 2037 Entity MIB using SMIv2
 
Authors:K. McCloghrie, A. Bierman.
Date:October 1996
Formats:txt html json
Obsoleted by:RFC 2737
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2037
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects used for managing multiple logical and physical entities managed by a single SNMP agent. [STANDARDS-TRACK]
 
RFC 2038 RTP Payload Format for MPEG1/MPEG2 Video
 
Authors:D. Hoffman, G. Fernando, V. Goyal.
Date:October 1996
Formats:txt json html
Obsoleted by:RFC 2250
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2038
This memo describes a packetization scheme for MPEG video and audio streams. The scheme proposed can be used to transport such a video or audio flow over the transport protocols supported by RTP. Two approaches are described. The first is designed to support maximum interoperability with MPEG System environments. The second is designed to provide maximum compatibility with other RTP-encapsulated media streams and future conference control work of the IETF.
 
RFC 2044 UTF-8, a transformation format of Unicode and ISO 10646
 
Authors:F. Yergeau.
Date:October 1996
Formats:txt html json
Obsoleted by:RFC 2279
Status:INFORMATIONAL
DOI:10.17487/RFC 2044
The Unicode Standard, version 1.1, and ISO/IEC 10646-1:1993 jointly define a 16 bit character set which encompasses most of the world's writing systems. 16-bit characters, however, are not compatible with many current applications and protocols, and this has led to the development of a few so-called UCS transformation formats (UTF), each with different characteristics. UTF-8, the object of this memo, has the characteristic of preserving the full US-ASCII range: US-ASCII characters are encoded in one octet having the usual US-ASCII value, and any octet with such a value can only be an US-ASCII character.This provides compatibility with file systems, parsers and other software that rely on US-ASCII values but are transparent to other values.
 
RFC 2048 Multipurpose Internet Mail Extensions (MIME) Part Four: Registration Procedures
 
Authors:N. Freed, J. Klensin, J. Postel.
Date:November 1996
Formats:txt html json
Obsoletes:RFC 1521, RFC 1522, RFC 1590
Obsoleted by:RFC 4288, RFC 4289
Updated by:RFC 3023
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 2048
STD 11, RFC 822, defines a message representation protocol specifying considerable detail about US-ASCII message headers, and leaves the message content, or message body, as flat US-ASCII text. This set of documents, collectively called the Multipurpose Internet MailExtensions, or MIME, redefines the format of messages to allow for

(1) textual message bodies in character sets other thanUS-ASCII,

(2) an extensible set of different formats for non-textual message bodies,

(3) multi-part message bodies, and

(4) textual header information in character sets other thanUS-ASCII.

These documents are based on earlier work documented in RFC 934, STD11, and RFC 1049, but extends and revises them. Because RFC 822 said so little about message bodies, these documents are largely orthogonal to (rather than a revision of) RFC 822.

This fourth document, RFC 2048, specifies various IANA registration procedures for the following MIME facilities:

(1) media types,

(2) external body access types,

(3) content-transfer-encodings.

Registration of character sets for use in MIME is covered elsewhere and is no longer addressed by this document.

These documents are revisions of RFCs 1521 and 1522, which themselves were revisions of RFCs 1341 and 1342. An appendix in RFC 2049 describes differences and changes from previous versions.

 
RFC 2050 Internet Registry IP Allocation Guidelines
 
Authors:K. Hubbard, M. Kosters, D. Conrad, D. Karrenberg, J. Postel.
Date:November 1996
Formats:txt html json
Obsoletes:RFC 1466
Obsoleted by:RFC 7020
Status:HISTORIC
DOI:10.17487/RFC 2050
This document describes the registry system for the distribution of globally unique Internet address space and registry operations.Particularly this document describes the rules and guidelines governing the distribution of this address space.

This document describes the IP assignment policies currently used by the Regional Registries to implement the guidelines developed by theIANA. The guidelines and these policies are subject to revision at the direction of the IANA. The registry working group (IRE WG) will be discussing these issues and may provide advice to the IANA about possible revisions.

This document replaces RFC 1466, with all the guidelines and procedures updated and modified in the light of experience.

This document does not describe private Internet address space and multicast address space. It also does not describe regional and local refinements of the global rules and guidelines.

This document can be considered the base set of operational guidelines in use by all registries. Additional guidelines may be imposed by a particular registry as appropriate.

 
RFC 2052 A DNS RR for specifying the location of services (DNS SRV)
 
Authors:A. Gulbrandsen, P. Vixie.
Date:October 1996
Formats:txt json html
Obsoleted by:RFC 2782
Status:EXPERIMENTAL
DOI:10.17487/RFC 2052
This document describes a DNS RR which specifies the location of the server(s) for a specific protocol and domain (like a more general form of MX).
 
RFC 2058 Remote Authentication Dial In User Service (RADIUS)
 
Authors:C. Rigney, A. Rubens, W. Simpson, S. Willens.
Date:January 1997
Formats:txt html json
Obsoleted by:RFC 2138
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2058
This document describes a protocol for carrying authentication, authorization, and configuration information between a Network AccessServer which desires to authenticate its links and a sharedAuthentication Server.
 
RFC 2059 RADIUS Accounting
 
Authors:C. Rigney.
Date:January 1997
Formats:txt html json
Obsoleted by:RFC 2139
Status:INFORMATIONAL
DOI:10.17487/RFC 2059
This document describes a protocol for carrying accounting information between a Network Access Server and a shared AccountingServer.
 
RFC 2060 Internet Message Access Protocol - Version 4rev1
 
Authors:M. Crispin.
Date:December 1996
Formats:txt html json
Obsoletes:RFC 1730
Obsoleted by:RFC 3501
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2060
The Internet Message Access Protocol, Version 4rev1 (IMAP4rev1) allows a client to access and manipulate electronic mail messages on a server. IMAP4rev1 permits manipulation of remote message folders, called "mailboxes", in a way that is functionally equivalent to local mailboxes. IMAP4rev1 also provides the capability for an offline client to resynchronize with the server (see also [IMAP-DISC]).

IMAP4rev1 includes operations for creating, deleting, and renaming mailboxes; checking for new messages; permanently removing messages; setting and clearing flags; [RFC-822] and [MIME-IMB] parsing; searching; and selective fetching of message attributes, texts, and portions thereof. Messages in IMAP4rev1 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers.

IMAP4rev1 supports a single server. A mechanism for accessing configuration information to support multiple IMAP4rev1 servers is discussed in [ACAP].

IMAP4rev1 does not specify a means of posting mail; this function is handled by a mail transfer protocol such as [SMTP].

IMAP4rev1 is designed to be upwards compatible from the [IMAP2] and unpublished IMAP2bis protocols. In the course of the evolution ofIMAP4rev1, some aspects in the earlier protocol have become obsolete.Obsolete commands, responses, and data formats which an IMAP4rev1 implementation may encounter when used with an earlier implementation are described in [IMAP-OBSOLETE].

Other compatibility issues with IMAP2bis, the most common variant of the earlier protocol, are discussed in [IMAP-COMPAT]. A full discussion of compatibility issues with rare (and presumed extinct) variants of [IMAP2] is in [IMAP-HISTORICAL]; this document is primarily of historical interest.

 
RFC 2063 Traffic Flow Measurement: Architecture
 
Authors:N. Brownlee, C. Mills, G. Ruth.
Date:January 1997
Formats:txt json html
Obsoleted by:RFC 2722
Status:EXPERIMENTAL
DOI:10.17487/RFC 2063
This document describes an architecture for the measurement and reporting of network traffic flows, discusses how this relates to an overall network traffic flow architecture, and describes how it can be used within the Internet. It is intended to provide a starting point for the Realtime Traffic Flow Measurement Working Group.
 
RFC 2064 Traffic Flow Measurement: Meter MIB
 
Authors:N. Brownlee.
Date:January 1997
Formats:txt html json
Obsoleted by:RFC 2720
Status:EXPERIMENTAL
DOI:10.17487/RFC 2064
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.In particular, this memo defines managed objects used for obtaining traffic flow information from network traffic meters.
 
RFC 2065 Domain Name System Security Extensions
 
Authors:D. Eastlake 3rd, C. Kaufman.
Date:January 1997
Formats:txt html json
Obsoleted by:RFC 2535
Updates:RFC 1034, RFC 1035
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2065
The Domain Name System (DNS) has become a critical operational part of the Internet infrastructure yet it has no strong security mechanisms to assure data integrity or authentication. Extensions to the DNS are described that provide these services to security aware resolvers or applications through the use of cryptographic digital signatures. These digital signatures are included in secured zones as resource records. Security can still be provided even through non-security aware DNS servers in many cases.

The extensions also provide for the storage of authenticated public keys in the DNS. This storage of keys can support general public key distribution service as well as DNS security. The stored keys enable security aware resolvers to learn the authenticating key of zones in addition to those for which they are initially configured. Keys associated with DNS names can be retrieved to support other protocols. Provision is made for a variety of key types and algorithms.

In addition, the security extensions provide for the optional authentication of DNS protocol transactions.

 
RFC 2068 Hypertext Transfer Protocol -- HTTP/1.1
 
Authors:R. Fielding, J. Gettys, J. Mogul, H. Frystyk, T. Berners-Lee.
Date:January 1997
Formats:txt html json
Obsoleted by:RFC 2616
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2068
The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, object-oriented protocol which can be used for many tasks, such as name servers and distributed object management systems, through extension of its request methods.A feature of HTTP is the typing and negotiation of data representation, allowing systems to be built independently of the data being transferred.

HTTP has been in use by the World-Wide Web global information initiative since 1990. This specification defines the protocol referred to as "HTTP/1.1".

 
RFC 2069 An Extension to HTTP : Digest Access Authentication
 
Authors:J. Franks, P. Hallam-Baker, J. Hostetler, P. Leach, A. Luotonen, E. Sink, L. Stewart.
Date:January 1997
Formats:txt html json
Obsoleted by:RFC 2617
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2069
The protocol referred to as "HTTP/1.0" includes the specification for a Basic Access Authentication scheme. This scheme is not considered to be a secure method of user authentication, as the user name and password are passed over the network as clear text. A specification for a different authentication scheme is needed to address this severe limitation. This document provides specification for such a scheme, referred to as "Digest Access Authentication". Like Basic,Digest access authentication verifies that both parties to a communication know a shared secret (a password); unlike Basic, this verification can be done without sending the password in the clear, which is Basic's biggest weakness. As with most other authentication protocols, the greatest sources of risks are usually found not in the core protocol itself but in policies and procedures surrounding its use.
 
RFC 2070 Internationalization of the Hypertext Markup Language
 
Authors:F. Yergeau, G. Nicol, G. Adams, M. Duerst.
Date:January 1997
Formats:txt html json
Obsoleted by:RFC 2854
Status:HISTORIC
DOI:10.17487/RFC 2070
The Hypertext Markup Language (HTML) is a markup language used to create hypertext documents that are platform independent. Initially, the application of HTML on the World Wide Web was seriously restricted by its reliance on the ISO-8859-1 coded character set, which is appropriate only for Western European languages. Despite this restriction, HTML has been widely used with other languages, using other coded character sets or character encodings, at the expense of interoperability.

This document is meant to address the issue of the internationalization (i18n, i followed by 18 letters followed by n) of HTML by extending the specification of HTML and giving additional recommendations for proper internationalization support. A foremost consideration is to make sure that HTML remains a valid application of SGML, while enabling its use with all languages of the world.

 
RFC 2073 An IPv6 Provider-Based Unicast Address Format
 
Authors:Y. Rekhter, P. Lothberg, R. Hinden, S. Deering, J. Postel.
Date:January 1997
Formats:txt json html
Obsoleted by:RFC 2374
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2073
This document defines an IPv6 provider-based unicast address format for use in the Internet. [STANDARDS-TRACK]
 
RFC 2074 Remote Network Monitoring MIB Protocol Identifiers
 
Authors:A. Bierman, R. Iddon.
Date:January 1997
Formats:txt html json
Obsoleted by:RFC 2895
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2074
This memo defines an experimental portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes the algorithms required to identify different protocol encapsulations managed with the Remote Network Monitoring MIB Version 2 [RMON2]. [STANDARDS-TRACK]
 
RFC 2078 Generic Security Service Application Program Interface, Version 2
 
Authors:J. Linn.
Date:January 1997
Formats:txt html json
Obsoletes:RFC 1508
Obsoleted by:RFC 2743
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2078
The Generic Security Service Application Program Interface (GSS-API), as defined in RFC-1508, provides security services to callers in a generic fashion, supportable with a range of underlying mechanisms and technologies and hence allowing source-level portability of applications to different environments. This specification definesGSS-API services and primitives at a level independent of underlying mechanism and programming language environment, and is to be complemented by other, related specifications: documents defining specific parameter bindings for particular language environments documents defining token formats, protocols, and procedures to be implemented in order to realize GSS-API services atop particular security mechanisms

This memo revises RFC-1508, making specific, incremental changes in response to implementation experience and liaison requests. It is intended, therefore, that this memo or a successor version thereto will become the basis for subsequent progression of the GSS-API specification on the standards track.

 
RFC 2082 RIP-2 MD5 Authentication
 
Authors:F. Baker, R. Atkinson.
Date:January 1997
Formats:txt json html
Obsoleted by:RFC 4822
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2082
Growth in the Internet has made us aware of the need for improved authentication of routing information. RIP-2 provides for unauthenticated service (as in classical RIP), or password authentication. [STANDARDS-TRACK]
 
RFC 2086 IMAP4 ACL extension
 
Authors:J. Myers.
Date:January 1997
Formats:txt json html
Obsoleted by:RFC 4314
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2086
The ACL extension of the Internet Message Access Protocol [IMAP4] permits access control lists to be manipulated through the IMAP protocol. [STANDARDS-TRACK]
 
RFC 2087 IMAP4 QUOTA extension
 
Authors:J. Myers.
Date:January 1997
Formats:txt json html
Obsoleted by:RFC 9208
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2087
The QUOTA extension of the Internet Message Access Protocol [IMAP4] permits administrative limits on resource usage (quotas) to be manipulated through the IMAP protocol. [STANDARDS-TRACK]
 
RFC 2088 IMAP4 non-synchronizing literals
 
Authors:J. Myers.
Date:January 1997
Formats:txt html json
Obsoleted by:RFC 7888
Updated by:RFC 4466
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2088
The Internet Message Access Protocol [IMAP4] contains the "literal" syntactic construct for communicating strings. When sending a literal from client to server, IMAP4 requires the client to wait for the server to send a command continuation request between sending the octet count and the string data. This document specifies an alternate form of literal which does not require this network round trip. [STANDARDS- TRACK]
 
RFC 2089 V2ToV1 Mapping SNMPv2 onto SNMPv1 within a bi-lingual SNMP agent
 
Authors:B. Wijnen, D. Levi.
Date:January 1997
Formats:txt html json
Obsoleted by:RFC 2576
Status:INFORMATIONAL
DOI:10.17487/RFC 2089
The goal of this memo is to document a common way of mapping anSNMPv2 response into an SNMPv1 response within a bi-lingual SNMP agent (one that supports both SNMPv1 and SNMPv2).
 
RFC 2095 IMAP/POP AUTHorize Extension for Simple Challenge/Response
 
Authors:J. Klensin, R. Catoe, P. Krumviede.
Date:January 1997
Formats:txt html json
Obsoleted by:RFC 2195
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2095
While IMAP4 supports a number of strong authentication mechanisms as described in RFC 1731, it lacks any mechanism that neither passes cleartext, reusable passwords across the network nor requires either a significant security infrastructure or that the mail server update a mail-system-wide user authentication file on each mail access.This specification provides a simple challenge-response authentication protocol that is suitable for use with IMAP4. Since it utilizes Keyed-MD5 digests and does not require that the secret be stored in the clear on the server, it may also constitute an improvement on APOP for POP3 use as specified in RFC 1734.
 
RFC 2096 IP Forwarding Table MIB
 
Authors:F. Baker.
Date:January 1997
Formats:txt json html
Obsoletes:RFC 1354
Obsoleted by:RFC 4292
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2096
This memo defines an update to RFC 1354. The significant difference between this MIB and RFC 1354 is the recognition (explicitly discussed but by consensus left to future work) that CIDR routes may have the same network number but different network masks. [STANDARDS-TRACK]
 
RFC 2106 Data Link Switching Remote Access Protocol
 
Authors:S. Chiang, J. Lee, H. Yasuda.
Date:February 1997
Formats:txt json html
Obsoleted by:RFC 2114
Status:INFORMATIONAL
DOI:10.17487/RFC 2106
This memo describes the Data Link Switching Remote Access Protocol that is used between workstations and routers to transport SNA/NetBIOS traffic over TCP sessions. Any questions or comments should be sent to drap@cisco.com.
 
RFC 2109 HTTP State Management Mechanism
 
Authors:D. Kristol, L. Montulli.
Date:February 1997
Formats:txt html json
Obsoleted by:RFC 2965
Status:HISTORIC
DOI:10.17487/RFC 2109
This document specifies a way to create a stateful session with HTTP requests and responses. It describes two new headers, Cookie and Set- Cookie, which carry state information between participating origin servers and user agents. The method described here differs from Netscape's Cookie proposal, but it can interoperate with HTTP/1.0 user agents that use Netscape's method. [STANDARDS-TRACK]
 
RFC 2110 MIME E-mail Encapsulation of Aggregate Documents, such as HTML (MHTML)
 
Authors:J. Palme, A. Hopmann.
Date:March 1997
Formats:txt html json
Obsoleted by:RFC 2557
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2110
Although HTML [RFC 1866] was designed within the context of MIME, more than the specification of HTML as defined in RFC 1866 is needed for two electronic mail user agents to be able to interoperate usingHTML as a document format. These issues include the naming of objects that are normally referred to by URIs, and the means of aggregating objects that go together. This document describes a set of guidelines that will allow conforming mail user agents to be able to send, deliver and display these objects, such as HTML objects, that can contain links represented by URIs. In order to be able to handle inter-linked objects, the document uses the MIME type multipart/related and specifies the MIME content-headers "Content-Location" and "Content-Base".
 
RFC 2111 Content-ID and Message-ID Uniform Resource Locators
 
Authors:E. Levinson.
Date:March 1997
Formats:txt html json
Obsoleted by:RFC 2392
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2111
The Uniform Resource Locator (URL) schemes, "cid:" and "mid:" allow references to messages and the body parts of messages. For example, within a single multipart message, one HTML body part might include embedded references to other parts of the same message.
 
RFC 2112 The MIME Multipart/Related Content-type
 
Authors:E. Levinson.
Date:March 1997
Formats:txt json html
Obsoletes:RFC 1872
Obsoleted by:RFC 2387
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2112
The Multipart/Related content-type provides a common mechanism for representing objects that are aggregates of related MIME body parts.This document defines the Multipart/Related content-type and provides examples of its use.
 
RFC 2117 Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification
 
Authors:D. Estrin, D. Farinacci, A. Helmy, D. Thaler, S. Deering, M. Handley, V. Jacobson, C. Liu, P. Sharma, L. Wei.
Date:June 1997
Formats:txt json html
Obsoleted by:RFC 2362
Status:EXPERIMENTAL
DOI:10.17487/RFC 2117
This document describes a protocol for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. This memo defines an Experimental Protocol for the Internet community.
 
RFC 2133 Basic Socket Interface Extensions for IPv6
 
Authors:R. Gilligan, S. Thomson, J. Bound, W. Stevens.
Date:April 1997
Formats:txt json html
Obsoleted by:RFC 2553
Status:INFORMATIONAL
DOI:10.17487/RFC 2133
The de facto standard application program interface (API) for TCP/IP applications is the "sockets" interface. Although this API was developed for Unix in the early 1980s it has also been implemented on a wide variety of non-Unix systems. TCP/IP applications written using the sockets API have in the past enjoyed a high degree of portability and we would like the same portability with IPv6 applications. But changes are required to the sockets API to supportIPv6 and this memo describes these changes. These include a new socket address structure to carry IPv6 addresses, new address conversion functions, and some new socket options. These extensions are designed to provide access to the basic IPv6 features required byTCP and UDP applications, including multicasting, while introducing a minimum of change into the system and providing complete compatibility for existing IPv4 applications. Additional extensions for advanced IPv6 features (raw sockets and access to the IPv6 extension headers) are defined in another document [5].
 
RFC 2137 Secure Domain Name System Dynamic Update
 
Authors:D. Eastlake 3rd.
Date:April 1997
Formats:txt json html
Obsoleted by:RFC 3007
Updates:RFC 1035
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2137
Domain Name System (DNS) protocol extensions have been defined to authenticate the data in DNS and provide key distribution services[RFC2065]. DNS Dynamic Update operations have also been defined[RFC2136], but without a detailed description of security for the update operation. This memo describes how to use DNSSEC digital signatures covering requests and data to secure updates and restrict updates to those authorized to perform them as indicated by the updater's possession of cryptographic keys.
 
RFC 2138 Remote Authentication Dial In User Service (RADIUS)
 
Authors:C. Rigney, A. Rubens, W. Simpson, S. Willens.
Date:April 1997
Formats:txt html json
Obsoletes:RFC 2058
Obsoleted by:RFC 2865
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2138
This document describes a protocol for carrying authentication, authorization, and configuration information between a Network AccessServer which desires to authenticate its links and a sharedAuthentication Server.
 
RFC 2139 RADIUS Accounting
 
Authors:C. Rigney.
Date:April 1997
Formats:txt html json
Obsoletes:RFC 2059
Obsoleted by:RFC 2866
Status:INFORMATIONAL
DOI:10.17487/RFC 2139
This document describes a protocol for carrying accounting information between a Network Access Server and a shared AccountingServer.
 
RFC 2140 TCP Control Block Interdependence
 
Authors:J. Touch.
Date:April 1997
Formats:txt json html
Obsoleted by:RFC 9040
Status:INFORMATIONAL
DOI:10.17487/RFC 2140
This memo makes the case for interdependent TCP control blocks, where part of the TCP state is shared among similar concurrent connections, or across similar connection instances. TCP state includes a combination of parameters, such as connection state, current round- trip time estimates, congestion control information, and process information. This state is currently maintained on a per-connection basis in the TCP control block, but should be shared across connections to the same host. The goal is to improve transient transport performance, while maintaining backward-compatibility with existing implementations.

This document is a product of the LSAM project at ISI.

 
RFC 2141 URN Syntax
 
Authors:R. Moats.
Date:May 1997
Formats:txt json html
Obsoleted by:RFC 8141
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2141
Uniform Resource Names (URNs) are intended to serve as persistent, location-independent, resource identifiers. This document sets forward the canonical syntax for URNs. A discussion of both existing legacy and new namespaces and requirements for URN presentation and transmission are presented. Finally, there is a discussion of URN equivalence and how to determine it.
 
RFC 2145 Use and Interpretation of HTTP Version Numbers
 
Authors:J. C. Mogul, R. Fielding, J. Gettys, H. Frystyk.
Date:May 1997
Formats:txt json html
Obsoleted by:RFC 7230
Status:INFORMATIONAL
DOI:10.17487/RFC 2145
HTTP request and response messages include an HTTP protocol version number. Some confusion exists concerning the proper use and interpretation of HTTP version numbers, and concerning interoperability of HTTP implementations of different protocol versions. This document is an attempt to clarify the situation. It is not a modification of the intended meaning of the existingHTTP/1.0 and HTTP/1.1 documents, but it does describe the intention of the authors of those documents, and can be considered definitive when there is any ambiguity in those documents concerning HTTP version numbers, for all versions of HTTP.
 
RFC 2147 TCP and UDP over IPv6 Jumbograms
 
Authors:D. Borman.
Date:May 1997
Formats:txt html json
Obsoleted by:RFC 2675
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2147
IPv6 supports datagrams larger than 65535 bytes long, often referred to as jumbograms, through use of the Jumbo Payload hop-by-hop option. The UDP protocol has a 16-bit length field that keeps it from being able to make use of jumbograms, and though TCP does not have a length field, both the MSS option and the Urgent field are constrained by 16-bits. This document describes some simple changes that can be made to allow TCP and UDP to make use of IPv6 jumbograms. [STANDARDS-TRACK]
 
RFC 2155 Definitions of Managed Objects for APPN using SMIv2
 
Authors:B. Clouston, B. Moore.
Date:June 1997
Formats:txt json html
Obsoleted by:RFC 2455
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2155
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it defines objects for monitoring and controlling network devices with APPN (Advanced Peer-to-Peer Networking) capabilities. This memo identifies managed objects for the APPN protocol. [STANDARDS- TRACK]
 
RFC 2168 Resolution of Uniform Resource Identifiers using the Domain Name System
 
Authors:R. Daniel, M. Mealling.
Date:June 1997
Formats:txt json html
Obsoleted by:RFC 3401, RFC 3402, RFC 3403, RFC 3404
Updated by:RFC 2915
Status:EXPERIMENTAL
DOI:10.17487/RFC 2168
The requirements document for URN resolution systems defines the concept of a "resolver discovery service". This document describes the first, experimental, RDS. It is implemented by a new DNS Resource Record, NAPTR (Naming Authority PoinTeR), that provides rules for mapping parts of URIs to domain names. This memo defines an Experimental Protocol for the Internet community.
 
RFC 2178 OSPF Version 2
 
Authors:J. Moy.
Date:July 1997
Formats:txt json html
Obsoletes:RFC 1583
Obsoleted by:RFC 2328
Status:DRAFT STANDARD
DOI:10.17487/RFC 2178
This memo documents version 2 of the OSPF protocol. OSPF is a link- state routing protocol. It is designed to be run internal to a single Autonomous System. Each OSPF router maintains an identical database describing the Autonomous System's topology. From this database, a routing table is calculated by constructing a shortest- path tree.

OSPF recalculates routes quickly in the face of topological changes, utilizing a minimum of routing protocol traffic. OSPF provides support for equal-cost multipath. An area routing capability is provided, enabling an additional level of routing protection and a reduction in routing protocol traffic. In addition, all OSPF routing protocol exchanges are authenticated.

The differences between this memo and RFC 1583 are explained inAppendix G. All differences are backward-compatible in nature.Implementations of this memo and of RFC 1583 will interoperate.

Please send comments to ospf@gated.cornell.edu.

 
RFC 2184 MIME Parameter Value and Encoded Word Extensions: Character Sets, Languages, and Continuations
 
Authors:N. Freed, K. Moore.
Date:August 1997
Formats:txt json html
Obsoleted by:RFC 2231
Updates:RFC 2045, RFC 2047, RFC 2183
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2184
This memo defines extensions to the RFC 2045 media type and RFC 2183 disposition parameter value mechanisms. [STANDARDS-TRACK]
 
RFC 2192 IMAP URL Scheme
 
Authors:C. Newman.
Date:September 1997
Formats:txt html json
Obsoleted by:RFC 5092
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2192
IMAP [IMAP4] is a rich protocol for accessing remote message stores. It provides an ideal mechanism for accessing public mailing list archives as well as private and shared message stores.This document defines a URL scheme for referencing objects on anIMAP server.
 
RFC 2197 SMTP Service Extension for Command Pipelining
 
Authors:N. Freed.
Date:September 1997
Formats:txt html json
Obsoletes:RFC 1854
Obsoleted by:RFC 2920
Status:DRAFT STANDARD
DOI:10.17487/RFC 2197
This memo defines an extension to the SMTP service whereby a server can indicate the extent of its ability to accept multiple commands in a single TCP send operation. [STANDARDS-TRACK]
 
RFC 2200 Internet Official Protocol Standards
 
Authors:J. Postel.
Date:June 1997
Formats:txt json html
Obsoletes:RFC 1250, RFC 2000
Obsoleted by:RFC 2300
Status:HISTORIC
DOI:10.17487/RFC 2200
A discussion of the standardization process and the RFC document series is presented first, followed by an explanation of the terms. Sections 6.2 - 6.10 contain the lists of protocols in each stage of standardization. Finally are pointers to references and contacts for further information. [STANDARDS-TRACK]
 
RFC 2204 ODETTE File Transfer Protocol
 
Authors:D. Nash.
Date:September 1997
Formats:txt json html
Obsoleted by:RFC 5024
Status:INFORMATIONAL
DOI:10.17487/RFC 2204
This memo describes a file transfer protocol to facilitate electronic data interchange between trading partners.

The protocol, denoted the ODETTE File Transfer Protocol, supports both direct communication between installations and indirect communication via a third party clearing centre. It was developed by the Organisation for Data Exchange by Tele Transmission in Europe to facilitate communication within the European motor industry and is presented here to allow for wider use within the Internet community.

 
RFC 2222 Simple Authentication and Security Layer (SASL)
 
Authors:J. Myers.
Date:October 1997
Formats:txt html json
Obsoleted by:RFC 4422, RFC 4752
Updated by:RFC 2444
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2222
This document describes a method for adding authentication support to connection-based protocols. [STANDARDS-TRACK]
 
RFC 2223 Instructions to RFC Authors
 
Authors:J. Postel, J. Reynolds.
Date:October 1997
Formats:txt html json
Obsoletes:RFC 1543, RFC 1111, RFC 0825
Obsoleted by:RFC 7322
Updated by:RFC 5741, RFC 6949
Status:INFORMATIONAL
DOI:10.17487/RFC 2223
This Request for Comments (RFC) provides information about the preparation of RFCs, and certain policies relating to the publication of RFCs. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.
 
RFC 2233 The Interfaces Group MIB using SMIv2
 
Authors:K. McCloghrie, F. Kastenholz.
Date:November 1997
Formats:txt html json
Obsoletes:RFC 1573
Obsoleted by:RFC 2863
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2233
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects used for managing Network Interfaces. [STANDARDS-TRACK]
 
RFC 2234 Augmented BNF for Syntax Specifications: ABNF
 
Authors:D. Crocker, Ed., P. Overell.
Date:November 1997
Formats:txt json html
Obsoleted by:RFC 4234
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2234
In the early days of the Arpanet, each specification contained its own definition of ABNF. This included the email specifications, RFC733 and then RFC822 which have come to be the common citations for defining ABNF. The current document separates out that definition, to permit selective reference. Predictably, it also provides some modifications and enhancements. [STANDARDS-TRACK]
 
RFC 2239 Definitions of Managed Objects for IEEE 802.3 Medium Attachment Units (MAUs) using SMIv2
 
Authors:K. de Graaf, D. Romascanu, D. McMaster, K. McCloghrie, S. Roberts.
Date:November 1997
Formats:txt json html
Obsoleted by:RFC 2668
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2239
This memo defines an portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it defines objects for managing 10 and 100 Mb/secondMedium Attachment Units (MAUs) based on IEEE Std 802.3 Section 30,"10 & 100 Mb/s Management," October 26, 1995.
 
RFC 2240 A Legal Basis for Domain Name Allocation
 
Authors:O. Vaughan.
Date:November 1997
Formats:txt html json
Obsoleted by:RFC 2352
Status:INFORMATIONAL
DOI:10.17487/RFC 2240
The purpose of this memo is to focus discussion on the particular problems with the exhaustion of the top level domain space in the Internet and the possible conflicts that can occur when multiple organisations are vying for the same name. This memo provides information for the Internet community. It does not specify an Internet standard of any kind.
 
RFC 2245 Anonymous SASL Mechanism
 
Authors:C. Newman.
Date:November 1997
Formats:txt html json
Obsoleted by:RFC 4505
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2245
It is common practice on the Internet to permit anonymous access to various services. Traditionally, this has been done with a plain text password mechanism using "anonymous" as the user name and optional trace information, such as an email address, as the password. As plaintext login commands are not permitted in new IETF protocols, a new way to provide anonymous login is needed within the context of the SASL [SASL] framework.
 
RFC 2246 The TLS Protocol Version 1.0
 
Authors:T. Dierks, C. Allen.
Date:January 1999
Formats:txt json html
Obsoleted by:RFC 4346
Updated by:RFC 3546, RFC 5746, RFC 6176, RFC 7465, RFC 7507, RFC 7919
Status:HISTORIC
DOI:10.17487/RFC 2246
This document specifies Version 1.0 of the Transport Layer Security(TLS) protocol. The TLS protocol provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.
 
RFC 2248 Network Services Monitoring MIB
 
Authors:N. Freed, S. Kille.
Date:January 1998
Formats:txt html json
Obsoletes:RFC 1565
Obsoleted by:RFC 2788
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2248
This MIB may be used on its own for any application, and for most simple applications this will suffice. This MIB is also designed to serve as a building block which can be used in conjunction with application- specific monitoring and management. [STANDARDS-TRACK]
 
RFC 2249 Mail Monitoring MIB
 
Authors:N. Freed, S. Kille.
Date:January 1998
Formats:txt html json
Obsoletes:RFC 1566
Obsoleted by:RFC 2789
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2249
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. Specifically, this memo extends the basic Network Services Monitoring MIB [8] to allow monitoring of Message Transfer Agents (MTAs). It may also be used to monitor MTA components within gateways. [STANDARDS- TRACK]
 
RFC 2251 Lightweight Directory Access Protocol (v3)
 
Authors:M. Wahl, T. Howes, S. Kille.
Date:December 1997
Formats:txt html json
Obsoleted by:RFC 4510, RFC 4511, RFC 4513, RFC 4512
Updated by:RFC 3377, RFC 3771
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2251
The protocol described in this document is designed to provide access to directories supporting the X.500 models, while not incurring the resource requirements of the X.500 Directory Access Protocol (DAP). [STANDARDS-TRACK]
 
RFC 2252 Lightweight Directory Access Protocol (v3): Attribute Syntax Definitions
 
Authors:M. Wahl, A. Coulbeck, T. Howes, S. Kille.
Date:December 1997
Formats:txt json html
Obsoleted by:RFC 4510, RFC 4517, RFC 4523, RFC 4512
Updated by:RFC 3377
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2252
This document defines a set of syntaxes for LDAPv3, and the rules by which attribute values of these syntaxes are represented as octet strings for transmission in the LDAP protocol. [STANDARDS-TRACK]
 
RFC 2253 Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Distinguished Names
 
Authors:M. Wahl, S. Kille, T. Howes.
Date:December 1997
Formats:txt json html
Obsoletes:RFC 1779
Obsoleted by:RFC 4510, RFC 4514
Updated by:RFC 3377
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2253
The X.500 Directory uses distinguished names as the primary keys to entries in the directory. Distinguished Names are encoded in ASN.1 in the X.500 Directory protocols. In the Lightweight DirectoryAccess Protocol, a string representation of distinguished names is transferred. This specification defines the string format for representing names, which is designed to give a clean representation of commonly used distinguished names, while being able to represent any distinguished name.
 
RFC 2254 The String Representation of LDAP Search Filters
 
Authors:T. Howes.
Date:December 1997
Formats:txt html json
Obsoletes:RFC 1960
Obsoleted by:RFC 4510, RFC 4515
Updated by:RFC 3377
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2254
This document defines a human-readable string format for representing LDAP search filters. [STANDARDS-TRACK]
 
RFC 2255 The LDAP URL Format
 
Authors:T. Howes, M. Smith.
Date:December 1997
Formats:txt html json
Obsoletes:RFC 1959
Obsoleted by:RFC 4510, RFC 4516
Updated by:RFC 3377
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2255
This document describes a format for an LDAP Uniform Resource Locator. [STANDARDS-TRACK]
 
RFC 2256 A Summary of the X.500(96) User Schema for use with LDAPv3
 
Authors:M. Wahl.
Date:December 1997
Formats:txt json html
Obsoleted by:RFC 4517, RFC 4519, RFC 4523, RFC 4512, RFC 4510
Updated by:RFC 3377
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2256
This document provides an overview of the attribute types and object classes defined by the ISO and ITU-T committees in the X.500 documents, in particular those intended for use by directory clients. [STANDARDS- TRACK]
 
RFC 2257 Agent Extensibility (AgentX) Protocol Version 1
 
Authors:M. Daniele, B. Wijnen, D. Francisco.
Date:January 1998
Formats:txt json html
Obsoleted by:RFC 2741
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2257
This memo defines a standardized framework for extensible SNMP agents. It defines processing entities called master agents and subagents, a protocol (AgentX) used to communicate between them, and the elements of procedure by which the extensible agent processes SNMP protocol messages. [STANDARDS-TRACK]
 
RFC 2261 An Architecture for Describing SNMP Management Frameworks
 
Authors:D. Harrington, R. Presuhn, B. Wijnen.
Date:January 1998
Formats:txt html json
Obsoleted by:RFC 2271
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2261
This document describes an architecture for describing SNMPManagement Frameworks. The architecture is designed to be modular to allow the evolution of the SNMP protocol standards over time. The major portions of the architecture are an SNMP engine containing aMessage Processing Subsystem, a Security Subsystem and an AccessControl Subsystem, and possibly multiple SNMP applications which provide specific functional processing of management data.
 
RFC 2262 Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)
 
Authors:J. Case, D. Harrington, R. Presuhn, B. Wijnen.
Date:January 1998
Formats:txt json html
Obsoleted by:RFC 2272
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2262
This document describes the Message Processing and Dispatching forSNMP messages within the SNMP architecture [RFC2261]. It defines the procedures for dispatching potentially multiple versions of SNMP messages to the proper SNMP Message Processing Models, and for dispatching PDUs to SNMP applications. This document also describes one Message Processing Model - the SNMPv3 Message Processing Model.
 
RFC 2263 SNMPv3 Applications
 
Authors:D. Levi, P. Meyer, B. Stewart.
Date:January 1998
Formats:txt json html
Obsoleted by:RFC 2273
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2263
This memo describes five types of SNMP applications which make use of an SNMP engine as described in [RFC2261]. The types of application described are Command Generators, Command Responders, NotificationOriginators, Notification Receivers, and Proxy Forwarders.

This memo also defines MIB modules for specifying targets of management operations, for notification filtering, and for proxy forwarding.

 
RFC 2264 User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)
 
Authors:U. Blumenthal, B. Wijnen.
Date:January 1998
Formats:txt html json
Obsoleted by:RFC 2274
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2264
This document describes the User-based Security Model (USM) for SNMP version 3 for use in the SNMP architecture [RFC2261]. It defines theElements of Procedure for providing SNMP message level security.This document also includes a MIB for remotely monitoring/managing the configuration parameters for this Security Model.
 
RFC 2265 View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)
 
Authors:B. Wijnen, R. Presuhn, K. McCloghrie.
Date:January 1998
Formats:txt html json
Obsoleted by:RFC 2275
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2265
This document describes the View-based Access Control Model for use in the SNMP architecture [RFC2261]. It defines the Elements ofProcedure for controlling access to management information. This document also includes a MIB for remotely managing the configuration parameters for the View-based Access Control Model.
 
RFC 2267 Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing
 
Authors:P. Ferguson, D. Senie.
Date:January 1998
Formats:txt json html
Obsoleted by:RFC 2827
Status:INFORMATIONAL
DOI:10.17487/RFC 2267
Recent occurrences of various Denial of Service (DoS) attacks which have employed forged source addresses have proven to be a troublesome issue for Internet Service Providers and the Internet community overall. This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.
 
RFC 2271 An Architecture for Describing SNMP Management Frameworks
 
Authors:D. Harrington, R. Presuhn, B. Wijnen.
Date:January 1998
Formats:txt html json
Obsoletes:RFC 2261
Obsoleted by:RFC 2571
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2271
This document describes an architecture for describing SNMPManagement Frameworks. The architecture is designed to be modular to allow the evolution of the SNMP protocol standards over time. The major portions of the architecture are an SNMP engine containing aMessage Processing Subsystem, a Security Subsystem and an AccessControl Subsystem, and possibly multiple SNMP applications which provide specific functional processing of management data.
 
RFC 2272 Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)
 
Authors:J. Case, D. Harrington, R. Presuhn, B. Wijnen.
Date:January 1998
Formats:txt json html
Obsoletes:RFC 2262
Obsoleted by:RFC 2572
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2272
This document describes the Message Processing and Dispatching forSNMP messages within the SNMP architecture [RFC2271]. It defines the procedures for dispatching potentially multiple versions of SNMP messages to the proper SNMP Message Processing Models, and for dispatching PDUs to SNMP applications. This document also describes one Message Processing Model - the SNMPv3 Message Processing Model.
 
RFC 2273 SNMPv3 Applications
 
Authors:D. Levi, P. Meyer, B. Stewart.
Date:January 1998
Formats:txt json html
Obsoletes:RFC 2263
Obsoleted by:RFC 2573
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2273
This memo describes five types of SNMP applications which make use of an SNMP engine as described in [RFC2271]. The types of application described are Command Generators, Command Responders, NotificationOriginators, Notification Receivers, and Proxy Forwarders.

This memo also defines MIB modules for specifying targets of management operations, for notification filtering, and for proxy forwarding.

 
RFC 2274 User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)
 
Authors:U. Blumenthal, B. Wijnen.
Date:January 1998
Formats:txt html json
Obsoletes:RFC 2264
Obsoleted by:RFC 2574
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2274
This document describes the User-based Security Model (USM) for SNMP version 3 for use in the SNMP architecture [RFC2271]. It defines theElements of Procedure for providing SNMP message level security.This document also includes a MIB for remotely monitoring/managing the configuration parameters for this Security Model.
 
RFC 2275 View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)
 
Authors:B. Wijnen, R. Presuhn, K. McCloghrie.
Date:January 1998
Formats:txt html json
Obsoletes:RFC 2265
Obsoleted by:RFC 2575
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2275
This document describes the View-based Access Control Model for use in the SNMP architecture [RFC2271]. It defines the Elements ofProcedure for controlling access to management information. This document also includes a MIB for remotely managing the configuration parameters for the View-based Access Control Model.
 
RFC 2278 IANA Charset Registration Procedures
 
Authors:N. Freed, J. Postel.
Date:January 1998
Formats:txt html json
Obsoleted by:RFC 2978
Status:INFORMATIONAL
DOI:10.17487/RFC 2278
MIME [RFC-2045, RFC-2046, RFC-2047, RFC-2184] and various other modern Internet protocols are capable of using many different charsets. This in turn means that the ability to label different charsets is essential. This registration procedure exists solely to associate a specific name or names with a given charset and to give an indication of whether or not a given charset can be used in MIME text objects. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.
 
RFC 2279 UTF-8, a transformation format of ISO 10646
 
Authors:F. Yergeau.
Date:January 1998
Formats:txt html json
Obsoletes:RFC 2044
Obsoleted by:RFC 3629
Status:DRAFT STANDARD
DOI:10.17487/RFC 2279
ISO/IEC 10646-1 defines a multi-octet character set called theUniversal Character Set (UCS) which encompasses most of the world's writing systems. Multi-octet characters, however, are not compatible with many current applications and protocols, and this has led to the development of a few so-called UCS transformation formats (UTF), each with different characteristics. UTF-8, the object of this memo, has the characteristic of preserving the full US-ASCII range, providing compatibility with file systems, parsers and other software that rely on US-ASCII values but are transparent to other values. This memo updates and replaces RFC 2044, in particular addressing the question of versions of the relevant standards.
 
RFC 2280 Routing Policy Specification Language (RPSL)
 
Authors:C. Alaettinoglu, T. Bates, E. Gerich, D. Karrenberg, D. Meyer, M. Terpstra, C. Villamizar.
Date:January 1998
Formats:txt html json
Obsoleted by:RFC 2622
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2280
This memo is the reference document for the Routing Policy Specification Language (RPSL). RPSL allows a network operator to be able to specify routing policies at various levels in the Internet hierarchy; for example at the Autonomous System (AS) level. At the same time, policies can be specified with sufficient detail in RPSL so that low level router configurations can be generated from them. RPSL is extensible; new routing protocols and new protocol features can be introduced at any time. [STANDARDS-TRACK]
 
RFC 2282 IAB and IESG Selection, Confirmation, and Recall Process: Operation of the Nominating and Recall Committees
 
Authors:J. Galvin.
Date:February 1998
Formats:txt json html
Obsoletes:RFC 2027
Obsoleted by:RFC 2727
Status:INFORMATIONAL
DOI:10.17487/RFC 2282
The process by which the members of the IAB and IESG are selected, confirmed, and recalled is specified. The evolution of the process has relied principally on oral tradition as a means by which the lessons learned could be passed on to successive committees. This document is a self-consistent, organized compilation of the process as it is known today.
 
RFC 2283 Multiprotocol Extensions for BGP-4
 
Authors:T. Bates, R. Chandra, D. Katz, Y. Rekhter.
Date:February 1998
Formats:txt json html
Obsoleted by:RFC 2858
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2283
This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, etc...). The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions. [STANDARDS-TRACK]
 
RFC 2284 PPP Extensible Authentication Protocol (EAP)
 
Authors:L. Blunk, J. Vollbrecht.
Date:March 1998
Formats:txt html json
Obsoleted by:RFC 3748
Updated by:RFC 2484
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2284
The Point-to-Point Protocol (PPP) [1] provides a standard method for transporting multi-protocol datagrams over point-to-point links.

PPP also defines an extensible Link Control Protocol, which allows negotiation of an Authentication Protocol for authenticating its peer before allowing Network Layer protocols to transmit over the link.

This document defines the PPP Extensible Authentication Protocol.

 
RFC 2292 Advanced Sockets API for IPv6
 
Authors:W. Stevens, M. Thomas.
Date:February 1998
Formats:txt json html
Obsoleted by:RFC 3542
Status:INFORMATIONAL
DOI:10.17487/RFC 2292
Specifications are in progress for changes to the sockets API to support IP version 6 [RFC-2133]. These changes are for TCP and UDP- based applications and will support most end-user applications in use today: Telnet and FTP clients and servers, HTTP clients and servers, and the like.

But another class of applications exists that will also be run underIPv6. We call these "advanced" applications and today this includes programs such as Ping, Traceroute, routing daemons, multicast routing daemons, router discovery daemons, and the like. The API feature typically used by these programs that make them "advanced" is a raw socket to access ICMPv4, IGMPv4, or IPv4, along with some knowledge of the packet header formats used by these protocols. To provide portability for applications that use raw sockets under IPv6, some standardization is needed for the advanced API features.

There are other features of IPv6 that some applications will need to access: interface identification (specifying the outgoing interface and determining the incoming interface) and IPv6 extension headers that are not addressed in [RFC-2133]: Hop-by-Hop options, Destination options, and the Routing header (source routing). This document provides API access to these features too.

 
RFC 2298 An Extensible Message Format for Message Disposition Notifications
 
Authors:R. Fajman.
Date:March 1998
Formats:txt html json
Obsoleted by:RFC 3798
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2298
This memo defines a MIME content-type that may be used by a mail user agent (UA) or electronic mail gateway to report the disposition of a message after it has been sucessfully delivered to a recipient. This content-type is intended to be machine-processable. Additional message headers are also defined to permit Message DispositionNotifications (MDNs) to be requested by the sender of a message. The purpose is to extend Internet Mail to support functionality often found in other messaging systems, such as X.400 and the proprietary"LAN-based" systems, and often referred to as "read receipts,""acknowledgements," or "receipt notifications." The intention is to do this while respecting the privacy concerns that have often been expressed when such functions have been discussed in the past.

Because many messages are sent between the Internet and other messaging systems (such as X.400 or the proprietary "LAN-based" systems), the MDN protocol is designed to be useful in a multi- protocol messaging environment. To this end, the protocol described in this memo provides for the carriage of "foreign" addresses, in addition to those normally used in Internet Mail. Additional attributes may also be defined to support "tunneling" of foreign notifications through Internet Mail.

 
RFC 2300 Internet Official Protocol Standards
 
Authors:J. Postel.
Date:May 1998
Formats:txt html json
Obsoletes:RFC 2200
Obsoleted by:RFC 2400
Status:HISTORIC
DOI:10.17487/RFC 2300
A discussion of the standardization process and the RFC document series is presented first, followed by an explanation of the terms. Sections 6.2 - 6.10 contain the lists of protocols in each stage of standardization. Finally are pointers to references and contacts for further information. [STANDARDS-TRACK]
 
RFC 2301 File Format for Internet Fax
 
Authors:L. McIntyre, S. Zilles, R. Buckley, D. Venable, G. Parsons, J. Rafferty.
Date:March 1998
Formats:txt html json
Obsoleted by:RFC 3949
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2301
This document describes the TIFF (Tag Image File Format) representation of image data specified by the ITU-T Recommendations for black-and-white and color facsimile. This file format specification is commonly known as TIFF-FX. It formally defines minimal, extended and lossless JBIG modes (Profiles S, F, J) for black-and-white fax, and base JPEG, lossless JBIG and Mixed RasterContent modes (Profiles C, L, M) for color and grayscale fax. These modes or profiles correspond to the content of the applicable ITU-TRecommendations. Files formatted according to this specification use the image/tiff MIME Content Type.
 
RFC 2302 Tag Image File Format (TIFF) - image/tiff MIME Sub-type Registration
 
Authors:G. Parsons, J. Rafferty, S. Zilles.
Date:March 1998
Formats:txt json html
Obsoleted by:RFC 3302
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2302
This document describes the registration of the MIME sub-type image/tiff. [STANDARDS-TRACK]
 
RFC 2303 Minimal PSTN address format in Internet Mail
 
Authors:C. Allocchio.
Date:March 1998
Formats:txt json html
Obsoleted by:RFC 3191
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2303
This memo describes the MINIMAL addressing method to encode PSTN addresses into e-mail addresses and the standard extension mechanism to allow definition of further standard elements. [STANDARDS-TRACK]
 
RFC 2304 Minimal FAX address format in Internet Mail
 
Authors:C. Allocchio.
Date:March 1998
Formats:txt html json
Obsoleted by:RFC 3192
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2304
This memo describes the MINIMAL addressing method and standard extensions to encode FAX addresses in e-mail addresses. [STANDARDS- TRACK]
 
RFC 2305 A Simple Mode of Facsimile Using Internet Mail
 
Authors:K. Toyoda, H. Ohno, J. Murai, D. Wing.
Date:March 1998
Formats:txt html json
Obsoleted by:RFC 3965
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2305
This specification provides for "simple mode" carriage of facsimile data over the Internet. [STANDARDS-TRACK]
 
RFC 2309 Recommendations on Queue Management and Congestion Avoidance in the Internet
 
Authors:B. Braden, D. Clark, J. Crowcroft, B. Davie, S. Deering, D. Estrin, S. Floyd, V. Jacobson, G. Minshall, C. Partridge, L. Peterson, K. Ramakrishnan, S. Shenker, J. Wroclawski, L. Zhang.
Date:April 1998
Formats:txt html json
Obsoleted by:RFC 7567
Updated by:RFC 7141
Status:INFORMATIONAL
DOI:10.17487/RFC 2309
This memo presents two recommendations to the Internet community concerning measures to improve and preserve Internet performance.It presents a strong recommendation for testing, standardization, and widespread deployment of active queue management in routers, to improve the performance of today's Internet. It also urges a concerted effort of research, measurement, and ultimate deployment of router mechanisms to protect the Internet from flows that are not sufficiently responsive to congestion notification.
 
RFC 2313 PKCS #1: RSA Encryption Version 1.5
 
Authors:B. Kaliski.
Date:March 1998
Formats:txt json html
Obsoleted by:RFC 2437
Status:INFORMATIONAL
DOI:10.17487/RFC 2313
This document describes a method for encrypting data using the RSA public-key cryptosystem. This memo provides information for the Internet community. It does not specify an Internet standard of any kind.
 
RFC 2314 PKCS #10: Certification Request Syntax Version 1.5
 
Authors:B. Kaliski.
Date:March 1998
Formats:txt html json
Obsoleted by:RFC 2986
Status:INFORMATIONAL
DOI:10.17487/RFC 2314
This document describes a syntax for certification requests. This memo provides information for the Internet community. It does not specify an Internet standard of any kind.
 
RFC 2326 Real Time Streaming Protocol (RTSP)
 
Authors:H. Schulzrinne, A. Rao, R. Lanphier.
Date:April 1998
Formats:txt json html
Obsoleted by:RFC 7826
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2326
The Real Time Streaming Protocol, or RTSP, is an application-level protocol for control over the delivery of data with real-time properties. RTSP provides an extensible framework to enable controlled, on-demand delivery of real-time data, such as audio and video. Sources of data can include both live data feeds and stored clips. This protocol is intended to control multiple data delivery sessions, provide a means for choosing delivery channels such as UDP, multicast UDP and TCP, and provide a means for choosing delivery mechanisms based upon RTP (RFC 1889).
 
RFC 2327 SDP: Session Description Protocol
 
Authors:M. Handley, V. Jacobson.
Date:April 1998
Formats:txt json html
Obsoleted by:RFC 4566
Updated by:RFC 3266
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2327
This document defines the Session Description Protocol, SDP. SDP is intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation.

This document is a product of the Multiparty Multimedia SessionControl (MMUSIC) working group of the Internet Engineering TaskForce. Comments are solicited and should be addressed to the working group's mailing list at confctrl@isi.edu and/or the authors.

 
RFC 2338 Virtual Router Redundancy Protocol
 
Authors:S. Knight, D. Weaver, D. Whipple, R. Hinden, D. Mitzel, P. Hunt, P. Higginson, M. Shand, A. Lindem.
Date:April 1998
Formats:txt html json
Obsoleted by:RFC 3768
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2338
This memo defines the Virtual Router Redundancy Protocol (VRRP).VRRP specifies an election protocol that dynamically assigns responsibility for a virtual router to one of the VRRP routers on aLAN. The VRRP router controlling the IP address(es) associated with a virtual router is called the Master, and forwards packets sent to these IP addresses. The election process provides dynamic fail over in the forwarding responsibility should the Master become unavailable. This allows any of the virtual router IP addresses on the LAN to be used as the default first hop router by end-hosts. The advantage gained from using VRRP is a higher availability default path without requiring configuration of dynamic routing or router discovery protocols on every end-host.
 
RFC 2344 Reverse Tunneling for Mobile IP
 
Authors:G. Montenegro, Ed..
Date:May 1998
Formats:txt json html
Obsoleted by:RFC 3024
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2344
Mobile IP uses tunneling from the home agent to the mobile node's care-of address, but rarely in the reverse direction. Usually, a mobile node sends its packets through a router on the foreign network, and assumes that routing is independent of source address.When this assumption is not true, it is convenient to establish a topologically correct reverse tunnel from the care-of address to the home agent.

This document proposes backwards-compatible extensions to Mobile IP in order to support topologically correct reverse tunnels. This document does not attempt to solve the problems posed by firewalls located between the home agent and the mobile node's care-of address.

 
RFC 2358 Definitions of Managed Objects for the Ethernet-like Interface Types
 
Authors:J. Flick, J. Johnson.
Date:June 1998
Formats:txt json html
Obsoletes:RFC 1650
Obsoleted by:RFC 2665
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2358
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.This memo obsoletes RFC 1650 "Definitions of Managed Objects for theEthernet-like Interface Types using SMIv2". This memo extends that specification by including management information useful for the management of 100 Mb/s Ethernet interfaces.

Ethernet technology, as defined by the 802.3 Working Group of theIEEE, continues to evolve, with scalable increases in speed, new types of cabling and interfaces, and new features. This evolution may require changes in the managed objects in order to reflect this new functionality. This document, as with other documents issued by this working group, reflect a certain stage in the evolution ofEthernet technology. In the future, this document might be revised, or new documents might be issued by the Ethernet Interfaces and HubMIB Working Group, in order to reflect the evolution of Ethernet technology.

 
RFC 2359 IMAP4 UIDPLUS extension
 
Authors:J. Myers.
Date:June 1998
Formats:txt json html
Obsoleted by:RFC 4315
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2359
The UIDPLUS extension of the Internet Message Access Protocol [IMAP4] provides a set of features intended to reduce the amount of time and resources used by some client operations. [STANDARDS-TRACK]
 
RFC 2362 Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification
 
Authors:D. Estrin, D. Farinacci, A. Helmy, D. Thaler, S. Deering, M. Handley, V. Jacobson, C. Liu, P. Sharma, L. Wei.
Date:June 1998
Formats:txt html json
Obsoletes:RFC 2117
Obsoleted by:RFC 4601, RFC 5059
Status:EXPERIMENTAL
DOI:10.17487/RFC 2362
This document describes a protocol for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested.
 
RFC 2366 Definitions of Managed Objects for Multicast over UNI 3.0/3.1 based ATM Networks
 
Authors:C. Chung, M. Greene.
Date:July 1998
Formats:txt html json
Obsoleted by:RFC 2417
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2366
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it describes managed objects for IP hosts and routers that use a Multicast Address Resolution Server (MARS) to support IP multicast over ATM, as described in 'Support for Multicast over UNI3.0/3.1 based ATM Networks' [1].

This memo specifies a MIB module in a manner that is both compliant to the SNMPv2 SMI, and semantically identical to the peer SNMPv1 definitions.

This memo does not specify a standard for the Internet community.

 
RFC 2368 The mailto URL scheme
 
Authors:P. Hoffman, L. Masinter, J. Zawinski.
Date:July 1998
Formats:txt json html
Obsoleted by:RFC 6068
Updates:RFC 1738, RFC 1808
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2368
This document defines the format of Uniform Resource Locators (URL) for designating electronic mail addresses. It is one of a suite of documents which replace RFC 1738, 'Uniform Resource Locators', andRFC 1808, 'Relative Uniform Resource Locators'. The syntax of'mailto' URLs from RFC 1738 is extended to allow creation of more RFC822 messages by allowing the URL to express additional header and body fields.
 
RFC 2370 The OSPF Opaque LSA Option
 
Authors:R. Coltun.
Date:July 1998
Formats:txt json html
Obsoleted by:RFC 5250
Updated by:RFC 3630
Also:RFC 2328
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2370
This memo defines enhancements to the OSPF protocol to support a new class of link-state advertisements (LSA) called Opaque LSAs. [STANDARDS-TRACK]
 
RFC 2373 IP Version 6 Addressing Architecture
 
Authors:R. Hinden, S. Deering.
Date:July 1998
Formats:txt html json
Obsoletes:RFC 1884
Obsoleted by:RFC 3513
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2373
This specification defines the addressing architecture of the IPVersion 6 protocol [IPV6]. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and anIPv6 node's required addresses.
 
RFC 2374 An IPv6 Aggregatable Global Unicast Address Format
 
Authors:R. Hinden, M. O'Dell, S. Deering.
Date:July 1998
Formats:txt json html
Obsoletes:RFC 2073
Obsoleted by:RFC 3587
Status:HISTORIC
DOI:10.17487/RFC 2374
This document defines an IPv6 aggregatable global unicast address format for use in the Internet. [STANDARDS-TRACK]
 
RFC 2376 XML Media Types
 
Authors:E. Whitehead, M. Murata.
Date:July 1998
Formats:txt html json
Obsoleted by:RFC 3023
Status:INFORMATIONAL
DOI:10.17487/RFC 2376
This document proposes two new media subtypes, text/xml and application/xml, for use in exchanging network entities which are conforming Extensible Markup Language (XML). XML entities are currently exchanged via the HyperText Transfer Protocol on the WorldWide Web, are an integral part of the WebDAV protocol for remote web authoring, and are expected to have utility in many domains.
 
RFC 2385 Protection of BGP Sessions via the TCP MD5 Signature Option
 
Authors:A. Heffernan.
Date:August 1998
Formats:txt json html
Obsoleted by:RFC 5925
Updated by:RFC 6691
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2385
This memo describes a TCP extension to enhance security for BGP. It defines a new TCP option for carrying an MD5 [RFC1321] digest in aTCP segment. This digest acts like a signature for that segment, incorporating information known only to the connection end points.Since BGP uses TCP as its transport, using this option in the way described in this paper significantly reduces the danger from certain security attacks on BGP.
 
RFC 2388 Returning Values from Forms: multipart/form-data
 
Authors:L. Masinter.
Date:August 1998
Formats:txt json html
Obsoleted by:RFC 7578
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2388
This specification defines an Internet Media Type, multipart/form-data, which can be used by a wide variety of applications and transported by a wide variety of protocols as a way of returning a set of values as the result of a user filling out a form. [STANDARDS-TRACK]
 
RFC 2393 IP Payload Compression Protocol (IPComp)
 
Authors:A. Shacham, R. Monsour, R. Pereira, M. Thomas.
Date:December 1998
Formats:txt html json
Obsoleted by:RFC 3173
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2393
This document describes a protocol intended to provide lossless compression for Internet Protocol datagrams in an Internet environment.
 
RFC 2396 Uniform Resource Identifiers (URI): Generic Syntax
 
Authors:T. Berners-Lee, R. Fielding, L. Masinter.
Date:August 1998
Formats:txt html json
Obsoleted by:RFC 3986
Updates:RFC 1808, RFC 1738
Updated by:RFC 2732
Status:DRAFT STANDARD
DOI:10.17487/RFC 2396
A Uniform Resource Identifier (URI) is a compact string of characters for identifying an abstract or physical resource. This document defines the generic syntax of URI, including both absolute and relative forms, and guidelines for their use; it revises and replaces the generic definitions in RFC 1738 and RFC 1808.

This document defines a grammar that is a superset of all valid URI, such that an implementation can parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier type. This document does not define a generative grammar for URI; that task will be performed by the individual specifications of each URI scheme.

 
RFC 2400 Internet Official Protocol Standards
 
Authors:J. Postel, J. Reynolds.
Date:September 1998
Formats:txt json html
Obsoletes:RFC 2300
Obsoleted by:RFC 2500
Status:HISTORIC
DOI:10.17487/RFC 2400
This memo describes the state of standardization of protocols used in the Internet as determined by the Internet Architecture Board (IAB). This memo is an Internet Standard. [STANDARDS-TRACK]
 
RFC 2401 Security Architecture for the Internet Protocol
 
Authors:S. Kent, R. Atkinson.
Date:November 1998
Formats:txt json html
Obsoletes:RFC 1825
Obsoleted by:RFC 4301
Updated by:RFC 3168
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2401
This memo specifies the base architecture for IPsec compliant systems. [STANDARDS-TRACK]
 
RFC 2402 IP Authentication Header
 
Authors:S. Kent, R. Atkinson.
Date:November 1998
Formats:txt html json
Obsoletes:RFC 1826
Obsoleted by:RFC 4302, RFC 4305
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2402
The IP Authentication Header (AH) is used to provide connectionless integrity and data origin authentication for IP datagrams (hereafter referred to as just "authentication"), and to provide protection against replays. [STANDARDS-TRACK]
 
RFC 2406 IP Encapsulating Security Payload (ESP)
 
Authors:S. Kent, R. Atkinson.
Date:November 1998
Formats:txt html json
Obsoletes:RFC 1827
Obsoleted by:RFC 4303, RFC 4305
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2406
The Encapsulating Security Payload (ESP) header is designed to provide a mix of security services in IPv4 and IPv6. [STANDARDS-TRACK]
 
RFC 2407 The Internet IP Security Domain of Interpretation for ISAKMP
 
Authors:D. Piper.
Date:November 1998
Formats:txt html json
Obsoleted by:RFC 4306
Status:HISTORIC
DOI:10.17487/RFC 2407
This document defines the Internet IP Security DOI (IPSEC DOI), which instantiates ISAKMP for use with IP when IP uses ISAKMP to negotiate security associations. [STANDARDS-TRACK]
 
RFC 2408 Internet Security Association and Key Management Protocol (ISAKMP)
 
Authors:D. Maughan, M. Schertler, M. Schneider, J. Turner.
Date:November 1998
Formats:txt json html
Obsoleted by:RFC 4306
Status:HISTORIC
DOI:10.17487/RFC 2408
This memo describes a protocol utilizing security concepts necessary for establishing Security Associations (SA) and cryptographic keys in an Internet environment. A Security Association protocol that negotiates, establishes, modifies and deletes Security Associations and their attributes is required for an evolving Internet, where there will be numerous security mechanisms and several options for each security mechanism. The key management protocol must be robust in order to handle public key generation for the Internet community at large and private key requirements for those private networks with that requirement. The Internet Security Association and KeyManagement Protocol (ISAKMP) defines the procedures for authenticating a communicating peer, creation and management ofSecurity Associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks). All of these are necessary to establish and maintain secure communications(via IP Security Service or any other security protocol) in anInternet environment.
 
RFC 2409 The Internet Key Exchange (IKE)
 
Authors:D. Harkins, D. Carrel.
Date:November 1998
Formats:txt json html
Obsoleted by:RFC 4306
Updated by:RFC 4109
Status:HISTORIC
DOI:10.17487/RFC 2409
This memo describes a hybrid protocol. The purpose is to negotiate, and provide authenticated keying material for, security associations in a protected manner. [STANDARDS-TRACK]
 
RFC 2411 IP Security Document Roadmap
 
Authors:R. Thayer, N. Doraswamy, R. Glenn.
Date:November 1998
Formats:txt json html
Obsoleted by:RFC 6071
Status:INFORMATIONAL
DOI:10.17487/RFC 2411
The IPsec protocol suite is used to provide privacy and authentication services at the IP layer. Several documents are used to describe this protocol suite. The interrelationship and organization of the various documents covering the IPsec protocol are discussed here. An explanation of what to find in which document, and what to include in new Encryption Algorithm and AuthenticationAlgorithm documents are described.
 
RFC 2413 Dublin Core Metadata for Resource Discovery
 
Authors:S. Weibel, J. Kunze, C. Lagoze, M. Wolf.
Date:September 1998
Formats:txt html json
Obsoleted by:RFC 5013
Status:INFORMATIONAL
DOI:10.17487/RFC 2413
This is the first of a set of Informational RFCs describing the Dublin Core. Its purpose is to introduce the Dublin Core and to describe the consensus reached on the semantics of each of the 15 elements. This memo provides information for the Internet community.
 
RFC 2414 Increasing TCP's Initial Window
 
Authors:M. Allman, S. Floyd, C. Partridge.
Date:September 1998
Formats:txt json html
Obsoleted by:RFC 3390
Status:EXPERIMENTAL
DOI:10.17487/RFC 2414
This document specifies an increase in the permitted initial window for TCP from one segment to roughly 4K bytes. This document discusses the advantages and disadvantages of such a change, outlining experimental results that indicate the costs and benefits of such a change to TCP.
 
RFC 2421 Voice Profile for Internet Mail - version 2
 
Authors:G. Vaudreuil, G. Parsons.
Date:September 1998
Formats:txt json html
Obsoletes:RFC 1911
Obsoleted by:RFC 3801
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2421
This document profiles Internet mail for voice messaging. [STANDARDS- TRACK]
 
RFC 2422 Toll Quality Voice - 32 kbit/s ADPCM MIME Sub-type Registration
 
Authors:G. Vaudreuil, G. Parsons.
Date:September 1998
Formats:txt html json
Obsoletes:RFC 1911
Obsoleted by:RFC 3802
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2422
This document describes the registration of the MIME sub-type audio/32KADPCM for toll quality audio. [STANDARDS-TRACK]
 
RFC 2423 VPIM Voice Message MIME Sub-type Registration
 
Authors:G. Vaudreuil, G. Parsons.
Date:September 1998
Formats:txt html json
Obsoletes:RFC 1911
Obsoleted by:RFC 3801
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2423
This document describes the registration of the MIME sub-type multipart/voice-message for use with the Voice Profile for Internet Mail (VPIM). [STANDARDS-TRACK]
 
RFC 2424 Content Duration MIME Header Definition
 
Authors:G. Vaudreuil, G. Parsons.
Date:September 1998
Formats:txt json html
Obsoleted by:RFC 3803
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2424
This document describes the MIME header Content-Duration that is intended for use with any timed media content (typically audio/* or video/*). [STANDARDS-TRACK]
 
RFC 2425 A MIME Content-Type for Directory Information
 
Authors:T. Howes, M. Smith, F. Dawson.
Date:September 1998
Formats:txt json html
Obsoleted by:RFC 6350
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2425
This document defines a MIME Content-Type for holding directory information. [STANDARDS-TRACK]
 
RFC 2426 vCard MIME Directory Profile
 
Authors:F. Dawson, T. Howes.
Date:September 1998
Formats:txt html json
Obsoleted by:RFC 6350
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2426
This memo defines the profile of the MIME Content-Type [MIME-DIR] for directory information for a white-pages person object, based on a vCard electronic business card. The profile definition is independent of any particular directory service or protocol. The profile is defined for representing and exchanging a variety of information about an individual (e.g., formatted and structured name and delivery addresses, email address, multiple telephone numbers, photograph, logo, audio clips, etc.). The directory information used by this profile is based on the attributes for the person object defined in the X.520 and X.521 directory services recommendations. The profile also provides the method for including a [VCARD] representation of a white-pages directory entry within the MIME Content-Type defined by the [MIME-DIR] document.
 
RFC 2429 RTP Payload Format for the 1998 Version of ITU-T Rec
 
Authors:H.263 Video (H.263+). C. Bormann, L. Cline, G. Deisher, T. Gardos, C. Maciocco, D. Newell, J. Ott, G. Sullivan, S. Wenger, C. Zhu.
Date:October 1998
Formats:txt json html
Obsoleted by:RFC 4629
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2429
This document specifies an RTP payload header format applicable to the transmission of video streams generated based on the 1998 version of ITU-T Recommendation H.263. [STANDARDS-TRACK]
 
RFC 2434 Guidelines for Writing an IANA Considerations Section in RFCs
 
Authors:T. Narten, H. Alvestrand.
Date:October 1998
Formats:txt json html
Obsoleted by:RFC 5226
Updated by:RFC 3692
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 2434
Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned NumbersAuthority (IANA).

In order for the IANA to manage a given name space prudently, it needs guidelines describing the conditions under which new values can be assigned. If the IANA is expected to play a role in the management of a name space, the IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a name space and provides guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

 
RFC 2436 Collaboration between ISOC/IETF and ITU-T
 
Authors:R. Brett, S. Bradner, G. Parsons.
Date:October 1998
Formats:txt html json
Obsoleted by:RFC 3356
Status:INFORMATIONAL
DOI:10.17487/RFC 2436
This document describes the collaboration process between the ITU-T and ISOC/IETF. This memo provides information for the Internet community.
 
RFC 2437 PKCS #1: RSA Cryptography Specifications Version 2.0
 
Authors:B. Kaliski, J. Staddon.
Date:October 1998
Formats:txt html json
Obsoletes:RFC 2313
Obsoleted by:RFC 3447
Status:INFORMATIONAL
DOI:10.17487/RFC 2437
This memo is the successor to RFC 2313. This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm. This memo provides information for the Internet community.
 
RFC 2440 OpenPGP Message Format
 
Authors:J. Callas, L. Donnerhacke, H. Finney, R. Thayer.
Date:November 1998
Formats:txt html json
Obsoleted by:RFC 4880
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2440
This document is maintained in order to publish all necessary information needed to develop interoperable applications based on theOpenPGP format. It is not a step-by-step cookbook for writing an application. It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network.It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws.

Open-PGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage. These services include confidentiality, key management, authentication, and digital signatures. This document specifies the message formats used inOpenPGP.

 
RFC 2445 Internet Calendaring and Scheduling Core Object Specification (iCalendar)
 
Authors:F. Dawson, D. Stenerson.
Date:November 1998
Formats:txt html json
Obsoleted by:RFC 5545
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2445
There is a clear need to provide and deploy interoperable calendaring and scheduling services for the Internet. Current group scheduling and Personal Information Management (PIM) products are being extended for use across the Internet, today, in proprietary ways. This memo has been defined to provide the definition of a common format for openly exchanging calendaring and scheduling information across theInternet.

This memo is formatted as a registration for a MIME media type per[RFC 2048]. However, the format in this memo is equally applicable for use outside of a MIME message content type.

The proposed media type value is 'text/calendar'. This string would label a media type containing calendaring and scheduling information encoded as text characters formatted in a manner outlined below.

This MIME media type provides a standard content type for capturing calendar event, to-do and journal entry information. It also can be used to convey free/busy time information. The content type is suitable as a MIME message entity that can be transferred over MIME based email systems, using HTTP or some other Internet transport. In addition, the content type is useful as an object for interactions between desktop applications using the operating system clipboard, drag/drop or file systems capabilities.

This memo is based on the earlier work of the vCalendar specification for the exchange of personal calendaring and scheduling information.In order to avoid confusion with this referenced work, this memo is to be known as the iCalendar specification.

This memo defines the format for specifying iCalendar object methods.An iCalendar object method is a set of usage constraints for the iCalendar object. For example, these methods might define scheduling messages that request an event be scheduled, reply to an event request, send a cancellation notice for an event, modify or replace the definition of an event, provide a counter proposal for an original event request, delegate an event request to another individual, request free or busy time, reply to a free or busy time request, or provide similar scheduling messages for a to-do or journal entry calendar component. The iCalendar Transport-indendentInteroperability Protocol (iTIP) defined in [ITIP] is one such scheduling protocol.

 
RFC 2446 iCalendar Transport-Independent Interoperability Protocol (iTIP) Scheduling Events, BusyTime, To-dos and Journal Entries
 
Authors:S. Silverberg, S. Mansour, F. Dawson, R. Hopson.
Date:November 1998
Formats:txt json html
Obsoleted by:RFC 5546
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2446
This document specifies how calendaring systems use iCalendar objects to interoperate with other calendar systems. It does so in a general way so as to allow multiple methods of communication between systems.Subsequent documents specify interoperable methods of communications between systems that use this protocol.

The document outlines a model for calendar exchange that defines both static and dynamic event, to-do, journal and free/busy objects.Static objects are used to transmit information from one entity to another without the expectation of continuity or referential integrity with the original item. Dynamic objects are a superset of static objects and will gracefully degrade to their static counterparts for clients that only support static objects.

This document specifies an Internet protocol based on the iCalendar object specification that provides scheduling interoperability between different calendar systems. The Internet protocol is called the "iCalendar Transport-Independent Interoperability Protocol(iTIP)". iTIP complements the iCalendar object specification by adding semantics for group scheduling methods commonly available in current calendar systems. These scheduling methods permit two or more calendar systems to perform transactions such as publish, schedule, reschedule, respond to scheduling requests, negotiation of changes or cancel iCalendar-based calendar components. iTIP is defined independent of the particular transport used to transmit the scheduling information. Companion memos to iTIP provide bindings of the interoperability protocol to a number of Internet protocols.

 
RFC 2447 iCalendar Message-Based Interoperability Protocol (iMIP)
 
Authors:F. Dawson, S. Mansour, S. Silverberg.
Date:November 1998
Formats:txt json html
Obsoleted by:RFC 6047
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2447
This document, [iMIP], specifies a binding from the iCalendarTransport-independent Interoperability Protocol (iTIP) to Internet email-based transports. Calendaring entries defined by the iCalendarObject Model [iCAL] are composed using constructs from [RFC-822],[RFC-2045], [RFC-2046], [RFC-2047], [RFC-2048] and [RFC-2049].

This document is based on discussions within the Internet EngineeringTask Force (IETF) Calendaring and Scheduling (CALSCH) working group.More information about the IETF CALSCH working group activities can be found on the IMC web site at http://www.imc.org, the IETF web site at http://www.ietf.org/html.charters/calsch-charter.html. Refer to the references within this document for further information on how to access these various documents.

 
RFC 2452 IP Version 6 Management Information Base for the Transmission Control Protocol
 
Authors:M. Daniele.
Date:December 1998
Formats:txt json html
Obsoleted by:RFC 4022, RFC 8096
Status:HISTORIC
DOI:10.17487/RFC 2452
This document is one in the series of documents that define variousMIB objects for IPv6. Specifically, this document is the MIB module which defines managed objects for implementations of the TransmissionControl Protocol (TCP) over IP Version 6 (IPv6).

This document also recommends a specific policy with respect to the applicability of RFC 2012 for implementations of IPv6. Namely, that most of managed objects defined in RFC 2012 are independent of whichIP versions underlie TCP, and only the TCP connection information isIP version-specific.

This memo defines an experimental portion of the ManagementInformation Base (MIB) for use with network management protocols inIPv6-based internets.

 
RFC 2454 IP Version 6 Management Information Base for the User Datagram Protocol
 
Authors:M. Daniele.
Date:December 1998
Formats:txt html json
Obsoleted by:RFC 4113, RFC 8096
Status:HISTORIC
DOI:10.17487/RFC 2454
This document is one in the series of documents that define variousMIB objects for IPv6. Specifically, this document is the MIB module which defines managed objects for implementations of the UserDatagram Protocol (UDP) over IP Version 6 (IPv6).

This document also recommends a specific policy with respect to the applicability of RFC 2013 for implementations of IPv6. Namely, that most of managed objects defined in RFC 2013 are independent of whichIP versions underlie UDP, and only the UDP listener information is IP version-specific.

This memo defines an experimental portion of the ManagementInformation Base (MIB) for use with network management protocols inIPv6-based internets.

 
RFC 2459 Internet X.509 Public Key Infrastructure Certificate and CRL Profile
 
Authors:R. Housley, W. Ford, W. Polk, D. Solo.
Date:January 1999
Formats:txt html json
Obsoleted by:RFC 3280
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2459
This memo profiles the X.509 v3 certificate and X.509 v2 CRL for use in the Internet. An overview of the approach and model are provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms (e.g., IP addresses). Standard certificate extensions are described and one new Internet-specific extension is defined. A required set of certificate extensions is specified. The X.509 v2 CRL format is described and a required extension set is defined as well. An algorithm for X.509 certificate path validation is described. Supplemental information is provided describing the format of public keys and digital signatures in X.509 certificates for common Internet public key encryption algorithms(i.e., RSA, DSA, and Diffie-Hellman). ASN.1 modules and examples are provided in the appendices.
 
RFC 2460 Internet Protocol, Version 6 (IPv6) Specification
 
Authors:S. Deering, R. Hinden.
Date:December 1998
Formats:txt html json
Obsoletes:RFC 1883
Obsoleted by:RFC 8200
Updated by:RFC 5095, RFC 5722, RFC 5871, RFC 6437, RFC 6564, RFC 6935, RFC 6946, RFC 7045, RFC 7112
Status:DRAFT STANDARD
DOI:10.17487/RFC 2460
This document specifies version 6 of the Internet Protocol (IPv6), also sometimes referred to as IP Next Generation or IPng.
 
RFC 2461 Neighbor Discovery for IP Version 6 (IPv6)
 
Authors:T. Narten, E. Nordmark, W. Simpson.
Date:December 1998
Formats:txt html json
Obsoletes:RFC 1970
Obsoleted by:RFC 4861
Updated by:RFC 4311
Status:DRAFT STANDARD
DOI:10.17487/RFC 2461
This document specifies the Neighbor Discovery protocol for IPVersion 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers and to maintain reachability information about the paths to active neighbors.
 
RFC 2462 IPv6 Stateless Address Autoconfiguration
 
Authors:S. Thomson, T. Narten.
Date:December 1998
Formats:txt json html
Obsoletes:RFC 1971
Obsoleted by:RFC 4862
Status:DRAFT STANDARD
DOI:10.17487/RFC 2462
This document specifies the steps a host takes in deciding how to autoconfigure its interfaces in IP version 6. The autoconfiguration process includes creating a link-local address and verifying its uniqueness on a link, determining what information should be autoconfigured (addresses, other information, or both), and in the case of addresses, whether they should be obtained through the stateless mechanism, the stateful mechanism, or both. This document defines the process for generating a link-local address, the process for generating site-local and global addresses via stateless address autoconfiguration, and the Duplicate Address Detection procedure. The details of autoconfiguration using the stateful protocol are specified elsewhere.
 
RFC 2463 Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification
 
Authors:A. Conta, S. Deering.
Date:December 1998
Formats:txt json html
Obsoletes:RFC 1885
Obsoleted by:RFC 4443
Status:DRAFT STANDARD
DOI:10.17487/RFC 2463
This document specifies a set of Internet Control Message Protocol(ICMP) messages for use with version 6 of the Internet Protocol(IPv6).
 
RFC 2465 Management Information Base for IP Version 6: Textual Conventions and General Group
 
Authors:D. Haskin, S. Onishi.
Date:December 1998
Formats:txt html json
Obsoleted by:RFC 4293, RFC 8096
Status:HISTORIC
DOI:10.17487/RFC 2465
This document is one in the series of documents that provide MIB definitions for for IP Version 6. Specifically, the IPv6 MIB textual conventions as well as the IPv6 MIB General group is defined in this document.

This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the IPv6-based internets.

This document specifies a MIB module in a manner that is both compliant to the SNMPv2 SMI, and semantically identical to the peerSNMPv1 definitions.

 
RFC 2466 Management Information Base for IP Version 6: ICMPv6 Group
 
Authors:D. Haskin, S. Onishi.
Date:December 1998
Formats:txt json html
Obsoleted by:RFC 4293, RFC 8096
Status:HISTORIC
DOI:10.17487/RFC 2466
This document is one in the series of documents that define variousMIB object groups for IPv6. Specifically, the ICMPv6 group is defined in this document.

This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the IPv6-based internets.

This document specifies a MIB module in a manner that is both compliant to the SNMPv2 SMI, and semantically identical to the peerSNMPv1 definitions.

 
RFC 2471 IPv6 Testing Address Allocation
 
Authors:R. Hinden, R. Fink, J. Postel.
Date:December 1998
Formats:txt html json
Obsoletes:RFC 1897
Obsoleted by:RFC 3701
Status:HISTORIC
DOI:10.17487/RFC 2471
This document describes an allocation plan for IPv6 addresses to be used in testing IPv6 prototype software. This memo defines an Experimental Protocol for the Internet community.
 
RFC 2472 IP Version 6 over PPP
 
Authors:D. Haskin, E. Allen.
Date:December 1998
Formats:txt json html
Obsoletes:RFC 2023
Obsoleted by:RFC 5072, RFC 5172
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2472
The Point-to-Point Protocol (PPP) [1] provides a standard method of encapsulating Network Layer protocol information over point-to-point links. PPP also defines an extensible Link Control Protocol, and proposes a family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols.

This document defines the method for transmission of IP Version 6 [2] packets over PPP links as well as the Network Control Protocol (NCP) for establishing and configuring the IPv6 over PPP. It also specifies the method of forming IPv6 link-local addresses on PPP links.

 
RFC 2476 Message Submission
 
Authors:R. Gellens, J. Klensin.
Date:December 1998
Formats:txt json html
Obsoleted by:RFC 4409
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2476
This memo describes a low cost, deterministic means for messages to be identified as submissions, and specifies what actions are to be taken by a submission server. [STANDARDS-TRACK]
 
RFC 2478 The Simple and Protected GSS-API Negotiation Mechanism
 
Authors:E. Baize, D. Pinkas.
Date:December 1998
Formats:txt html json
Obsoleted by:RFC 4178
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2478
This document specifies a Security Negotiation Mechanism for the Generic Security Service Application Program Interface (GSS-API). [STANDARDS- TRACK]
 
RFC 2481 A Proposal to add Explicit Congestion Notification (ECN) to IP
 
Authors:K. Ramakrishnan, S. Floyd.
Date:January 1999
Formats:txt html json
Obsoleted by:RFC 3168
Status:EXPERIMENTAL
DOI:10.17487/RFC 2481
This note describes a proposed addition of ECN (Explicit CongestionNotification) to IP. TCP is currently the dominant transport protocol used in the Internet. We begin by describing TCP's use of packet drops as an indication of congestion. Next we argue that with the addition of active queue management (e.g., RED) to the Internet infrastructure, where routers detect congestion before the queue overflows, routers are no longer limited to packet drops as an indication of congestion. Routers could instead set a CongestionExperienced (CE) bit in the packet header of packets from ECN-capable transport protocols. We describe when the CE bit would be set in the routers, and describe what modifications would be needed to TCP to make it ECN-capable. Modifications to other transport protocols(e.g., unreliable unicast or multicast, reliable multicast, other reliable unicast transport protocols) could be considered as those protocols are developed and advance through the standards process.
 
RFC 2482 Language Tagging in Unicode Plain Text
 
Authors:K. Whistler, G. Adams.
Date:January 1999
Formats:txt json html
Obsoleted by:RFC 6082
Status:HISTORIC
DOI:10.17487/RFC 2482
This document proposed a mechanism for language tagging in plain text. This memo provides information for the Internet community.
 
RFC 2486 The Network Access Identifier
 
Authors:B. Aboba, M. Beadles.
Date:January 1999
Formats:txt json html
Obsoleted by:RFC 4282
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2486
This document proposes syntax for the Network Access Identifier (NAI), the userID submitted by the client during PPP authentication. [STANDARDS-TRACK]
 
RFC 2487 SMTP Service Extension for Secure SMTP over TLS
 
Authors:P. Hoffman.
Date:January 1999
Formats:txt json html
Obsoleted by:RFC 3207
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2487
This document describes an extension to the SMTP service that allows an SMTP server and client to use transport-layer security to provide private, authenticated communication over the Internet. This gives SMTP agents the ability to protect some or all of their communications from eavesdroppers and attackers. [STANDARDS-TRACK]
 
RFC 2489 Procedure for Defining New DHCP Options
 
Authors:R. Droms.
Date:January 1999
Formats:txt html json
Obsoleted by:RFC 2939
Also:BCP 0029
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 2489
The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing configuration information to hosts on a TCP/IP network.Configuration parameters and other control information are carried in tagged data items that are stored in the 'options' field of the DHCP message. The data items themselves are also called "options."

New DHCP options may be defined after the publication of the DHCP specification to accommodate requirements for conveyance of new configuration parameters. This document describes the procedure for defining new DHCP options.

 
RFC 2493 Textual Conventions for MIB Modules Using Performance History Based on 15 Minute Intervals
 
Authors:K. Tesink, Ed..
Date:January 1999
Formats:txt json html
Obsoleted by:RFC 3593
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2493
This document defines a set of Textual Conventions for MIB modules which make use of performance history data based on 15 minute intervals.
 
RFC 2495 Definitions of Managed Objects for the DS1, E1, DS2 and E2 Interface Types
 
Authors:D. Fowler, Ed..
Date:January 1999
Formats:txt html json
Obsoletes:RFC 1406
Obsoleted by:RFC 3895
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2495
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it describes objects used for managing DS1, E1, DS2 and E2 interfaces. This document is a companion document withDefinitions of Managed Objects for the DS0 (RFC 2494 [30]), DS3/E3(RFC 2496 [28]), and the work in progress, SONET/SDH Interface Types.

This memo specifies a MIB module in a manner that is both compliant to the SNMPv2 SMI, and semantically identical to the peer SNMPv1 definitions.

 
RFC 2496 Definitions of Managed Object for the DS3/E3 Interface Type
 
Authors:D. Fowler, Ed..
Date:January 1999
Formats:txt json html
Obsoletes:RFC 1407
Obsoleted by:RFC 3896
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2496
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it describes objects used for managing DS3 and E3 interfaces. This document is a companion document with Definitions of Managed Objects for the DS0 (RFC 2494 [25]), DS1/E1/DS2/E2 (RFC2495 [17]), and the work in progress SONET/SDH Interface Types.

This memo specifies a MIB module in a manner that is both compliant to the SNMPv2 SMI, and semantically identical to the peer SNMPv1 definitions.

 
RFC 2498 IPPM Metrics for Measuring Connectivity
 
Authors:J. Mahdavi, V. Paxson.
Date:January 1999
Formats:txt html json
Obsoleted by:RFC 2678
Status:EXPERIMENTAL
DOI:10.17487/RFC 2498
This memo defines a series of metrics for connectivity between a pair of Internet hosts. It builds on notions introduced and discussed in RFC 2330, the IPPM framework document. This memo defines an Experimental Protocol for the Internet community.
 
RFC 2500 Internet Official Protocol Standards
 
Authors:J. Reynolds, R. Braden.
Date:June 1999
Formats:txt html json
Obsoletes:RFC 2400
Obsoleted by:RFC 2600
Status:HISTORIC
DOI:10.17487/RFC 2500
This memo summarizes the status of Internet protocols and specifications. [STANDARDS-TRACK]
 
RFC 2509 IP Header Compression over PPP
 
Authors:M. Engan, S. Casner, C. Bormann.
Date:February 1999
Formats:txt html json
Obsoleted by:RFC 3544
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2509
This document describes an option for negotiating the use of header compression on IP datagrams transmitted over the Point-to-PointProtocol [RFC1661]. It defines extensions to the PPP ControlProtocols for IPv4 and IPv6 [RFC1332, RFC2023]. Header compression may be applied to IPv4 and IPv6 datagrams in combination with TCP,UDP and RTP transport protocols as specified in [IPHC] and [CRTP].
 
RFC 2510 Internet X.509 Public Key Infrastructure Certificate Management Protocols
 
Authors:C. Adams, S. Farrell.
Date:March 1999
Formats:txt html json
Obsoleted by:RFC 4210
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2510
This document describes the Internet X.509 Public Key Infrastructure(PKI) Certificate Management Protocols. Protocol messages are defined for all relevant aspects of certificate creation and management.Note that "certificate" in this document refers to an X.509v3Certificate as defined in [COR95, X509-AM].
 
RFC 2511 Internet X.509 Certificate Request Message Format
 
Authors:M. Myers, C. Adams, D. Solo, D. Kemp.
Date:March 1999
Formats:txt html json
Obsoleted by:RFC 4211
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2511
This document describes the Certificate Request Message Format (CRMF). [STANDARDS-TRACK]
 
RFC 2518 HTTP Extensions for Distributed Authoring -- WEBDAV
 
Authors:Y. Goland, E. Whitehead, A. Faizi, S. Carter, D. Jensen.
Date:February 1999
Formats:txt html json
Obsoleted by:RFC 4918
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2518
This document specifies a set of methods, headers, and content-types ancillary to HTTP/1.1 for the management of resource properties, creation and management of resource collections, namespace manipulation, and resource locking (collision avoidance).
 
RFC 2527 Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework
 
Authors:S. Chokhani, W. Ford.
Date:March 1999
Formats:txt json html
Obsoleted by:RFC 3647
Status:INFORMATIONAL
DOI:10.17487/RFC 2527
This document presents a framework to assist the writers of certificate policies or certification practice statements for certification authorities and public key infrastructures. In particular, the framework provides a comprehensive list of topics that potentially (at the writer's discretion) need to be covered in a certificate policy definition or a certification practice statement.
 
RFC 2531 Content Feature Schema for Internet Fax
 
Authors:G. Klyne, L. McIntyre.
Date:March 1999
Formats:txt html json
Obsoleted by:RFC 2879
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2531
This document defines a content feature schema that is a profile of the media feature registration mechanisms [1,2,3] for use in performing capability identification between extended Internet fax systems [5].

This document does not describe any specific mechanisms for communicating capability information, but does presume that any such mechanisms will transfer textual values. It specifies a textual format to be used for describing Internet fax capability information.

 
RFC 2535 Domain Name System Security Extensions
 
Authors:D. Eastlake 3rd.
Date:March 1999
Formats:txt html json
Obsoletes:RFC 2065
Obsoleted by:RFC 4033, RFC 4034, RFC 4035
Updates:RFC 2181, RFC 1035, RFC 1034
Updated by:RFC 2931, RFC 3007, RFC 3008, RFC 3090, RFC 3226, RFC 3445, RFC 3597, RFC 3655, RFC 3658, RFC 3755, RFC 3757, RFC 3845
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2535
Extensions to the Domain Name System (DNS) are described that provide data integrity and authentication to security aware resolvers and applications through the use of cryptographic digital signatures.These digital signatures are included in secured zones as resource records. Security can also be provided through non-security awareDNS servers in some cases.

The extensions provide for the storage of authenticated public keys in the DNS. This storage of keys can support general public key distribution services as well as DNS security. The stored keys enable security aware resolvers to learn the authenticating key of zones in addition to those for which they are initially configured.Keys associated with DNS names can be retrieved to support other protocols. Provision is made for a variety of key types and algorithms.

In addition, the security extensions provide for the optional authentication of DNS protocol transactions and requests.

This document incorporates feedback on RFC 2065 from early implementers and potential users.

 
RFC 2537 RSA/MD5 KEYs and SIGs in the Domain Name System (DNS)
 
Authors:D. Eastlake 3rd.
Date:March 1999
Formats:txt json html
Obsoleted by:RFC 3110
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2537
A standard method for storing RSA keys and and RSA/MD5 based signatures in the Domain Name System is described which utilizes DNSKEY and SIG resource records.
 
RFC 2538 Storing Certificates in the Domain Name System (DNS)
 
Authors:D. Eastlake 3rd, O. Gudmundsson.
Date:March 1999
Formats:txt html json
Obsoleted by:RFC 4398
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2538
Cryptographic public key are frequently published and their authenticity demonstrated by certificates. A CERT resource record(RR) is defined so that such certificates and related certificate revocation lists can be stored in the Domain Name System (DNS).
 
RFC 2541 DNS Security Operational Considerations
 
Authors:D. Eastlake 3rd.
Date:March 1999
Formats:txt json html
Obsoleted by:RFC 4641
Status:INFORMATIONAL
DOI:10.17487/RFC 2541
Secure DNS is based on cryptographic techniques. A necessary part of the strength of these techniques is careful attention to the operational aspects of key and signature generation, lifetime, size, and storage. In addition, special attention must be paid to the security of the high level zones, particularly the root zone. This document discusses these operational aspects for keys and signatures used in connection with the KEY and SIG DNS resource records.
 
RFC 2543 SIP: Session Initiation Protocol
 
Authors:M. Handley, H. Schulzrinne, E. Schooler, J. Rosenberg.
Date:March 1999
Formats:txt html json
Obsoleted by:RFC 3261, RFC 3262, RFC 3263, RFC 3264, RFC 3265
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2543
The Session Initiation Protocol (SIP) is an application-layer control(signaling) protocol for creating, modifying and terminating sessions with one or more participants. These sessions include Internet multimedia conferences, Internet telephone calls and multimedia distribution. Members in a session can communicate via multicast or via a mesh of unicast relations, or a combination of these.

SIP invitations used to create sessions carry session descriptions which allow participants to agree on a set of compatible media types.SIP supports user mobility by proxying and redirecting requests to the user's current location. Users can register their current location. SIP is not tied to any particular conference control protocol. SIP is designed to be independent of the lower-layer transport protocol and can be extended with additional capabilities.

 
RFC 2546 6Bone Routing Practice
 
Authors:A. Durand, B. Buclin.
Date:March 1999
Formats:txt html json
Obsoleted by:RFC 2772
Status:INFORMATIONAL
DOI:10.17487/RFC 2546
This memo identifies guidelines on how 6Bone sites might operate, so that the 6Bone can remain a quality experimentation environment and to avoid pathological situations that have been encountered in the past. It defines the 'best current practice' acceptable in the 6Bone for the configuration of both Interior Gateway Protocols and Exterior Gateway Protocols. This memo provides information for the Internet community.
 
RFC 2547 BGP/MPLS VPNs
 
Authors:E. Rosen, Y. Rekhter.
Date:March 1999
Formats:txt html json
Obsoleted by:RFC 4364
Status:INFORMATIONAL
DOI:10.17487/RFC 2547
This document describes a method by which a Service Provider with anIP backbone may provide VPNs (Virtual Private Networks) for its customers. MPLS (Multiprotocol Label Switching) is used for forwarding packets over the backbone, and BGP (Border GatewayProtocol) is used for distributing routes over the backbone. The primary goal of this method is to support the outsourcing of IP backbone services for enterprise networks. It does so in a manner which is simple for the enterprise, while still scalable and flexible for the Service Provider, and while allowing the Service Provider to add value. These techniques can also be used to provide a VPN which itself provides IP service to customers.
 
RFC 2553 Basic Socket Interface Extensions for IPv6
 
Authors:R. Gilligan, S. Thomson, J. Bound, W. Stevens.
Date:March 1999
Formats:txt html json
Obsoletes:RFC 2133
Obsoleted by:RFC 3493
Updated by:RFC 3152
Status:INFORMATIONAL
DOI:10.17487/RFC 2553
The de facto standard application program interface (API) for TCP/IP applications is the "sockets" interface. Although this API was developed for Unix in the early 1980s it has also been implemented on a wide variety of non-Unix systems. TCP/IP applications written using the sockets API have in the past enjoyed a high degree of portability and we would like the same portability with IPv6 applications. But changes are required to the sockets API to supportIPv6 and this memo describes these changes. These include a new socket address structure to carry IPv6 addresses, new address conversion functions, and some new socket options. These extensions are designed to provide access to the basic IPv6 features required byTCP and UDP applications, including multicasting, while introducing a minimum of change into the system and providing complete compatibility for existing IPv4 applications. Additional extensions for advanced IPv6 features (raw sockets and access to the IPv6 extension headers) are defined in another document [4].
 
RFC 2554 SMTP Service Extension for Authentication
 
Authors:J. Myers.
Date:March 1999
Formats:txt json html
Obsoleted by:RFC 4954
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2554
This document defines an SMTP service extension [ESMTP] whereby an SMTP client may indicate an authentication mechanism to the server, perform an authentication protocol exchange, and optionally negotiate a security layer for subsequent protocol interactions. [STANDARDS-TRACK]
 
RFC 2558 Definitions of Managed Objects for the SONET/SDH Interface Type
 
Authors:K. Tesink.
Date:March 1999
Formats:txt json html
Obsoletes:RFC 1595
Obsoleted by:RFC 3592
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2558
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing Synchronous Optical Network/Synchronous Digital Hierarchy (SONET/SDH) interfaces. This document is a companion to the documents that define Managed Objects for the DS1/E1/DS2/E2 and DS3/E3 Interface Types. [STANDARDS-TRACK]
 
RFC 2559 Internet X.509 Public Key Infrastructure Operational Protocols - LDAPv2
 
Authors:S. Boeyen, T. Howes, P. Richard.
Date:April 1999
Formats:txt json html
Obsoleted by:RFC 3494
Updates:RFC 1778
Status:HISTORIC
DOI:10.17487/RFC 2559
Specifically, this document addresses requirements to provide access to Public Key Infrastructure (PKI) repositories for the purposes of retrieving PKI information and managing that same information. [STANDARDS-TRACK]
 
RFC 2560 X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
 
Authors:M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams.
Date:June 1999
Formats:txt json html
Obsoleted by:RFC 6960
Updated by:RFC 6277
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2560
This document specifies a protocol useful in determining the current status of a digital certificate without requiring CRLs. [STANDARDS- TRACK]
 
RFC 2565 Internet Printing Protocol/1.0: Encoding and Transport
 
Authors:R. Herriot, Ed., S. Butler, P. Moore, R. Turner.
Date:April 1999
Formats:txt json html
Obsoleted by:RFC 2910
Status:EXPERIMENTAL
DOI:10.17487/RFC 2565
This document is one of a set of documents, which together describe all aspects of a new Internet Printing Protocol (IPP). IPP is an application level protocol that can be used for distributed printing using Internet tools and technologies. This document defines the rules for encoding IPP operations and IPP attributes into a newInternet mime media type called "application/ipp". This document also defines the rules for transporting over HTTP a message body whose Content-Type is "application/ipp".

The full set of IPP documents includes:

Design Goals for an Internet Printing Protocol [RFC2567]Rationale for the Structure and Model and Protocol for theInternet Printing Protocol [RFC2568]Internet Printing Protocol/1.0: Model and Semantics [RFC2566]Internet Printing Protocol/1.0: Encoding and Transport (this document)Internet Printing Protocol/1.0: Implementer's Guide [ipp-iig]Mapping between LPD and IPP Protocols [RFC2569]

The document, "Design Goals for an Internet Printing Protocol", takes a broad look at distributed printing functionality, and it enumerates real-life scenarios that help to clarify the features that need to be included in a printing protocol for the Internet. It identifies requirements for three types of users: end users, operators, and administrators. It calls out a subset of end user requirements that are satisfied in IPP/1.0. Operator and administrator requirements are out of scope for version 1.0.

The document, "Rationale for the Structure and Model and Protocol for the Internet Printing Protocol", describes IPP from a high level view, defines a roadmap for the various documents that form the suite of IPP specifications, and gives background and rationale for theIETF working group's major decisions.

The document, "Internet Printing Protocol/1.0: Model and Semantics", describes a simplified model with abstract objects, their attributes, and their operations that are independent of encoding and transport.It introduces a Printer and a Job object. The Job object optionally supports multiple documents per Job. It also addresses security, internationalization, and directory issues.

This document "Internet Printing Protocol/1.0: Implementer's Guide", gives advice to implementers of IPP clients and IPP objects.

The document "Mapping between LPD and IPP Protocols" gives some advice to implementers of gateways between IPP and LPD (Line PrinterDaemon) implementations.

 
RFC 2566 Internet Printing Protocol/1.0: Model and Semantics
 
Authors:R. deBry, T. Hastings, R. Herriot, S. Isaacson, P. Powell.
Date:April 1999
Formats:txt html json
Obsoleted by:RFC 2911
Status:EXPERIMENTAL
DOI:10.17487/RFC 2566
This document is one of a set of documents, which together describe all aspects of a new Internet Printing Protocol (IPP). IPP is an application level protocol that can be used for distributed printing using Internet tools and technologies. This document describes a simplified model consisting of abstract objects, their attributes, and their operations that is independent of encoding and transport.The model consists of a Printer and a Job object. A Job optionally supports multiple documents. IPP 1.0 semantics allow end-users and operators to query printer capabilities, submit print jobs, inquire about the status of print jobs and printers, and cancel print jobs.This document also addresses security, internationalization, and directory issues.

The full set of IPP documents includes:

Design Goals for an Internet Printing Protocol [RFC2567]Rationale for the Structure and Model and Protocol for the InternetPrinting Protocol [RFC2568]Internet Printing Protocol/1.0: Model and Semantics (this document)Internet Printing Protocol/1.0: Encoding and Transport [RFC2565]Internet Printing Protocol/1.0: Implementer's Guide [ipp-iig]Mapping between LPD and IPP Protocols [RFC2569]

The "Design Goals for an Internet Printing Protocol" document takes a broad look at distributed printing functionality, and it enumerates real-life scenarios that help to clarify the features that need to be included in a printing protocol for the Internet. It identifies requirements for three types of users: end users, operators, and administrators. It calls out a subset of end user requirements that are satisfied in IPP/1.0. Operator and administrator requirements are out of scope for version 1.0.

The "Rationale for the Structure and Model and Protocol for theInternet Printing Protocol" document describes IPP from a high level view, defines a roadmap for the various documents that form the suite of IPP specifications, and gives background and rationale for theIETF working group's major decisions.

The "Internet Printing Protocol/1.0: Encoding and Transport" document is a formal mapping of the abstract operations and attributes defined in the model document onto HTTP/1.1. It defines the encoding rules for a new Internet media type called "application/ipp".

The "Internet Printing Protocol/1.0: Implementer's Guide" document gives insight and advice to implementers of IPP clients and IPP objects. It is intended to help them understand IPP/1.0 and some of the considerations that may assist them in the design of their client and/or IPP object implementations. For example, a typical order of processing requests is given, including error checking. Motivation for some of the specification decisions is also included.

The "Mapping between LPD and IPP Protocols" document gives some advice to implementers of gateways between IPP and LPD (Line PrinterDaemon) implementations.

 
RFC 2570 Introduction to Version 3 of the Internet-standard Network Management Framework
 
Authors:J. Case, R. Mundy, D. Partain, B. Stewart.
Date:April 1999
Formats:txt json html
Obsoleted by:RFC 3410
Status:INFORMATIONAL
DOI:10.17487/RFC 2570
The purpose of this document is to provide an overview of the third version of the Internet-standard Management Framework, termed theSNMP version 3 Framework (SNMPv3). This Framework is derived from and builds upon both the original Internet-standard ManagementFramework (SNMPv1) and the second Internet-standard ManagementFramework (SNMPv2).

The architecture is designed to be modular to allow the evolution of the Framework over time.

 
RFC 2571 An Architecture for Describing SNMP Management Frameworks
 
Authors:B. Wijnen, D. Harrington, R. Presuhn.
Date:April 1999
Formats:txt json html
Obsoletes:RFC 2271
Obsoleted by:RFC 3411
Status:DRAFT STANDARD
DOI:10.17487/RFC 2571
This document describes an architecture for describing SNMPManagement Frameworks. The architecture is designed to be modular to allow the evolution of the SNMP protocol standards over time. The major portions of the architecture are an SNMP engine containing aMessage Processing Subsystem, a Security Subsystem and an AccessControl Subsystem, and possibly multiple SNMP applications which provide specific functional processing of management data.
 
RFC 2572 Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)
 
Authors:J. Case, D. Harrington, R. Presuhn, B. Wijnen.
Date:April 1999
Formats:txt html json
Obsoletes:RFC 2272
Obsoleted by:RFC 3412
Status:DRAFT STANDARD
DOI:10.17487/RFC 2572
This document describes the Message Processing and Dispatching forSNMP messages within the SNMP architecture [RFC2571]. It defines the procedures for dispatching potentially multiple versions of SNMP messages to the proper SNMP Message Processing Models, and for dispatching PDUs to SNMP applications. This document also describes one Message Processing Model - the SNMPv3 Message Processing Model.
 
RFC 2573 SNMP Applications
 
Authors:D. Levi, P. Meyer, B. Stewart.
Date:April 1999
Formats:txt html json
Obsoletes:RFC 2273
Obsoleted by:RFC 3413
Status:DRAFT STANDARD
DOI:10.17487/RFC 2573
This memo describes five types of SNMP applications which make use of an SNMP engine as described in [RFC2571]. The types of application described are Command Generators, Command Responders, NotificationOriginators, Notification Receivers, and Proxy Forwarders.

This memo also defines MIB modules for specifying targets of management operations, for notification filtering, and for proxy forwarding.

 
RFC 2574 User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)
 
Authors:U. Blumenthal, B. Wijnen.
Date:April 1999
Formats:txt json html
Obsoletes:RFC 2274
Obsoleted by:RFC 3414
Status:DRAFT STANDARD
DOI:10.17487/RFC 2574
This document describes the User-based Security Model (USM) for SNMP version 3 for use in the SNMP architecture [RFC2571]. It defines theElements of Procedure for providing SNMP message level security.This document also includes a MIB for remotely monitoring/managing the configuration parameters for this Security Model.
 
RFC 2575 View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)
 
Authors:B. Wijnen, R. Presuhn, K. McCloghrie.
Date:April 1999
Formats:txt json html
Obsoletes:RFC 2275
Obsoleted by:RFC 3415
Status:DRAFT STANDARD
DOI:10.17487/RFC 2575
This document describes the View-based Access Control Model for use in the SNMP architecture [RFC2571]. It defines the Elements ofProcedure for controlling access to management information. This document also includes a MIB for remotely managing the configuration parameters for the View-based Access Control Model.
 
RFC 2576 Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework
 
Authors:R. Frye, D. Levi, S. Routhier, B. Wijnen.
Date:March 2000
Formats:txt html json
Obsoletes:RFC 1908, RFC 2089
Obsoleted by:RFC 3584
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2576
The purpose of this document is to describe coexistence between version 3 of the Internet-standard Network Management Framework,(SNMPv3), version 2 of the Internet-standard Network ManagementFramework (SNMPv2), and the original Internet-standard NetworkManagement Framework (SNMPv1). This document obsoletes RFC 1908 [13] and RFC2089 [14].
 
RFC 2581 TCP Congestion Control
 
Authors:M. Allman, V. Paxson, W. Stevens.
Date:April 1999
Formats:txt json html
Obsoletes:RFC 2001
Obsoleted by:RFC 5681
Updated by:RFC 3390
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2581
This document defines TCP's four intertwined congestion control algorithms: slow start, congestion avoidance, fast retransmit, and fast recovery. In addition, the document specifies how TCP should begin transmission after a relatively long idle period, as well as discussing various acknowledgment generation methods.
 
RFC 2582 The NewReno Modification to TCP's Fast Recovery Algorithm
 
Authors:S. Floyd, T. Henderson.
Date:April 1999
Formats:txt html json
Obsoleted by:RFC 3782
Status:EXPERIMENTAL
DOI:10.17487/RFC 2582
RFC 2001 [RFC2001] documents the following four intertwined TCP congestion control algorithms: Slow Start, Congestion Avoidance, FastRetransmit, and Fast Recovery. RFC 2581 [RFC2581] explicitly allows certain modifications of these algorithms, including modifications that use the TCP Selective Acknowledgement (SACK) option [MMFR96], and modifications that respond to "partial acknowledgments" (ACKs which cover new data, but not all the data outstanding when loss was detected) in the absence of SACK. This document describes a specific algorithm for responding to partial acknowledgments, referred to asNewReno. This response to partial acknowledgments was first proposed by Janey Hoe in [Hoe95].
 
RFC 2587 Internet X.509 Public Key Infrastructure LDAPv2 Schema
 
Authors:S. Boeyen, T. Howes, P. Richard.
Date:June 1999
Formats:txt html json
Obsoleted by:RFC 4523
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2587
The schema defined in this document is a minimal schema to support PKIX in an LDAPv2 environment, as defined in RFC 2559. Only PKIX-specific components are specified here. [STANDARDS-TRACK]
 
RFC 2591 Definitions of Managed Objects for Scheduling Management Operations
 
Authors:D. Levi, J. Schoenwaelder.
Date:May 1999
Formats:txt json html
Obsoleted by:RFC 3231
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2591
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it describes a set of managed objects that are used to schedule management operations periodically or at specified dates and times.
 
RFC 2592 Definitions of Managed Objects for the Delegation of Management Script
 
Authors:D. Levi, J. Schoenwaelder.
Date:May 1999
Formats:txt html json
Obsoleted by:RFC 3165
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2592
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it describes a set of managed objects that allow the delegation of management scripts to distributed managers.
 
RFC 2593 Script MIB Extensibility Protocol Version 1.0
 
Authors:J. Schoenwaelder, J. Quittek.
Date:May 1999
Formats:txt html json
Obsoleted by:RFC 3179
Status:EXPERIMENTAL
DOI:10.17487/RFC 2593
The IETF Script MIB defines an interface for the delegation of management functions based on the Internet management framework. A management script is a set of instructions that are executed by a language specific runtime system. The Script MIB extensibility protocol (SMX) defined in this memo separates language specific runtime systems from language independent Script MIB implementations.
 
RFC 2596 Use of Language Codes in LDAP
 
Authors:M. Wahl, T. Howes.
Date:May 1999
Formats:txt html json
Obsoleted by:RFC 3866
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2596
This document describes how language codes are carried in LDAP and are to be interpreted by LDAP servers. [STANDARDS-TRACK]
 
RFC 2598 An Expedited Forwarding PHB
 
Authors:V. Jacobson, K. Nichols, K. Poduri.
Date:June 1999
Formats:txt json html
Obsoleted by:RFC 3246
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2598
The definition of PHBs (per-hop forwarding behaviors) is a critical part of the work of the Diffserv Working Group. This document describes a PHB called Expedited Forwarding. We show the generality of this PHB by noting that it can be produced by more than one mechanism and give an example of its use to produce at least one service, a Virtual Leased Line. A recommended codepoint for this PHB is given.

A pdf version of this document is available at ftp://ftp.ee.lbl.gov/papers/ef_phb.pdf

 
RFC 2600 Internet Official Protocol Standards
 
Authors:J. Reynolds, R. Braden.
Date:March 2000
Formats:txt json html
Obsoletes:RFC 2500
Obsoleted by:RFC 2700
Status:HISTORIC
DOI:10.17487/RFC 2600
This memo is published by the RFC Editor in accordance with Section 2.1 of "The Internet Standards Process -- Revision 3", RFC 2026, which specifies the rules and procedures by which all Internet standards are set. This memo is prepared by the RFC Editor for the IESG and IAB. Please see http://www.rfc-editor.org for later updates to this document. [STANDARDS-TRACK]
 
RFC 2604 Wireless Device Configuration (OTASP/OTAPA) via ACAP
 
Authors:R. Gellens.
Date:June 1999
Formats:txt json html
Obsoleted by:RFC 2636
Status:INFORMATIONAL
DOI:10.17487/RFC 2604
Wireless carriers today are faced with creating more efficient distribution channels, increasing customer satisfaction, while also improving margin and profitability. Industry trends are pushing the sale of handsets further into the retail channel. The cost and effort of provisioning handsets, activating users, and updating handset parameters can be greatly reduced by using over-the-air activation mechanisms. A comprehensive and extensible means for over-the-air provisioning and handset parameter updating is required.

One approach is to purchase EIA/TIA/IS-683A (Over-the-air ServiceProvisioning of Mobile Stations in Spread Spectrum Systems) equipment. The cost of this has led carriers to seek alternative solutions. A very viable means for providing over-the-air (OTA) provisioning is to leverage the rollout of IS-707 data services equipment, which most carriers are in the process of deploying. This paper presents an approach to OTA provisioning that utilizes the deployment of IS-707 to deliver OTA provisioning and parameter upgrading.

IS-707 data services makes available several methods of providing over-the-air provisioning and parameter updating. A well thought-out approach utilizing Internet-based open standard mechanisms can provide an extensible platform for further carrier service offerings, enhanced interoperability among back-end services, and vendor independence.

This paper describes a viable and attractive means to provideOTASP/OTAPA via IS-707, using the ACAP [ACAP] protocol.

 
RFC 2611 URN Namespace Definition Mechanisms
 
Authors:L. Daigle, D. van Gulik, R. Iannella, P. Faltstrom.
Date:June 1999
Formats:txt json html
Obsoleted by:RFC 3406
Also:BCP 0033
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 2611
The URN WG has defined a syntax for Uniform Resource Names (URNs)[RFC2141], as well as some proposed mechanisms for their resolution and use in Internet applications ([RFC2168, RFC2169]). The whole rests on the concept of individual "namespaces" within the URN structure. Apart from proof-of-concept namespaces, the use of existing identifiers in URNs has been discussed ([RFC2288]), and this document lays out general definitions of and mechanisms for establishing URN "namespaces".
 
RFC 2616 Hypertext Transfer Protocol -- HTTP/1.1
 
Authors:R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee.
Date:June 1999
Formats:txt ps html pdf json
Obsoletes:RFC 2068
Obsoleted by:RFC 7230, RFC 7231, RFC 7232, RFC 7233, RFC 7234, RFC 7235
Updated by:RFC 2817, RFC 5785, RFC 6266, RFC 6585
Status:DRAFT STANDARD
DOI:10.17487/RFC 2616
The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, protocol which can be used for many tasks beyond its use for hypertext, such as name servers and distributed object management systems, through extension of its request methods, error codes and headers [47]. A feature of HTTP is the typing and negotiation of data representation, allowing systems to be built independently of the data being transferred.

HTTP has been in use by the World-Wide Web global information initiative since 1990. This specification defines the protocol referred to as "HTTP/1.1", and is an update to RFC 2068 [33].

 
RFC 2617 HTTP Authentication: Basic and Digest Access Authentication
 
Authors:J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, L. Stewart.
Date:June 1999
Formats:txt html json
Obsoletes:RFC 2069
Obsoleted by:RFC 7235, RFC 7615, RFC 7616, RFC 7617
Status:DRAFT STANDARD
DOI:10.17487/RFC 2617
"HTTP/1.0", includes the specification for a Basic AccessAuthentication scheme. This scheme is not considered to be a secure method of user authentication (unless used in conjunction with some external secure system such as SSL [5]), as the user name and password are passed over the network as cleartext.

This document also provides the specification for HTTP's authentication framework, the original Basic authentication scheme and a scheme based on cryptographic hashes, referred to as "DigestAccess Authentication". It is therefore also intended to serve as a replacement for RFC 2069 [6]. Some optional elements specified byRFC 2069 have been removed from this specification due to problems found since its publication; other new elements have been added for compatibility, those new elements have been made optional, but are strongly recommended.

Like Basic, Digest access authentication verifies that both parties to a communication know a shared secret (a password); unlike Basic, this verification can be done without sending the password in the clear, which is Basic's biggest weakness. As with most other authentication protocols, the greatest sources of risks are usually found not in the core protocol itself but in policies and procedures surrounding its use.

 
RFC 2618 RADIUS Authentication Client MIB
 
Authors:B. Aboba, G. Zorn.
Date:June 1999
Formats:txt json html
Obsoleted by:RFC 4668
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2618
This memo defines a set of extensions which instrument RADIUS authentication client functions. These extensions represent a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. Using these extensions IP-based management stations can manage RADIUS authentication clients.
 
RFC 2619 RADIUS Authentication Server MIB
 
Authors:G. Zorn, B. Aboba.
Date:June 1999
Formats:txt json html
Obsoleted by:RFC 4669
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2619
This memo defines a set of extensions which instrument RADIUS authentication server functions. These extensions represent a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. Using these extensions IP-based management stations can manage RADIUS authentication servers.
 
RFC 2620 RADIUS Accounting Client MIB
 
Authors:B. Aboba, G. Zorn.
Date:June 1999
Formats:txt json html
Obsoleted by:RFC 4670
Status:INFORMATIONAL
DOI:10.17487/RFC 2620
This memo defines a set of extensions which instrument RADIUS accounting client functions. These extensions represent a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. Using these extensions IP-based management stations can manage RADIUS accounting clients.
 
RFC 2621 RADIUS Accounting Server MIB
 
Authors:G. Zorn, B. Aboba.
Date:June 1999
Formats:txt json html
Obsoleted by:RFC 4671
Status:INFORMATIONAL
DOI:10.17487/RFC 2621
This memo defines a set of extensions which instrument RADIUS accounting server functions. These extensions represent a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. Using these extensions IP-based management stations can manage RADIUS accounting servers.
 
RFC 2625 IP and ARP over Fibre Channel
 
Authors:M. Rajagopal, R. Bhagwat, W. Rickard.
Date:June 1999
Formats:txt json html
Obsoleted by:RFC 4338
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2625
Fibre Channel (FC) is a high speed serial interface technology that supports several higher layer protocols including Small ComputerSystem Interface (SCSI) and Internet Protocol(IP). Until now, SCSI has been the only widely used protocol over FC. Existing FC standards[3] do not adequately specify how IP packets may be transported overFC and how IP addresses are resolved to FC addresses. The purpose of this document is to specify a way of encapsulating IP and AddressResolution Protocol(ARP) over Fibre Channel and also to describe a mechanism(s) for IP address resolution.
 
RFC 2629 Writing I-Ds and RFCs using XML
 
Authors:M. Rose.
Date:June 1999
Formats:txt json html
Obsoleted by:RFC 7749
Status:INFORMATIONAL
DOI:10.17487/RFC 2629
This memo presents a technique for using XML (Extensible MarkupLanguage) as a source format for documents in the Internet-Drafts(I-Ds) and Request for Comments (RFC) series.
 
RFC 2630 Cryptographic Message Syntax
 
Authors:R. Housley.
Date:June 1999
Formats:txt json html
Obsoleted by:RFC 3369, RFC 3370
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2630
This document describes the Cryptographic Message Syntax. This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary messages.

The Cryptographic Message Syntax is derived from PKCS #7 version 1.5 as specified in RFC 2315 [PKCS#7]. Wherever possible, backward compatibility is preserved; however, changes were necessary to accommodate attribute certificate transfer and key agreement techniques for key management.

 
RFC 2632 S/MIME Version 3 Certificate Handling
 
Authors:B. Ramsdell, Ed..
Date:June 1999
Formats:txt html json
Obsoleted by:RFC 3850
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2632
S/MIME (Secure/Multipurpose Internet Mail Extensions), provides a method to send and receive secure MIME messages. Before using a public key to provide security services, the S/MIME agent MUST certify that the public key is valid. S/MIME agents MUST use PKIX certificates to validate public keys as described in the Internet X.509 Public Key Infrastructure (PKIX) Certificate and CRL Profile. [STANDARDS-TRACK]
 
RFC 2633 S/MIME Version 3 Message Specification
 
Authors:B. Ramsdell, Ed..
Date:June 1999
Formats:txt html json
Obsoleted by:RFC 3851
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2633
This document describes a protocol for adding cryptographic signature and encryption services to MIME data. [STANDARDS-TRACK]
 
RFC 2639 Internet Printing Protocol/1.0: Implementer's Guide
 
Authors:T. Hastings, C. Manros.
Date:July 1999
Formats:txt json html
Obsoleted by:RFC 3196
Status:INFORMATIONAL
DOI:10.17487/RFC 2639
This document is one of a set of documents, which together describe all aspects of a new Internet Printing Protocol (IPP). IPP is an application level protocol that can be used for distributed printing using Internet tools and technologies. This document contains information that supplements the IPP Model and Semantics [RFC2566] and the IPP Transport and Encoding [RFC2565] documents. It is intended to help implementers understand IPP/1.0 and some of the considerations that may assist them in the design of their client and/or IPP object implementations. For example, a typical order of processing requests is given, including error checking. Motivation for some of the specification decisions is also included.

The full set of IPP documents includes:

Design Goals for an Internet Printing Protocol [RFC2567]Rationale for the Structure and Model and Protocol for the InternetPrinting Protocol [RFC2568]Internet Printing Protocol/1.0: Model and Semantics [RFC2566]Internet Printing Protocol/1.0: Encoding and Transport [RFC2565]Mapping between LPD and IPP Protocols [RFC2569]

The document, "Design Goals for an Internet Printing Protocol", takes a broad look at distributed printing functionality, and it enumerates real-life scenarios that help to clarify the features that need to be included in a printing protocol for the Internet. It identifies requirements for three types of users: end users, operators, and administrators. The design goals document calls out a subset of end user requirements that are satisfied in IPP/1.0. Operator and administrator requirements are out of scope for version 1.0.

The document, "Rationale for the Structure and Model and Protocol for the Internet Printing Protocol", describes IPP from a high level view, defines a roadmap for the various documents that form the suite of IPP specifications, and gives background and rationale for theIETF working group's major decisions.

The document, "Internet Printing Protocol/1.0: Model and Semantics", describes a simplified model with abstract objects, their attributes, and their operations. The model introduces a Printer and a Job. TheJob supports multiple documents per Job. The model document also addresses how security, internationalization, and directory issues are addressed.

The document, "Internet Printing Protocol/1.0: Encoding andTransport", is a formal mapping of the abstract operations and attributes defined in the model document onto HTTP/1.1. It also defines the encoding rules for a new Internet media type called"application/ipp".

The document, "Mapping between LPD and IPP Protocols", gives some advice to implementers of gateways between IPP and LPD (Line PrinterDaemon) implementations.

 
RFC 2646 The Text/Plain Format Parameter
 
Authors:R. Gellens, Ed..
Date:August 1999
Formats:txt json html
Obsoleted by:RFC 3676
Updates:RFC 2046
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2646
This memo proposes a new parameter to be used with Text/Plain, and, in the presence of this parameter, the use of trailing whitespace to indicate flowed lines. This results in an encoding which appears as normal Text/Plain in older implementations, since it is in fact normal Text/Plain. [STANDARDS-TRACK]
 
RFC 2665 Definitions of Managed Objects for the Ethernet-like Interface Types
 
Authors:J. Flick, J. Johnson.
Date:August 1999
Formats:txt html json
Obsoletes:RFC 2358
Obsoleted by:RFC 3635
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2665
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.This memo obsoletes RFC 2358, "Definitions of Managed Objects for theEthernet-like Interface Types". This memo extends that specification by including management information useful for the management of 1000Mb/s and full-duplex Ethernet interfaces.

Ethernet technology, as defined by the 802.3 Working Group of theIEEE, continues to evolve, with scalable increases in speed, new types of cabling and interfaces, and new features. This evolution may require changes in the managed objects in order to reflect this new functionality. This document, as with other documents issued by this working group, reflects a certain stage in the evolution ofEthernet technology. In the future, this document might be revised, or new documents might be issued by the Ethernet Interfaces and HubMIB Working Group, in order to reflect the evolution of Ethernet technology.

 
RFC 2667 IP Tunnel MIB
 
Authors:D. Thaler.
Date:August 1999
Formats:txt json html
Obsoleted by:RFC 4087
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2667
This memo defines a Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects used for managing tunnels of any type over IPv4 networks. [STANDARDS-TRACK]
 
RFC 2668 Definitions of Managed Objects for IEEE 802.3 Medium Attachment Units (MAUs)
 
Authors:A. Smith, J. Flick, K. de Graaf, D. Romascanu, D. McMaster, K. McCloghrie, S. Roberts.
Date:August 1999
Formats:txt html json
Obsoletes:RFC 2239
Obsoleted by:RFC 3636
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2668
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.This memo obsoletes RFC 2239, "Definitions of Managed Objects forIEEE 802.3 Medium Attachment Units (MAUs) using SMIv2". This memo extends that specification by including management information useful for the management of 1000 Mb/s MAUs.

Ethernet technology, as defined by the 802.3 Working Group of theIEEE, continues to evolve, with scalable increases in speed, new types of cabling and interfaces, and new features. This evolution may require changes in the managed objects in order to reflect this new functionality. This document, as with other documents issued by this working group, reflects a certain stage in the evolution ofEthernet technology. In the future, this document might be revised, or new documents might be issued by the Ethernet Interfaces and HubMIB Working Group, in order to reflect the evolution of Ethernet technology.

 
RFC 2669 DOCSIS Cable Device MIB Cable Device Management Information Base for DOCSIS compliant Cable Modems and Cable Modem Termination Systems
 
Authors:M. St. Johns, Ed..
Date:August 1999
Formats:txt html json
Obsoleted by:RFC 4639
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2669
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it defines a basic set of managed objects for SNMP- based management of DOCSIS 1.0 compliant Cable Modems and Cable ModemTermination Systems.

This memo specifies a MIB module in a manner that is compliant to theSNMP SMIv2 [5][6][7]. The set of objects is consistent with the SNMP framework and existing SNMP standards.

This memo is a product of the IPCDN working group within the InternetEngineering Task Force. Comments are solicited and should be addressed to the working group's mailing list at ipcdn@terayon.com and/or the author.

 
RFC 2670 Radio Frequency (RF) Interface Management Information Base for MCNS/DOCSIS compliant RF interfaces
 
Authors:M. St. Johns, Ed..
Date:August 1999
Formats:txt html json
Obsoleted by:RFC 4546
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2670
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it defines a basic set of managed objects for SNMP- based management of MCNS/DOCSIS compliant Radio Frequency (RF) interfaces.

This memo specifies a MIB module in a manner that is compliant to theSNMP SMIv2 [5][6][7]. The set of objects are consistent with theSNMP framework and existing SNMP standards.

This memo is a product of the IPCDN working group within the InternetEngineering Task Force. Comments are solicited and should be addressed to the working group's mailing list at ipcdn@terayon.com and/or the author.

 
RFC 2671 Extension Mechanisms for DNS (EDNS0)
 
Authors:P. Vixie.
Date:August 1999
Formats:txt html json
Obsoleted by:RFC 6891
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2671
The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow clients to advertise their capabilities to servers. This document describes backward compatible mechanisms for allowing the protocol to grow.
 
RFC 2672 Non-Terminal DNS Name Redirection
 
Authors:M. Crawford.
Date:August 1999
Formats:txt json html
Obsoleted by:RFC 6672
Updated by:RFC 4592, RFC 6604
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2672
This document defines a new DNS Resource Record called "DNAME", which provides the capability to map an entire subtree of the DNS name space to another domain. [STANDARDS-TRACK]
 
RFC 2673 Binary Labels in the Domain Name System
 
Authors:M. Crawford.
Date:August 1999
Formats:txt json html
Obsoleted by:RFC 6891
Updates:RFC 1035
Updated by:RFC 3363, RFC 3364
Status:HISTORIC
DOI:10.17487/RFC 2673
This document defines a "Bit-String Label" which may appear within domain names. This new label type compactly represents a sequence of "One-Bit Labels" and enables resource records to be stored at any bit- boundary in a binary-named section of the domain name tree. [STANDARDS-TRACK]
 
RFC 2674 Definitions of Managed Objects for Bridges with Traffic Classes, Multicast Filtering and Virtual LAN Extensions
 
Authors:E. Bell, A. Smith, P. Langille, A. Rijhsinghani, K. McCloghrie.
Date:August 1999
Formats:txt html json
Obsoleted by:RFC 4363
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2674
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP based internets.In particular, it defines two MIB modules for managing the new capabilities of MAC bridges defined by the IEEE 802.1D-1998 MACBridges and the IEEE 802.1Q-1998 Virtual LAN (VLAN) standards for bridging between Local Area Network (LAN) segments. One MIB module defines objects for managing the 'Traffic Classes' and 'EnhancedMulticast Filtering' components of IEEE 802.1D-1998. The other MIB module defines objects for managing IEEE 802.1Q VLANs.

Provisions are made for support of transparent bridging. Provisions are also made so that these objects apply to bridges connected by subnetworks other than LAN segments. This memo also includes severalMIB modules in a manner that is compliant to the SMIv2 [V2SMI].

This memo supplements RFC 1493 [BRIDGEMIB] and (to a lesser extent)RFC 1525 [SBRIDGEMIB].

 
RFC 2679 A One-way Delay Metric for IPPM
 
Authors:G. Almes, S. Kalidindi, M. Zekauskas.
Date:September 1999
Formats:txt html json
Obsoleted by:RFC 7679
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2679
This memo defines a metric for one-way delay of packets across Internet paths. [STANDARDS-TRACK]
 
RFC 2680 A One-way Packet Loss Metric for IPPM
 
Authors:G. Almes, S. Kalidindi, M. Zekauskas.
Date:September 1999
Formats:txt html json
Obsoleted by:RFC 7680
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2680
This memo defines a metric for one-way packet loss across Internet paths. [STANDARDS-TRACK]
 
RFC 2700 Internet Official Protocol Standards
 
Authors:J. Reynolds, R. Braden.
Date:August 2000
Formats:txt html json
Obsoletes:RFC 2600
Obsoleted by:RFC 2800
Status:HISTORIC
DOI:10.17487/RFC 2700
This memo describes the current state of standardization of protocols used in the Internet as determined by the Internet Engineering TaskForce (IETF). Sections 3.1 - 3.6 contain the lists of protocols in each stage of standardization - Standard, Draft Standard, ProposedStandard, Experimental and Historic. Protocols that are new to this document or have been moved from one protocol level to another, or differ from the previous edition of this document are marked.Informational Request for Comments (RFCs) are not included. This memo lists the current protocols; it is not a complete index to RFCs.
 
RFC 2705 Media Gateway Control Protocol (MGCP) Version 1.0
 
Authors:M. Arango, A. Dugan, I. Elliott, C. Huitema, S. Pickett.
Date:October 1999
Formats:txt html json
Obsoleted by:RFC 3435
Updated by:RFC 3660
Status:INFORMATIONAL
DOI:10.17487/RFC 2705
This document describes an application programming interface and a corresponding protocol (MGCP) for controlling Voice over IP (VoIP)Gateways from external call control elements. MGCP assumes a call control architecture where the call control "intelligence" is outside the gateways and handled by external call control elements.

The document is structured in 6 main sections:

* The introduction presents the basic assumptions and the relation to other protocols such as H.323, RTSP, SAP or SIP.

* The interface section presents a conceptual overview of the MGCP, presenting the naming conventions, the usage of the session description protocol SDP, and the procedures that compose MGCP:Notifications Request, Notification, Create Connection, ModifyConnection, Delete Connection, AuditEndpoint, AuditConnection andRestartInProgress.

* The protocol description section presents the MGCP encodings, which are based on simple text formats, and the transmission procedure over UDP.

* The security section presents the security requirement of MGCP, and its usage of IP security services (IPSEC).

* The event packages section provides an initial definition of packages and event names.

* The description of the changes made in combining SGCP 1.1 and IPDC to create MGCP 1.0.

 
RFC 2706 ECML v1: Field Names for E-Commerce
 
Authors:D. Eastlake 3rd, T. Goldstein.
Date:October 1999
Formats:txt json html
Obsoleted by:RFC 3106
Status:INFORMATIONAL
DOI:10.17487/RFC 2706
Customers are frequently required to enter substantial amounts of information at an Internet merchant site in order to complete a purchase or other transaction, especially the first time they go there. A standard set of information fields is defined as the first version of an Electronic Commerce Modeling Language (ECML) so that this task can be more easily automated, for example by wallet software that could fill in fields. Even for the manual data entry case, customers will be less confused by varying merchant sites if a substantial number adopt these standard fields.
 
RFC 2716 PPP EAP TLS Authentication Protocol
 
Authors:B. Aboba, D. Simon.
Date:October 1999
Formats:txt json html
Obsoleted by:RFC 5216
Status:EXPERIMENTAL
DOI:10.17487/RFC 2716
The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links.The Extensible Authentication Protocol (EAP) is a PPP extension that provides support for additional authentication methods within PPP. This memo defines an Experimental Protocol for the Internet community.
 
RFC 2717 Registration Procedures for URL Scheme Names
 
Authors:R. Petke, I. King.
Date:November 1999
Formats:txt json html
Obsoleted by:RFC 4395
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 2717
This document defines the process by which new URL scheme names are registered.
 
RFC 2718 Guidelines for new URL Schemes
 
Authors:L. Masinter, H. Alvestrand, D. Zigmond, R. Petke.
Date:November 1999
Formats:txt html json
Obsoleted by:RFC 4395
Status:INFORMATIONAL
DOI:10.17487/RFC 2718
A Uniform Resource Locator (URL) is a compact string representation of the location for a resource that is available via the Internet.This document provides guidelines for the definition of new URL schemes.
 
RFC 2727 IAB and IESG Selection, Confirmation, and Recall Process: Operation of the Nominating and Recall Committees
 
Authors:J. Galvin.
Date:February 2000
Formats:txt json html
Obsoletes:RFC 2282
Obsoleted by:RFC 3777
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 2727
The process by which the members of the IAB and IESG are selected, confirmed, and recalled is specified. This document is a self- consistent, organized compilation of the process as it was known at the time of publication.
 
RFC 2731 Encoding Dublin Core Metadata in HTML
 
Authors:J. Kunze.
Date:December 1999
Formats:txt html json
Obsoleted by:RFC 5791
Status:INFORMATIONAL
DOI:10.17487/RFC 2731
The Dublin Core is a small set of metadata elements for describing information resources. This document explains how these elements are expressed using the META and LINK tags of HTML. This memo provides information for the Internet community.
 
RFC 2732 Format for Literal IPv6 Addresses in URL's
 
Authors:R. Hinden, B. Carpenter, L. Masinter.
Date:December 1999
Formats:txt json html
Obsoleted by:RFC 3986
Updates:RFC 2396
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2732
This document defines the format for literal IPv6 Addresses in URL's for implementation in World Wide Web browsers. This format has been implemented in the IPv6 versions of several widely deployed browsers including Microsoft Internet Explorer, Mozilla, and Lynx. It is also intended to be used in the IPv6 version of the service location protocol.

This document incudes an update to the generic syntax for UniformResource Identifiers defined in RFC 2396 [URL]. It defines a syntax for IPv6 addresses and allows the use of "[" and "]" within a URI explicitly for this reserved purpose.

 
RFC 2733 An RTP Payload Format for Generic Forward Error Correction
 
Authors:J. Rosenberg, H. Schulzrinne.
Date:December 1999
Formats:txt json html
Obsoleted by:RFC 5109
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2733
This document specifies a payload format for generic forward error correction of media encapsulated in RTP. It is engineered for FEC algorithms based on the exclusive-or (parity) operation. The payload format allows end systems to transmit using arbitrary block lengths and parity schemes. It also allows for the recovery of both the payload and critical RTP header fields. Since FEC is sent as a separate stream, it is backwards compatible with non-FEC capable hosts, so that receivers which do not wish to implement FEC can just ignore the extensions.
 
RFC 2737 Entity MIB (Version 2)
 
Authors:K. McCloghrie, A. Bierman.
Date:December 1999
Formats:txt json html
Obsoletes:RFC 2037
Obsoleted by:RFC 4133
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2737
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it describes managed objects used for managing multiple logical and physical entities managed by a single SNMP agent.
 
RFC 2740 OSPF for IPv6
 
Authors:R. Coltun, D. Ferguson, J. Moy.
Date:December 1999
Formats:txt json html
Obsoleted by:RFC 5340
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2740
This document describes the modifications to OSPF to support version6 of the Internet Protocol (IPv6). The fundamental mechanisms ofOSPF (flooding, DR election, area support, SPF calculations, etc.) remain unchanged. However, some changes have been necessary, either due to changes in protocol semantics between IPv4 and IPv6, or simply to handle the increased address size of IPv6.

Changes between OSPF for IPv4 and this document include the following. Addressing semantics have been removed from OSPF packets and the basic LSAs. New LSAs have been created to carry IPv6 addresses and prefixes. OSPF now runs on a per-link basis, instead of on a per-IP-subnet basis. Flooding scope for LSAs has been generalized. Authentication has been removed from the OSPF protocol itself, instead relying on IPv6's Authentication Header andEncapsulating Security Payload.

Most packets in OSPF for IPv6 are almost as compact as those in OSPF for IPv4, even with the larger IPv6 addresses. Most field-XSand packet-size limitations present in OSPF for IPv4 have been relaxed.In addition, option handling has been made more flexible.

All of OSPF for IPv4's optional capabilities, including on-demand circuit support, NSSA areas, and the multicast extensions to OSPF(MOSPF) are also supported in OSPF for IPv6.

 
RFC 2751 Signaled Preemption Priority Policy Element
 
Authors:S. Herzog.
Date:January 2000
Formats:txt json html
Obsoleted by:RFC 3181
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2751
This document describes a preemption priority policy element for use by signaled policy based admission protocols (such as [RSVP] and[COPS]).

Preemption priority defines a relative importance (rank) within the set of flows competing to be admitted into the network. Rather than admitting flows by order of arrival (First Come First Admitted) network nodes may consider priorities to preempt some previously admitted low priority flows in order to make room for a newer, high- priority flow.

 
RFC 2752 Identity Representation for RSVP
 
Authors:S. Yadav, R. Yavatkar, R. Pabbati, P. Ford, T. Moore, S. Herzog.
Date:January 2000
Formats:txt html json
Obsoleted by:RFC 3182
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2752
This document describes the representation of identity information inPOLICY_DATA object [POL-EXT] for supporting policy based admission control in RSVP. The goal of identity representation is to allow a process on a system to securely identify the owner and the application of the communicating process (e.g. user id) and convey this information in RSVP messages (PATH or RESV) in a secure manner.We describe the encoding of identities as RSVP policy element. We describe the processing rules to generate identity policy elements for multicast merged flows. Subsequently, we describe representations of user identities for Kerberos and Public Key based user authentication mechanisms. In summary we describe the use of this identity information in an operational setting.
 
RFC 2754 RPS IANA Issues
 
Authors:C. Alaettinoglu, C. Villamizar, R. Govindan.
Date:January 2000
Formats:txt json html
Obsoleted by:RFC 6254
Status:HISTORIC
DOI:10.17487/RFC 2754
RPS Security [2] requires certain RPSL [1] objects in the IRR to be hierarchically delegated. The set of objects that are at the root of this hierarchy needs to be created and digitally signed by IANA. This paper presents these seed objects and lists operations required fromIANA.
 
RFC 2763 Dynamic Hostname Exchange Mechanism for IS-IS
 
Authors:N. Shen, H. Smit.
Date:February 2000
Formats:txt html json
Obsoleted by:RFC 5301
Status:INFORMATIONAL
DOI:10.17487/RFC 2763
Currently, there does not exist a simple and dynamic mechanism for routers running IS-IS to learn about symbolic hostnames. This document defines a new TLV which allows the IS-IS routers to flood their name to system ID mapping information across the IS-IS network.
 
RFC 2765 Stateless IP/ICMP Translation Algorithm (SIIT)
 
Authors:E. Nordmark.
Date:February 2000
Formats:txt json html
Obsoleted by:RFC 6145
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2765
This document specifies a transition mechanism algorithm in addition to the mechanisms already specified in [TRANS-MECH]. The algorithm translates between IPv4 and IPv6 packet headers (including ICMP headers) in separate translator "boxes" in the network without requiring any per-connection state in those "boxes". This new algorithm can be used as part of a solution that allows IPv6 hosts, which do not have a permanently assigned IPv4 addresses, to communicate with IPv4-only hosts. The document neither specifies address assignment nor routing to and from the IPv6 hosts when they communicate with the IPv4-only hosts.
 
RFC 2766 Network Address Translation - Protocol Translation (NAT-PT)
 
Authors:G. Tsirtsis, P. Srisuresh.
Date:February 2000
Formats:txt html json
Obsoleted by:RFC 4966
Updated by:RFC 3152
Status:HISTORIC
DOI:10.17487/RFC 2766
This document specifies an IPv4-to-IPv6 transition mechanism, in addition to those already specified in [TRANS]. This solution attempts to provide transparent routing, as defined in [NAT-TERM], to end-nodes in V6 realm trying to communicate with end-nodes in V4 realm and vice versa. This is achieved using a combination of NetworkAddress Translation and Protocol Translation. The scheme described does not mandate dual-stacks (i.e., IPv4 as well as V6 protocol support) or special purpose routing requirements (such as requiring tunneling support) on end nodes. This scheme is based on a combination of address translation theme as described in [NAT-TERM] and V6/V4 protocol translation theme as described in [SIIT].
 
RFC 2767 Dual Stack Hosts using the "Bump-In-the-Stack" Technique (BIS)
 
Authors:K. Tsuchiya, H. Higuchi, Y. Atarashi.
Date:February 2000
Formats:txt html json
Obsoleted by:RFC 6535
Status:INFORMATIONAL
DOI:10.17487/RFC 2767
In the especially initial stage of the transition from IPv4 to IPv6, it is hard to provide a complete set of IPv6 applications. This memo proposes a mechanism of dual stack hosts using the technique called"Bump-in-the-Stack" in the IP security area. The mechanism allows the hosts to communicate with other IPv6 hosts using existing IPv4 applications.
 
RFC 2770 GLOP Addressing in 233/8
 
Authors:D. Meyer, P. Lothberg.
Date:February 2000
Formats:txt json html
Obsoleted by:RFC 3180
Status:EXPERIMENTAL
DOI:10.17487/RFC 2770
This describes an experimental policy for use of the class D address space using 233/8 as the experimental statically assigned subset of the class D address space. This new experimental allocation is in addition to those described on [IANA] (e.g. [RFC2365]).

This memo is a product of the Multicast Deployment Working Group(MBONED) in the Operations and Management Area of the InternetEngineering Task Force. Submit comments to <mboned@ns.uoregon.edu&rt; or the authors.

 
RFC 2777 Publicly Verifiable Nomcom Random Selection
 
Authors:D. Eastlake 3rd.
Date:February 2000
Formats:txt html json
Obsoleted by:RFC 3797
Status:INFORMATIONAL
DOI:10.17487/RFC 2777
This document describes a method for making random selections in such a way that the unbiased nature of the choice is publicly verifiable.As an example, the selection of the voting members of the IETFNominations Committee from the pool of eligible volunteers is used.Similar techniques would be applicable to other cases.
 
RFC 2787 Definitions of Managed Objects for the Virtual Router Redundancy Protocol
 
Authors:B. Jewell, D. Chuang.
Date:March 2000
Formats:txt html json
Obsoleted by:RFC 6527
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2787
This specification defines an extension to the Management InformationBase (MIB) for use with SNMP-based network management. In particular, it defines objects for configuring, monitoring, and controlling routers that employ the Virtual Router RedundancyProtocol (VRRP) [17].

This memo specifies a MIB module in a manner that is compliant withSMIv2 [5], and semantically identical to the SMIv1 definitions [2].

 
RFC 2793 RTP Payload for Text Conversation
 
Authors:G. Hellstrom.
Date:May 2000
Formats:txt html json
Obsoleted by:RFC 4103
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2793
This memo describes how to carry text conversation session contents in RTP packets. Text conversation session contents are specified inITU-T Recommendation T.140 [1].

Text conversation is used alone or in connection to other conversational facilities such as video and voice, to form multimedia conversation services.

This RTP payload description contains an optional possibility to include redundant text from already transmitted packets in order to reduce the risk of text loss caused by packet loss. The redundancy coding follows RFC 2198.

 
RFC 2796 BGP Route Reflection - An Alternative to Full Mesh IBGP
 
Authors:T. Bates, R. Chandra, E. Chen.
Date:April 2000
Formats:txt html json
Obsoleted by:RFC 4456
Updates:RFC 1966
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2796
The Border Gateway Protocol [1] is an inter-autonomous system routing protocol designed for TCP/IP internets. Currently in the Internet BGP deployments are configured such that that all BGP speakers within a single AS must be fully meshed so that any external routing information must be re-distributed to all other routers within thatAS. This represents a serious scaling problem that has been well documented with several alternatives proposed [2,3].

This document describes the use and design of a method known as"Route Reflection" to alleviate the the need for "full mesh" IBGP.

 
RFC 2797 Certificate Management Messages over CMS
 
Authors:M. Myers, X. Liu, J. Schaad, J. Weinstein.
Date:April 2000
Formats:txt html json
Obsoleted by:RFC 5272
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2797
This document defines a Certificate Management protocol using CMS(CMC). This protocol addresses two immediate needs within theInternet PKI community:

1. The need for an interface to public key certification products and services based on [CMS] and [PKCS10], and2. The need in [SMIMEV3] for a certificate enrollment protocol forDSA-signed certificates with Diffie-Hellman public keys.

A small number of additional services are defined to supplement the core certificate request service.

Throughout this specification the term CMS is used to refer to both[CMS] and [PKCS7]. For both signedData and envelopedData, CMS is a superset of the PKCS7. In general, the use of PKCS7 in this document is aligned to the Cryptographic Message Syntax [CMS] that provides a superset of the PKCS7 syntax. The term CMC refers to this specification.

 
RFC 2800 Internet Official Protocol Standards
 
Authors:J. Reynolds, R. Braden, S. Ginoza.
Date:May 2001
Formats:txt html json
Obsoletes:RFC 2700
Obsoleted by:RFC 2900
Status:HISTORIC
DOI:10.17487/RFC 2800
This memo contains a snapshot of the state of standardization of protocols used in the Internet as of April 17, 2001. It lists only official protocol standards RFCs; it is not a complete index to theRFC series. The latest version of this memo is designated STD 1.
 
RFC 2806 URLs for Telephone Calls
 
Authors:A. Vaha-Sipila.
Date:April 2000
Formats:txt json html
Obsoleted by:RFC 3966
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2806
This document specifies URL (Uniform Resource Locator) schemes "tel","fax" and "modem" for specifying the location of a terminal in the phone network and the connection types (modes of operation) that can be used to connect to that entity. This specification covers voice calls (normal phone calls, answering machines and voice messaging systems), facsimile (telefax) calls and data calls, both for POTS and digital/mobile subscribers.
 
RFC 2818 HTTP Over TLS
 
Authors:E. Rescorla.
Date:May 2000
Formats:txt html json
Obsoleted by:RFC 9110
Updated by:RFC 5785, RFC 7230
Status:INFORMATIONAL
DOI:10.17487/RFC 2818
This memo describes how to use TLS to secure HTTP connections over the Internet. Current practice is to layer HTTP over SSL (the predecessor to TLS), distinguishing secured traffic from insecure traffic by the use of a different server port. This document documents that practice using TLS. A companion document describes a method for using HTTP/TLS over the same port as normal HTTP[RFC2817].
 
RFC 2821 Simple Mail Transfer Protocol
 
Authors:J. Klensin, Ed..
Date:April 2001
Formats:txt html json
Obsoletes:RFC 0821, RFC 0974, RFC 1869
Obsoleted by:RFC 5321
Updated by:RFC 5336
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2821
This document is a self-contained specification of the basic protocol for the Internet electronic mail transport. It consolidates, updates and clarifies, but doesn't add new or change existing functionality of the following:

- the original SMTP (Simple Mail Transfer Protocol) specification ofRFC 821 [30],

- domain name system requirements and implications for mail transport from RFC 1035 [22] and RFC 974 [27],

- the clarifications and applicability statements in RFC 1123 [2], and

- material drawn from the SMTP Extension mechanisms [19].

It obsoletes RFC 821, RFC 974, and updates RFC 1123 (replaces the mail transport materials of RFC 1123). However, RFC 821 specifies some features that were not in significant use in the Internet by the mid-1990s and (in appendices) some additional transport models.Those sections are omitted here in the interest of clarity and brevity; readers needing them should refer to RFC 821.

It also includes some additional material from RFC 1123 that required amplification. This material has been identified in multiple ways, mostly by tracking flaming on various lists and newsgroups and problems of unusual readings or interpretations that have appeared as the SMTP extensions have been deployed. Where this specification moves beyond consolidation and actually differs from earlier documents, it supersedes them technically as well as textually.

Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a 'mail submission' protocol, as recommended for POP [3, 26] and IMAP [6]. Additional submission issues are discussed in RFC 2476[15].

Section 2.3 provides definitions of terms specific to this document.Except when the historical terminology is necessary for clarity, this document uses the current 'client' and 'server' terminology to identify the sending and receiving SMTP processes, respectively.

A companion document [32] discusses message headers, message bodies and formats and structures for them, and their relationship.

 
RFC 2822 Internet Message Format
 
Authors:P. Resnick, Ed..
Date:April 2001
Formats:txt json html
Obsoletes:RFC 0822
Obsoleted by:RFC 5322
Updated by:RFC 5335, RFC 5336
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2822
This standard specifies a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This standard supersedes the one specified in Request ForComments (RFC) 822, "Standard for the Format of ARPA Internet TextMessages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.
 
RFC 2828 Internet Security Glossary
 
Authors:R. Shirey.
Date:May 2000
Formats:txt html json
Obsoleted by:RFC 4949
Status:INFORMATIONAL
DOI:10.17487/RFC 2828
This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with Internet security, particularly Internet Standards documents (ISDs). To avoid confusion,ISDs should use the same term or definition whenever the same concept is mentioned. To improve international understanding, ISDs should use terms in their plainest, dictionary sense. ISDs should use terms established in standards documents and other well-founded publications and should avoid substituting private or newly made-up terms. ISDs should avoid terms that are proprietary or otherwise favor a particular vendor, or that create a bias toward a particular security technology or mechanism versus other, competing techniques that already exist or might be developed in the future.
 
RFC 2829 Authentication Methods for LDAP
 
Authors:M. Wahl, H. Alvestrand, J. Hodges, R. Morgan.
Date:May 2000
Formats:txt html json
Obsoleted by:RFC 4513, RFC 4510
Updated by:RFC 3377
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2829
This document specifies particular combinations of security mechanisms which are required and recommended in LDAP [1] implementations.
 
RFC 2830 Lightweight Directory Access Protocol (v3): Extension for Transport Layer Security
 
Authors:J. Hodges, R. Morgan, M. Wahl.
Date:May 2000
Formats:txt html json
Obsoleted by:RFC 4511, RFC 4513, RFC 4510
Updated by:RFC 3377
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2830
This document defines the "Start Transport Layer Security (TLS)Operation" for LDAP [LDAPv3, TLS]. This operation provides for TLS establishment in an LDAP association and is defined in terms of anLDAP extended request.
 
RFC 2831 Using Digest Authentication as a SASL Mechanism
 
Authors:P. Leach, C. Newman.
Date:May 2000
Formats:txt html json
Obsoleted by:RFC 6331
Status:HISTORIC
DOI:10.17487/RFC 2831
This specification defines how HTTP Digest Authentication [Digest] can be used as a SASL [RFC 2222] mechanism for any protocol that has a SASL profile. It is intended both as an improvement over CRAM-MD5[RFC 2195] and as a convenient way to support a single authentication mechanism for web, mail, LDAP, and other protocols.
 
RFC 2833 RTP Payload for DTMF Digits, Telephony Tones and Telephony Signals
 
Authors:H. Schulzrinne, S. Petrack.
Date:May 2000
Formats:txt json html
Obsoleted by:RFC 4733, RFC 4734
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2833
This memo describes how to carry dual-tone multifrequency (DTMF) signaling, other tone signals and telephony events in RTP packets.
 
RFC 2836 Per Hop Behavior Identification Codes
 
Authors:S. Brim, B. Carpenter, F. Le Faucheur.
Date:May 2000
Formats:txt json html
Obsoleted by:RFC 3140
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2836
This document defines a binary encoding to uniquely identify PHBs (Per Hop Behaviors) and/or sets of PHBs in protocol messages. [STANDARDS TRACK]
 
RFC 2837 Definitions of Managed Objects for the Fabric Element in Fibre Channel Standard
 
Authors:K. Teow.
Date:May 2000
Formats:txt json html
Obsoleted by:RFC 4044
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2837
This memo defines an extension to the Management Information Base(MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines the objects for managing the operations of the Fabric Element portion of the Fibre ChannelStandards.
 
RFC 2842 Capabilities Advertisement with BGP-4
 
Authors:R. Chandra, J. Scudder.
Date:May 2000
Formats:txt html json
Obsoleted by:RFC 3392
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2842
Currently BGP-4 [BGP-4] requires that when a BGP speaker receives anOPEN message with one or more unrecognized Optional Parameters, the speaker must terminate BGP peering. This complicates introduction of new capabilities in BGP.

This document defines new Optional Parameter, called Capabilities, that is expected to facilitate introduction of new capabilities inBGP by providing graceful capability advertisement without requiring that BGP peering be terminated.

 
RFC 2845 Secret Key Transaction Authentication for DNS (TSIG)
 
Authors:P. Vixie, O. Gudmundsson, D. Eastlake 3rd, B. Wellington.
Date:May 2000
Formats:txt json html
Obsoleted by:RFC 8945
Updates:RFC 1035
Updated by:RFC 3645, RFC 4635, RFC 6895
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2845
This protocol allows for transaction level authentication using shared secrets and one way hashing. It can be used to authenticate dynamic updates as coming from an approved client, or to authenticate responses as coming from an approved recursive name server.

No provision has been made here for distributing the shared secrets; it is expected that a network administrator will statically configure name servers and clients using some out of band mechanism such as sneaker-net until a secure automated mechanism for key distribution is available.

 
RFC 2851 Textual Conventions for Internet Network Addresses
 
Authors:M. Daniele, B. Haberman, S. Routhier, J. Schoenwaelder.
Date:June 2000
Formats:txt json html
Obsoleted by:RFC 3291
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2851
This MIB module defines textual conventions to represent commonly used Internet network layer addressing information. The intent is that these definitions will be imported and used in MIBs that would otherwise define their own representations.

This work is output from the Operations and Management Area "IPv6MIB" design team.

 
RFC 2853 Generic Security Service API Version 2 : Java Bindings
 
Authors:J. Kabat, M. Upadhyay.
Date:June 2000
Formats:txt html json
Obsoleted by:RFC 5653
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2853
The Generic Security Services Application Program Interface (GSS-API) offers application programmers uniform access to security services atop a variety of underlying cryptographic mechanisms. This document specifies the Java bindings for GSS-API which is described at a language independent conceptual level in RFC 2743 [GSSAPIv2-UPDATE].

The GSS-API allows a caller application to authenticate a principal identity, to delegate rights to a peer, and to apply security services such as confidentiality and integrity on a per-message basis. Examples of security mechanisms defined for GSS-API are TheSimple Public-Key GSS-API Mechanism [SPKM] and The Kerberos Version 5GSS-API Mechanism [KERBV5].

 
RFC 2858 Multiprotocol Extensions for BGP-4
 
Authors:T. Bates, Y. Rekhter, R. Chandra, D. Katz.
Date:June 2000
Formats:txt json html
Obsoletes:RFC 2283
Obsoleted by:RFC 4760
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2858
Currently BGP-4 [BGP-4] is capable of carrying routing information only for IPv4 [IPv4]. This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, etc...). The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions.

This document obsoletes RFC 2283.

 
RFC 2861 TCP Congestion Window Validation
 
Authors:M. Handley, J. Padhye, S. Floyd.
Date:June 2000
Formats:txt json html
Obsoleted by:RFC 7661
Status:HISTORIC
DOI:10.17487/RFC 2861
TCP's congestion window controls the number of packets a TCP flow may have in the network at any time. However, long periods when the sender is idle or application-limited can lead to the invalidation of the congestion window, in that the congestion window no longer reflects current information about the state of the network. This document describes a simple modification to TCP's congestion control algorithms to decay the congestion window cwnd after the transition from a sufficiently-long application-limited period, while using the slow-start threshold ssthresh to save information about the previous value of the congestion window.

An invalid congestion window also results when the congestion window is increased (i.e., in TCP's slow-start or congestion avoidance phases) during application-limited periods, when the previous value of the congestion window might never have been fully utilized. We propose that the TCP sender should not increase the congestion window when the TCP sender has been application-limited (and therefore has not fully used the current congestion window). We have explored these algorithms both with simulations and with experiments from an implementation in FreeBSD.

 
RFC 2870 Root Name Server Operational Requirements
 
Authors:R. Bush, D. Karrenberg, M. Kosters, R. Plzak.
Date:June 2000
Formats:txt json html
Obsoletes:RFC 2010
Obsoleted by:RFC 7720
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 2870
As the internet becomes increasingly critical to the world's social and economic infrastructure, attention has rightly focused on the correct, safe, reliable, and secure operation of the internet infrastructure itself. The root domain name servers are seen as a crucial part of that technical infrastructure. The primary focus of this document is to provide guidelines for operation of the root name servers. Other major zone server operators (gTLDs, ccTLDs, major zones) may also find it useful. These guidelines are intended to meet the perceived societal needs without overly prescribing technical details.
 
RFC 2873 TCP Processing of the IPv4 Precedence Field
 
Authors:X. Xiao, A. Hannan, V. Paxson, E. Crabbe.
Date:June 2000
Formats:txt html json
Obsoleted by:RFC 9293
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2873
This memo describes a conflict between TCP [RFC793] and DiffServ[RFC2475] on the use of the three leftmost bits in the TOS octet of an IPv4 header [RFC791]. In a network that contains DiffServ-capable nodes, such a conflict can cause failures in establishing TCP connections or can cause some established TCP connections to be reset undesirably. This memo proposes a modification to TCP for resolving the conflict.

Because the IPv6 [RFC2460] traffic class octet does not have any defined meaning except what is defined in RFC 2474, and in particular does not define precedence or security parameter bits, there is no conflict between TCP and DiffServ on the use of any bits in the IPv6 traffic class octet.

 
RFC 2875 Diffie-Hellman Proof-of-Possession Algorithms
 
Authors:H. Prafullchandra, J. Schaad.
Date:July 2000
Formats:txt json html
Obsoleted by:RFC 6955
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2875
This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair. This behavior is needed for such operations as creating the signature of a PKCS #10 certification request. These algorithms are designed to provide a proof-of- possession rather than general purpose signing.
 
RFC 2877 5250 Telnet Enhancements
 
Authors:T. Murphy Jr., P. Rieth, J. Stevens.
Date:July 2000
Formats:txt html json
Obsoleted by:RFC 4777
Updates:RFC 1205
Status:INFORMATIONAL
DOI:10.17487/RFC 2877
This memo describes the interface to the IBM 5250 Telnet server that allows client Telnet to request a Telnet terminal or printer session using a specific device name. If a requested device name is not available, a method to retry the request using a new device name is described. Methods to request specific Telnet session settings and auto-signon function are also described.

By allowing a Telnet client to select the device name, the 5250Telnet server opens the door for applications to set and/or extract useful information about the Telnet client. Some possibilities are1) selecting a customized device name associated with a particular user profile name for National Language Support or subsystem routing,2) connecting PC and network printers as clients and 3) auto-signon using clear-text or DES-encrypted password exchange.

Applications may need to use system API's on the AS/400 in order to extract Telnet session settings from the device name description.Refer to the Retrieve Device Description (QDCRDEVD) API described in the AS/400 System API book [3] on how to extract information using the DEVD0600 and DEVD1100 templates.

This memo describes how the IBM 5250 Telnet server supports WorkStation Function (WSF) printers using 5250 Display Station Pass-Through. A response code is returned by the Telnet server to indicate success or failure of the WSF printer session.

 
RFC 2878 PPP Bridging Control Protocol (BCP)
 
Authors:M. Higashiyama, F. Baker.
Date:July 2000
Formats:txt json html
Obsoletes:RFC 1638
Obsoleted by:RFC 3518
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2878
The Point-to-Point Protocol (PPP) [6] provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP defines an extensible Link Control Protocol, and proposes a family ofNetwork Control Protocols for establishing and configuring different network-layer protocols.

This document defines the Network Control Protocol for establishing and configuring Remote Bridging for PPP links.

This document obsoletes RFC 1638, which was based on the IEEE802.1D-1993 MAC Bridge[3]. This document extends that specification by including the IEEE 802.1D-1998 MAC Bridge[8] and IEEE 802.1QVirtual LAN (VLAN)[9] standards. This document also improves the protocol in order to support high-speed switched LANs.

 
RFC 2885 Megaco Protocol version 0.8
 
Authors:F. Cuervo, N. Greene, C. Huitema, A. Rayhan, B. Rosen, J. Segers.
Date:August 2000
Formats:txt json html
Obsoleted by:RFC 3015
Status:HISTORIC
DOI:10.17487/RFC 2885
This document is common text with Recommendation H.248 as redetermined in Geneva, February 2000. It must be read in conjunction with the Megaco Errata, RFC 2886. A merged document presenting the Megaco protocol with the Errata incorporated will be available shortly.

The protocol presented in this document meets the requirements for a media gateway control protocol as presented in RFC 2805.

 
RFC 2886 Megaco Errata
 
Authors:T. Taylor.
Date:August 2000
Formats:txt html json
Obsoleted by:RFC 3015
Status:HISTORIC
DOI:10.17487/RFC 2886
This document records the errors found in the Megaco/H.248 protocol document, along with the changes proposed in the text of that document to resolve them. [STANDARDS TRACK]
 
RFC 2893 Transition Mechanisms for IPv6 Hosts and Routers
 
Authors:R. Gilligan, E. Nordmark.
Date:August 2000
Formats:txt html json
Obsoletes:RFC 1933
Obsoleted by:RFC 4213
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2893
This document specifies IPv4 compatibility mechanisms that can be implemented by IPv6 hosts and routers. These mechanisms include providing complete implementations of both versions of the InternetProtocol (IPv4 and IPv6), and tunneling IPv6 packets over IPv4 routing infrastructures. They are designed to allow IPv6 nodes to maintain complete compatibility with IPv4, which should greatly simplify the deployment of IPv6 in the Internet, and facilitate the eventual transition of the entire Internet to IPv6. This document obsoletes RFC 1933.
 
RFC 2898 PKCS #5: Password-Based Cryptography Specification Version 2.0
 
Authors:B. Kaliski.
Date:September 2000
Formats:txt json html
Obsoleted by:RFC 8018
Status:INFORMATIONAL
DOI:10.17487/RFC 2898
This memo represents a republication of PKCS #5 v2.0 from RSALaboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from that specification.

This document provides recommendations for the implementation of password-based cryptography, covering key derivation functions, encryption schemes, message-authentication schemes, and ASN.1 syntax identifying the techniques.

The recommendations are intended for general application within computer and communications systems, and as such include a fair amount of flexibility. They are particularly intended for the protection of sensitive information such as private keys, as in PKCS#8 [25]. It is expected that application standards and implementation profiles based on these specifications may include additional constraints.

Other cryptographic techniques based on passwords, such as password- based key entity authentication and key establishment protocols[4][5][26] are outside the scope of this document. Guidelines for the selection of passwords are also outside the scope.

 
RFC 2900 Internet Official Protocol Standards
 
Authors:J. Reynolds, R. Braden, S. Ginoza.
Date:August 2001
Formats:txt json html
Obsoletes:RFC 2800
Obsoleted by:RFC 3000
Status:HISTORIC
DOI:10.17487/RFC 2900
This memo contains a snapshot of the state of standardization of protocols used in the Internet as of July 17, 2001. It lists official protocol standards and Best Current Practice RFCs; it is not a complete index to the RFC series. The latest version of this memo is designated STD 1.
 
RFC 2908 The Internet Multicast Address Allocation Architecture
 
Authors:D. Thaler, M. Handley, D. Estrin.
Date:September 2000
Formats:txt json html
Obsoleted by:RFC 6308
Status:HISTORIC
DOI:10.17487/RFC 2908
This document proposes a multicast address allocation architecture(MALLOC) for the Internet. The architecture is modular with three layers, comprising a host-server mechanism, an intra-domain server- server coordination mechanism, and an inter-domain mechanism.
 
RFC 2910 Internet Printing Protocol/1.1: Encoding and Transport
 
Authors:R. Herriot, Ed., S. Butler, P. Moore, R. Turner, J. Wenn.
Date:September 2000
Formats:txt json html
Obsoletes:RFC 2565
Obsoleted by:RFC 8010
Updated by:RFC 3380, RFC 3381, RFC 3382, RFC 3510, RFC 3995, RFC 7472
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2910
This document is one of a set of documents, which together describe all aspects of a new Internet Printing Protocol (IPP). IPP is an application level protocol that can be used for distributed printing using Internet tools and technologies. This document defines the rules for encoding IPP operations and IPP attributes into a newInternet mime media type called "application/ipp". This document also defines the rules for transporting over Hypertext TransferProtocol (HTTP) a message body whose Content-Type is"application/ipp". This document defines a new scheme named 'ipp' for identifying IPP printers and jobs.

The full set of IPP documents includes:

Design Goals for an Internet Printing Protocol [RFC2567]Rationale for the Structure and Model and Protocol for the InternetPrinting Protocol [RFC2568]Internet Printing Protocol/1.1: Model and Semantics [RFC2911]Internet Printing Protocol/1.1: Encoding and Transport (this document)Internet Printing Protocol/1.1: Implementer's Guide [ipp-iig]Mapping between LPD and IPP Protocols [RFC2569]

The document, "Design Goals for an Internet Printing Protocol", takes a broad look at distributed printing functionality, and it enumerates real-life scenarios that help to clarify the features that need to be included in a printing protocol for the Internet. It identifies requirements for three types of users: end users, operators, and administrators. It calls out a subset of end user requirements that are satisfied in IPP/1.1. A few OPTIONAL operator operations have been added to IPP/1.1.

The document, "Rationale for the Structure and Model and Protocol for the Internet Printing Protocol", describes IPP from a high level view, defines a roadmap for the various documents that form the suite of IPP specification documents, and gives background and rationale for the IETF working group's major decisions.

The document, "Internet Printing Protocol/1.1: Model and Semantics", describes a simplified model with abstract objects, their attributes, and their operations that are independent of encoding and transport.It introduces a Printer and a Job object. The Job object optionally supports multiple documents per Job. It also addresses security, internationalization, and directory issues.

The document "Internet Printing Protocol/1.1: Implementer's Guide", gives advice to implementers of IPP clients and IPP objects.

The document "Mapping between LPD and IPP Protocols", gives some advice to implementers of gateways between IPP and LPD (Line PrinterDaemon) implementations.

 
RFC 2911 Internet Printing Protocol/1.1: Model and Semantics
 
Authors:T. Hastings, Ed., R. Herriot, R. deBry, S. Isaacson, P. Powell.
Date:September 2000
Formats:txt json html
Obsoletes:RFC 2566
Obsoleted by:RFC 8011
Updated by:RFC 3380, RFC 3382, RFC 3996, RFC 3995, RFC 7472
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2911
This document is one of a set of documents, which together describe all aspects of a new Internet Printing Protocol (IPP). IPP is an application level protocol that can be used for distributed printing using Internet tools and technologies. This document describes a simplified model consisting of abstract objects, their attributes, and their operations that is independent of encoding and transport.The model consists of a Printer and a Job object. A Job optionally supports multiple documents. IPP 1.1 semantics allow end-users and operators to query printer capabilities, submit print jobs, inquire about the status of print jobs and printers, cancel, hold, release, and restart print jobs. IPP 1.1 semantics allow operators to pause, resume, and purge (jobs from) Printer objects. This document also addresses security, internationalization, and directory issues.

The full set of IPP documents includes:

Design Goals for an Internet Printing Protocol [RFC2567]Rationale for the Structure and Model and Protocol for the InternetPrinting Protocol [RFC2568]Internet Printing Protocol/1.1: Model and Semantics (this document)Internet Printing Protocol/1.1: Encoding and Transport [RFC2910]Internet Printing Protocol/1.1: Implementer's Guide [IPP-IIG]Mapping between LPD and IPP Protocols [RFC2569]

The "Design Goals for an Internet Printing Protocol" document takes a broad look at distributed printing functionality, and it enumerates real-life scenarios that help to clarify the features that need to be included in a printing protocol for the Internet. It identifies requirements for three types of users: end users, operators, and administrators. It calls out a subset of end user requirements that are satisfied in IPP/1.0. A few OPTIONAL operator operations have been added to IPP/1.1.

The "Rationale for the Structure and Model and Protocol for theInternet Printing Protocol" document describes IPP from a high level view, defines a roadmap for the various documents that form the suite of IPP specification documents, and gives background and rationale for the IETF working group's major decisions.

The "Internet Printing Protocol/1.1: Encoding and Transport" document is a formal mapping of the abstract operations and attributes defined in the model document onto HTTP/1.1 [RFC2616]. It defines the encoding rules for a new Internet MIME media type called"application/ipp". This document also defines the rules for transporting over HTTP a message body whose Content-Type is"application/ipp". This document defines a new scheme named 'ipp' for identifying IPP printers and jobs.

The "Internet Printing Protocol/1.1: Implementer's Guide" document gives insight and advice to implementers of IPP clients and IPP objects. It is intended to help them understand IPP/1.1 and some of the considerations that may assist them in the design of their client and/or IPP object implementations. For example, a typical order of processing requests is given, including error checking. Motivation for some of the specification decisions is also included.

The "Mapping between LPD and IPP Protocols" document gives some advice to implementers of gateways between IPP and LPD (Line PrinterDaemon) implementations.

 
RFC 2915 The Naming Authority Pointer (NAPTR) DNS Resource Record
 
Authors:M. Mealling, R. Daniel.
Date:September 2000
Formats:txt json html
Obsoleted by:RFC 3401, RFC 3402, RFC 3403, RFC 3404
Updates:RFC 2168
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2915
This document describes a Domain Name System (DNS) resource record which specifies a regular expression based rewrite rule that, when applied to an existing string, will produce a new domain label orUniform Resource Identifier (URI). Depending on the value of the flags field of the resource record, the resulting domain label or URI may be used in subsequent queries for the Naming Authority Pointer(NAPTR) resource records (to delegate the name lookup) or as the output of the entire process for which this system is used (a resolution server for URI resolution, a service URI for ENUM style e.164 number to URI mapping, etc).

This allows the DNS to be used to lookup services for a wide variety of resource names (including URIs) which are not in domain name syntax. Reasons for doing this range from URN Resource DiscoverySystems to moving out-of-date services to new domains.

This document updates the portions of RFC 2168 specifically dealing with the definition of the NAPTR records and how other, non-URI specific applications, might use NAPTR.

 
RFC 2916 E.164 number and DNS
 
Authors:P. Faltstrom.
Date:September 2000
Formats:txt html json
Obsoleted by:RFC 3761
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2916
This document discusses the use of the Domain Name System (DNS) for storage of E.164 numbers. More specifically, how DNS can be used for identifying available services connected to one E.164 number.Routing of the actual connection using the service selected using these methods is not discussed.
 
RFC 2925 Definitions of Managed Objects for Remote Ping, Traceroute, and Lookup Operations
 
Authors:K. White.
Date:September 2000
Formats:txt json html
Obsoleted by:RFC 4560
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2925
This memo defines Management Information Bases (MIBs) for performing remote ping, traceroute and lookup operations at a remote host. When managing a network it is useful to be able to initiate and retrieve the results of ping or traceroute operations when performed at a remote host. A Lookup capability is defined in order to enable resolving of either an IP address to an DNS name or an DNS name to anIP address at a remote host.

Currently, there are several enterprise-specific MIBs for performing remote ping or traceroute operations. The purpose of this memo is to define a standards-based solution to enable interoperability.

 
RFC 2929 Domain Name System (DNS) IANA Considerations
 
Authors:D. Eastlake 3rd, E. Brunner-Williams, B. Manning.
Date:September 2000
Formats:txt json html
Obsoleted by:RFC 5395
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 2929
Internet Assigned Number Authority (IANA) parameter assignment considerations are given for the allocation of Domain Name System(DNS) classes, Resource Record (RR) types, operation codes, error codes, etc.
 
RFC 2932 IPv4 Multicast Routing MIB
 
Authors:K. McCloghrie, D. Farinacci, D. Thaler.
Date:October 2000
Formats:txt html json
Obsoleted by:RFC 5132
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2932
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it describes managed objects used for managing IPMulticast Routing for IPv4, independent of the specific multicast routing protocol in use.
 
RFC 2933 Internet Group Management Protocol MIB
 
Authors:K. McCloghrie, D. Farinacci, D. Thaler.
Date:October 2000
Formats:txt html json
Obsoleted by:RFC 5519
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2933
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it describes objects used for managing the InternetGroup Management Protocol (IGMP).
 
RFC 2960 Stream Control Transmission Protocol
 
Authors:R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, V. Paxson.
Date:October 2000
Formats:txt html json
Obsoleted by:RFC 4960
Updated by:RFC 3309
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2960
This document describes the Stream Control Transmission Protocol(SCTP). SCTP is designed to transport PSTN signaling messages overIP networks, but is capable of broader applications.

SCTP is a reliable transport protocol operating on top of a connectionless packet network such as IP. It offers the following services to its users:

-- acknowledged error-free non-duplicated transfer of user data,-- data fragmentation to conform to discovered path MTU size,

-- sequenced delivery of user messages within multiple streams, with an option for order-of-arrival delivery of individual user messages,-- optional bundling of multiple user messages into a single SCTP packet, and-- network-level fault tolerance through supporting of multi- homing at either or both ends of an association.

The design of SCTP includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.

 
RFC 2965 HTTP State Management Mechanism
 
Authors:D. Kristol, L. Montulli.
Date:October 2000
Formats:txt html json
Obsoletes:RFC 2109
Obsoleted by:RFC 6265
Status:HISTORIC
DOI:10.17487/RFC 2965
This document specifies a way to create a stateful session withHypertext Transfer Protocol (HTTP) requests and responses. It describes three new headers, Cookie, Cookie2, and Set-Cookie2, which carry state information between participating origin servers and user agents. The method described here differs from Netscape's Cookie proposal [Netscape], but it can interoperate with HTTP/1.0 user agents that use Netscape's method. (See the HISTORICAL section.)

This document reflects implementation experience with RFC 2109 and obsoletes it.

 
RFC 2966 Domain-wide Prefix Distribution with Two-Level IS-IS
 
Authors:T. Li, T. Przygienda, H. Smit.
Date:October 2000
Formats:txt json html
Obsoleted by:RFC 5302
Status:INFORMATIONAL
DOI:10.17487/RFC 2966
This document describes extensions to the Intermediate System toIntermediate System (IS-IS) protocol to support optimal routing within a two-level domain. The IS-IS protocol is specified in ISO10589, with extensions for supporting IPv4 (Internet Protocol) specified in RFC 1195 [2].

This document extends the semantics presented in RFC 1195 so that a routing domain running with both level 1 and level 2 IntermediateSystems (IS) [routers] can distribute IP prefixes between level 1 and level 2 and vice versa. This distribution requires certain restrictions to insure that persistent forwarding loops do not form.The goal of this domain-wide prefix distribution is to increase the granularity of the routing information within the domain.

 
RFC 2976 The SIP INFO Method
 
Authors:S. Donovan.
Date:October 2000
Formats:txt json html
Obsoleted by:RFC 6086
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2976
This document proposes an extension to the Session InitiationProtocol (SIP). This extension adds the INFO method to the SIP protocol. The intent of the INFO method is to allow for the carrying of session related control information that is generated during a session. One example of such session control information is ISUP andISDN signaling messages used to control telephony call services.

This and other example uses of the INFO method may be standardized in the future.

 
RFC 2988 Computing TCP's Retransmission Timer
 
Authors:V. Paxson, M. Allman.
Date:November 2000
Formats:txt html json
Obsoleted by:RFC 6298
Status:PROPOSED STANDARD
DOI:10.17487/RFC 2988
This document defines the standard algorithm that TransmissionControl Protocol (TCP) senders are required to use to compute and manage their retransmission timer. It expands on the discussion in section 4.2.3.1 of RFC 1122 and upgrades the requirement of supporting the algorithm from a SHOULD to a MUST.
 
RFC 3000 Internet Official Protocol Standards
 
Authors:J. Reynolds, R. Braden, S. Ginoza, L. Shiota.
Date:November 2001
Formats:txt json html
Obsoletes:RFC 2900
Obsoleted by:RFC 3300
Status:HISTORIC
DOI:10.17487/RFC 3000
This memo contains a snapshot of the state of standardization of protocols used in the Internet as of October 25, 2001. It lists official protocol standards and Best Current Practice RFCs; it is not a complete index to the RFC series. The latest version of this memo is designated STD 1.
 
RFC 3001 A URN Namespace of Object Identifiers
 
Authors:M. Mealling.
Date:November 2000
Formats:txt json html
Obsoleted by:RFC 3061
Status:INFORMATIONAL
DOI:10.17487/RFC 3001
This document describes a Uniform Resource Names (URN) namespace that contains Object Identifiers (OIDs).
 
RFC 3005 IETF Discussion List Charter
 
Authors:S. Harris.
Date:November 2000
Formats:txt json html
Obsoleted by:RFC 9245
Updated by:RFC 8717
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 3005
The Internet Engineering Task Force (IETF) discussion mailing list furthers the development and specification of Internet technology through discussion of technical issues, and hosts discussions of IETF direction, policy, meetings, and procedures. As this is the most general IETF mailing list, considerable latitude is allowed.Advertising, whether to solicit business or promote employment opportunities, falls well outside the range of acceptable topics, as do discussions of a personal nature.
 
RFC 3008 Domain Name System Security (DNSSEC) Signing Authority
 
Authors:B. Wellington.
Date:November 2000
Formats:txt json html
Obsoleted by:RFC 4035, RFC 4033, RFC 4034
Updates:RFC 2535
Updated by:RFC 3658
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3008
This document proposes a revised model of Domain Name System Security(DNSSEC) Signing Authority. The revised model is designed to clarify earlier documents and add additional restrictions to simplify the secure resolution process. Specifically, this affects the authorization of keys to sign sets of records.
 
RFC 3009 Registration of parityfec MIME types
 
Authors:J. Rosenberg, H. Schulzrinne.
Date:November 2000
Formats:txt json html
Obsoleted by:RFC 5109
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3009
The RTP (Real-time Transport Protocol) payload format for generic forward error correction allows RTP participants to improve loss resiliency through the use of traditional parity-based channel codes.This payload format requires four new MIME types, audio/parityfec, video/parityfec, text/parityfec and application/parityfec. This document serves as the MIME type registration for those formats.
 
RFC 3010 NFS version 4 Protocol
 
Authors:S. Shepler, B. Callaghan, D. Robinson, R. Thurlow, C. Beame, M. Eisler, D. Noveck.
Date:December 2000
Formats:txt json html
Obsoleted by:RFC 3530
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3010
NFS (Network File System) version 4 is a distributed file system protocol which owes heritage to NFS protocol versions 2 [RFC1094] and3 [RFC1813]. Unlike earlier versions, the NFS version 4 protocol supports traditional file access while integrating support for file locking and the mount protocol. In addition, support for strong security (and its negotiation), compound operations, client caching, and internationalization have been added. Of course, attention has been applied to making NFS version 4 operate well in an Internet environment.
 
RFC 3012 Mobile IPv4 Challenge/Response Extensions
 
Authors:C. Perkins, P. Calhoun.
Date:November 2000
Formats:txt html json
Obsoleted by:RFC 4721
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3012
Mobile IP, as originally specified, defines an authentication extension (the Mobile-Foreign Authentication extension) by which a mobile node can authenticate itself to a foreign agent.Unfortunately, this extension does not provide ironclad replay protection for the foreign agent, and does not allow for the use of existing techniques (such as CHAP) for authenticating portable computer devices. In this specification, we define extensions for the Mobile IP Agent Advertisements and the Registration Request that allow a foreign agent to use a challenge/response mechanism to authenticate the mobile node.
 
RFC 3015 Megaco Protocol Version 1.0
 
Authors:F. Cuervo, N. Greene, A. Rayhan, C. Huitema, B. Rosen, J. Segers.
Date:November 2000
Formats:txt json html
Obsoletes:RFC 2885, RFC 2886
Obsoleted by:RFC 3525
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3015
This document defines the protocol used between elements of a physically decomposed multimedia gateway, i.e. a Media Gateway and aMedia Gateway Controller. The document is common text with ITU-TRecommendation H.248 and is a result of applying the changes in RFC2886 to the text of RFC 2885.

The protocol presented in this document meets the requirements for a media gateway control protocol as presented in RFC 2805.

 
RFC 3016 RTP Payload Format for MPEG-4 Audio/Visual Streams
 
Authors:Y. Kikuchi, T. Nomura, S. Fukunaga, Y. Matsui, H. Kimata.
Date:November 2000
Formats:txt html json
Obsoleted by:RFC 6416
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3016
This document describes Real-Time Transport Protocol (RTP) payload formats for carrying each of MPEG-4 Audio and MPEG-4 Visual bitstreams without using MPEG-4 Systems. For the purpose of directly mapping MPEG-4 Audio/Visual bitstreams onto RTP packets, it provides specifications for the use of RTP header fields and also specifies fragmentation rules. It also provides specifications forMultipurpose Internet Mail Extensions (MIME) type registrations and the use of Session Description Protocol (SDP).
 
RFC 3019 IP Version 6 Management Information Base for The Multicast Listener Discovery Protocol
 
Authors:B. Haberman, R. Worzella.
Date:January 2001
Formats:txt json html
Obsoleted by:RFC 5519
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3019
This document defines a portion of the Management Information Base(MIB) for use with network management protocols in Internet ProtocolVersion 6 internets. Specifically, this document is the MIB module that defines managed objects for implementations of the MulticastListener Discovery Protocol [RFC2710].
 
RFC 3023 XML Media Types
 
Authors:M. Murata, S. St. Laurent, D. Kohn.
Date:January 2001
Formats:txt html json
Obsoletes:RFC 2376
Obsoleted by:RFC 7303
Updates:RFC 2048
Updated by:RFC 6839
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3023
This document standardizes five new media types -- text/xml, application/xml, text/xml-external-parsed-entity, application/xml- external-parsed-entity, and application/xml-dtd -- for use in exchanging network entities that are related to the Extensible MarkupLanguage (XML). This document also standardizes a convention (using the suffix '+xml') for naming media types outside of these five types when those media types represent XML MIME (Multipurpose Internet MailExtensions) entities. XML MIME entities are currently exchanged via the HyperText Transfer Protocol on the World Wide Web, are an integral part of the WebDAV protocol for remote web authoring, and are expected to have utility in many domains.

Major differences from RFC 2376 are (1) the addition of text/xml- external-parsed-entity, application/xml-external-parsed-entity, and application/xml-dtd, (2) the '+xml' suffix convention (which also updates the RFC 2048 registration process), and (3) the discussion of"utf-16le" and "utf-16be".

 
RFC 3025 Mobile IP Vendor/Organization-Specific Extensions
 
Authors:G. Dommety, K. Leung.
Date:February 2001
Formats:txt json html
Obsoleted by:RFC 3115
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3025
This document defines two new extensions to Mobile IP. These extensions will facilitate equipment vendors and organizations to make specific use of these extensions as they see fit for research or deployment purposes.
 
RFC 3028 Sieve: A Mail Filtering Language
 
Authors:T. Showalter.
Date:January 2001
Formats:txt json html
Obsoleted by:RFC 5228, RFC 5429
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3028
This document describes a language for filtering e-mail messages at time of final delivery. It is designed to be implementable on either a mail client or mail server. It is meant to be extensible, simple, and independent of access protocol, mail architecture, and operating system. It is suitable for running on a mail server where users may not be allowed to execute arbitrary programs, such as on black boxInternet Message Access Protocol (IMAP) servers, as it has no variables, loops, or ability to shell out to external programs.
 
RFC 3036 LDP Specification
 
Authors:L. Andersson, P. Doolan, N. Feldman, A. Fredette, B. Thomas.
Date:January 2001
Formats:txt html json
Obsoleted by:RFC 5036
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3036
The architecture for Multi Protocol Label Switching (MPLS) is described in RFC 3031. A fundamental concept in MPLS is that twoLabel Switching Routers (LSRs) must agree on the meaning of the labels used to forward traffic between and through them. This common understanding is achieved by using a set of procedures, called a label distribution protocol, by which one LSR informs another of label bindings it has made. This document defines a set of such procedures called LDP (for Label Distribution Protocol) by which LSRs distribute labels to support MPLS forwarding along normally routed paths.
 
RFC 3039 Internet X.509 Public Key Infrastructure Qualified Certificates Profile
 
Authors:S. Santesson, W. Polk, P. Barzin, M. Nystrom.
Date:January 2001
Formats:txt json html
Obsoleted by:RFC 3739
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3039
This document forms a certificate profile for Qualified Certificates, based on RFC 2459, for use in the Internet. The term QualifiedCertificate is used to describe a certificate with a certain qualified status within applicable governing law. Further, QualifiedCertificates are issued exclusively to physical persons.

The goal of this document is to define a general syntax independent of local legal requirements. The profile is however designed to allow further profiling in order to meet specific local needs.

It is important to note that the profile does not define any legal requirements for Qualified Certificates.

 
RFC 3041 Privacy Extensions for Stateless Address Autoconfiguration in IPv6
 
Authors:T. Narten, R. Draves.
Date:January 2001
Formats:txt html json
Obsoleted by:RFC 4941
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3041
Nodes use IPv6 stateless address autoconfiguration to generate addresses without the necessity of a Dynamic Host ConfigurationProtocol (DHCP) server. Addresses are formed by combining network prefixes with an interface identifier. On interfaces that contain embedded IEEE Identifiers, the interface identifier is typically derived from it. On other interface types, the interface identifier is generated through other means, for example, via random number generation. This document describes an extension to IPv6 stateless address autoconfiguration for interfaces whose interface identifier is derived from an IEEE identifier. Use of the extension causes nodes to generate global-scope addresses from interface identifiers that change over time, even in cases where the interface contains an embedded IEEE identifier. Changing the interface identifier (and the global-scope addresses generated from it) over time makes it more difficult for eavesdroppers and other information collectors to identify when different addresses used in different transactions actually correspond to the same node.
 
RFC 3044 Using The ISSN (International Serial Standard Number) as URN (Uniform Resource Names) within an ISSN-URN Namespace
 
Authors:S. Rozenfeld.
Date:January 2001
Formats:txt html json
Obsoleted by:RFC 8254
Status:HISTORIC
DOI:10.17487/RFC 3044
This document presents how the ISSN - International Standard SerialNumber - which is a persistent number for unique identification of serials widely recognised and used in the bibliographic world, can be supported within the Uniform Resource Name (URN) framework as a specific URN namespace identifier.

An ISSN URN resolution system using the ISSN identifier as Uniform resource Name within an ISN URN Namespace has been developed by theISSN International Centre (ISSN-IC) and is operating as a demonstrator to evaluate all requirements to deploy it in an operational environment.

This proceeds from concepts and proposals developed in several IETFRFCs emphasising the way to implement and to use "recognised" existing numbering system within the URN framework (RFC 2248, RFC2141, RFC 2611).

 
RFC 3047 RTP Payload Format for ITU-T Recommendation G.722.1
 
Authors:P. Luthi.
Date:January 2001
Formats:txt json html
Obsoleted by:RFC 5577
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3047
International Telecommunication Union (ITU-T) Recommendation G.722.1 is a wide-band audio codec, which operates at one of two selectable bit rates, 24kbit/s or 32kbit/s. This document describes the payload format for including G.722.1 generated bit streams within an RTP packet. Also included here are the necessary details for the use ofG.722.1 with MIME and SDP.
 
RFC 3057 ISDN Q.921-User Adaptation Layer
 
Authors:K. Morneault, S. Rengasami, M. Kalla, G. Sidebottom.
Date:February 2001
Formats:txt json html
Obsoleted by:RFC 4233
Updated by:RFC 3807
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3057
This document defines a protocol for backhauling of ISDN Q.921 User messages over IP using the Stream Control Transmission Protocol(SCTP). This protocol would be used between a Signaling Gateway (SG) and Media Gateway Controller (MGC). It is assumed that the SG receives ISDN signaling over a standard ISDN interface.
 
RFC 3065 Autonomous System Confederations for BGP
 
Authors:P. Traina, D. McPherson, J. Scudder.
Date:February 2001
Formats:txt html json
Obsoletes:RFC 1965
Obsoleted by:RFC 5065
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3065
The Border Gateway Protocol (BGP) is an inter-autonomous system routing protocol designed for Transmission Control Protocol/InternetProtocol (TCP/IP) networks. BGP requires that all BGP speakers within a single autonomous system (AS) must be fully meshed. This represents a serious scaling problem that has been well documented in a number of proposals.

This document describes an extension to BGP which may be used to create a confederation of autonomous systems that is represented as a single autonomous system to BGP peers external to the confederation, thereby removing the "full mesh" requirement. The intention of this extension is to aid in policy administration and reduce the management complexity of maintaining a large autonomous system.

 
RFC 3066 Tags for the Identification of Languages
 
Authors:H. Alvestrand.
Date:January 2001
Formats:txt json html
Obsoletes:RFC 1766
Obsoleted by:RFC 4646, RFC 4647
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 3066
This document describes a language tag for use in cases where it is desired to indicate the language used in an information object, how to register values for use in this language tag, and a construct for matching such language tags.
 
RFC 3068 An Anycast Prefix for 6to4 Relay Routers
 
Authors:C. Huitema.
Date:June 2001
Formats:txt html json
Obsoleted by:RFC 7526
Status:HISTORIC
DOI:10.17487/RFC 3068
This memo introduces a "6to4 anycast address" in order to simplify the configuration of 6to4 routers. It also defines how this address will be used by 6to4 relay routers, how the corresponding "6to4 anycast prefix" will be advertised in the IGP and in the EGP. The memo documents the reservation by IANA (Internet Assigned NumbersAuthority) of the "6to4 relay anycast prefix."
 
RFC 3075 XML-Signature Syntax and Processing
 
Authors:D. Eastlake 3rd, J. Reagle, D. Solo.
Date:March 2001
Formats:txt html json
Obsoleted by:RFC 3275
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3075
This document specifies XML (Extensible Markup Language) digital signature processing rules and syntax. XML Signatures provide integrity, message authentication, and/or signer authentication services for data of any type, whether located within the XML that includes the signature or elsewhere.
 
RFC 3090 DNS Security Extension Clarification on Zone Status
 
Authors:E. Lewis.
Date:March 2001
Formats:txt html json
Obsoleted by:RFC 4033, RFC 4034, RFC 4035
Updates:RFC 2535
Updated by:RFC 3658
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3090
The definition of a secured zone is presented, clarifying and updating sections of RFC 2535. RFC 2535 defines a zone to be secured based on a per algorithm basis, e.g., a zone can be secured with RSA keys, and not secured with DSA keys. This document changes this to define a zone to be secured or not secured regardless of the key algorithm used (or not used). To further simplify the determination of a zone's status, "experimentally secure" status is deprecated.
 
RFC 3107 Carrying Label Information in BGP-4
 
Authors:Y. Rekhter, E. Rosen.
Date:May 2001
Formats:txt json html
Obsoleted by:RFC 8277
Updated by:RFC 6790
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3107
This document specifies the way in which the label mapping information for a particular route is piggybacked in the same BorderGateway Protocol (BGP) Update message that is used to distribute the route itself. When BGP is used to distribute a particular route, it can be also be used to distribute a Multiprotocol Label Switching(MPLS) label which is mapped to that route.
 
RFC 3119 A More Loss-Tolerant RTP Payload Format for MP3 Audio
 
Authors:R. Finlayson.
Date:June 2001
Formats:txt html json
Obsoleted by:RFC 5219
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3119
This document describes a RTP (Real-Time Protocol) payload format for transporting MPEG (Moving Picture Experts Group) 1 or 2, layer III audio (commonly known as "MP3"). This format is an alternative to that described in RFC 2250, and performs better if there is packet loss.
 
RFC 3126 Electronic Signature Formats for long term electronic signatures
 
Authors:D. Pinkas, J. Ross, N. Pope.
Date:September 2001
Formats:txt json html
Obsoleted by:RFC 5126
Status:INFORMATIONAL
DOI:10.17487/RFC 3126
This document defines the format of an electronic signature that can remain valid over long periods. This includes evidence as to its validity even if the signer or verifying party later attempts to deny(i.e., repudiates the validity of the signature).

The format can be considered as an extension to RFC 2630 and RFC2634, where, when appropriate additional signed and unsigned attributes have been defined.

The contents of this Informational RFC is technically equivalent toETSI TS 101 733 V.1.2.2. The ETSI TS is under the ETSI Copyright (C).Individual copies of this ETSI deliverable can be downloaded from http://www.etsi.org

 
RFC 3137 OSPF Stub Router Advertisement
 
Authors:A. Retana, L. Nguyen, R. White, A. Zinin, D. McPherson.
Date:June 2001
Formats:txt json html
Obsoleted by:RFC 6987
Status:INFORMATIONAL
DOI:10.17487/RFC 3137
This memo describes a backward-compatible technique that may be used by OSPF (Open Shortest Path First) implementations to advertise unavailability to forward transit traffic or to lower the preference level for the paths through such a router. In some cases, it is desirable not to route transit traffic via a specific OSPF router.However, OSPF does not specify a standard way to accomplish this.
 
RFC 3138 Extended Assignments in 233/8
 
Authors:D. Meyer.
Date:June 2001
Formats:txt html json
Obsoleted by:RFC 5771
Status:INFORMATIONAL
DOI:10.17487/RFC 3138
This memo provides describes the mapping of the GLOP addresses corresponding to the private AS space.
 
RFC 3152 Delegation of IP6.ARPA
 
Authors:R. Bush.
Date:August 2001
Formats:txt html json
Obsoleted by:RFC 3596
Updates:RFC 2874, RFC 2772, RFC 2766, RFC 2553, RFC 1886
Also:BCP 0049
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 3152
This document discusses the need for delegation of the IP6.ARPA DNS zone, and specifies a plan for the technical operation thereof.
 
RFC 3160 The Tao of IETF - A Novice's Guide to the Internet Engineering Task Force
 
Authors:S. Harris.
Date:August 2001
Formats:txt json html
Obsoletes:RFC 1718
Obsoleted by:RFC 4677
Status:INFORMATIONAL
DOI:10.17487/RFC 3160
This document describes the inner workings of IETF meetings andWorking Groups, discusses organizations related to the IETF, and introduces the standards process.
 
RFC 3164 The BSD Syslog Protocol
 
Authors:C. Lonvick.
Date:August 2001
Formats:txt json html
Obsoleted by:RFC 5424
Status:INFORMATIONAL
DOI:10.17487/RFC 3164
This document describes the observed behavior of the syslog protocol.This protocol has been used for the transmission of event notification messages across networks for many years. While this protocol was originally developed on the University of CaliforniaBerkeley Software Distribution (BSD) TCP/IP system implementations, its value to operations and management has led it to be ported to many other operating systems as well as being embedded into many other networked devices.
 
RFC 3171 IANA Guidelines for IPv4 Multicast Address Assignments
 
Authors:Z. Albanna, K. Almeroth, D. Meyer, M. Schipper.
Date:August 2001
Formats:txt json html
Obsoleted by:RFC 5771
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 3171
This memo provides guidance for the Internet Assigned NumbersAuthority (IANA) in assigning IPv4 multicast addresses.
 
RFC 3177 IAB/IESG Recommendations on IPv6 Address Allocations to Sites
 
Authors:IAB, IESG.
Date:September 2001
Formats:txt html json
Obsoleted by:RFC 6177
Status:INFORMATIONAL
DOI:10.17487/RFC 3177
This document provides recommendations to the addressing registries(APNIC, ARIN and RIPE-NCC) on policies for assigning IPv6 address blocks to end sites. In particular, it recommends the assignment of/48 in the general case, /64 when it is known that one and only one subnet is needed and /128 when it is absolutely known that one and only one device is connecting.

The original recommendations were made in an IAB/IESG statement mailed to the registries on September 1, 2000. This document refines the original recommendation and documents it for the historical record.

 
RFC 3184 IETF Guidelines for Conduct
 
Authors:S. Harris.
Date:October 2001
Formats:txt json html
Obsoleted by:RFC 7154
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 3184
This document provides a set of guidelines for personal interaction in the Internet Engineering Task Force. The Guidelines recognize the diversity of IETF participants, emphasize the value of mutual respect, and stress the broad applicability of our work.
 
RFC 3187 Using International Standard Book Numbers as Uniform Resource Names
 
Authors:J. Hakala, H. Walravens.
Date:October 2001
Formats:txt html json
Obsoleted by:RFC 8254
Status:HISTORIC
DOI:10.17487/RFC 3187
This document discusses how International Standard Book Numbers(ISBN) can be supported within the URN (Uniform Resource Names) framework and the syntax for URNs defined in RFC 2141. Much of the discussion below is based on the ideas expressed in RFC 2288.
 
RFC 3188 Using National Bibliography Numbers as Uniform Resource Names
 
Authors:J. Hakala.
Date:October 2001
Formats:txt json html
Obsoleted by:RFC 8458
Status:INFORMATIONAL
DOI:10.17487/RFC 3188
This document discusses how national bibliography numbers (persistent and unique identifiers assigned by the national libraries) can be supported within the URN (Uniform Resource Names) framework and the syntax for URNs defined in RFC 2141. Much of the discussion is based on the ideas expressed in RFC 2288.
 
RFC 3189 RTP Payload Format for DV (IEC 61834) Video
 
Authors:K. Kobayashi, A. Ogawa, S. Casner, C. Bormann.
Date:January 2002
Formats:txt json html
Obsoleted by:RFC 6469
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3189
This document specifies the packetization scheme for encapsulating the compressed digital video data streams commonly known as "DV" into a payload format for the Real-Time Transport Protocol (RTP).
 
RFC 3205 On the use of HTTP as a Substrate
 
Authors:K. Moore.
Date:February 2002
Formats:txt json html
Obsoleted by:RFC 9205
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 3205
Recently there has been widespread interest in using HypertextTransfer Protocol (HTTP) as a substrate for other applications-level protocols. This document recommends technical particulars of such use, including use of default ports, URL schemes, and HTTP security mechanisms.
 
RFC 3211 Password-based Encryption for CMS
 
Authors:P. Gutmann.
Date:December 2001
Formats:txt json html
Obsoleted by:RFC 3369, RFC 3370
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3211
This document provides a method of encrypting data using user- supplied passwords and, by extension, any form of variable-length keying material which is not necessarily an algorithm-specific fixed-format key. The Cryptographic Message Syntax data format does not currently contain any provisions for password-based data encryption.
 
RFC 3220 IP Mobility Support for IPv4
 
Authors:C. Perkins, Ed..
Date:January 2002
Formats:txt json html
Obsoletes:RFC 2002
Obsoleted by:RFC 3344
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3220
This document specifies protocol enhancements that allow transparent routing of IP datagrams to mobile nodes in the Internet. Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which provides information about its current point of attachment to the Internet. The protocol provides for registering the care-of address with a home agent. The home agent sends datagrams destined for the mobile node through a tunnel to the care- of address. After arriving at the end of the tunnel, each datagram is then delivered to the mobile node.
 
RFC 3230 Instance Digests in HTTP
 
Authors:J. Mogul, A. Van Hoff.
Date:January 2002
Formats:txt json html
Obsoleted by:RFC 9530
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3230
HTTP/1.1 defines a Content-MD5 header that allows a server to include a digest of the response body. However, this is specifically defined to cover the body of the actual message, not the contents of the full file (which might be quite different, if the response is a Content-Range, or uses a delta encoding). Also, the Content-MD5 is limited to one specific digest algorithm; other algorithms, such as SHA-1(Secure Hash Standard), may be more appropriate in some circumstances. Finally, HTTP/1.1 provides no explicit mechanism by which a client may request a digest. This document proposes HTTP extensions that solve these problems.
 
RFC 3242 RObust Header Compression (ROHC): A Link-Layer Assisted Profile for IP/UDP/RTP
 
Authors:L-E. Jonsson, G. Pelletier.
Date:April 2002
Formats:txt json html
Obsoleted by:RFC 4362
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3242
This document defines a ROHC (Robust Header Compression) profile for compression of IP/UDP/RTP (Internet Protocol/User DatagramProtocol/Real-Time Transport Protocol) packets, utilizing functionality provided by the lower layers to increase compression efficiency by completely eliminating the header for most packets during optimal operation. The profile is built as an extension to the ROHC RTP profile. It defines additional mechanisms needed inROHC, states requirements on the assisting layer to guarantee transparency, and specifies general logic for compression and decompression making use of this header-free packet.
 
RFC 3250 Tag Image File Format Fax eXtended (TIFF-FX) - image/tiff-fx MIME Sub-type Registration
 
Authors:L. McIntyre, G. Parsons, J. Rafferty.
Date:September 2002
Formats:txt html json
Obsoleted by:RFC 3950
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3250
This document describes the registration of the MIME sub-type image/tiff-fx. The encodings are defined by File Format for InternetFax and its extensions.
 
RFC 3265 Session Initiation Protocol (SIP)-Specific Event Notification
 
Authors:A. B. Roach.
Date:June 2002
Formats:txt html json
Obsoletes:RFC 2543
Obsoleted by:RFC 6665
Updates:RFC 3261
Updated by:RFC 5367, RFC 5727, RFC 6446
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3265
This document describes an extension to the Session InitiationProtocol (SIP). The purpose of this extension is to provide an extensible framework by which SIP nodes can request notification from remote nodes indicating that certain events have occurred.

Concrete uses of the mechanism described in this document may be standardized in the future.

Note that the event notification mechanisms defined herein are NOT intended to be a general-purpose infrastructure for all classes of event subscription and notification.

 
RFC 3266 Support for IPv6 in Session Description Protocol (SDP)
 
Authors:S. Olson, G. Camarillo, A. B. Roach.
Date:June 2002
Formats:txt json html
Obsoleted by:RFC 4566
Updates:RFC 2327
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3266
This document describes the use of Internet Protocol Version 6 (IPv6) addresses in conjunction with the Session Description Protocol (SDP).Specifically, this document clarifies existing text in SDP with regards to the syntax of IPv6 addresses.
 
RFC 3267 Real-Time Transport Protocol (RTP) Payload Format and File Storage Format for the Adaptive Multi-Rate (AMR) and Adaptive Multi-Rate Wideband (AMR-WB) Audio Codecs
 
Authors:J. Sjoberg, M. Westerlund, A. Lakaniemi, Q. Xie.
Date:June 2002
Formats:txt json html
Obsoleted by:RFC 4867
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3267
This document specifies a real-time transport protocol (RTP) payload format to be used for Adaptive Multi-Rate (AMR) and Adaptive Multi-Rate Wideband (AMR-WB) encoded speech signals. The payload format is designed to be able to interoperate with existing AMR and AMR-WB transport formats on non-IP networks. In addition, a file format is specified for transport of AMR and AMR-WB speech data in storage mode applications such as email. Two separate MIME type registrations are included, one for AMR and one for AMR-WB, specifying use of both theRTP payload format and the storage format.
 
RFC 3268 Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS)
 
Authors:P. Chown.
Date:June 2002
Formats:txt html json
Obsoleted by:RFC 5246
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3268
This document proposes several new ciphersuites. At present, the symmetric ciphers supported by Transport Layer Security (TLS) areRC2, RC4, International Data Encryption Algorithm (IDEA), DataEncryption Standard (DES), and triple DES. The protocol would be enhanced by the addition of Advanced Encryption Standard (AES) ciphersuites.
 
RFC 3272 Overview and Principles of Internet Traffic Engineering
 
Authors:D. Awduche, A. Chiu, A. Elwalid, I. Widjaja, X. Xiao.
Date:May 2002
Formats:txt json html
Obsoleted by:RFC 9522
Updated by:RFC 5462
Status:INFORMATIONAL
DOI:10.17487/RFC 3272
This memo describes the principles of Traffic Engineering (TE) in theInternet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks, and to provide a common basis for the development of traffic engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational IP networks are discussed throughout this document.
 
RFC 3276 Definitions of Managed Objects for High Bit-Rate DSL - 2nd generation (HDSL2) and Single-Pair High-Speed Digital Subscriber Line (SHDSL) Lines Processing
 
Authors:B. Ray, R. Abbi.
Date:May 2002
Formats:txt json html
Obsoleted by:RFC 4319
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3276
This document defines a portion of the Management Information Base(MIB) module for use with network management protocols in theInternet community. In particular, it describes objects used for managing High Bit-Rate DSL - 2nd generation (HDSL2) and Single-PairHigh-Speed Digital Subscriber Line (SHDSL) interfaces.
 
RFC 3278 Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS)
 
Authors:S. Blake-Wilson, D. Brown, P. Lambert.
Date:April 2002
Formats:txt html json
Obsoleted by:RFC 5753
Status:INFORMATIONAL
DOI:10.17487/RFC 3278
This document describes how to use Elliptic Curve Cryptography (ECC) public-key algorithms in the Cryptographic Message Syntax (CMS). TheECC algorithms support the creation of digital signatures and the exchange of keys to encrypt or authenticate content. The definition of the algorithm processing is based on the ANSI X9.62 standard, developed by the ANSI X9F1 working group, the IEEE 1363 standard, and the SEC 1 standard.

The readers attention is called to the Intellectual Property Rights section at the end of this document.

 
RFC 3280 Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
 
Authors:R. Housley, W. Polk, W. Ford, D. Solo.
Date:April 2002
Formats:txt html json
Obsoletes:RFC 2459
Obsoleted by:RFC 5280
Updated by:RFC 4325, RFC 4630
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3280
This memo profiles the X.509 v3 certificate and X.509 v2 CertificateRevocation List (CRL) for use in the Internet. An overview of this approach and model are provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and twoInternet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail, and required extensions are defined. An algorithm for X.509 certification path validation is described. AnASN.1 module and examples are provided in the appendices.
 
RFC 3281 An Internet Attribute Certificate Profile for Authorization
 
Authors:S. Farrell, R. Housley.
Date:April 2002
Formats:txt html json
Obsoleted by:RFC 5755
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3281
This specification defines a profile for the use of X.509 AttributeCertificates in Internet Protocols. Attribute certificates may be used in a wide range of applications and environments covering a broad spectrum of interoperability goals and a broader spectrum of operational and assurance requirements. The goal of this document is to establish a common baseline for generic applications requiring broad interoperability as well as limited special purpose requirements. The profile places emphasis on attribute certificate support for Internet electronic mail, IPSec, and WWW security applications.
 
RFC 3285 Using Microsoft Word to create Internet Drafts and RFCs
 
Authors:M. Gahrns, T. Hain.
Date:May 2002
Formats:txt html json
Obsoleted by:RFC 5385
Status:INFORMATIONAL
DOI:10.17487/RFC 3285
This document describes the steps to configure the Microsoft Word application to produce documents in Internet Draft and RFC format.
 
RFC 3288 Using the Simple Object Access Protocol (SOAP) in Blocks Extensible Exchange Protocol (BEEP)
 
Authors:E. O'Tuathail, M. Rose.
Date:June 2002
Formats:txt html json
Obsoleted by:RFC 4227
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3288
This memo specifies a Simple Object Access Protocol (SOAP) binding to the Blocks Extensible Exchange Protocol core (BEEP). A SOAP binding describes how SOAP messages are transmitted in the network.

The SOAP is an XML-based (extensible markup language) messaging protocol used to implement a wide variety of distributed messaging models. It defines a message format and describes a variety of message patterns, including, but not limited to, RPC, asynchronous event notification, unacknowledged messages, and forwarding via SOAP intermediaries.

 
RFC 3291 Textual Conventions for Internet Network Addresses
 
Authors:M. Daniele, B. Haberman, S. Routhier, J. Schoenwaelder.
Date:May 2002
Formats:txt html json
Obsoletes:RFC 2851
Obsoleted by:RFC 4001
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3291
This MIB module defines textual conventions to represent commonly used Internet network layer addressing information. The intent is that these textual conventions (TCs) will be imported and used in MIB modules that would otherwise define their own representations.

This document obsoletes RFC 2851.

 
RFC 3300 Internet Official Protocol Standards
 
Authors:J. Reynolds, R. Braden, S. Ginoza, A. De La Cruz.
Date:November 2002
Formats:txt html json
Obsoletes:RFC 3000
Obsoleted by:RFC 3600
Status:HISTORIC
DOI:10.17487/RFC 3300
This memo contains a snapshot of the state of standardization of protocols used in the Internet as of October 24, 2002. It lists official protocol standards and Best Current Practice RFCs; it is not a complete index to the RFC series. The latest version of this memo is designated STD 1.
 
RFC 3309 Stream Control Transmission Protocol (SCTP) Checksum Change
 
Authors:J. Stone, R. Stewart, D. Otis.
Date:September 2002
Formats:txt html json
Obsoleted by:RFC 4960
Updates:RFC 2960
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3309
Stream Control Transmission Protocol (SCTP) currently uses an Adler-32 checksum. For small packets Adler-32 provides weak detection of errors. This document changes that checksum and updates SCTP to use a 32 bit CRC checksum.
 
RFC 3315 Dynamic Host Configuration Protocol for IPv6 (DHCPv6)
 
Authors:R. Droms, Ed., J. Bound, B. Volz, T. Lemon, C. Perkins, M. Carney.
Date:July 2003
Formats:txt html json
Obsoleted by:RFC 8415
Updated by:RFC 4361, RFC 5494, RFC 6221, RFC 6422, RFC 6644, RFC 7083, RFC 7227, RFC 7283, RFC 7550
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3315
The Dynamic Host Configuration Protocol for IPv6 (DHCP) enables DHCP servers to pass configuration parameters such as IPv6 network addresses to IPv6 nodes. It offers the capability of automatic allocation of reusable network addresses and additional configuration flexibility. This protocol is a stateful counterpart to "IPv6Stateless Address Autoconfiguration" (RFC 2462), and can be used separately or concurrently with the latter to obtain configuration parameters.
 
RFC 3316 Internet Protocol Version 6 (IPv6) for Some Second and Third Generation Cellular Hosts
 
Authors:J. Arkko, G. Kuijpers, H. Soliman, J. Loughney, J. Wiljakka.
Date:April 2003
Formats:txt json html
Obsoleted by:RFC 7066
Status:INFORMATIONAL
DOI:10.17487/RFC 3316
As the deployment of second and third generation cellular networks progresses, a large number of cellular hosts are being connected to the Internet. Standardization organizations are making InternetProtocol version 6 (IPv6) mandatory in their specifications.However, the concept of IPv6 covers many aspects and numerous specifications. In addition, the characteristics of cellular links in terms of bandwidth, cost and delay put special requirements on howIPv6 is used. This document considers IPv6 for cellular hosts that attach to the General Packet Radio Service (GPRS), or UniversalMobile Telecommunications System (UMTS) networks. This document also lists basic components of IPv6 functionality and discusses some issues relating to the use of these components when operating in these networks.
 
RFC 3330 Special-Use IPv4 Addresses
 
Authors:IANA.
Date:September 2002
Formats:txt html json
Obsoleted by:RFC 5735
Status:INFORMATIONAL
DOI:10.17487/RFC 3330
This document describes the global and other specialized IPv4 address blocks that have been assigned by the Internet Assigned NumbersAuthority (IANA). It does not address IPv4 address space assigned to operators and users through the Regional Internet Registries. It also does not address allocations or assignments of IPv6 addresses or autonomous system numbers.
 
RFC 3332 Signaling System 7 (SS7) Message Transfer Part 3 (MTP3) - User Adaptation Layer (M3UA)
 
Authors:G. Sidebottom, Ed., K. Morneault, Ed., J. Pastor-Balbas, Ed..
Date:September 2002
Formats:txt json html
Obsoleted by:RFC 4666
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3332
This memo defines a protocol for supporting the transport of any SS7MTP3-User signalling (e.g., ISUP and SCCP messages) over IP using the services of the Stream Control Transmission Protocol. Also, provision is made for protocol elements that enable a seamless operation of the MTP3-User peers in the SS7 and IP domains. This protocol would be used between a Signalling Gateway (SG) and a MediaGateway Controller (MGC) or IP-resident Database, or between twoIP-based applications. It is assumed that the SG receives SS7 signalling over a standard SS7 interface using the SS7 MessageTransfer Part (MTP) to provide transport.
 
RFC 3338 Dual Stack Hosts Using "Bump-in-the-API" (BIA)
 
Authors:S. Lee, M-K. Shin, Y-J. Kim, E. Nordmark, A. Durand.
Date:October 2002
Formats:txt html json
Obsoleted by:RFC 6535
Status:EXPERIMENTAL
DOI:10.17487/RFC 3338
This document specifies a mechanism of dual stack hosts using a technique called "Bump-in-the-API"(BIA) which allows for the hosts to communicate with other IPv6 hosts using existing IPv4 applications.The goal of this mechanism is the same as that of the Bump-in-the- stack mechanism, but this mechanism provides the translation method between the IPv4 APIs and IPv6 APIs. Thus, the goal is simply achieved without IP header translation.
 
RFC 3344 IP Mobility Support for IPv4
 
Authors:C. Perkins, Ed..
Date:August 2002
Formats:txt json html
Obsoletes:RFC 3220
Obsoleted by:RFC 5944
Updated by:RFC 4636, RFC 4721
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3344
This document specifies protocol enhancements that allow transparent routing of IP datagrams to mobile nodes in the Internet. Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which provides information about its current point of attachment to the Internet. The protocol provides for registering the care-of address with a home agent. The home agent sends datagrams destined for the mobile node through a tunnel to the care- of address. After arriving at the end of the tunnel, each datagram is then delivered to the mobile node.
 
RFC 3356 Internet Engineering Task Force and International Telecommunication Union - Telecommunications Standardization Sector Collaboration Guidelines
 
Authors:G. Fishman, S. Bradner.
Date:August 2002
Formats:txt html json
Obsoletes:RFC 2436
Obsoleted by:RFC 6756
Status:INFORMATIONAL
DOI:10.17487/RFC 3356
This document provides guidance to aid in the understanding of collaboration on standards development between the InternationalTelecommunication Union -- Telecommunication Standardization Sector(ITU-T) and the Internet Society (ISOC) / Internet Engineering TaskForce (IETF). It is an update of and obsoletes RFC 2436. The updates reflect changes in the IETF and ITU-T since RFC 2436 was written. The bulk of this document is common text with ITU-TSupplement 3 to the ITU-T A-Series Recommendations.

Note: This was approved by ITU-T TSAG on 30 November 2001 as aSupplement to the ITU-T A-Series of Recommendations (will be numbered as A-Series Supplement 3).

 
RFC 3369 Cryptographic Message Syntax (CMS)
 
Authors:R. Housley.
Date:August 2002
Formats:txt json html
Obsoletes:RFC 2630, RFC 3211
Obsoleted by:RFC 3852
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3369
This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.
 
RFC 3373 Three-Way Handshake for Intermediate System to Intermediate System (IS-IS) Point-to-Point Adjacencies
 
Authors:D. Katz, R. Saluja.
Date:September 2002
Formats:txt html json
Obsoleted by:RFC 5303
Status:INFORMATIONAL
DOI:10.17487/RFC 3373
The IS-IS routing protocol (ISO 10589) requires reliable protocols at the link layer for point-to-point links. As a result, it does not use a three-way handshake when establishing adjacencies on point-to- point media. This paper defines a backward-compatible extension to the protocol that provides for a three-way handshake. It is fully interoperable with systems that do not support the extension.

Additionally, the extension allows the robust operation of more than256 point-to-point links on a single router.

This extension has been implemented by multiple router vendors; this paper is provided as information to the Internet community in order to allow interoperable implementations to be built by other vendors.

 
RFC 3377 Lightweight Directory Access Protocol (v3): Technical Specification
 
Authors:J. Hodges, R. Morgan.
Date:September 2002
Formats:txt html json
Obsoleted by:RFC 4510
Updates:RFC 2251, RFC 2252, RFC 2253, RFC 2254, RFC 2255, RFC 2256, RFC 2829, RFC 2830
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3377
This document specifies the set of RFCs comprising the LightweightDirectory Access Protocol Version 3 (LDAPv3), and addresses the "IESGNote" attached to RFCs 2251 through 2256.
 
RFC 3381 Internet Printing Protocol (IPP): Job Progress Attributes
 
Authors:T. Hastings, H. Lewis, R. Bergman.
Date:September 2002
Formats:txt json html
Obsoleted by:RFC 8011
Updates:RFC 2910
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3381
This document defines four new Job Description attributes for monitoring job progress to be registered as OPTIONAL extensions to the Internet Printing Protocol (IPP/1.0 and IPP/1.1). These attributes are drawn from the PWG Job Monitoring MIB. This document also defines a new "sheet-collate" Job Template attribute to control sheet collation and to help with the interpretation of the job progress attributes.
 
RFC 3382 Internet Printing Protocol (IPP): The 'collection' attribute syntax
 
Authors:R. deBry, T. Hastings, R. Herriot, K. Ocke, P. Zehler.
Date:September 2002
Formats:txt html json
Obsoleted by:RFC 8010, RFC 8011
Updates:RFC 2910, RFC 2911
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3382
This document specifies an OPTIONAL attribute syntax called'collection' for use with the Internet Printing Protocol (IPP/1.0 andIPP/1.1). A 'collection' is a container holding one or more named values, which are called "member" attributes. A collection allows data to be grouped like a PostScript dictionary or a Java Map. This document also specifies the conformance requirements for a definition document that defines a collection attribute. Finally, this document gives some illustrative example collection attribute definitions that are not intended as actual attribute specifications.
 
RFC 3383 Internet Assigned Numbers Authority (IANA) Considerations for the Lightweight Directory Access Protocol (LDAP)
 
Authors:K. Zeilenga.
Date:September 2002
Formats:txt html json
Obsoleted by:RFC 4520
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 3383
This document provides procedures for registering extensible elements of the Lightweight Directory Access Protocol (LDAP). This document also provides guidelines to the Internet Assigned Numbers Authority(IANA) describing conditions under which new values can be assigned.
 
RFC 3388 Grouping of Media Lines in the Session Description Protocol (SDP)
 
Authors:G. Camarillo, G. Eriksson, J. Holler, H. Schulzrinne.
Date:December 2002
Formats:txt json html
Obsoleted by:RFC 5888
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3388
This document defines two Session Description Protocol (SDP) attributes: "group" and "mid". They allow to group together several"m" lines for two different purposes: for lip synchronization and for receiving media from a single flow (several media streams) that are encoded in different formats during a particular session, on different ports and host interfaces.
 
RFC 3392 Capabilities Advertisement with BGP-4
 
Authors:R. Chandra, J. Scudder.
Date:November 2002
Formats:txt html json
Obsoletes:RFC 2842
Obsoleted by:RFC 5492
Status:DRAFT STANDARD
DOI:10.17487/RFC 3392
This document defines a new Optional Parameter, called Capabilities, that is expected to facilitate the introduction of new capabilities in the Border Gateway Protocol (BGP) by providing graceful capability advertisement without requiring that BGP peering be terminated.

This document obsoletes RFC 2842.

 
RFC 3406 Uniform Resource Names (URN) Namespace Definition Mechanisms
 
Authors:L. Daigle, D. van Gulik, R. Iannella, P. Faltstrom.
Date:October 2002
Formats:txt html json
Obsoletes:RFC 2611
Obsoleted by:RFC 8141
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 3406
This document lays out general definitions of and mechanisms for establishing Uniform Resource Names (URN) "namespaces". The URN WG has defined a syntax for URNs in RFC 2141, as well as some proposed mechanisms for their resolution and use in Internet applications inRFC 3401 and RFC 3405. The whole rests on the concept of individual"namespaces" within the URN structure. Apart from proof-of-concept namespaces, the use of existing identifiers in URNs has been discussed in RFC 2288.
 
RFC 3427 Change Process for the Session Initiation Protocol (SIP)
 
Authors:A. Mankin, S. Bradner, R. Mahy, D. Willis, J. Ott, B. Rosen.
Date:December 2002
Formats:txt html json
Obsoleted by:RFC 5727
Updated by:RFC 3968, RFC 3969
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 3427
This memo documents a process intended to apply architectural discipline to the future development of the Session InitiationProtocol (SIP). There have been concerns with regards to new SIP proposals. Specifically, that the addition of new SIP features can be damaging towards security and/or greatly increase the complexity of the protocol. The Transport Area directors, along with the SIP and Session Initiation Proposal Investigation (SIPPING) working group chairs, have provided suggestions for SIP modifications and extensions.
 
RFC 3431 Sieve Extension: Relational Tests
 
Authors:W. Segmuller.
Date:December 2002
Formats:txt json html
Obsoleted by:RFC 5231
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3431
This document describes the RELATIONAL extension to the Sieve mail filtering language defined in RFC 3028. This extension extends existing conditional tests in Sieve to allow relational operators.In addition to testing their content, it also allows for testing of the number of entities in header and envelope fields.
 
RFC 3445 Limiting the Scope of the KEY Resource Record (RR)
 
Authors:D. Massey, S. Rose.
Date:December 2002
Formats:txt html json
Obsoleted by:RFC 4033, RFC 4034, RFC 4035
Updates:RFC 2535
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3445
This document limits the Domain Name System (DNS) KEY Resource Record(RR) to only keys used by the Domain Name System Security Extensions(DNSSEC). The original KEY RR used sub-typing to store both DNSSEC keys and arbitrary application keys. Storing both DNSSEC and application keys with the same record type is a mistake. This document removes application keys from the KEY record by redefining the Protocol Octet field in the KEY RR Data. As a result of removing application keys, all but one of the flags in the KEY record become unnecessary and are redefined. Three existing application key sub- types are changed to reserved, but the format of the KEY record is not changed. This document updates RFC 2535.
 
RFC 3447 Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1
 
Authors:J. Jonsson, B. Kaliski.
Date:February 2003
Formats:txt json html
Obsoletes:RFC 2437
Obsoleted by:RFC 8017
Status:INFORMATIONAL
DOI:10.17487/RFC 3447
This memo represents a republication of PKCS #1 v2.1 from RSALaboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document is taken directly from the PKCS #1 v2.1 document, with certain corrections made during the publication process.
 
RFC 3448 TCP Friendly Rate Control (TFRC): Protocol Specification
 
Authors:M. Handley, S. Floyd, J. Padhye, J. Widmer.
Date:January 2003
Formats:txt html json
Obsoleted by:RFC 5348
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3448
This document specifies TCP-Friendly Rate Control (TFRC). TFRC is a congestion control mechanism for unicast flows operating in a best- effort Internet environment. It is reasonably fair when competing for bandwidth with TCP flows, but has a much lower variation of throughput over time compared with TCP, making it more suitable for applications such as telephony or streaming media where a relatively smooth sending rate is of importance.
 
RFC 3450 Asynchronous Layered Coding (ALC) Protocol Instantiation
 
Authors:M. Luby, J. Gemmell, L. Vicisano, L. Rizzo, J. Crowcroft.
Date:December 2002
Formats:txt html json
Obsoleted by:RFC 5775
Status:EXPERIMENTAL
DOI:10.17487/RFC 3450
This document describes the Asynchronous Layered Coding (ALC) protocol, a massively scalable reliable content delivery protocol.Asynchronous Layered Coding combines the Layered Coding Transport(LCT) building block, a multiple rate congestion control building block and the Forward Error Correction (FEC) building block to provide congestion controlled reliable asynchronous delivery of content to an unlimited number of concurrent receivers from a single sender.
 
RFC 3451 Layered Coding Transport (LCT) Building Block
 
Authors:M. Luby, J. Gemmell, L. Vicisano, L. Rizzo, M. Handley, J. Crowcroft.
Date:December 2002
Formats:txt html json
Obsoleted by:RFC 5651
Status:EXPERIMENTAL
DOI:10.17487/RFC 3451
Layered Coding Transport (LCT) provides transport level support for reliable content delivery and stream delivery protocols. LCT is specifically designed to support protocols using IP multicast, but also provides support to protocols that use unicast. LCT is compatible with congestion control that provides multiple rate delivery to receivers and is also compatible with coding techniques that provide reliable delivery of content.
 
RFC 3452 Forward Error Correction (FEC) Building Block
 
Authors:M. Luby, L. Vicisano, J. Gemmell, L. Rizzo, M. Handley, J. Crowcroft.
Date:December 2002
Formats:txt json html
Obsoleted by:RFC 5052, RFC 5445
Status:EXPERIMENTAL
DOI:10.17487/RFC 3452
This document generally describes how to use Forward Error Correction(FEC) codes to efficiently provide and/or augment reliability for data transport. The primary focus of this document is the application of FEC codes to one-to-many reliable data transport usingIP multicast. This document describes what information is needed to identify a specific FEC code, what information needs to be communicated out-of-band to use the FEC code, and what information is needed in data packets to identify the encoding symbols they carry.The procedures for specifying FEC codes and registering them with theInternet Assigned Numbers Authority (IANA) are also described. This document should be read in conjunction with and uses the terminology of the companion document titled, "The Use of Forward ErrorCorrection (FEC) in Reliable Multicast".
 
RFC 3454 Preparation of Internationalized Strings ("stringprep")
 
Authors:P. Hoffman, M. Blanchet.
Date:December 2002
Formats:txt html json
Obsoleted by:RFC 7564
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3454
This document describes a framework for preparing Unicode text strings in order to increase the likelihood that string input and string comparison work in ways that make sense for typical users throughout the world. The stringprep protocol is useful for protocol identifier values, company and personal names, internationalized domain names, and other text strings.

This document does not specify how protocols should prepare text strings. Protocols must create profiles of stringprep in order to fully specify the processing options.

 
RFC 3455 Private Header (P-Header) Extensions to the Session Initiation Protocol (SIP) for the 3rd-Generation Partnership Project (3GPP)
 
Authors:M. Garcia-Martin, E. Henrikson, D. Mills.
Date:January 2003
Formats:txt html json
Obsoleted by:RFC 7315
Status:INFORMATIONAL
DOI:10.17487/RFC 3455
This document describes a set of private Session Initiation Protocol(SIP) headers (P-headers) used by the 3rd-Generation PartnershipProject (3GPP), along with their applicability, which is limited to particular environments. The P-headers are for a variety of purposes within the networks that the partners use, including charging and information about the networks a call traverses.
 
RFC 3462 The Multipart/Report Content Type for the Reporting of Mail System Administrative Messages
 
Authors:G. Vaudreuil.
Date:January 2003
Formats:txt json html
Obsoletes:RFC 1892
Obsoleted by:RFC 6522
Updated by:RFC 5337
Status:DRAFT STANDARD
DOI:10.17487/RFC 3462
The Multipart/Report Multipurpose Internet Mail Extensions (MIME) content-type is a general "family" or "container" type for electronic mail reports of any kind. Although this memo defines only the use of the Multipart/Report content-type with respect to delivery status reports, mail processing programs will benefit if a single content- type is used to for all kinds of reports.

This document is part of a four document set describing the delivery status report service. This collection includes the Simple MailTransfer Protocol (SMTP) extensions to request delivery status reports, a MIME content for the reporting of delivery reports, an enumeration of extended status codes, and a multipart container for the delivery report, the original message, and a human-friendly summary of the failure.

 
RFC 3466 A Model for Content Internetworking (CDI)
 
Authors:M. Day, B. Cain, G. Tomlinson, P. Rzewski.
Date:February 2003
Formats:txt json html
Obsoleted by:RFC 7336
Status:INFORMATIONAL
DOI:10.17487/RFC 3466
Content (distribution) internetworking (CDI) is the technology for interconnecting content networks, sometimes previously called"content peering" or "CDN peering". A common vocabulary helps the process of discussing such interconnection and interoperation. This document introduces content networks and content internetworking, and defines elements for such a common vocabulary.
 
RFC 3484 Default Address Selection for Internet Protocol version 6 (IPv6)
 
Authors:R. Draves.
Date:February 2003
Formats:txt html json
Obsoleted by:RFC 6724
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3484
This document describes two algorithms, for source address selection and for destination address selection. The algorithms specify default behavior for all Internet Protocol version 6 (IPv6) implementations. They do not override choices made by applications or upper-layer protocols, nor do they preclude the development of more advanced mechanisms for address selection. The two algorithms share a common context, including an optional mechanism for allowing administrators to provide policy that can override the default behavior. In dual stack implementations, the destination address selection algorithm can consider both IPv4 and IPv6 addresses - depending on the available source addresses, the algorithm might prefer IPv6 addresses over IPv4 addresses, or vice-versa.

All IPv6 nodes, including both hosts and routers, must implement default address selection as defined in this specification.

 
RFC 3489 STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs)
 
Authors:J. Rosenberg, J. Weinberger, C. Huitema, R. Mahy.
Date:March 2003
Formats:txt html json
Obsoleted by:RFC 5389
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3489
Simple Traversal of User Datagram Protocol (UDP) Through NetworkAddress Translators (NATs) (STUN) is a lightweight protocol that allows applications to discover the presence and types of NATs and firewalls between them and the public Internet. It also provides the ability for applications to determine the public Internet Protocol(IP) addresses allocated to them by the NAT. STUN works with many existing NATs, and does not require any special behavior from them.As a result, it allows a wide variety of applications to work through existing NAT infrastructure.
 
RFC 3490 Internationalizing Domain Names in Applications (IDNA)
 
Authors:P. Faltstrom, P. Hoffman, A. Costello.
Date:March 2003
Formats:txt html json
Obsoleted by:RFC 5890, RFC 5891
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3490
Until now, there has been no standard method for domain names to use characters outside the ASCII repertoire. This document defines internationalized domain names (IDNs) and a mechanism calledInternationalizing Domain Names in Applications (IDNA) for handling them in a standard fashion. IDNs use characters drawn from a large repertoire (Unicode), but IDNA allows the non-ASCII characters to be represented using only the ASCII characters already allowed in so- called host names today. This backward-compatible representation is required in existing protocols like DNS, so that IDNs can be introduced with no changes to the existing infrastructure. IDNA is only meant for processing domain names, not free text.
 
RFC 3491 Nameprep: A Stringprep Profile for Internationalized Domain Names (IDN)
 
Authors:P. Hoffman, M. Blanchet.
Date:March 2003
Formats:txt html json
Obsoleted by:RFC 5891
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3491
This document describes how to prepare internationalized domain name(IDN) labels in order to increase the likelihood that name input and name comparison work in ways that make sense for typical users throughout the world. This profile of the stringprep protocol is used as part of a suite of on-the-wire protocols for internationalizing the Domain Name System (DNS).
 
RFC 3501 INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1
 
Authors:M. Crispin.
Date:March 2003
Formats:txt html json
Obsoletes:RFC 2060
Obsoleted by:RFC 9051
Updated by:RFC 4466, RFC 4469, RFC 4551, RFC 5032, RFC 5182, RFC 5738, RFC 6186, RFC 6858, RFC 7817, RFC 8314, RFC 8437, RFC 8474, RFC 8996
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3501
The Internet Message Access Protocol, Version 4rev1 (IMAP4rev1) allows a client to access and manipulate electronic mail messages on a server. IMAP4rev1 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders. IMAP4rev1 also provides the capability for an offline client to resynchronize with the server.

IMAP4rev1 includes operations for creating, deleting, and renaming mailboxes, checking for new messages, permanently removing messages, setting and clearing flags, RFC 2822 and RFC 2045 parsing, searching, and selective fetching of message attributes, texts, and portions thereof. Messages in IMAP4rev1 are accessed by the use of numbers.These numbers are either message sequence numbers or unique identifiers.

IMAP4rev1 supports a single server. A mechanism for accessing configuration information to support multiple IMAP4rev1 servers is discussed in RFC 2244.

IMAP4rev1 does not specify a means of posting mail; this function is handled by a mail transfer protocol such as RFC 2821.

 
RFC 3511 Benchmarking Methodology for Firewall Performance
 
Authors:B. Hickman, D. Newman, S. Tadjudin, T. Martin.
Date:April 2003
Formats:txt html json
Obsoleted by:RFC 9411
Status:INFORMATIONAL
DOI:10.17487/RFC 3511
This document discusses and defines a number of tests that may be used to describe the performance characteristics of firewalls. In addition to defining the tests, this document also describes specific formats for reporting the results of the tests.

This document is a product of the Benchmarking Methodology WorkingGroup (BMWG) of the Internet Engineering Task Force (IETF).

 
RFC 3513 Internet Protocol Version 6 (IPv6) Addressing Architecture
 
Authors:R. Hinden, S. Deering.
Date:April 2003
Formats:txt json html
Obsoletes:RFC 2373
Obsoleted by:RFC 4291
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3513
This specification defines the addressing architecture of the IPVersion 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and anIPv6 node's required addresses.
 
RFC 3517 A Conservative Selective Acknowledgment (SACK)-based Loss Recovery Algorithm for TCP
 
Authors:E. Blanton, M. Allman, K. Fall, L. Wang.
Date:April 2003
Formats:txt json html
Obsoleted by:RFC 6675
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3517
This document presents a conservative loss recovery algorithm for TCP that is based on the use of the selective acknowledgment (SACK) TCP option. The algorithm presented in this document conforms to the spirit of the current congestion control specification (RFC 2581), but allows TCP senders to recover more effectively when multiple segments are lost from a single flight of data.
 
RFC 3525 Gateway Control Protocol Version 1
 
Authors:C. Groves, Ed., M. Pantaleo, Ed., T. Anderson, Ed., T. Taylor, Ed..
Date:June 2003
Formats:txt html json
Obsoletes:RFC 3015
Obsoleted by:RFC 5125
Status:HISTORIC
DOI:10.17487/RFC 3525
This document defines the protocol used between elements of a physically decomposed multimedia gateway, i.e., a Media Gateway and aMedia Gateway Controller. The protocol presented in this document meets the requirements for a media gateway control protocol as presented in RFC 2805.

This document replaces RFC 3015. It is the result of continued cooperation between the IETF Megaco Working Group and ITU-T StudyGroup 16. It incorporates the original text of RFC 3015, modified by corrections and clarifications discussed on the MegacoE-mail list and incorporated into the Study Group 16 Implementor'sGuide for Recommendation H.248. The present version of this document underwent ITU-T Last Call as Recommendation H.248 Amendment 1.Because of ITU-T renumbering, it was published by the ITU-T asRecommendation H.248.1 (03/2002), Gateway Control Protocol Version 1.

Users of this specification are advised to consult the H.248 Sub- series Implementors' Guide at http://www.itu.int/itudoc/itu- t/com16/implgd for additional corrections and clarifications.

 
RFC 3530 Network File System (NFS) version 4 Protocol
 
Authors:S. Shepler, B. Callaghan, D. Robinson, R. Thurlow, C. Beame, M. Eisler, D. Noveck.
Date:April 2003
Formats:txt html json
Obsoletes:RFC 3010
Obsoleted by:RFC 7530
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3530
The Network File System (NFS) version 4 is a distributed filesystem protocol which owes heritage to NFS protocol version 2, RFC 1094, and version 3, RFC 1813. Unlike earlier versions, the NFS version 4 protocol supports traditional file access while integrating support for file locking and the mount protocol. In addition, support for strong security (and its negotiation), compound operations, client caching, and internationalization have been added. Of course, attention has been applied to making NFS version 4 operate well in anInternet environment.

This document replaces RFC 3010 as the definition of the NFS version4 protocol.

 
RFC 3534 The application/ogg Media Type
 
Authors:L. Walleij.
Date:May 2003
Formats:txt html json
Obsoleted by:RFC 5334
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3534
The Ogg Bitstream Format aims at becoming a general, freely-available standard for transporting multimedia content across computing platforms and networks. The intention of this document is to define the MIME media type application/ogg to refer to this kind of content when transported across the Internet. It is the intention of the OggBitstream Format developers that it be usable without intellectual property concerns.
 
RFC 3536 Terminology Used in Internationalization in the IETF
 
Authors:P. Hoffman.
Date:May 2003
Formats:txt json html
Obsoleted by:RFC 6365
Status:INFORMATIONAL
DOI:10.17487/RFC 3536
This document provides a glossary of terms used in the IETF when discussing internationalization. The purpose is to help frame discussions of internationalization in the various areas of the IETF and to help introduce the main concepts to IETF participants.
 
RFC 3546 Transport Layer Security (TLS) Extensions
 
Authors:S. Blake-Wilson, M. Nystrom, D. Hopwood, J. Mikkelsen, T. Wright.
Date:June 2003
Formats:txt html json
Obsoleted by:RFC 4366
Updates:RFC 2246
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3546
This document describes extensions that may be used to add functionality to Transport Layer Security (TLS). It provides both generic extension mechanisms for the TLS handshake client and server hellos, and specific extensions using these generic mechanisms.

The extensions may be used by TLS clients and servers. The extensions are backwards compatible - communication is possible between TLS 1.0 clients that support the extensions and TLS 1.0 servers that do not support the extensions, and vice versa.

 
RFC 3547 The Group Domain of Interpretation
 
Authors:M. Baugher, B. Weis, T. Hardjono, H. Harney.
Date:July 2003
Formats:txt html json
Obsoleted by:RFC 6407
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3547
This document presents an ISAMKP Domain of Interpretation (DOI) for group key management to support secure group communications. TheGDOI manages group security associations, which are used by IPSEC and potentially other data security protocols running at the IP or application layers. These security associations protect one or more key-encrypting keys, traffic-encrypting keys, or data shared by group members.
 
RFC 3548 The Base16, Base32, and Base64 Data Encodings
 
Authors:S. Josefsson, Ed..
Date:July 2003
Formats:txt json html
Obsoleted by:RFC 4648
Status:INFORMATIONAL
DOI:10.17487/RFC 3548
This document describes the commonly used base 64, base 32, and base16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, and use of different encoding alphabets.
 
RFC 3555 MIME Type Registration of RTP Payload Formats
 
Authors:S. Casner, P. Hoschka.
Date:July 2003
Formats:txt json html
Obsoleted by:RFC 4855, RFC 4856
Updated by:RFC 3625, RFC 4629
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3555
This document defines the procedure to register RTP Payload Formats as audio, video or other MIME subtype names. This is useful in a text-based format or control protocol to identify the type of an RTP transmission. This document also registers all the RTP payload formats defined in the RTP Profile for Audio and Video Conferences asMIME subtypes. Some of these may also be used for transfer modes other than RTP.
 
RFC 3567 Intermediate System to Intermediate System (IS-IS) Cryptographic Authentication
 
Authors:T. Li, R. Atkinson.
Date:July 2003
Formats:txt html json
Obsoleted by:RFC 5304
Status:INFORMATIONAL
DOI:10.17487/RFC 3567
This document describes the authentication of Intermediate System toIntermediate System (IS-IS) Protocol Data Units (PDUs) using theHashed Message Authentication Codes - Message Digest 5 (HMAC-MD5) algorithm as found in RFC 2104. IS-IS is specified in InternationalStandards Organization (ISO) 10589, with extensions to supportInternet Protocol version 4 (IPv4) described in RFC 1195. The base specification includes an authentication mechanism that allows for multiple authentication algorithms. The base specification only specifies the algorithm for cleartext passwords.

This document proposes an extension to that specification that allows the use of the HMAC-MD5 authentication algorithm to be used in conjunction with the existing authentication mechanisms.

 
RFC 3570 Content Internetworking (CDI) Scenarios
 
Authors:P. Rzewski, M. Day, D. Gilletti.
Date:July 2003
Formats:txt json html
Obsoleted by:RFC 6770
Status:INFORMATIONAL
DOI:10.17487/RFC 3570
In describing content internetworking as a technology targeted for use in production networks, it is useful to provide examples of the sequence of events that may occur when two content networks decide to interconnect. The scenarios presented here seek to provide some concrete examples of what content internetworking is, and also to provide a basis for evaluating content internetworking proposals.
 
RFC 3576 Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)
 
Authors:M. Chiba, G. Dommety, M. Eklund, D. Mitton, B. Aboba.
Date:July 2003
Formats:txt html json
Obsoleted by:RFC 5176
Status:INFORMATIONAL
DOI:10.17487/RFC 3576
This document describes a currently deployed extension to the RemoteAuthentication Dial In User Service (RADIUS) protocol, allowing dynamic changes to a user session, as implemented by network access server products. This includes support for disconnecting users and changing authorizations applicable to a user session.
 
RFC 3588 Diameter Base Protocol
 
Authors:P. Calhoun, J. Loughney, E. Guttman, G. Zorn, J. Arkko.
Date:September 2003
Formats:txt json html
Obsoleted by:RFC 6733
Updated by:RFC 5729, RFC 5719, RFC 6408
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3588
The Diameter base protocol is intended to provide an Authentication,Authorization and Accounting (AAA) framework for applications such as network access or IP mobility. Diameter is also intended to work in both local Authentication, Authorization & Accounting and roaming situations. This document specifies the message format, transport, error reporting, accounting and security services to be used by allDiameter applications. The Diameter base application needs to be supported by all Diameter implementations.
 
RFC 3598 Sieve Email Filtering -- Subaddress Extension
 
Authors:K. Murchison.
Date:September 2003
Formats:txt json html
Obsoleted by:RFC 5233
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3598
On email systems that allow for "subaddressing" or "detailed addressing" (e.g., "ken+sieve@example.org"), it is sometimes desirable to make comparisons against these sub-parts of addresses.This document defines an extension to the Sieve mail filtering language that allows users to compare against the user and detail parts of an address.
 
RFC 3600 Internet Official Protocol Standards
 
Authors:J. Reynolds, Ed., S. Ginoza, Ed..
Date:November 2003
Formats:txt json html
Obsoletes:RFC 3300
Obsoleted by:RFC 3700
Status:HISTORIC
DOI:10.17487/RFC 3600
This memo contains a snapshot of the state of standardization of protocols used in the Internet as of October 2, 2003. It lists official protocol standards and Best Current Practice RFCs; it is not a complete index to the RFC series. The latest version of this memo is designated STD 1.
 
RFC 3603 Private Session Initiation Protocol (SIP) Proxy-to-Proxy Extensions for Supporting the PacketCable Distributed Call Signaling Architecture
 
Authors:W. Marshall, Ed., F. Andreasen, Ed..
Date:October 2003
Formats:txt html json
Obsoleted by:RFC 5503
Status:INFORMATIONAL
DOI:10.17487/RFC 3603
In order to deploy a residential telephone service at very large scale across different domains, it is necessary for trusted elements owned by different service providers to exchange trusted information that conveys customer-specific information and expectations about the parties involved in the call. This document describes private extensions to the Session Initiation Protocol (SIP) (RFC3261) for supporting the exchange of customer information and billing information between trusted entities in the PacketCable DistributedCall Signaling Architecture. These extensions provide mechanisms for access network coordination to prevent theft of service, customer originated trace of harassing calls, support for operator services and emergency services, and support for various other regulatory issues. The use of the extensions is only applicable within closed administrative domains, or among federations of administrative domains with previously agreed-upon policies where coordination of charging and other functions is required.
 
RFC 3627 Use of /127 Prefix Length Between Routers Considered Harmful
 
Authors:P. Savola.
Date:September 2003
Formats:txt html json
Obsoleted by:RFC 6547
Status:HISTORIC
DOI:10.17487/RFC 3627
In some cases, the operational decision may be to use IPv6 /127 prefix lengths, especially on point-to-point links between routers.Under certain situations, this may lead to one router claiming both addresses due to subnet-router anycast being implemented. This document discusses the issue and offers a couple of solutions to the problem; nevertheless, /127 should be avoided between two routers.
 
RFC 3633 IPv6 Prefix Options for Dynamic Host Configuration Protocol (DHCP) version 6
 
Authors:O. Troan, R. Droms.
Date:December 2003
Formats:txt html json
Obsoleted by:RFC 8415
Updated by:RFC 6603, RFC 7550
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3633
The Prefix Delegation options provide a mechanism for automated delegation of IPv6 prefixes using the Dynamic Host ConfigurationProtocol (DHCP). This mechanism is intended for delegating a long- lived prefix from a delegating router to a requesting router, across an administrative boundary, where the delegating router does not require knowledge about the topology of the links in the network to which the prefixes will be assigned.
 
RFC 3636 Definitions of Managed Objects for IEEE 802.3 Medium Attachment Units (MAUs)
 
Authors:J. Flick.
Date:September 2003
Formats:txt html json
Obsoletes:RFC 2668, RFC 1515
Obsoleted by:RFC 4836
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3636
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it defines objects for managing IEEE 802.3 MediumAttachment Units (MAUs). This memo obsoletes RFC 2668. This memo extends that specification by including management information useful for the management of 10 gigabit per second (Gb/s) MAUs. This memo also obsoletes RFC 1515.
 
RFC 3655 Redefinition of DNS Authenticated Data (AD) bit
 
Authors:B. Wellington, O. Gudmundsson.
Date:November 2003
Formats:txt html json
Obsoleted by:RFC 4033, RFC 4034, RFC 4035
Updates:RFC 2535
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3655
This document alters the specification defined in RFC 2535. Based on implementation experience, the Authenticated Data (AD) bit in the DNS header is not useful. This document redefines the AD bit such that it is only set if all answers or records proving that no answers exist in the response has been cryptographically verified or otherwise meets the server's local security policy.
 
RFC 3658 Delegation Signer (DS) Resource Record (RR)
 
Authors:O. Gudmundsson.
Date:December 2003
Formats:txt html json
Obsoleted by:RFC 4033, RFC 4034, RFC 4035
Updates:RFC 3090, RFC 3008, RFC 2535, RFC 1035
Updated by:RFC 3755
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3658
The delegation signer (DS) resource record (RR) is inserted at a zone cut (i.e., a delegation point) to indicate that the delegated zone is digitally signed and that the delegated zone recognizes the indicated key as a valid zone key for the delegated zone. The DS RR is a modification to the DNS Security Extensions definition, motivated by operational considerations. The intent is to use this resource record as an explicit statement about the delegation, rather than relying on inference.

This document defines the DS RR, gives examples of how it is used and describes the implications on resolvers. This change is not backwards compatible with RFC 2535. This document updates RFC 1035,RFC 2535, RFC 3008 and RFC 3090.

 
RFC 3662 A Lower Effort Per-Domain Behavior (PDB) for Differentiated Services
 
Authors:R. Bless, K. Nichols, K. Wehrle.
Date:December 2003
Formats:txt json html
Obsoleted by:RFC 8622
Status:INFORMATIONAL
DOI:10.17487/RFC 3662
This document proposes a differentiated services per-domain behavior(PDB) whose traffic may be "starved" (although starvation is not strictly required) in a properly functioning network. This is in contrast to the Internet's "best-effort" or "normal Internet traffic" model, where prolonged starvation indicates network problems. In this sense, the proposed PDB's traffic is forwarded with a "lower" priority than the normal "best-effort" Internet traffic, thus the PDB is called "Lower Effort" (LE). Use of this PDB permits a network operator to strictly limit the effect of its traffic on "best- effort"/"normal" or all other Internet traffic. This document gives some example uses, but does not propose constraining the PDB's use to any particular type of traffic.
 
RFC 3664 The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE)
 
Authors:P. Hoffman.
Date:January 2004
Formats:txt html json
Obsoleted by:RFC 4434
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3664
Some implementations of IP Security (IPsec) may want to use a pseudo-random function derived from the Advanced Encryption Standard(AES). This document describes such an algorithm, called AES-XCBC-PRF-128.
 
RFC 3667 IETF Rights in Contributions
 
Authors:S. Bradner.
Date:February 2004
Formats:txt json html
Obsoleted by:RFC 3978
Updates:RFC 2026
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 3667
The IETF policies about rights in Contributions to the IETF are designed to ensure that such Contributions can be made available to the IETF and Internet communities while permitting the authors to retain as many rights as possible. This memo details the IETF policies on rights in Contributions to the IETF. It also describes the objectives that the policies are designed to meet. This memo updates RFC 2026, and, with RFC 3668, replaces Section 10 of RFC2026.
 
RFC 3668 Intellectual Property Rights in IETF Technology
 
Authors:S. Bradner.
Date:February 2004
Formats:txt html json
Obsoleted by:RFC 3979
Updates:RFC 2026, RFC 2028
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 3668
The IETF policies about Intellectual Property Rights (IPR), such as patent rights, relative to technologies developed in the IETF are designed to ensure that IETF working groups and participants have as much information about any IPR constraints on a technical proposal as possible. The policies are also intended to benefit the Internet community and the public at large, while respecting the legitimate rights of IPR holders. This memo details the IETF policies concerning IPR related to technology worked on within the IETF. It also describes the objectives that the policies are designed to meet.This memo updates RFC 2026 and, with RFC 3667, replaces Section 10 ofRFC 2026. This memo also updates paragraph 4 of Section 3.2 of RFC2028, for all purposes, including reference [2] in RFC 2418.
 
RFC 3674 Feature Discovery in Lightweight Directory Access Protocol (LDAP)
 
Authors:K. Zeilenga.
Date:December 2003
Formats:txt html json
Obsoleted by:RFC 4512
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3674
The Lightweight Directory Access Protocol (LDAP) is an extensible protocol with numerous elective features. This document introduces a general mechanism for discovery of elective features and extensions which cannot be discovered using existing mechanisms.
 
RFC 3682 The Generalized TTL Security Mechanism (GTSM)
 
Authors:V. Gill, J. Heasley, D. Meyer.
Date:February 2004
Formats:txt json html
Obsoleted by:RFC 5082
Status:EXPERIMENTAL
DOI:10.17487/RFC 3682
The use of a packet's Time to Live (TTL) (IPv4) or Hop Limit (IPv6) to protect a protocol stack from CPU-utilization based attacks has been proposed in many settings (see for example, RFC 2461). This document generalizes these techniques for use by other protocols such as BGP (RFC 1771), Multicast Source Discovery Protocol (MSDP),Bidirectional Forwarding Detection, and Label Distribution Protocol(LDP) (RFC 3036). While the Generalized TTL Security Mechanism(GTSM) is most effective in protecting directly connected protocol peers, it can also provide a lower level of protection to multi-hop sessions. GTSM is not directly applicable to protocols employing flooding mechanisms (e.g., multicast), and use of multi-hop GTSM should be considered on a case-by-case basis.
 
RFC 3685 SIEVE Email Filtering: Spamtest and VirusTest Extensions
 
Authors:C. Daboo.
Date:February 2004
Formats:txt html json
Obsoleted by:RFC 5235
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3685
The SIEVE mail filtering language "spamtest" and "virustest" extensions permit users to use simple, portable commands for spam and virus tests on email messages. Each extension provides a new test using matches against numeric 'scores'. It is the responsibility of the underlying SIEVE implementation to do the actual checks that result in values returned by the tests.
 
RFC 3695 Compact Forward Error Correction (FEC) Schemes
 
Authors:M. Luby, L. Vicisano.
Date:February 2004
Formats:txt html json
Obsoleted by:RFC 5445
Status:EXPERIMENTAL
DOI:10.17487/RFC 3695
This document introduces some Forward Error Correction (FEC) schemes that supplement the FEC schemes described in RFC 3452. The primary benefits of these additional FEC schemes are that they are designed for reliable bulk delivery of large objects using a more compact FECPayload ID, and they can be used to sequentially deliver blocks of an object of indeterminate length. Thus, they more flexibly support different delivery models with less packet header overhead.

This document also describes the Fully-Specified FEC scheme corresponding to FEC Encoding ID 0. This Fully-Specified FEC scheme requires no FEC coding and is introduced primarily to allow simple interoperability testing between different implementations of protocol instantiations that use the FEC building block.

 
RFC 3697 IPv6 Flow Label Specification
 
Authors:J. Rajahalme, A. Conta, B. Carpenter, S. Deering.
Date:March 2004
Formats:txt json html
Obsoleted by:RFC 6437
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3697
This document specifies the IPv6 Flow Label field and the minimum requirements for IPv6 source nodes labeling flows, IPv6 nodes forwarding labeled packets, and flow state establishment methods.Even when mentioned as examples of possible uses of the flow labeling, more detailed requirements for specific use cases are out of scope for this document.

The usage of the Flow Label field enables efficient IPv6 flow classification based only on IPv6 main header fields in fixed positions.

 
RFC 3700 Internet Official Protocol Standards
 
Authors:J. Reynolds, Ed., S. Ginoza, Ed..
Date:July 2004
Formats:txt html json
Obsoletes:RFC 3600
Obsoleted by:RFC 5000
Status:HISTORIC
DOI:10.17487/RFC 3700
This memo contains a snapshot of the state of standardization of protocols used in the Internet as of July 22, 2004. It lists official protocol standards and Best Current Practice RFCs; it is not a complete index to the RFC series. The latest version of this memo is designated STD 1.
 
RFC 3709 Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates
 
Authors:S. Santesson, R. Housley, T. Freeman.
Date:February 2004
Formats:txt html json
Obsoleted by:RFC 9399
Updated by:RFC 6170
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3709
This document specifies a certificate extension for including logotypes in public key certificates and attribute certificates.
 
RFC 3712 Lightweight Directory Access Protocol (LDAP): Schema for Printer Services
 
Authors:P. Fleming, I. McDonald.
Date:February 2004
Formats:txt json html
Obsoleted by:RFC 7612
Status:INFORMATIONAL
DOI:10.17487/RFC 3712
This document defines a schema, object classes and attributes, for printers and printer services, for use with directories that supportLightweight Directory Access Protocol v3 (LDAP-TS). This document is based on the printer attributes listed in Appendix E of InternetPrinting Protocol/1.1 (IPP) (RFC 2911). A few additional printer attributes are based on definitions in the Printer MIB (RFC 1759).
 
RFC 3720 Internet Small Computer Systems Interface (iSCSI)
 
Authors:J. Satran, K. Meth, C. Sapuntzakis, M. Chadalapaka, E. Zeidner.
Date:April 2004
Formats:txt html json
Obsoleted by:RFC 7143
Updated by:RFC 3980, RFC 4850, RFC 5048, RFC 7146
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3720
This document describes a transport protocol for Internet SmallComputer Systems Interface (iSCSI) that works on top of TCP. The iSCSI protocol aims to be fully compliant with the standardized SCSI architecture model.

SCSI is a popular family of protocols that enable systems to communicate with I/O devices, especially storage devices. SCSI protocols are request/response application protocols with a common standardized architecture model and basic command set, as well as standardized command sets for different device classes (disks, tapes, media-changers etc.).

As system interconnects move from the classical bus structure to a network structure, SCSI has to be mapped to network transport protocols. IP networks now meet the performance requirements of fast system interconnects and as such are good candidates to "carry" SCSI.

 
RFC 3730 Extensible Provisioning Protocol (EPP)
 
Authors:S. Hollenbeck.
Date:March 2004
Formats:txt html json
Obsoleted by:RFC 4930
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3730
This document describes an application layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration.
 
RFC 3731 Extensible Provisioning Protocol (EPP) Domain Name Mapping
 
Authors:S. Hollenbeck.
Date:March 2004
Formats:txt html json
Obsoleted by:RFC 4931
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3731
This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names.
 
RFC 3732 Extensible Provisioning Protocol (EPP) Host Mapping
 
Authors:S. Hollenbeck.
Date:March 2004
Formats:txt json html
Obsoleted by:RFC 4932
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3732
This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet host names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to host names.
 
RFC 3733 Extensible Provisioning Protocol (EPP) Contact Mapping
 
Authors:S. Hollenbeck.
Date:March 2004
Formats:txt json html
Obsoleted by:RFC 4933
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3733
This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of individual or organizational social information identifiers (known as "contacts") stored in a shared central repository. Specified in ExtensibleMarkup Language (XML), the mapping defines EPP command syntax and semantics as applied to contacts.
 
RFC 3734 Extensible Provisioning Protocol (EPP) Transport Over TCP
 
Authors:S. Hollenbeck.
Date:March 2004
Formats:txt html json
Obsoleted by:RFC 4934
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3734
This document describes how an Extensible Provisioning Protocol (EPP) session is mapped onto a single Transmission Control Protocol (TCP) connection. This mapping requires use of the Transport LayerSecurity (TLS) protocol to protect information exchanged between anEPP client and an EPP server.
 
RFC 3736 Stateless Dynamic Host Configuration Protocol (DHCP) Service for IPv6
 
Authors:R. Droms.
Date:April 2004
Formats:txt json html
Obsoleted by:RFC 8415
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3736
Stateless Dynamic Host Configuration Protocol service for IPv6(DHCPv6) is used by nodes to obtain configuration information, such as the addresses of DNS recursive name servers, that does not require the maintenance of any dynamic state for individual clients. A node that uses stateless DHCP must have obtained its IPv6 addresses through some other mechanism, typically stateless address autoconfiguration. This document explains which parts of RFC 3315 must be implemented in each of the different kinds of DHCP agents so that agent can support stateless DHCP.
 
RFC 3755 Legacy Resolver Compatibility for Delegation Signer (DS)
 
Authors:S. Weiler.
Date:May 2004
Formats:txt json html
Obsoleted by:RFC 4033, RFC 4034, RFC 4035
Updates:RFC 3658, RFC 2535
Updated by:RFC 3757, RFC 3845
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3755
As the DNS Security (DNSSEC) specifications have evolved, the syntax and semantics of the DNSSEC resource records (RRs) have changed.Many deployed nameservers understand variants of these semantics.Dangerous interactions can occur when a resolver that understands an earlier version of these semantics queries an authoritative server that understands the new delegation signer semantics, including at least one failure scenario that will cause an unsecured zone to be unresolvable. This document changes the type codes and mnemonics of the DNSSEC RRs (SIG, KEY, and NXT) to avoid those interactions.
 
RFC 3757 Domain Name System KEY (DNSKEY) Resource Record (RR) Secure Entry Point (SEP) Flag
 
Authors:O. Kolkman, J. Schlyter, E. Lewis.
Date:April 2004
Formats:txt html json
Obsoleted by:RFC 4033, RFC 4034, RFC 4035
Updates:RFC 3755, RFC 2535
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3757
With the Delegation Signer (DS) resource record (RR), the concept of a public key acting as a secure entry point (SEP) has been introduced. During exchanges of public keys with the parent there is a need to differentiate SEP keys from other public keys in the DomainName System KEY (DNSKEY) resource record set. A flag bit in theDNSKEY RR is defined to indicate that DNSKEY is to be used as a SEP.The flag bit is intended to assist in operational procedures to correctly generate DS resource records, or to indicate what DNSKEYs are intended for static configuration. The flag bit is not to be used in the DNS verification protocol. This document updates RFC2535 and RFC 3755.
 
RFC 3761 The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM)
 
Authors:P. Faltstrom, M. Mealling.
Date:April 2004
Formats:txt json html
Obsoletes:RFC 2916
Obsoleted by:RFC 6116, RFC 6117
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3761
This document discusses the use of the Domain Name System (DNS) for storage of E.164 numbers. More specifically, how DNS can be used for identifying available services connected to one E.164 number. It specifically obsoletes RFC 2916 to bring it in line with the DynamicDelegation Discovery System (DDDS) Application specification found in the document series specified in RFC 3401. It is very important to note that it is impossible to read and understand this document without reading the documents discussed in RFC 3401.
 
RFC 3768 Virtual Router Redundancy Protocol (VRRP)
 
Authors:R. Hinden, Ed..
Date:April 2004
Formats:txt json html
Obsoletes:RFC 2338
Obsoleted by:RFC 5798
Status:DRAFT STANDARD
DOI:10.17487/RFC 3768
This memo defines the Virtual Router Redundancy Protocol (VRRP).VRRP specifies an election protocol that dynamically assigns responsibility for a virtual router to one of the VRRP routers on aLAN. The VRRP router controlling the IP address(es) associated with a virtual router is called the Master, and forwards packets sent to these IP addresses. The election process provides dynamic fail over in the forwarding responsibility should the Master become unavailable. This allows any of the virtual router IP addresses on the LAN to be used as the default first hop router by end-hosts. The advantage gained from using VRRP is a higher availability default path without requiring configuration of dynamic routing or router discovery protocols on every end-host.
 
RFC 3770 Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN)
 
Authors:R. Housley, T. Moore.
Date:May 2004
Formats:txt json html
Obsoleted by:RFC 4334
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3770
This document defines two EAP extended key usage values and a public key certificate extension to carry Wireless LAN (WLAN) System Service identifiers (SSIDs).
 
RFC 3771 The Lightweight Directory Access Protocol (LDAP) Intermediate Response Message
 
Authors:R. Harrison, K. Zeilenga.
Date:April 2004
Formats:txt json html
Obsoleted by:RFC 4511, RFC 4510
Updates:RFC 2251
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3771
This document defines and describes the IntermediateResponse message, a general mechanism for defining single-request/multiple-response operations in Lightweight Directory Access Protocol (LDAP). TheIntermediateResponse message is defined in such a way that the protocol behavior of existing LDAP operations is maintained. This message is intended to be used in conjunction with the LDAPExtendedRequest and ExtendedResponse to define new single- request/multiple-response operations or in conjunction with a control when extending existing LDAP operations in a way that requires them to return intermediate response information.
 
RFC 3775 Mobility Support in IPv6
 
Authors:D. Johnson, C. Perkins, J. Arkko.
Date:June 2004
Formats:txt json html
Obsoleted by:RFC 6275
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3775
This document specifies a protocol which allows nodes to remain reachable while moving around in the IPv6 Internet. Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location. IPv6 packets addressed to a mobile node's home address are transparently routed to its care-of address. The protocol enables IPv6 nodes to cache the binding of a mobile node's home address with its care-of address, and to then send any packets destined for the mobile node directly to it at this care-of address. To support this operation,Mobile IPv6 defines a new IPv6 protocol and a new destination option.All IPv6 nodes, whether mobile or stationary, can communicate with mobile nodes.
 
RFC 3777 IAB and IESG Selection, Confirmation, and Recall Process: Operation of the Nominating and Recall Committees
 
Authors:J. Galvin, Ed..
Date:June 2004
Formats:txt html json
Obsoletes:RFC 2727
Obsoleted by:RFC 7437
Updated by:RFC 5078, RFC 5633, RFC 5680, RFC 6859
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 3777
The process by which the members of the IAB and IESG are selected, confirmed, and recalled is specified. This document is a self- consistent, organized compilation of the process as it was known at the time of publication.
 
RFC 3778 The application/pdf Media Type
 
Authors:E. Taft, J. Pravetz, S. Zilles, L. Masinter.
Date:May 2004
Formats:txt json html
Obsoleted by:RFC 8118
Status:INFORMATIONAL
DOI:10.17487/RFC 3778
PDF, the 'Portable Document Format', is a general document representation language that has been in use for document exchange on the Internet since 1993. This document provides an overview of thePDF format, explains the mechanisms for digital signatures and encryption within PDF files, and updates the media type registration of 'application/pdf'.
 
RFC 3782 The NewReno Modification to TCP's Fast Recovery Algorithm
 
Authors:S. Floyd, T. Henderson, A. Gurtov.
Date:April 2004
Formats:txt html json
Obsoletes:RFC 2582
Obsoleted by:RFC 6582
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3782
The purpose of this document is to advance NewReno TCP's FastRetransmit and Fast Recovery algorithms in RFC 2582 from Experimental to Standards Track status.

The main change in this document relative to RFC 2582 is to specify the Careful variant of NewReno's Fast Retransmit and Fast Recovery algorithms. The base algorithm described in RFC 2582 did not attempt to avoid unnecessary multiple Fast Retransmits that can occur after a timeout. However, RFC 2582 also defined "Careful" and "Less Careful" variants that avoid these unnecessary Fast Retransmits, and recommended the Careful variant. This document specifies the previously-named "Careful" variant as the basic version of NewRenoTCP.

 
RFC 3784 Intermediate System to Intermediate System (IS-IS) Extensions for Traffic Engineering (TE)
 
Authors:H. Smit, T. Li.
Date:June 2004
Formats:txt json html
Obsoleted by:RFC 5305
Updated by:RFC 4205
Status:INFORMATIONAL
DOI:10.17487/RFC 3784
This document describes extensions to the Intermediate System toIntermediate System (IS-IS) protocol to support Traffic Engineering(TE). This document extends the IS-IS protocol by specifying new information that an Intermediate System (router) can place in LinkState Protocol (LSP) Data Units. This information describes additional details regarding the state of the network that are useful for traffic engineering computations.
 
RFC 3786 Extending the Number of Intermediate System to Intermediate System (IS-IS) Link State PDU (LSP) Fragments Beyond the 256 Limit
 
Authors:A. Hermelin, S. Previdi, M. Shand.
Date:May 2004
Formats:txt html json
Obsoleted by:RFC 5311
Status:INFORMATIONAL
DOI:10.17487/RFC 3786
This document describes a mechanism that allows a system to originate more than 256 Link State PDU (LSP) fragments, a limit set by the original Intermediate System to Intermediate System (IS-IS) Routing protocol, as described in ISO/IEC 10589. This mechanism can be used in IP-only, OSI-only, and dual routers.
 
RFC 3798 Message Disposition Notification
 
Authors:T. Hansen, Ed., G. Vaudreuil, Ed..
Date:May 2004
Formats:txt json html
Obsoletes:RFC 2298
Obsoleted by:RFC 8098
Updates:RFC 3461, RFC 2046
Updated by:RFC 5337, RFC 6533
Status:DRAFT STANDARD
DOI:10.17487/RFC 3798
This memo defines a MIME content-type that may be used by a mail user agent (MUA) or electronic mail gateway to report the disposition of a message after it has been successfully delivered to a recipient.This content-type is intended to be machine-processable. Additional message headers are also defined to permit Message DispositionNotifications (MDNs) to be requested by the sender of a message. The purpose is to extend Internet Mail to support functionality often found in other messaging systems, such as X.400 and the proprietary"LAN-based" systems, and often referred to as "read receipts,""acknowledgements", or "receipt notifications." The intention is to do this while respecting privacy concerns, which have often been expressed when such functions have been discussed in the past.

Because many messages are sent between the Internet and other messaging systems (such as X.400 or the proprietary "LAN-based" systems), the MDN protocol is designed to be useful in a multi- protocol messaging environment. To this end, the protocol described in this memo provides for the carriage of "foreign" addresses, in addition to those normally used in Internet Mail. Additional attributes may also be defined to support "tunneling" of foreign notifications through Internet Mail.

 
RFC 3825 Dynamic Host Configuration Protocol Option for Coordinate-based Location Configuration Information
 
Authors:J. Polk, J. Schnizlein, M. Linsner.
Date:July 2004
Formats:txt html json
Obsoleted by:RFC 6225
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3825
This document specifies a Dynamic Host Configuration Protocol Option for the coordinate-based geographic location of the client. TheLocation Configuration Information (LCI) includes latitude, longitude, and altitude, with resolution indicators for each. The reference datum for these values is also included.
 
RFC 3831 Transmission of IPv6 Packets over Fibre Channel
 
Authors:C. DeSanti.
Date:July 2004
Formats:txt html json
Obsoleted by:RFC 4338
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3831
This document specifies the way of encapsulating IPv6 packets overFibre Channel, and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on Fibre Channel networks.
 
RFC 3845 DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format
 
Authors:J. Schlyter, Ed..
Date:August 2004
Formats:txt json html
Obsoleted by:RFC 4033, RFC 4034, RFC 4035
Updates:RFC 3755, RFC 2535
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3845
This document redefines the wire format of the "Type Bit Map" field in the DNS NextSECure (NSEC) resource record RDATA format to cover the full resource record (RR) type space.
 
RFC 3847 Restart Signaling for Intermediate System to Intermediate System (IS-IS)
 
Authors:M. Shand, L. Ginsberg.
Date:July 2004
Formats:txt html json
Obsoleted by:RFC 5306
Status:INFORMATIONAL
DOI:10.17487/RFC 3847
This document describes a mechanism for a restarting router to signal to its neighbors that it is restarting, allowing them to reestablish their adjacencies without cycling through the down state, while still correctly initiating database synchronization.

This document additionally describes a mechanism for a restarting router to determine when it has achieved LSP database synchronization with its neighbors and a mechanism to optimize LSP database synchronization, while minimizing transient routing disruption when a router starts.

 
RFC 3850 Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Certificate Handling
 
Authors:B. Ramsdell, Ed..
Date:July 2004
Formats:txt json html
Obsoletes:RFC 2632
Obsoleted by:RFC 5750
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3850
This document specifies conventions for X.509 certificate usage bySecure/Multipurpose Internet Mail Extensions (S/MIME) agents. S/MIME provides a method to send and receive secure MIME messages, and certificates are an integral part of S/MIME agent processing. S/MIME agents validate certificates as described in RFC 3280, the InternetX.509 Public Key Infrastructure Certificate and CRL Profile. S/MIME agents must meet the certificate processing requirements in this document as well as those in RFC 3280.
 
RFC 3851 Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification
 
Authors:B. Ramsdell, Ed..
Date:July 2004
Formats:txt json html
Obsoletes:RFC 2633
Obsoleted by:RFC 5751
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3851
This document defines Secure/Multipurpose Internet Mail Extensions(S/MIME) version 3.1. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin.Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 2633.
 
RFC 3852 Cryptographic Message Syntax (CMS)
 
Authors:R. Housley.
Date:July 2004
Formats:txt html json
Obsoletes:RFC 3369
Obsoleted by:RFC 5652
Updated by:RFC 4853, RFC 5083
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3852
This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.
 
RFC 3895 Definitions of Managed Objects for the DS1, E1, DS2, and E2 Interface Types
 
Authors:O. Nicklass, Ed..
Date:September 2004
Formats:txt json html
Obsoletes:RFC 2495
Obsoleted by:RFC 4805
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3895
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it describes objects used for managing DS1, E1, DS2 and E2 interfaces. This document is a companion to the documents that define Managed Objects for the DS0, DS3/E3 and SynchronousOptical Network/Synchronous Digital Hierarchy (SONET/SDH) InterfaceTypes. This document obsoletes RFC 2495.
 
RFC 3920 Extensible Messaging and Presence Protocol (XMPP): Core
 
Authors:P. Saint-Andre, Ed..
Date:October 2004
Formats:txt json html
Obsoleted by:RFC 6120
Updated by:RFC 6122
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3920
This memo defines the core features of the Extensible Messaging andPresence Protocol (XMPP), a protocol for streaming Extensible MarkupLanguage (XML) elements in order to exchange structured information in close to real time between any two network endpoints. While XMPP provides a generalized, extensible framework for exchanging XML data, it is used mainly for the purpose of building instant messaging and presence applications that meet the requirements of RFC 2779.
 
RFC 3921 Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence
 
Authors:P. Saint-Andre, Ed..
Date:October 2004
Formats:txt json html
Obsoleted by:RFC 6121
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3921
This memo describes extensions to and applications of the core features of the Extensible Messaging and Presence Protocol (XMPP) that provide the basic instant messaging (IM) and presence functionality defined in RFC 2779.
 
RFC 3926 FLUTE - File Delivery over Unidirectional Transport
 
Authors:T. Paila, M. Luby, R. Lehtonen, V. Roca, R. Walsh.
Date:October 2004
Formats:txt html json
Obsoleted by:RFC 6726
Status:EXPERIMENTAL
DOI:10.17487/RFC 3926
This document defines FLUTE, a protocol for the unidirectional delivery of files over the Internet, which is particularly suited to multicast networks. The specification builds on Asynchronous LayeredCoding, the base protocol designed for massively scalable multicast distribution.
 
RFC 3932 The IESG and RFC Editor Documents: Procedures
 
Authors:H. Alvestrand.
Date:October 2004
Formats:txt html json
Obsoleted by:RFC 5742
Updates:RFC 2026, RFC 3710
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 3932
This document describes the IESG's procedures for handling documents submitted for RFC publication via the RFC Editor, subsequent to the changes proposed by the IESG at the Seoul IETF, March 2004.

This document updates procedures described in RFC 2026 and RFC 3710.

 
RFC 3940 Negative-acknowledgment (NACK)-Oriented Reliable Multicast (NORM) Protocol
 
Authors:B. Adamson, C. Bormann, M. Handley, J. Macker.
Date:November 2004
Formats:txt html json
Obsoleted by:RFC 5740
Status:EXPERIMENTAL
DOI:10.17487/RFC 3940
This document describes the messages and procedures of the Negative- acknowledgment (NACK) Oriented Reliable Multicast (NORM) protocol.This protocol is designed to provide end-to-end reliable transport of bulk data objects or streams over generic IP multicast routing and forwarding services. NORM uses a selective, negative acknowledgment mechanism for transport reliability and offers additional protocol mechanisms to allow for operation with minimal "a priori" coordination among senders and receivers. A congestion control scheme is specified to allow the NORM protocol to fairly share available network bandwidth with other transport protocols such asTransmission Control Protocol (TCP). It is capable of operating with both reciprocal multicast routing among senders and receivers and with asymmetric connectivity (possibly a unicast return path) between the senders and receivers. The protocol offers a number of features to allow different types of applications or possibly other higher level transport protocols to utilize its service in different ways.The protocol leverages the use of FEC-based repair and other IETF reliable multicast transport (RMT) building blocks in its design.
 
RFC 3941 Negative-Acknowledgment (NACK)-Oriented Reliable Multicast (NORM) Building Blocks
 
Authors:B. Adamson, C. Bormann, M. Handley, J. Macker.
Date:November 2004
Formats:txt html json
Obsoleted by:RFC 5401
Status:EXPERIMENTAL
DOI:10.17487/RFC 3941
This document discusses the creation of negative-acknowledgment(NACK)-oriented reliable multicast (NORM) protocols. The rationale for NORM goals and assumptions are presented. Technical challenges for NACK-oriented (and in some cases general) reliable multicast protocol operation are identified. These goals and challenges are resolved into a set of functional "building blocks" that address different aspects of NORM protocol operation. It is anticipated that these building blocks will be useful in generating different instantiations of reliable multicast protocols.
 
RFC 3946 Generalized Multi-Protocol Label Switching (GMPLS) Extensions for Synchronous Optical Network (SONET) and Synchronous Digital Hierarchy (SDH) Control
 
Authors:E. Mannie, D. Papadimitriou.
Date:October 2004
Formats:txt json html
Obsoleted by:RFC 4606
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3946
This document is a companion to the Generalized Multi-Protocol LabelSwitching (GMPLS) signaling. It defines the Synchronous OpticalNetwork (SONET)/Synchronous Digital Hierarchy (SDH) technology specific information needed when using GMPLS signaling.
 
RFC 3978 IETF Rights in Contributions
 
Authors:S. Bradner, Ed..
Date:March 2005
Formats:txt html json
Obsoletes:RFC 3667
Obsoleted by:RFC 5378
Updates:RFC 2026
Updated by:RFC 4748
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 3978
The IETF policies about rights in Contributions to the IETF are designed to ensure that such Contributions can be made available to the IETF and Internet communities while permitting the authors to retain as many rights as possible. This memo details the IETF policies on rights in Contributions to the IETF. It also describes the objectives that the policies are designed to meet. This memo updates RFC 2026, and, with RFC 3979, replaces Section 10 of RFC2026.
 
RFC 3979 Intellectual Property Rights in IETF Technology
 
Authors:S. Bradner, Ed..
Date:March 2005
Formats:txt html json
Obsoletes:RFC 3668
Obsoleted by:RFC 8179
Updates:RFC 2026, RFC 2028
Updated by:RFC 4879
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 3979
The IETF policies about Intellectual Property Rights (IPR), such as patent rights, relative to technologies developed in the IETF are designed to ensure that IETF working groups and participants have as much information about any IPR constraints on a technical proposal as possible. The policies are also intended to benefit the Internet community and the public at large, while respecting the legitimate rights of IPR holders. This memo details the IETF policies concerning IPR related to technology worked on within the IETF. It also describes the objectives that the policies are designed to meet.This memo updates RFC 2026 and, with RFC 3978, replaces Section 10 ofRFC 2026. This memo also updates paragraph 4 of Section 3.2 of RFC2028, for all purposes, including reference [2] in RFC 2418.
 
RFC 3980 T11 Network Address Authority (NAA) Naming Format for iSCSI Node Names
 
Authors:M. Krueger, M. Chadalapaka, R. Elliott.
Date:February 2005
Formats:txt html json
Obsoleted by:RFC 7143
Updates:RFC 3720
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3980
Internet Small Computer Systems Interface (iSCSI) is a SCSI transport protocol that maps the SCSI family of protocols onto TCP/IP. This document defines an additional iSCSI node name type format to enable use of the "Network Address Authority" (NAA) worldwide naming format defined by the InterNational Committee for Information TechnologyStandards (INCITS) T11 - Fibre Channel (FC) protocols and used bySerial Attached SCSI (SAS). This document updates RFC 3720.
 
RFC 3984 RTP Payload Format for H.264 Video
 
Authors:S. Wenger, M.M. Hannuksela, T. Stockhammer, M. Westerlund, D. Singer.
Date:February 2005
Formats:txt html json
Obsoleted by:RFC 6184
Status:PROPOSED STANDARD
DOI:10.17487/RFC 3984
This memo describes an RTP Payload format for the ITU-TRecommendation H.264 video codec and the technically identicalISO/IEC International Standard 14496-10 video codec. The RTP payload format allows for packetization of one or more Network AbstractionLayer Units (NALUs), produced by an H.264 video encoder, in each RTP payload. The payload format has wide applicability, as it supports applications from simple low bit-rate conversational usage, toInternet video streaming with interleaved transmission, to high bit- rate video-on-demand.
 
RFC 3989 Middlebox Communications (MIDCOM) Protocol Semantics
 
Authors:M. Stiemerling, J. Quittek, T. Taylor.
Date:February 2005
Formats:txt html json
Obsoleted by:RFC 5189
Status:INFORMATIONAL
DOI:10.17487/RFC 3989
This memo specifies semantics for a Middlebox Communication (MIDCOM) protocol to be used by MIDCOM agents for interacting with middleboxes such as firewalls and Network Address Translators (NATs). The semantics discussion does not include any specification of a concrete syntax or a transport protocol. However, a concrete protocol is expected to implement the specified semantics or, more likely, a superset of it. The MIDCOM protocol semantics is derived from theMIDCOM requirements, from the MIDCOM framework, and from working group decisions.
 
RFC 4005 Diameter Network Access Server Application
 
Authors:P. Calhoun, G. Zorn, D. Spence, D. Mitton.
Date:August 2005
Formats:txt html json
Obsoleted by:RFC 7155
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4005
This document describes the Diameter protocol application used forAuthentication, Authorization, and Accounting (AAA) services in theNetwork Access Server (NAS) environment. When combined with theDiameter Base protocol, Transport Profile, and ExtensibleAuthentication Protocol specifications, this application specification satisfies typical network access services requirements.

Initial deployments of the Diameter protocol are expected to include legacy systems. Therefore, this application has been carefully designed to ease the burden of protocol conversion between RADIUS andDiameter. This is achieved by including the RADIUS attribute space to eliminate the need to perform many attribute translations.

The interactions between Diameter applications and RADIUS specified in this document are to be applied to all Diameter applications. In this sense, this document extends the Base Diameter protocol.

 
RFC 4006 Diameter Credit-Control Application
 
Authors:H. Hakala, L. Mattila, J-P. Koskinen, M. Stura, J. Loughney.
Date:August 2005
Formats:txt json html
Obsoleted by:RFC 8506
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4006
This document specifies a Diameter application that can be used to implement real-time credit-control for a variety of end user services such as network access, Session Initiation Protocol (SIP) services, messaging services, and download services.
 
RFC 4008 Definitions of Managed Objects for Network Address Translators (NAT)
 
Authors:R. Rohit, P. Srisuresh, R. Raghunarayan, N. Pai, C. Wang.
Date:March 2005
Formats:txt html json
Obsoleted by:RFC 7658
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4008
This memo defines a portion of the Management Information Base (MIB) for devices implementing Network Address Translator (NAT) function.This MIB module may be used for configuration as well as monitoring of a device capable of NAT function.
 
RFC 4009 The SEED Encryption Algorithm
 
Authors:J. Park, S. Lee, J. Kim, J. Lee.
Date:February 2005
Formats:txt html json
Obsoleted by:RFC 4269
Status:INFORMATIONAL
DOI:10.17487/RFC 4009
This document describes the SEED encryption algorithm, which has been adopted by most of the security systems in the Republic of Korea.Included are a description of the cipher and the key scheduling algorithm (Section 2), the S-boxes (Appendix A), and a set of test vectors (Appendix B).
 
RFC 4013 SASLprep: Stringprep Profile for User Names and Passwords
 
Authors:K. Zeilenga.
Date:February 2005
Formats:txt json html
Obsoleted by:RFC 7613
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4013
This document describes how to prepare Unicode strings representing user names and passwords for comparison. The document defines the"SASLprep" profile of the "stringprep" algorithm to be used for both user names and passwords. This profile is intended to be used bySimple Authentication and Security Layer (SASL) mechanisms (such asPLAIN, CRAM-MD5, and DIGEST-MD5), as well as other protocols exchanging simple user names and/or passwords.
 
RFC 4020 Early IANA Allocation of Standards Track Code Points
 
Authors:K. Kompella, A. Zinin.
Date:February 2005
Formats:txt html json
Obsoleted by:RFC 7120
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 4020
This memo discusses earlier allocation of code points by IANA as a remedy to the problem created by the "Standards Action" IANA policy for protocols for which, by the IETF process, implementation and deployment experience is desired or required prior to publication.
 
RFC 4049 BinaryTime: An Alternate Format for Representing Date and Time in ASN.1
 
Authors:R. Housley.
Date:April 2005
Formats:txt json html
Obsoleted by:RFC 6019
Status:EXPERIMENTAL
DOI:10.17487/RFC 4049
This document specifies a new ASN.1 type for representing time:BinaryTime. This document also specifies an alternate to the signing-time attribute for use with the Cryptographic Message Syntax(CMS) SignedData and AuthenticatedData content types; the binary- signing-time attribute uses BinaryTime. CMS and the signing-time attribute are defined in RFC 3852.
 
RFC 4051 Additional XML Security Uniform Resource Identifiers (URIs)
 
Authors:D. Eastlake 3rd.
Date:April 2005
Formats:txt json html
Obsoleted by:RFC 6931
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4051
A number of Uniform Resource Identifiers (URIs) intended for use withXML Digital Signatures, Encryption, and Canonicalization are defined.These URIs identify algorithms and types of keying information.
 
RFC 4068 Fast Handovers for Mobile IPv6
 
Authors:R. Koodli, Ed..
Date:July 2005
Formats:txt json html
Obsoleted by:RFC 5268
Status:EXPERIMENTAL
DOI:10.17487/RFC 4068
Mobile IPv6 enables a Mobile Node to maintain its connectivity to theInternet when moving from one Access Router to another, a process referred to as handover. During handover, there is a period during which the Mobile Node is unable to send or receive packets because of link switching delay and IP protocol operations. This "handover latency" resulting from standard Mobile IPv6 procedures, namely movement detection, new Care of Address configuration, and BindingUpdate, is often unacceptable to real-time traffic such as Voice overIP. Reducing the handover latency could be beneficial to non-real- time, throughput-sensitive applications as well. This document specifies a protocol to improve handover latency due to Mobile IPv6 procedures. This document does not address improving the link switching latency.
 
RFC 4071 Structure of the IETF Administrative Support Activity (IASA)
 
Authors:R. Austein, Ed., B. Wijnen, Ed..
Date:April 2005
Formats:txt json html
Obsoleted by:RFC 8711
Updated by:RFC 4371, RFC 7691
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 4071
This document describes the structure of the IETF AdministrativeSupport Activity (IASA) as an activity housed within the InternetSociety (ISOC). It defines the roles and responsibilities of theIETF Administrative Oversight Committee (IAOC), the IETFAdministrative Director (IAD), and ISOC in the fiscal and administrative support of the IETF standards process. It also defines the membership and selection rules for the IAOC.
 
RFC 4091 The Alternative Network Address Types (ANAT) Semantics for the Session Description Protocol (SDP) Grouping Framework
 
Authors:G. Camarillo, J. Rosenberg.
Date:June 2005
Formats:txt json html
Obsoleted by:RFC 5245
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4091
This document defines the Alternative Network Address Types (ANAT) semantics for the Session Description Protocol (SDP) grouping framework. The ANAT semantics allow alternative types of network addresses to establish a particular media stream.
 
RFC 4092 Usage of the Session Description Protocol (SDP) Alternative Network Address Types (ANAT) Semantics in the Session Initiation Protocol (SIP)
 
Authors:G. Camarillo, J. Rosenberg.
Date:June 2005
Formats:txt html json
Obsoleted by:RFC 5245
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4092
This document describes how to use the Alternative Network AddressTypes (ANAT) semantics of the Session Description Protocol (SDP) grouping framework in SIP. In particular, we define the sdp-anat SIP option-tag. This SIP option-tag ensures that SDP session descriptions that use ANAT are only handled by SIP entities with ANAT support. To justify the need for such a SIP option-tag, we describe what could possibly happen if an ANAT-unaware SIP entity tried to handle media lines grouped with ANAT.
 
RFC 4122 A Universally Unique IDentifier (UUID) URN Namespace
 
Authors:P. Leach, M. Mealling, R. Salz.
Date:July 2005
Formats:txt html json
Obsoleted by:RFC 9562
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4122
This specification defines a Uniform Resource Name namespace forUUIDs (Universally Unique IDentifier), also known as GUIDs (GloballyUnique IDentifier). A UUID is 128 bits long, and can guarantee uniqueness across space and time. UUIDs were originally used in theApollo Network Computing System and later in the Open SoftwareFoundation's (OSF) Distributed Computing Environment (DCE), and then in Microsoft Windows platforms.

This specification is derived from the DCE specification with the kind permission of the OSF (now known as The Open Group).Information from earlier versions of the DCE specification have been incorporated into this document.

 
RFC 4132 Addition of Camellia Cipher Suites to Transport Layer Security (TLS)
 
Authors:S. Moriai, A. Kato, M. Kanda.
Date:July 2005
Formats:txt html json
Obsoleted by:RFC 5932
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4132
This document proposes the addition of new cipher suites to theTransport Layer Security (TLS) protocol to support the Camellia encryption algorithm as a bulk cipher algorithm.
 
RFC 4133 Entity MIB (Version 3)
 
Authors:A. Bierman, K. McCloghrie.
Date:August 2005
Formats:txt html json
Obsoletes:RFC 2737
Obsoleted by:RFC 6933
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4133
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it describes managed objects used for managing multiple logical and physical entities managed by a single SNMP agent. This document specifies version 3 of the Entity MIB, which obsoletes version 2 (RFC 2737).
 
RFC 4140 Hierarchical Mobile IPv6 Mobility Management (HMIPv6)
 
Authors:H. Soliman, C. Castelluccia, K. El Malki, L. Bellier.
Date:August 2005
Formats:txt html json
Obsoleted by:RFC 5380
Status:EXPERIMENTAL
DOI:10.17487/RFC 4140
This document introduces extensions to Mobile IPv6 and IPv6 NeighbourDiscovery to allow for local mobility handling. Hierarchical mobility management for Mobile IPv6 is designed to reduce the amount of signalling between the Mobile Node, its Correspondent Nodes, and its Home Agent. The Mobility Anchor Point (MAP) described in this document can also be used to improve the performance of Mobile IPv6 in terms of handover speed.
 
RFC 4148 IP Performance Metrics (IPPM) Metrics Registry
 
Authors:E. Stephan.
Date:August 2005
Formats:txt html json
Obsoleted by:RFC 6248
Also:BCP 0108
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 4148
This memo defines a registry for IP Performance Metrics (IPPM). It assigns and registers an initial set of OBJECT IDENTITIES to currently defined metrics in the IETF.

This memo also defines the rules for adding IP Performance Metrics that are defined in the future and for encouraging all IP performance metrics to be registered here.

IANA has been assigned to administer this new registry.

 
RFC 4205 Intermediate System to Intermediate System (IS-IS) Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)
 
Authors:K. Kompella, Ed., Y. Rekhter, Ed..
Date:October 2005
Formats:txt html json
Obsoleted by:RFC 5307
Updates:RFC 3784
Status:INFORMATIONAL
DOI:10.17487/RFC 4205
This document specifies encoding of extensions to the IS-IS routing protocol in support of Generalized Multi-Protocol Label Switching(GMPLS).
 
RFC 4214 Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
 
Authors:F. Templin, T. Gleeson, M. Talwar, D. Thaler.
Date:October 2005
Formats:txt html json
Obsoleted by:RFC 5214
Status:EXPERIMENTAL
DOI:10.17487/RFC 4214
The Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) connectsIPv6 hosts/routers over IPv4 networks. ISATAP views the IPv4 network as a link layer for IPv6 and views other nodes on the network as potential IPv6 hosts/routers. ISATAP supports an automatic tunneling abstraction similar to the Non-Broadcast Multiple Access (NBMA) model.
 
RFC 4234 Augmented BNF for Syntax Specifications: ABNF
 
Authors:D. Crocker, Ed., P. Overell.
Date:October 2005
Formats:txt html json
Obsoletes:RFC 2234
Obsoleted by:RFC 5234
Status:DRAFT STANDARD
DOI:10.17487/RFC 4234
Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form(BNF), called Augmented BNF (ABNF), has been popular among manyInternet specifications. The current specification documents ABNF.It balances compactness and simplicity, with reasonable representational power. The differences between standard BNF andABNF involve naming rules, repetition, alternatives, order- independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.
 
RFC 4242 Information Refresh Time Option for Dynamic Host Configuration Protocol for IPv6 (DHCPv6)
 
Authors:S. Venaas, T. Chown, B. Volz.
Date:November 2005
Formats:txt html json
Obsoleted by:RFC 8415
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4242
This document describes a Dynamic Host Configuration Protocol forIPv6 (DHCPv6) option for specifying an upper bound for how long a client should wait before refreshing information retrieved fromDHCPv6. It is used with stateless DHCPv6 as there are no addresses or other entities with lifetimes that can tell the client when to contact the DHCPv6 server to refresh its configuration.
 
RFC 4244 An Extension to the Session Initiation Protocol (SIP) for Request History Information
 
Authors:M. Barnes, Ed..
Date:November 2005
Formats:txt json html
Obsoleted by:RFC 7044
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4244
This document defines a standard mechanism for capturing the history information associated with a Session Initiation Protocol (SIP) request. This capability enables many enhanced services by providing the information as to how and why a call arrives at a specific application or user. This document defines a new optional SIP header, History-Info, for capturing the history information in requests.
 
RFC 4281 The Codecs Parameter for "Bucket" Media Types
 
Authors:R. Gellens, D. Singer, P. Frojdh.
Date:November 2005
Formats:txt json html
Obsoleted by:RFC 6381
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4281
Several MIME type/subtype combinations exist that can contain different media formats. A receiving agent thus needs to examine the details of such media content to determine if the specific elements can be rendered given an available set of codecs. Especially when the end system has limited resources, or the connection to the end system has limited bandwidth, it would be helpful to know from theContent-Type alone if the content can be rendered.

This document adds a new parameter, "codecs", to various type/subtype combinations to allow for unambiguous specification of the codecs indicated by the media formats contained within.

By labeling content with the specific codecs indicated to render the contained media, receiving systems can determine if the codecs are supported by the end system, and if not, can take appropriate action(such as rejecting the content, sending notification of the situation, transcoding the content to a supported type, fetching and installing the required codecs, further inspection to determine if it will be sufficient to support a subset of the indicated codecs, etc.)

 
RFC 4282 The Network Access Identifier
 
Authors:B. Aboba, M. Beadles, J. Arkko, P. Eronen.
Date:December 2005
Formats:txt html json
Obsoletes:RFC 2486
Obsoleted by:RFC 7542
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4282
In order to provide roaming services, it is necessary to have a standardized method for identifying users. This document defines the syntax for the Network Access Identifier (NAI), the user identity submitted by the client during network authentication. "Roaming" may be loosely defined as the ability to use any one of multiple InternetService Providers (ISPs), while maintaining a formal, customer-vendor relationship with only one. Examples of where roaming capabilities might be required include ISP "confederations" and ISP-provided corporate network access support. This document is a revised version of RFC 2486, which originally defined NAIs. Enhancements include international character set and privacy support, as well as a number of corrections to the original RFC.
 
RFC 4288 Media Type Specifications and Registration Procedures
 
Authors:N. Freed, J. Klensin.
Date:December 2005
Formats:txt json html
Obsoletes:RFC 2048
Obsoleted by:RFC 6838
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 4288
This document defines procedures for the specification and registration of media types for use in MIME and other Internet protocols.
 
RFC 4294 IPv6 Node Requirements
 
Authors:J. Loughney, Ed..
Date:April 2006
Formats:txt json html
Obsoleted by:RFC 6434
Updated by:RFC 5095
Status:INFORMATIONAL
DOI:10.17487/RFC 4294
This document defines requirements for IPv6 nodes. It is expected that IPv6 will be deployed in a wide range of devices and situations.Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments.
 
RFC 4305 Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH)
 
Authors:D. Eastlake 3rd.
Date:December 2005
Formats:txt json html
Obsoletes:RFC 2402, RFC 2406
Obsoleted by:RFC 4835
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4305
The IPsec series of protocols makes use of various cryptographic algorithms in order to provide security services. The EncapsulatingSecurity Payload (ESP) and the Authentication Header (AH) provide two mechanisms for protecting data being sent over an IPsec SecurityAssociation (SA). To ensure interoperability between disparate implementations, it is necessary to specify a set of mandatory-to- implement algorithms to ensure that there is at least one algorithm that all implementations will have available. This document defines the current set of mandatory-to-implement algorithms for ESP and AH as well as specifying algorithms that should be implemented because they may be promoted to mandatory at some future time.
 
RFC 4306 Internet Key Exchange (IKEv2) Protocol
 
Authors:C. Kaufman, Ed..
Date:December 2005
Formats:txt html json
Obsoletes:RFC 2407, RFC 2408, RFC 2409
Obsoleted by:RFC 5996
Updated by:RFC 5282
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4306
This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining security associations(SAs).

This version of the IKE specification combines the contents of what were previously separate documents, including Internet SecurityAssociation and Key Management Protocol (ISAKMP, RFC 2408), IKE (RFC2409), the Internet Domain of Interpretation (DOI, RFC 2407), NetworkAddress Translation (NAT) Traversal, Legacy authentication, and remote address acquisition.

Version 2 of IKE does not interoperate with version 1, but it has enough of the header format in common that both versions can unambiguously run over the same UDP port.

 
RFC 4307 Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2)
 
Authors:J. Schiller.
Date:December 2005
Formats:txt html json
Obsoleted by:RFC 8247
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4307
The IPsec series of protocols makes use of various cryptographic algorithms in order to provide security services. The Internet KeyExchange (IKE (RFC 2409) and IKEv2) provide a mechanism to negotiate which algorithms should be used in any given association. However, to ensure interoperability between disparate implementations, it is necessary to specify a set of mandatory-to-implement algorithms to ensure that there is at least one algorithm that all implementations will have available. This document defines the current set of algorithms that are mandatory to implement as part of IKEv2, as well as algorithms that should be implemented because they may be promoted to mandatory at some future time.
 
RFC 4310 Domain Name System (DNS) Security Extensions Mapping for the Extensible Provisioning Protocol (EPP)
 
Authors:S. Hollenbeck.
Date:December 2005
Formats:txt json html
Obsoleted by:RFC 5910
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4310
This document describes an Extensible Provisioning Protocol (EPP) extension mapping for the provisioning and management of Domain NameSystem security extensions (DNSSEC) for domain names stored in a shared central repository. Specified in XML, this mapping extends the EPP domain name mapping to provide additional features required for the provisioning of DNS security extensions.
 
RFC 4325 Internet X.509 Public Key Infrastructure Authority Information Access Certificate Revocation List (CRL) Extension
 
Authors:S. Santesson, R. Housley.
Date:December 2005
Formats:txt json html
Obsoleted by:RFC 5280
Updates:RFC 3280
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4325
This document updates RFC 3280 by defining the Authority InformationAccess Certificate Revocation List (CRL) extension. RFC 3280 defines the Authority Information Access certificate extension using the same syntax. The CRL extension provides a means of discovering and retrieving CRL issuer certificates.
 
RFC 4327 Link Management Protocol (LMP) Management Information Base (MIB)
 
Authors:M. Dubuc, T. Nadeau, J. Lang, E. McGinnis.
Date:January 2006
Formats:txt html json
Obsoleted by:RFC 4631
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4327
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.In particular, it describes managed objects for modeling the LinkManagement Protocol (LMP).
 
RFC 4329 Scripting Media Types
 
Authors:B. Hoehrmann.
Date:April 2006
Formats:txt json html
Obsoleted by:RFC 9239
Status:INFORMATIONAL
DOI:10.17487/RFC 4329
This document describes the registration of media types for theECMAScript and JavaScript programming languages and conformance requirements for implementations of these types.
 
RFC 4330 Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI
 
Authors:D. Mills.
Date:January 2006
Formats:txt json html
Obsoletes:RFC 2030, RFC 1769
Obsoleted by:RFC 5905
Status:INFORMATIONAL
DOI:10.17487/RFC 4330
This memorandum describes the Simple Network Time Protocol Version 4(SNTPv4), which is a subset of the Network Time Protocol (NTP) used to synchronize computer clocks in the Internet. SNTPv4 can be used when the ultimate performance of a full NTP implementation based onRFC 1305 is neither needed nor justified. When operating with current and previous NTP and SNTP versions, SNTPv4 requires no changes to the specifications or known implementations, but rather clarifies certain design features that allow operation in a simple, stateless remote-procedure call (RPC) mode with accuracy and reliability expectations similar to the UDP/TIME protocol described in RFC 868.

This memorandum obsoletes RFC 1769, which describes SNTP Version 3(SNTPv3), and RFC 2030, which describes SNTPv4. Its purpose is to correct certain inconsistencies in the previous documents and to clarify header formats and protocol operations for NTPv3 (IPv4) andSNTPv4 (IPv4, IPv6, and OSI), which are also used for SNTP. A further purpose is to provide guidance for home and business client implementations for routers and other consumer devices to protect the server population from abuse. A working knowledge of the NTPv3 specification, RFC 1305, is not required for an implementation ofSNTP.

 
RFC 4333 The IETF Administrative Oversight Committee (IAOC) Member Selection Guidelines and Process
 
Authors:G. Huston, Ed., B. Wijnen, Ed..
Date:December 2005
Formats:txt html json
Obsoleted by:RFC 8711
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 4333
This memo outlines the guidelines for selection of members of theIETF Administrative Oversight Committee, and describes the selection process used by the IAB and the IESG.
 
RFC 4346 The Transport Layer Security (TLS) Protocol Version 1.1
 
Authors:T. Dierks, E. Rescorla.
Date:April 2006
Formats:txt json html
Obsoletes:RFC 2246
Obsoleted by:RFC 5246
Updated by:RFC 4366, RFC 4680, RFC 4681, RFC 5746, RFC 6176, RFC 7465, RFC 7507, RFC 7919
Status:HISTORIC
DOI:10.17487/RFC 4346
This document specifies Version 1.1 of the Transport Layer Security(TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.
 
RFC 4347 Datagram Transport Layer Security
 
Authors:E. Rescorla, N. Modadugu.
Date:April 2006
Formats:txt json html
Obsoleted by:RFC 6347
Updated by:RFC 5746, RFC 7507
Status:HISTORIC
DOI:10.17487/RFC 4347
This document specifies Version 1.0 of the Datagram Transport LayerSecurity (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol.
 
RFC 4366 Transport Layer Security (TLS) Extensions
 
Authors:S. Blake-Wilson, M. Nystrom, D. Hopwood, J. Mikkelsen, T. Wright.
Date:April 2006
Formats:txt json html
Obsoletes:RFC 3546
Obsoleted by:RFC 5246, RFC 6066
Updates:RFC 4346
Updated by:RFC 5746
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4366
This document describes extensions that may be used to add functionality to Transport Layer Security (TLS). It provides both generic extension mechanisms for the TLS handshake client and server hellos, and specific extensions using these generic mechanisms.

The extensions may be used by TLS clients and servers. The extensions are backwards compatible: communication is possible between TLS clients that support the extensions and TLS servers that do not support the extensions, and vice versa.

 
RFC 4369 Definitions of Managed Objects for Internet Fibre Channel Protocol (iFCP)
 
Authors:K. Gibbons, C. Monia, J. Tseng, F. Travostino.
Date:January 2006
Formats:txt html json
Obsoleted by:RFC 6173
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4369
The iFCP protocol (RFC 4172) provides Fibre Channel fabric functionality on an IP network in which TCP/IP switching and routing elements replace Fibre Channel components. The iFCP protocol is used between iFCP Gateways. This document provides a mechanism to monitor and control iFCP Gateway instances, and their associated sessions, using SNMP.
 
RFC 4371 BCP 101 Update for IPR Trust
 
Authors:B. Carpenter, Ed., L. Lynch, Ed..
Date:January 2006
Formats:txt html json
Obsoleted by:RFC 8714
Updates:RFC 4071
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 4371
This document updates BCP 101 to take account of the new IETFIntellectual Property Trust.
 
RFC 4379 Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures
 
Authors:K. Kompella, G. Swallow.
Date:February 2006
Formats:txt html json
Obsoleted by:RFC 8029
Updates:RFC 1122
Updated by:RFC 5462, RFC 6424, RFC 6425, RFC 6426, RFC 6829, RFC 7506, RFC 7537, RFC 7743
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4379
This document describes a simple and efficient mechanism that can be used to detect data plane failures in Multi-Protocol Label Switching(MPLS) Label Switched Paths (LSPs). There are two parts to this document: information carried in an MPLS "echo request" and "echo reply" for the purposes of fault detection and isolation, and mechanisms for reliably sending the echo reply.
 
RFC 4395 Guidelines and Registration Procedures for New URI Schemes
 
Authors:T. Hansen, T. Hardie, L. Masinter.
Date:February 2006
Formats:txt html json
Obsoletes:RFC 2717, RFC 2718
Obsoleted by:RFC 7595
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 4395
This document provides guidelines and recommendations for the definition of Uniform Resource Identifier (URI) schemes. It also updates the process and IANA registry for URI schemes. It obsoletes both RFC 2717 and RFC 2718.
 
RFC 4402 A Pseudo-Random Function (PRF) for the Kerberos V Generic Security Service Application Program Interface (GSS-API) Mechanism
 
Authors:N. Williams.
Date:February 2006
Formats:txt json html
Obsoleted by:RFC 7802
Status:HISTORIC
DOI:10.17487/RFC 4402
This document defines the Pseudo-Random Function (PRF) for theKerberos V mechanism for the Generic Security Service ApplicationProgram Interface (GSS-API), based on the PRF defined for theKerberos V cryptographic framework, for keying application protocols given an established Kerberos V GSS-API security context.
 
RFC 4408 Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1
 
Authors:M. Wong, W. Schlitt.
Date:April 2006
Formats:txt html json
Obsoleted by:RFC 7208
Updated by:RFC 6652
Status:EXPERIMENTAL
DOI:10.17487/RFC 4408
E-mail on the Internet can be forged in a number of ways. In particular, existing protocols place no restriction on what a sending host can use as the reverse-path of a message or the domain given on the SMTP HELO/EHLO commands. This document describes version 1 of the Sender Policy Framework (SPF) protocol, whereby a domain may explicitly authorize the hosts that are allowed to use its domain name, and a receiving host may check such authorization.
 
RFC 4409 Message Submission for Mail
 
Authors:R. Gellens, J. Klensin.
Date:April 2006
Formats:txt html json
Obsoletes:RFC 2476
Obsoleted by:RFC 6409
Status:DRAFT STANDARD
DOI:10.17487/RFC 4409
This memo splits message submission from message relay, allowing each service to operate according to its own rules (for security, policy, etc.), and specifies what actions are to be taken by a submission server.

Message relay and final delivery are unaffected, and continue to useSMTP over port 25.

When conforming to this document, message submission uses the protocol specified here, normally over port 587.

This separation of function offers a number of benefits, including the ability to apply specific security or policy requirements.

 
RFC 4420 Encoding of Attributes for Multiprotocol Label Switching (MPLS) Label Switched Path (LSP) Establishment Using Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)
 
Authors:A. Farrel, Ed., D. Papadimitriou, J.-P. Vasseur, A. Ayyangar.
Date:February 2006
Formats:txt html json
Obsoleted by:RFC 5420
Updates:RFC 3209, RFC 3473
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4420
Multiprotocol Label Switching (MPLS) Label Switched Paths (LSPs) may be established using the Resource Reservation Protocol TrafficEngineering (RSVP-TE) extensions. This protocol includes an object(the SESSION_ATTRIBUTE object) that carries a Flags field used to indicate options and attributes of the LSP. That Flags field has eight bits allowing for eight options to be set. Recent proposals in many documents that extend RSVP-TE have suggested uses for each of the previously unused bits.

This document defines a new object for RSVP-TE messages that allows the signaling of further attribute bits and also the carriage of arbitrary attribute parameters to make RSVP-TE easily extensible to support new requirements. Additionally, this document defines a way to record the attributes applied to the LSP on a hop-by-hop basis.

The object mechanisms defined in this document are equally applicable to Generalized MPLS (GMPLS) Packet Switch Capable (PSC) LSPs and toGMPLS non-PSC LSPs.

 
RFC 4423 Host Identity Protocol (HIP) Architecture
 
Authors:R. Moskowitz, P. Nikander.
Date:May 2006
Formats:txt json html
Obsoleted by:RFC 9063
Status:INFORMATIONAL
DOI:10.17487/RFC 4423
This memo describes a snapshot of the reasoning behind a proposed new namespace, the Host Identity namespace, and a new protocol layer, theHost Identity Protocol (HIP), between the internetworking and transport layers. Herein are presented the basics of the current namespaces, their strengths and weaknesses, and how a new namespace will add completeness to them. The roles of this new namespace in the protocols are defined. The memo describes the thinking of the authors as of Fall 2003. The architecture may have evolved since.This document represents one stable point in that evolution of understanding.
 
RFC 4441 The IEEE 802/IETF Relationship
 
Authors:B. Aboba, Ed..
Date:March 2006
Formats:txt json html
Obsoleted by:RFC 7241
Status:INFORMATIONAL
DOI:10.17487/RFC 4441
Since the late 1980s, IEEE 802 and IETF have cooperated in the development of Simple Network Management Protocol (SNMP) MIBs andAuthentication, Authorization, and Accounting (AAA) applications.This document describes the policies and procedures that have developed in order to coordinate between the two organizations, as well as some of the relationship history.
 
RFC 4447 Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP)
 
Authors:L. Martini, Ed., E. Rosen, N. El-Aawar, T. Smith, G. Heron.
Date:April 2006
Formats:txt html json
Obsoleted by:RFC 8077
Updated by:RFC 6723, RFC 6870, RFC 7358
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4447
Layer 2 services (such as Frame Relay, Asynchronous Transfer Mode, and Ethernet) can be "emulated" over an MPLS backbone by encapsulating the Layer 2 Protocol Data Units (PDU) and transmitting them over "pseudowires". It is also possible to use pseudowires to provide low-rate Time Division Multiplexed and a Synchronous OpticalNETworking circuit emulation over an MPLS-enabled network. This document specifies a protocol for establishing and maintaining the pseudowires, using extensions to Label Distribution Protocol (LDP).Procedures for encapsulating Layer 2 PDUs are specified in a set of companion documents.
 
RFC 4460 Stream Control Transmission Protocol (SCTP) Specification Errata and Issues
 
Authors:R. Stewart, I. Arias-Rodriguez, K. Poon, A. Caro, M. Tuexen.
Date:April 2006
Formats:txt json html
Obsoleted by:RFC 9260
Status:INFORMATIONAL
DOI:10.17487/RFC 4460
This document is a compilation of issues found during six interoperability events and 5 years of experience with implementing, testing, and using Stream Control Transmission Protocol (SCTP) along with the suggested fixes. This document provides deltas to RFC 2960 and is organized in a time-based way. The issues are listed in the order they were brought up. Because some text is changed several times, the last delta in the text is the one that should be applied.In addition to the delta, a description of the problem and the details of the solution are also provided.
 
RFC 4474 Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP)
 
Authors:J. Peterson, C. Jennings.
Date:August 2006
Formats:txt json html
Obsoleted by:RFC 8224
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4474
The existing security mechanisms in the Session Initiation Protocol(SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP messages. It does so by defining two new SIP header fields, Identity, for conveying a signature used for validating the identity, and Identity-Info, for conveying a reference to the certificate of the signer.
 
RFC 4492 Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)
 
Authors:S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, B. Moeller.
Date:May 2006
Formats:txt html json
Obsoleted by:RFC 8422
Updated by:RFC 5246, RFC 7027, RFC 7919
Status:INFORMATIONAL
DOI:10.17487/RFC 4492
This document describes new key exchange algorithms based on EllipticCurve Cryptography (ECC) for the Transport Layer Security (TLS) protocol. In particular, it specifies the use of Elliptic CurveDiffie-Hellman (ECDH) key agreement in a TLS handshake and the use ofElliptic Curve Digital Signature Algorithm (ECDSA) as a new authentication mechanism.
 
RFC 4507 Transport Layer Security (TLS) Session Resumption without Server-Side State
 
Authors:J. Salowey, H. Zhou, P. Eronen, H. Tschofenig.
Date:May 2006
Formats:txt html json
Obsoleted by:RFC 5077
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4507
This document describes a mechanism that enables the Transport LayerSecurity (TLS) server to resume sessions and avoid keeping per-client session state. The TLS server encapsulates the session state into a ticket and forwards it to the client. The client can subsequently resume a session using the obtained ticket.
 
RFC 4544 Definitions of Managed Objects for Internet Small Computer System Interface (iSCSI)
 
Authors:M. Bakke, M. Krueger, T. McSweeney, J. Muchow.
Date:May 2006
Formats:txt html json
Obsoleted by:RFC 7147
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4544
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.In particular, it defines objects for managing a client using theInternet Small Computer System Interface (iSCSI) protocol (SCSI overTCP).
 
RFC 4550 Internet Email to Support Diverse Service Environments (Lemonade) Profile
 
Authors:S. Maes, A. Melnikov.
Date:June 2006
Formats:txt html json
Obsoleted by:RFC 5550
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4550
This document describes a profile (a set of required extensions, restrictions, and usage modes) of the IMAP and mail submission protocols. This profile allows clients (especially those that are constrained in memory, bandwidth, processing power, or other areas) to efficiently use IMAP and Submission to access and submit mail.This includes the ability to forward received mail without needing to download and upload the mail, to optimize submission, and to efficiently resynchronize in case of loss of connectivity with the server.

The Internet Email to Support Diverse Service Environments (Lemonade) profile relies upon extensions to IMAP and Mail Submission protocols; specifically, the URLAUTH and CATENATE IMAP protocol (RFC 3501) extensions and the BURL extension to the SUBMIT protocol (RFC 4409).

 
RFC 4551 IMAP Extension for Conditional STORE Operation or Quick Flag Changes Resynchronization
 
Authors:A. Melnikov, S. Hole.
Date:June 2006
Formats:txt html json
Obsoleted by:RFC 7162
Updates:RFC 3501
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4551
Often, multiple IMAP (RFC 3501) clients need to coordinate changes to a common IMAP mailbox. Examples include different clients working on behalf of the same user, and multiple users accessing shared mailboxes. These clients need a mechanism to synchronize state changes for messages within the mailbox. They must be able to guarantee that only one client can change message state (e.g., message flags) at any time. An example of such an application is use of an IMAP mailbox as a message queue with multiple dequeueing clients.

The Conditional Store facility provides a protected update mechanism for message state information that can detect and resolve conflicts between multiple writing mail clients.

The Conditional Store facility also allows a client to quickly resynchronize mailbox flag changes.

This document defines an extension to IMAP (RFC 3501).

 
RFC 4566 SDP: Session Description Protocol
 
Authors:M. Handley, V. Jacobson, C. Perkins.
Date:July 2006
Formats:txt json html
Obsoletes:RFC 2327, RFC 3266
Obsoleted by:RFC 8866
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4566
This memo defines the Session Description Protocol (SDP). SDP is intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation.
 
RFC 4572 Connection-Oriented Media Transport over the Transport Layer Security (TLS) Protocol in the Session Description Protocol (SDP)
 
Authors:J. Lennox.
Date:July 2006
Formats:txt json html
Obsoleted by:RFC 8122
Updates:RFC 4145
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4572
This document specifies how to establish secure connection-oriented media transport sessions over the Transport Layer Security (TLS) protocol using the Session Description Protocol (SDP). It defines a new SDP protocol identifier, 'TCP/TLS'. It also defines the syntax and semantics for an SDP 'fingerprint' attribute that identifies the certificate that will be presented for the TLS session. This mechanism allows media transport over TLS connections to be established securely, so long as the integrity of session descriptions is assured.

This document extends and updates RFC 4145.

 
RFC 4582 The Binary Floor Control Protocol (BFCP)
 
Authors:G. Camarillo, J. Ott, K. Drage.
Date:November 2006
Formats:txt json html
Obsoleted by:RFC 8855
Updated by:RFC 8996
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4582
Floor control is a means to manage joint or exclusive access to shared resources in a (multiparty) conferencing environment.Thereby, floor control complements other functions -- such as conference and media session setup, conference policy manipulation, and media control -- that are realized by other protocols.

This document specifies the Binary Floor Control Protocol (BFCP).BFCP is used between floor participants and floor control servers, and between floor chairs (i.e., moderators) and floor control servers.

 
RFC 4583 Session Description Protocol (SDP) Format for Binary Floor Control Protocol (BFCP) Streams
 
Authors:G. Camarillo.
Date:November 2006
Formats:txt json html
Obsoleted by:RFC 8856
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4583
This document specifies how to describe Binary Floor Control Protocol(BFCP) streams in Session Description Protocol (SDP) descriptions.User agents using the offer/answer model to establish BFCP streams use this format in their offers and answers.
 
RFC 4590 RADIUS Extension for Digest Authentication
 
Authors:B. Sterman, D. Sadolevsky, D. Schwartz, D. Williams, W. Beck.
Date:July 2006
Formats:txt html json
Obsoleted by:RFC 5090
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4590
This document defines an extension to the Remote AuthenticationDial-In User Service (RADIUS) protocol to enable support of DigestAuthentication, for use with HTTP-style protocols like the SessionInitiation Protocol (SIP) and HTTP.
 
RFC 4601 Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised)
 
Authors:B. Fenner, M. Handley, H. Holbrook, I. Kouvelas.
Date:August 2006
Formats:txt pdf html json
Obsoletes:RFC 2362
Obsoleted by:RFC 7761
Updated by:RFC 5059, RFC 5796, RFC 6226
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4601
This document specifies Protocol Independent Multicast - Sparse Mode(PIM-SM). PIM-SM is a multicast routing protocol that can use the underlying unicast routing information base or a separate multicast- capable routing information base. It builds unidirectional shared trees rooted at a Rendezvous Point (RP) per group, and optionally creates shortest-path trees per source.

This document obsoletes RFC 2362, an Experimental version of PIM-SM.

 
RFC 4614 A Roadmap for Transmission Control Protocol (TCP) Specification Documents
 
Authors:M. Duke, R. Braden, W. Eddy, E. Blanton.
Date:September 2006
Formats:txt html json
Obsoleted by:RFC 7414
Updated by:RFC 6247
Status:INFORMATIONAL
DOI:10.17487/RFC 4614
This document contains a "roadmap" to the Requests for Comments (RFC) documents relating to the Internet's Transmission Control Protocol(TCP). This roadmap provides a brief summary of the documents defining TCP and various TCP extensions that have accumulated in theRFC series. This serves as a guide and quick reference for both TCP implementers and other parties who desire information contained in the TCP-related RFCs.
 
RFC 4622 Internationalized Resource Identifiers (IRIs) and Uniform Resource Identifiers (URIs) for the Extensible Messaging and Presence Protocol (XMPP)
 
Authors:P. Saint-Andre.
Date:July 2006
Formats:txt json html
Obsoleted by:RFC 5122
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4622
This document defines the use of Internationalized ResourceIdentifiers (IRIs) and Uniform Resource Identifiers (URIs) in identifying or interacting with entities that can communicate via theExtensible Messaging and Presence Protocol (XMPP).
 
RFC 4627 The application/json Media Type for JavaScript Object Notation (JSON)
 
Authors:D. Crockford.
Date:July 2006
Formats:txt json html
Obsoleted by:RFC 7159
Status:INFORMATIONAL
DOI:10.17487/RFC 4627
JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.
 
RFC 4630 Update to DirectoryString Processing in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
 
Authors:R. Housley, S. Santesson.
Date:August 2006
Formats:txt html json
Obsoleted by:RFC 5280
Updates:RFC 3280
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4630
This document updates the handling of DirectoryString in the InternetX.509 Public Key Infrastructure Certificate and CertificateRevocation List (CRL) Profile, which is published in RFC 3280. The use of UTF8String and PrintableString are the preferred encoding.The requirement for exclusive use of UTF8String after December 31,2003 is removed.
 
RFC 4634 US Secure Hash Algorithms (SHA and HMAC-SHA)
 
Authors:D. Eastlake 3rd, T. Hansen.
Date:July 2006
Formats:txt html json
Obsoleted by:RFC 6234
Updates:RFC 3174
Status:INFORMATIONAL
DOI:10.17487/RFC 4634
The United States of America has adopted a suite of Secure HashAlgorithms (SHAs), including four beyond SHA-1, as part of a FederalInformation Processing Standard (FIPS), specifically SHA-224 (RFC3874), SHA-256, SHA-384, and SHA-512. The purpose of this document is to make source code performing these hash functions conveniently available to the Internet community. The sample code supports input strings of arbitrary bit length. SHA-1's sample code from RFC 3174 has also been updated to handle input strings of arbitrary bit length. Most of the text herein was adapted by the authors from FIPS180-2.

Code to perform SHA-based HMACs, with arbitrary bit length text, is also included.

 
RFC 4635 HMAC SHA (Hashed Message Authentication Code, Secure Hash Algorithm) TSIG Algorithm Identifiers
 
Authors:D. Eastlake 3rd.
Date:August 2006
Formats:txt html json
Obsoleted by:RFC 8945
Updates:RFC 2845
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4635
Use of the Domain Name System TSIG resource record requires specification of a cryptographic message authentication code.Currently, identifiers have been specified only for HMAC MD5 (HashedMessage Authentication Code, Message Digest 5) and GSS (GenericSecurity Service) TSIG algorithms. This document standardizes identifiers and implementation requirements for additional HMAC SHA(Secure Hash Algorithm) TSIG algorithms and standardizes how to specify and handle the truncation of HMAC values in TSIG.
 
RFC 4641 DNSSEC Operational Practices
 
Authors:O. Kolkman, R. Gieben.
Date:September 2006
Formats:txt json html
Obsoletes:RFC 2541
Obsoleted by:RFC 6781
Status:INFORMATIONAL
DOI:10.17487/RFC 4641
This document describes a set of practices for operating the DNS with security extensions (DNSSEC). The target audience is zone administrators deploying DNSSEC.

The document discusses operational aspects of using keys and signatures in the DNS. It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.

This document obsoletes RFC 2541, as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the new DNSSEC specification.

 
RFC 4646 Tags for Identifying Languages
 
Authors:A. Phillips, M. Davis.
Date:September 2006
Formats:txt html json
Obsoletes:RFC 3066
Obsoleted by:RFC 5646
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 4646
This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object. It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange. This document, in combination with RFC 4647, replaces RFC 3066, which replaced RFC 1766.
 
RFC 4676 Dynamic Host Configuration Protocol (DHCPv4 and DHCPv6) Option for Civic Addresses Configuration Information
 
Authors:H. Schulzrinne.
Date:October 2006
Formats:txt html json
Obsoleted by:RFC 4776
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4676
This document specifies a Dynamic Host Configuration Protocol (DHCPv4 and DHCPv6) option containing the civic location of the client or theDHCP server. The Location Configuration Information (LCI) includes information about the country, administrative units such as states, provinces, and cities, as well as street addresses, postal community names, and building information. The option allows multiple renditions of the same address in different scripts and languages.
 
RFC 4677 The Tao of IETF - A Novice's Guide to the Internet Engineering Task Force
 
Authors:P. Hoffman, S. Harris.
Date:September 2006
Formats:txt html json
Obsoletes:RFC 3160
Obsoleted by:RFC 6722
Status:INFORMATIONAL
DOI:10.17487/RFC 4677
This document describes the inner workings of IETF meetings andWorking Groups, discusses organizations related to the IETF, and introduces the standards process. It is not a formal IETF process document but instead an informational overview.
 
RFC 4693 IETF Operational Notes
 
Authors:H. Alvestrand.
Date:October 2006
Formats:txt html json
Obsoleted by:RFC 6393
Status:HISTORIC
DOI:10.17487/RFC 4693
This document describes a new document series intended for use as a repository for IETF operations documents, which should be more ephemeral than RFCs, but more referenceable than Internet-Drafts, and with more clear handling procedures than a random Web page.

It proposes to establish this series as an RFC 3933 process experiment.

 
RFC 4695 RTP Payload Format for MIDI
 
Authors:J. Lazzaro, J. Wawrzynek.
Date:November 2006
Formats:txt json html
Obsoleted by:RFC 6295
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4695
This memo describes a Real-time Transport Protocol (RTP) payload format for the MIDI (Musical Instrument Digital Interface) command language. The format encodes all commands that may legally appear on a MIDI 1.0 DIN cable. The format is suitable for interactive applications (such as network musical performance) and content- delivery applications (such as file streaming). The format may be used over unicast and multicast UDP and TCP, and it defines tools for graceful recovery from packet loss. Stream behavior, including theMIDI rendering method, may be customized during session setup. The format also serves as a mode for the mpeg4-generic format, to support the MPEG 4 Audio Object Types for General MIDI, Downloadable SoundsLevel 2, and Structured Audio.
 
RFC 4718 IKEv2 Clarifications and Implementation Guidelines
 
Authors:P. Eronen, P. Hoffman.
Date:October 2006
Formats:txt json html
Obsoleted by:RFC 5996
Status:INFORMATIONAL
DOI:10.17487/RFC 4718
This document clarifies many areas of the IKEv2 specification. It does not to introduce any changes to the protocol, but rather provides descriptions that are less prone to ambiguous interpretations. The purpose of this document is to encourage the development of interoperable implementations.
 
RFC 4722 Media Server Control Markup Language (MSCML) and Protocol
 
Authors:J. Van Dyke, E. Burger, Ed., A. Spitzer.
Date:November 2006
Formats:txt html json
Obsoleted by:RFC 5022
Status:INFORMATIONAL
DOI:10.17487/RFC 4722
Media Server Control Markup Language (MSCML) is a markup language used in conjunction with SIP to provide advanced conferencing and interactive voice response (IVR) functions. MSCML presents an application-level control model, as opposed to device-level control models. One use of this protocol is for communications between a conference focus and mixer in the IETF SIP Conferencing Framework.
 
RFC 4741 NETCONF Configuration Protocol
 
Authors:R. Enns, Ed..
Date:December 2006
Formats:txt html json
Obsoleted by:RFC 6241
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4741
The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible MarkupLanguage (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized on top of a simple Remote Procedure Call (RPC) layer.
 
RFC 4742 Using the NETCONF Configuration Protocol over Secure SHell (SSH)
 
Authors:M. Wasserman, T. Goddard.
Date:December 2006
Formats:txt json html
Obsoleted by:RFC 6242
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4742
This document describes a method for invoking and running the NetworkConfiguration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem.
 
RFC 4748 RFC 3978 Update to Recognize the IETF Trust
 
Authors:S. Bradner, Ed..
Date:October 2006
Formats:txt html json
Obsoleted by:RFC 5378
Updates:RFC 3978
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 4748
This document updates RFC 3978 "IETF Rights in Contributions" to recognize that the IETF Trust is now the proper custodian of allIETF-related intellectual property rights.

This document does not constrain how the IETF Trust exercises those rights.

 
RFC 4753 ECP Groups For IKE and IKEv2
 
Authors:D. Fu, J. Solinas.
Date:January 2007
Formats:txt json html
Obsoleted by:RFC 5903
Status:INFORMATIONAL
DOI:10.17487/RFC 4753
This document describes new Elliptic Curve Cryptography (ECC) groups for use in the Internet Key Exchange (IKE) and Internet Key Exchange version 2 (IKEv2) protocols in addition to previously defined groups.Specifically, the new curve groups are based on modular arithmetic rather than binary arithmetic. These new groups are defined to alignIKE and IKEv2 with other ECC implementations and standards, particularly NIST standards. In addition, the curves defined here can provide more efficient implementation than previously defined ECC groups.
 
RFC 4756 Forward Error Correction Grouping Semantics in Session Description Protocol
 
Authors:A. Li.
Date:November 2006
Formats:txt json html
Obsoleted by:RFC 5956
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4756
This document defines the semantics that allow for grouping ofForward Error Correction (FEC) streams with the protected payload streams in Session Description Protocol (SDP). The semantics defined in this document are to be used with "Grouping of Media Lines in theSession Description Protocol" (RFC 3388) to group together "m" lines in the same session.
 
RFC 4770 vCard Extensions for Instant Messaging (IM)
 
Authors:C. Jennings, J. Reschke, Ed..
Date:January 2007
Formats:txt html json
Obsoleted by:RFC 6350
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4770
This document describes an extension to vCard to support InstantMessaging (IM) and Presence Protocol (PP) applications. IM and PP are becoming increasingly common ways of communicating, and users want to save this contact information in their address books. It allows a URI that is associated with IM or PP to be specified inside a vCard.
 
RFC 4773 Administration of the IANA Special Purpose IPv6 Address Block
 
Authors:G. Huston.
Date:December 2006
Formats:txt json html
Obsoleted by:RFC 6890
Status:INFORMATIONAL
DOI:10.17487/RFC 4773
This is a direction to IANA concerning the management of the IANASpecial Purpose IPv6 address assignment registry.
 
RFC 4813 OSPF Link-Local Signaling
 
Authors:B. Friedman, L. Nguyen, A. Roy, D. Yeung, A. Zinin.
Date:March 2007
Formats:txt html json
Obsoleted by:RFC 5613
Status:EXPERIMENTAL
DOI:10.17487/RFC 4813
OSPF is a link-state intra-domain routing protocol used in IP networks. OSPF routers exchange information on a link using packets that follow a well-defined format. The format of OSPF packets is not flexible enough to enable applications to exchange arbitrary data, which may be necessary in certain situations. This memo describes a vendor-specific, backward-compatible technique to perform link-local signaling, i.e., exchange arbitrary data on a link.
 
RFC 4835 Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH)
 
Authors:V. Manral.
Date:April 2007
Formats:txt json html
Obsoletes:RFC 4305
Obsoleted by:RFC 7321
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4835
The IPsec series of protocols makes use of various cryptographic algorithms in order to provide security services. The EncapsulatingSecurity Payload (ESP) and the Authentication Header (AH) provide two mechanisms for protecting data being sent over an IPsec SecurityAssociation (SA). To ensure interoperability between disparate implementations, it is necessary to specify a set of mandatory-to- implement algorithms to ensure that there is at least one algorithm that all implementations will have available. This document defines the current set of mandatory-to-implement algorithms for ESP and AH as well as specifying algorithms that should be implemented because they may be promoted to mandatory at some future time.
 
RFC 4843 An IPv6 Prefix for Overlay Routable Cryptographic Hash Identifiers (ORCHID)
 
Authors:P. Nikander, J. Laganier, F. Dupont.
Date:April 2007
Formats:txt json html
Obsoleted by:RFC 7343
Status:EXPERIMENTAL
DOI:10.17487/RFC 4843
This document introduces Overlay Routable Cryptographic HashIdentifiers (ORCHID) as a new, experimental class of IPv6-address- like identifiers. These identifiers are intended to be used as endpoint identifiers at applications and Application ProgrammingInterfaces (API) and not as identifiers for network location at theIP layer, i.e., locators. They are designed to appear as application layer entities and at the existing IPv6 APIs, but they should not appear in actual IPv6 headers. To make them more like vanilla IPv6 addresses, they are expected to be routable at an overlay level.Consequently, while they are considered non-routable addresses from the IPv6 layer point-of-view, all existing IPv6 applications are expected to be able to use them in a manner compatible with currentIPv6 addresses.

This document requests IANA to allocate a temporary prefix out of theIPv6 addressing space for Overlay Routable Cryptographic HashIdentifiers. By default, the prefix will be returned to IANA in2014, with continued use requiring IETF consensus.

 
RFC 4844 The RFC Series and RFC Editor
 
Authors:L. Daigle, Ed., Internet Architecture Board.
Date:July 2007
Formats:txt html json
Obsoleted by:RFC 8729
Updated by:RFC 5741
Status:INFORMATIONAL
DOI:10.17487/RFC 4844
This document describes the framework for an RFC Series and an RFCEditor function that incorporate the principles of organized community involvement and accountability that has become necessary as the Internet technical community has grown, thereby enabling the RFCSeries to continue to fulfill its mandate.
 
RFC 4850 Declarative Public Extension Key for Internet Small Computer Systems Interface (iSCSI) Node Architecture
 
Authors:D. Wysochanski.
Date:April 2007
Formats:txt html json
Obsoleted by:RFC 7143
Updates:RFC 3720
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4850
The Internet Small Computer Systems Interface (iSCSI) protocol, described in RFC 3720, allows for extension items to the protocol in the form of Private or Public Extension Keys. This document describes a Public Extension Key for the purpose of enhancing iSCSI supportability. The key accomplishes this objective by allowing iSCSI nodes to communicate architecture details during the iSCSI login sequence. The receiving node can then use this information for enhanced logging and support. This document updates RFC 3720 to allow iSCSI extension items to be defined by standards track RFCs and experimental RFCs in addition to informational RFCs.
 
RFC 4869 Suite B Cryptographic Suites for IPsec
 
Authors:L. Law, J. Solinas.
Date:May 2007
Formats:txt html json
Obsoleted by:RFC 6379
Status:HISTORIC
DOI:10.17487/RFC 4869
This document proposes four optional cryptographic user interface suites ("UI suites") for IPsec, similar to the two suites specified in RFC 4308. The four new suites provide compatibility with theUnited States National Security Agency's Suite B specifications.
 
RFC 4870 Domain-Based Email Authentication Using Public Keys Advertised in the DNS (DomainKeys)
 
Authors:M. Delany.
Date:May 2007
Formats:txt html json
Obsoleted by:RFC 4871
Status:HISTORIC
DOI:10.17487/RFC 4870
"DomainKeys" creates a domain-level authentication framework for email by using public key technology and the DNS to prove the provenance and contents of an email.

This document defines a framework for digitally signing email on a per-domain basis. The ultimate goal of this framework is to unequivocally prove and protect identity while retaining the semantics of Internet email as it is known today.

Proof and protection of email identity may assist in the global control of "spam" and "phishing".

 
RFC 4871 DomainKeys Identified Mail (DKIM) Signatures
 
Authors:E. Allman, J. Callas, M. Delany, M. Libbey, J. Fenton, M. Thomas.
Date:May 2007
Formats:txt html json
Obsoletes:RFC 4870
Obsoleted by:RFC 6376
Updated by:RFC 5672
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4871
DomainKeys Identified Mail (DKIM) defines a domain-level authentication framework for email using public-key cryptography and key server technology to permit verification of the source and contents of messages by either Mail Transfer Agents (MTAs) or MailUser Agents (MUAs). The ultimate goal of this framework is to permit a signing domain to assert responsibility for a message, thus protecting message signer identity and the integrity of the messages they convey while retaining the functionality of Internet email as it is known today. Protection of email identity may assist in the global control of "spam" and "phishing".
 
RFC 4879 Clarification of the Third Party Disclosure Procedure in RFC 3979
 
Authors:T. Narten.
Date:April 2007
Formats:txt html json
Obsoleted by:RFC 8179
Updates:RFC 3979
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 4879
This document clarifies and updates a single sentence in RFC 3979.Specifically, when third party Intellectual Property Rights (IPR) disclosures are made, the intention is that the IETF ExecutiveDirector notify the IPR holder that a third party disclosure has been filed, and to ask the IPR holder whether they have any disclosure that needs to be made, per applicable RFC 3979 rules.
 
RFC 4880 OpenPGP Message Format
 
Authors:J. Callas, L. Donnerhacke, H. Finney, D. Shaw, R. Thayer.
Date:November 2007
Formats:txt html json
Obsoletes:RFC 1991, RFC 2440
Obsoleted by:RFC 9580
Updated by:RFC 5581
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4880
This document is maintained in order to publish all necessary information needed to develop interoperable applications based on theOpenPGP format. It is not a step-by-step cookbook for writing an application. It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network. It does not deal with storage and implementation questions.It does, however, discuss implementation issues necessary to avoid security flaws.

OpenPGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage. These services include confidentiality, key management, authentication, and digital signatures. This document specifies the message formats used inOpenPGP.

 
RFC 4893 BGP Support for Four-octet AS Number Space
 
Authors:Q. Vohra, E. Chen.
Date:May 2007
Formats:txt json html
Obsoleted by:RFC 6793
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4893
Currently the Autonomous System (AS) number is encoded as a two-octet entity in BGP. This document describes extensions to BGP to carry theAutonomous System number as a four-octet entity.
 
RFC 4909 Multimedia Internet KEYing (MIKEY) General Extension Payload for Open Mobile Alliance BCAST LTKM/STKM Transport
 
Authors:L. Dondeti, Ed., D. Castleford, F. Hartung.
Date:June 2007
Formats:txt html json
Obsoleted by:RFC 5410, RFC 6309
Status:INFORMATIONAL
DOI:10.17487/RFC 4909
This document specifies a new Multimedia Internet KEYing (MIKEY)General Extension payload (RFC 3830) to transport the short-term key message (STKM) and long-term key message (LTKM) payloads defined in the Open Mobile Alliance's (OMA) Browser and Content (BAC) Broadcast(BCAST) group's Service and Content protection specification.
 
RFC 4930 Extensible Provisioning Protocol (EPP)
 
Authors:S. Hollenbeck.
Date:May 2007
Formats:txt html json
Obsoletes:RFC 3730
Obsoleted by:RFC 5730
Status:DRAFT STANDARD
DOI:10.17487/RFC 4930
This document describes an application layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 3730.
 
RFC 4931 Extensible Provisioning Protocol (EPP) Domain Name Mapping
 
Authors:S. Hollenbeck.
Date:May 2007
Formats:txt html json
Obsoletes:RFC 3731
Obsoleted by:RFC 5731
Status:DRAFT STANDARD
DOI:10.17487/RFC 4931
This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names.This document obsoletes RFC 3731.
 
RFC 4932 Extensible Provisioning Protocol (EPP) Host Mapping
 
Authors:S. Hollenbeck.
Date:May 2007
Formats:txt json html
Obsoletes:RFC 3732
Obsoleted by:RFC 5732
Status:DRAFT STANDARD
DOI:10.17487/RFC 4932
This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet host names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to host names.This document obsoletes RFC 3732.
 
RFC 4933 Extensible Provisioning Protocol (EPP) Contact Mapping
 
Authors:S. Hollenbeck.
Date:May 2007
Formats:txt json html
Obsoletes:RFC 3733
Obsoleted by:RFC 5733
Status:DRAFT STANDARD
DOI:10.17487/RFC 4933
This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of individual or organizational social information identifiers (known as "contacts") stored in a shared central repository. Specified in ExtensibleMarkup Language (XML), the mapping defines EPP command syntax and semantics as applied to contacts. This document obsoletes RFC 3733.
 
RFC 4934 Extensible Provisioning Protocol (EPP) Transport Over TCP
 
Authors:S. Hollenbeck.
Date:May 2007
Formats:txt html json
Obsoletes:RFC 3734
Obsoleted by:RFC 5734
Status:DRAFT STANDARD
DOI:10.17487/RFC 4934
This document describes how an Extensible Provisioning Protocol (EPP) session is mapped onto a single Transmission Control Protocol (TCP) connection. This mapping requires use of the Transport LayerSecurity (TLS) protocol to protect information exchanged between anEPP client and an EPP server. This document obsoletes RFC 3734.
 
RFC 4938 PPP Over Ethernet (PPPoE) Extensions for Credit Flow and Link Metrics
 
Authors:B. Berry, H. Holgate.
Date:June 2007
Formats:txt html json
Obsoleted by:RFC 5578
Status:INFORMATIONAL
DOI:10.17487/RFC 4938
This document extends the Point-to-Point over Ethernet (PPPoE)Protocol with a credit-based flow control mechanism and Link QualityMetric report. This optional extension should improve the performance of PPPoE over media with variable bandwidth and limited buffering, such as mobile radio links.
 
RFC 4941 Privacy Extensions for Stateless Address Autoconfiguration in IPv6
 
Authors:T. Narten, R. Draves, S. Krishnan.
Date:September 2007
Formats:txt json html
Obsoletes:RFC 3041
Obsoleted by:RFC 8981
Status:DRAFT STANDARD
DOI:10.17487/RFC 4941
Nodes use IPv6 stateless address autoconfiguration to generate addresses using a combination of locally available information and information advertised by routers. Addresses are formed by combining network prefixes with an interface identifier. On an interface that contains an embedded IEEE Identifier, the interface identifier is typically derived from it. On other interface types, the interface identifier is generated through other means, for example, via random number generation. This document describes an extension to IPv6 stateless address autoconfiguration for interfaces whose interface identifier is derived from an IEEE identifier. Use of the extension causes nodes to generate global scope addresses from interface identifiers that change over time, even in cases where the interface contains an embedded IEEE identifier. Changing the interface identifier (and the global scope addresses generated from it) over time makes it more difficult for eavesdroppers and other information collectors to identify when different addresses used in different transactions actually correspond to the same node.
 
RFC 4952 Overview and Framework for Internationalized Email
 
Authors:J. Klensin, Y. Ko.
Date:July 2007
Formats:txt html json
Obsoleted by:RFC 6530
Updated by:RFC 5336
Status:INFORMATIONAL
DOI:10.17487/RFC 4952
Full use of electronic mail throughout the world requires that people be able to use their own names, written correctly in their own languages and scripts, as mailbox names in email addresses. This document introduces a series of specifications that define mechanisms and protocol extensions needed to fully support internationalized email addresses. These changes include an SMTP extension and extension of email header syntax to accommodate UTF-8 data. The document set also includes discussion of key assumptions and issues in deploying fully internationalized email.
 
RFC 4960 Stream Control Transmission Protocol
 
Authors:R. Stewart, Ed..
Date:September 2007
Formats:txt json html
Obsoletes:RFC 2960, RFC 3309
Obsoleted by:RFC 9260
Updated by:RFC 6096, RFC 6335, RFC 7053, RFC 8899
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4960
This document obsoletes RFC 2960 and RFC 3309. It describes theStream Control Transmission Protocol (SCTP). SCTP is designed to transport Public Switched Telephone Network (PSTN) signaling messages over IP networks, but is capable of broader applications.

SCTP is a reliable transport protocol operating on top of a connectionless packet network such as IP. It offers the following services to its users:

-- acknowledged error-free non-duplicated transfer of user data,

-- data fragmentation to conform to discovered path MTU size,

-- sequenced delivery of user messages within multiple streams, with an option for order-of-arrival delivery of individual user messages,

-- optional bundling of multiple user messages into a single SCTP packet, and

-- network-level fault tolerance through supporting of multi-homing at either or both ends of an association.

The design of SCTP includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.

 
RFC 4970 Extensions to OSPF for Advertising Optional Router Capabilities
 
Authors:A. Lindem, Ed., N. Shen, JP. Vasseur, R. Aggarwal, S. Shaffer.
Date:July 2007
Formats:txt json html
Obsoleted by:RFC 7770
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4970
It is useful for routers in an OSPFv2 or OSPFv3 routing domain to know the capabilities of their neighbors and other routers in the routing domain. This document proposes extensions to OSPFv2 andOSPFv3 for advertising optional router capabilities. A new RouterInformation (RI) Link State Advertisement (LSA) is proposed for this purpose. In OSPFv2, the RI LSA will be implemented with a new opaqueLSA type ID. In OSPFv3, the RI LSA will be implemented with a newLSA type function code. In both protocols, the RI LSA can be advertised at any of the defined flooding scopes (link, area, or autonomous system (AS)).
 
RFC 4971 Intermediate System to Intermediate System (IS-IS) Extensions for Advertising Router Information
 
Authors:JP. Vasseur, Ed., N. Shen, Ed., R. Aggarwal, Ed..
Date:July 2007
Formats:txt json html
Obsoleted by:RFC 7981
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4971
This document defines a new optional Intermediate System toIntermediate System (IS-IS) TLV named CAPABILITY, formed of multiple sub-TLVs, which allows a router to announce its capabilities within an IS-IS level or the entire routing domain.
 
RFC 4995 The RObust Header Compression (ROHC) Framework
 
Authors:L-E. Jonsson, G. Pelletier, K. Sandlund.
Date:July 2007
Formats:txt json html
Obsoleted by:RFC 5795
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4995
The Robust Header Compression (ROHC) protocol provides an efficient, flexible, and future-proof header compression concept. It is designed to operate efficiently and robustly over various link technologies with different characteristics.

The ROHC framework, along with a set of compression profiles, was initially defined in RFC 3095. To improve and simplify the ROHC specifications, this document explicitly defines the ROHC framework and the profile for uncompressed separately. More specifically, the definition of the framework does not modify or update the definition of the framework specified by RFC 3095.

 
RFC 4996 RObust Header Compression (ROHC): A Profile for TCP/IP (ROHC-TCP)
 
Authors:G. Pelletier, K. Sandlund, L-E. Jonsson, M. West.
Date:July 2007
Formats:txt html json
Obsoleted by:RFC 6846
Status:PROPOSED STANDARD
DOI:10.17487/RFC 4996
This document specifies a ROHC (Robust Header Compression) profile for compression of TCP/IP packets. The profile, called ROHC-TCP, provides efficient and robust compression of TCP headers, including frequently used TCP options such as SACK (Selective Acknowledgments) and Timestamps.

ROHC-TCP works well when used over links with significant error rates and long round-trip times. For many bandwidth-limited links where header compression is essential, such characteristics are common.

 
RFC 5000 Internet Official Protocol Standards
 
Authors:RFC Editor.
Date:May 2008
Formats:txt html json
Obsoletes:RFC 3700
Obsoleted by:RFC 7100
Status:HISTORIC
DOI:10.17487/RFC 5000
This document is published by the RFC Editor to provide a summary of the current standards protocols (as of 18 February 2008). It lists those official protocol standards, Best Current Practice, andExperimental RFCs that have not been obsoleted; it is not a complete index to the RFC series. Newly published RFCs and RFCs whose status has changed are starred.

For an up-to-date list, see http://www.rfc-editor.org/rfcxx00.html, which is updated daily.

 
RFC 5006 IPv6 Router Advertisement Option for DNS Configuration
 
Authors:J. Jeong, Ed., S. Park, L. Beloeil, S. Madanapalli.
Date:September 2007
Formats:txt json html
Obsoleted by:RFC 6106
Status:EXPERIMENTAL
DOI:10.17487/RFC 5006
This document specifies a new IPv6 Router Advertisement option to allow IPv6 routers to advertise DNS recursive server addresses toIPv6 hosts.
 
RFC 5008 Suite B in Secure/Multipurpose Internet Mail Extensions (S/MIME)
 
Authors:R. Housley, J. Solinas.
Date:September 2007
Formats:txt html json
Obsoleted by:RFC 6318
Status:HISTORIC
DOI:10.17487/RFC 5008
This document specifies the conventions for using the United StatesNational Security Agency's Suite B algorithms in Secure/MultipurposeInternet Mail Extensions (S/MIME) as specified in RFC 3851.
 
RFC 5046 Internet Small Computer System Interface (iSCSI) Extensions for Remote Direct Memory Access (RDMA)
 
Authors:M. Ko, M. Chadalapaka, J. Hufferd, U. Elzur, H. Shah, P. Thaler.
Date:October 2007
Formats:txt html json
Obsoleted by:RFC 7145
Updated by:RFC 7146
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5046
Internet Small Computer System Interface (iSCSI) Extensions forRemote Direct Memory Access (RDMA) provides the RDMA data transfer capability to iSCSI by layering iSCSI on top of an RDMA-CapableProtocol, such as the iWARP protocol suite. An RDMA-Capable Protocol provides RDMA Read and Write services, which enable data to be transferred directly into SCSI I/O Buffers without intermediate data copies. This document describes the extensions to the iSCSI protocol to support RDMA services as provided by an RDMA-Capable Protocol, such as the iWARP protocol suite.
 
RFC 5048 Internet Small Computer System Interface (iSCSI) Corrections and Clarifications
 
Authors:M. Chadalapaka, Ed..
Date:October 2007
Formats:txt json html
Obsoleted by:RFC 7143
Updates:RFC 3720
Updated by:RFC 7146
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5048
The Internet Small Computer System Interface (iSCSI) is a SCSI transport protocol and maps the SCSI architecture and command sets onto TCP/IP. RFC 3720 defines the iSCSI protocol. This document compiles the clarifications to the original protocol definition inRFC 3720 to serve as a companion document for the iSCSI implementers.This document updates RFC 3720 and the text in this document supersedes the text in RFC 3720 when the two differ.
 
RFC 5070 The Incident Object Description Exchange Format
 
Authors:R. Danyliw, J. Meijer, Y. Demchenko.
Date:December 2007
Formats:txt json html
Obsoleted by:RFC 7970
Updated by:RFC 6685
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5070
The Incident Object Description Exchange Format (IODEF) defines a data representation that provides a framework for sharing information commonly exchanged by Computer Security Incident Response Teams(CSIRTs) about computer security incidents. This document describes the information model for the IODEF and provides an associated data model specified with XML Schema.
 
RFC 5075 IPv6 Router Advertisement Flags Option
 
Authors:B. Haberman, Ed., R. Hinden.
Date:November 2007
Formats:txt json html
Obsoleted by:RFC 5175
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5075
The IPv6 Neighbor Discovery's Router Advertisement message contains an 8-bit field reserved for single-bit flags. Several protocols have reserved flags in this field and others are preparing to reserve a sufficient number of flags to exhaust the field. This document defines an option to the Router Advertisement message that expands the available number of flag bits available.
 
RFC 5077 Transport Layer Security (TLS) Session Resumption without Server-Side State
 
Authors:J. Salowey, H. Zhou, P. Eronen, H. Tschofenig.
Date:January 2008
Formats:txt html json
Obsoletes:RFC 4507
Obsoleted by:RFC 8446
Updated by:RFC 8447
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5077
This document describes a mechanism that enables the Transport LayerSecurity (TLS) server to resume sessions and avoid keeping per-client session state. The TLS server encapsulates the session state into a ticket and forwards it to the client. The client can subsequently resume a session using the obtained ticket. This document obsoletesRFC 4507.
 
RFC 5078 IAB and IESG Selection, Confirmation, and Recall Process: Revision of the Nominating and Recall Committees Timeline
 
Authors:S. Dawkins.
Date:October 2007
Formats:txt json html
Obsoleted by:RFC 7437
Updates:RFC 3777
Status:INFORMATIONAL
DOI:10.17487/RFC 5078
RFC 3777 defines the Nominations and Recall Committee's (NomCom's) operation, and includes a sample timeline for major steps in theNomCom process that meets the minimum normative requirements for the process. Recent NomComs have been scheduling based on the sample timeline, and the chairs of the last three NomComs -- Danny McPherson(2004-2005), Ralph Droms (2005-2006), and Andrew Lange (2006-2007) -- have all reported that this timeline is very aggressive and suggested starting earlier. This document restructures the sample timeline, but makes no normative process changes.
 
RFC 5081 Using OpenPGP Keys for Transport Layer Security (TLS) Authentication
 
Authors:N. Mavrogiannopoulos.
Date:November 2007
Formats:txt json html
Obsoleted by:RFC 6091
Status:EXPERIMENTAL
DOI:10.17487/RFC 5081
This memo proposes extensions to the Transport Layer Security (TLS) protocol to support the OpenPGP key format. The extensions discussed here include a certificate type negotiation mechanism, and the required modifications to the TLS Handshake Protocol.
 
RFC 5101 Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information
 
Authors:B. Claise, Ed..
Date:January 2008
Formats:txt json html
Obsoleted by:RFC 7011
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5101
This document specifies the IP Flow Information Export (IPFIX) protocol that serves for transmitting IP Traffic Flow information over the network. In order to transmit IP Traffic Flow information from an Exporting Process to an information Collecting Process, a common representation of flow data and a standard means of communicating them is required. This document describes how theIPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIXCollecting Process.
 
RFC 5102 Information Model for IP Flow Information Export
 
Authors:J. Quittek, S. Bryant, B. Claise, P. Aitken, J. Meyer.
Date:January 2008
Formats:txt html json
Obsoleted by:RFC 7012
Updated by:RFC 6313
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5102
This memo defines an information model for the IP Flow Information eXport (IPFIX) protocol. It is used by the IPFIX protocol for encoding measured traffic information and information related to the traffic Observation Point, the traffic Metering Process, and theExporting Process. Although developed for the IPFIX protocol, the model is defined in an open way that easily allows using it in other protocols, interfaces, and applications.
 
RFC 5117 RTP Topologies
 
Authors:M. Westerlund, S. Wenger.
Date:January 2008
Formats:txt html json
Obsoleted by:RFC 7667
Status:INFORMATIONAL
DOI:10.17487/RFC 5117
This document discusses multi-endpoint topologies used in Real-timeTransport Protocol (RTP)-based environments. In particular, centralized topologies commonly employed in the video conferencing industry are mapped to the RTP terminology.
 
RFC 5143 Synchronous Optical Network/Synchronous Digital Hierarchy (SONET/SDH) Circuit Emulation Service over MPLS (CEM) Encapsulation
 
Authors:A. Malis, J. Brayley, J. Shirron, L. Martini, S. Vogelsang.
Date:February 2008
Formats:txt json html
Obsoleted by:RFC 4842
Status:HISTORIC
DOI:10.17487/RFC 5143
This document describes a historical method for encapsulatingSynchronous Optical Network/Synchronous Digital Hierarchy (SONET/SDH)Path signals for transport across packet-switched networks (PSNs).The PSNs explicitly supported by this document include MPLS and IP.Note that RFC 4842 describes the standards-track protocol for this functionality, and new implementations must use RFC 4842 rather than this document except when interoperability with older implementations is desired.
 
RFC 5156 Special-Use IPv6 Addresses
 
Authors:M. Blanchet.
Date:April 2008
Formats:txt json html
Obsoleted by:RFC 6890
Status:INFORMATIONAL
DOI:10.17487/RFC 5156
This document is a compilation of special IPv6 addresses defined in other RFCs. It can be used as a checklist of invalid routing prefixes for developing filtering policies for routes and IP packets.It does not discuss addresses that are assigned to operators and users through the Regional Internet Registries.
 
RFC 5157 IPv6 Implications for Network Scanning
 
Authors:T. Chown.
Date:March 2008
Formats:txt json html
Obsoleted by:RFC 7707
Status:INFORMATIONAL
DOI:10.17487/RFC 5157
The much larger default 64-bit subnet address space of IPv6 should in principle make traditional network (port) scanning techniques used by certain network worms or scanning tools less effective. While traditional network scanning probes (whether by individuals or automated via network worms) may become less common, administrators should be aware that attackers may use other techniques to discoverIPv6 addresses on a target network, and thus they should also be aware of measures that are available to mitigate them. This informational document discusses approaches that administrators could take when planning their site address allocation and management strategies as part of a defence-in-depth approach to network security.
 
RFC 5162 IMAP4 Extensions for Quick Mailbox Resynchronization
 
Authors:A. Melnikov, D. Cridland, C. Wilson.
Date:March 2008
Formats:txt json html
Obsoleted by:RFC 7162
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5162
This document defines an IMAP4 extension, which gives an IMAP client the ability to quickly resynchronize any previously opened mailbox as part of the SELECT command, without the need for server-side state or additional client round-trips. This extension also introduces a new response that allows for a more compact representation of a list of expunged messages (and always includes the Unique Identifiers (UIDs) expunged).
 
RFC 5201 Host Identity Protocol
 
Authors:R. Moskowitz, P. Nikander, P. Jokela, Ed., T. Henderson.
Date:April 2008
Formats:txt html json
Obsoleted by:RFC 7401
Updated by:RFC 6253
Status:EXPERIMENTAL
DOI:10.17487/RFC 5201
This memo specifies the details of the Host Identity Protocol (HIP).HIP allows consenting hosts to securely establish and maintain sharedIP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes. HIP is based on a Sigma-compliant Diffie-Hellman key exchange, using public key identifiers from a new HostIdentity namespace for mutual peer authentication. The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the- middle (MitM) attacks. When used together with another suitable security protocol, such as the Encapsulated Security Payload (ESP), it provides integrity protection and optional encryption for upper- layer protocols, such as TCP and UDP.
 
RFC 5202 Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP)
 
Authors:P. Jokela, R. Moskowitz, P. Nikander.
Date:April 2008
Formats:txt json html
Obsoleted by:RFC 7402
Status:EXPERIMENTAL
DOI:10.17487/RFC 5202
This memo specifies an Encapsulated Security Payload (ESP) based mechanism for transmission of user data packets, to be used with theHost Identity Protocol (HIP).
 
RFC 5203 Host Identity Protocol (HIP) Registration Extension
 
Authors:J. Laganier, T. Koponen, L. Eggert.
Date:April 2008
Formats:txt json html
Obsoleted by:RFC 8003
Status:EXPERIMENTAL
DOI:10.17487/RFC 5203
This document specifies a registration mechanism for the HostIdentity Protocol (HIP) that allows hosts to register with services, such as HIP rendezvous servers or middleboxes.
 
RFC 5204 Host Identity Protocol (HIP) Rendezvous Extension
 
Authors:J. Laganier, L. Eggert.
Date:April 2008
Formats:txt html json
Obsoleted by:RFC 8004
Status:EXPERIMENTAL
DOI:10.17487/RFC 5204
This document defines a rendezvous extension for the Host IdentityProtocol (HIP). The rendezvous extension extends HIP and the HIP registration extension for initiating communication between HIP nodes via HIP rendezvous servers. Rendezvous servers improve reachability and operation when HIP nodes are multi-homed or mobile.
 
RFC 5205 Host Identity Protocol (HIP) Domain Name System (DNS) Extensions
 
Authors:P. Nikander, J. Laganier.
Date:April 2008
Formats:txt html json
Obsoleted by:RFC 8005
Status:EXPERIMENTAL
DOI:10.17487/RFC 5205
This document specifies a new resource record (RR) for the DomainName System (DNS), and how to use it with the Host Identity Protocol(HIP). This RR allows a HIP node to store in the DNS its HostIdentity (HI, the public component of the node public-private key pair), Host Identity Tag (HIT, a truncated hash of its public key), and the Domain Names of its rendezvous servers (RVSs).
 
RFC 5206 End-Host Mobility and Multihoming with the Host Identity Protocol
 
Authors:P. Nikander, T. Henderson, Ed., C. Vogt, J. Arkko.
Date:April 2008
Formats:txt json html
Obsoleted by:RFC 8046
Status:EXPERIMENTAL
DOI:10.17487/RFC 5206
This document defines mobility and multihoming extensions to the HostIdentity Protocol (HIP). Specifically, this document defines a general "LOCATOR" parameter for HIP messages that allows for a HIP host to notify peers about alternate addresses at which it may be reached. This document also defines elements of procedure for mobility of a HIP host -- the process by which a host dynamically changes the primary locator that it uses to receive packets. While the same LOCATOR parameter can also be used to support end-host multihoming, detailed procedures are left for further study.
 
RFC 5208 Public-Key Cryptography Standards (PKCS) #8: Private-Key Information Syntax Specification Version 1.2
 
Authors:B. Kaliski.
Date:May 2008
Formats:txt html json
Obsoleted by:RFC 5958
Status:INFORMATIONAL
DOI:10.17487/RFC 5208
This document represents a republication of PKCS #8 v1.2 from RSALaboratories' Public Key Cryptography Standard (PKCS) series. Change control is transferred to the IETF. The body of this document, except for the security considerations section, is taken directly from the PKCS #8 v1.2 specification.

This document describes a syntax for private-key information.

 
RFC 5226 Guidelines for Writing an IANA Considerations Section in RFCs
 
Authors:T. Narten, H. Alvestrand.
Date:May 2008
Formats:txt json html
Obsoletes:RFC 2434
Obsoleted by:RFC 8126
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 5226
Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication transform for IPsec). To ensure that such quantities have consistent values and interpretations across all implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned NumbersAuthority (IANA).

In order for IANA to manage a given namespace prudently, it needs guidelines describing the conditions under which new values can be assigned or when modifications to existing values can be made. IfIANA is expected to play a role in the management of a namespace,IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a namespace and provides guidelines for authors on the specific text that must be included in documents that place demands on IANA.

This document obsoletes RFC 2434.

 
RFC 5245 Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer/Answer Protocols
 
Authors:J. Rosenberg.
Date:April 2010
Formats:txt json html
Obsoletes:RFC 4091, RFC 4092
Obsoleted by:RFC 8445, RFC 8839
Updated by:RFC 6336
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5245
This document describes a protocol for Network Address Translator(NAT) traversal for UDP-based multimedia sessions established with the offer/answer model. This protocol is called InteractiveConnectivity Establishment (ICE). ICE makes use of the SessionTraversal Utilities for NAT (STUN) protocol and its extension,Traversal Using Relay NAT (TURN). ICE can be used by any protocol utilizing the offer/answer model, such as the Session InitiationProtocol (SIP).
 
RFC 5246 The Transport Layer Security (TLS) Protocol Version 1.2
 
Authors:T. Dierks, E. Rescorla.
Date:August 2008
Formats:txt html json
Obsoletes:RFC 3268, RFC 4346, RFC 4366
Obsoleted by:RFC 8446
Updates:RFC 4492
Updated by:RFC 5746, RFC 5878, RFC 6176, RFC 7465, RFC 7507, RFC 7568, RFC 7627, RFC 7685, RFC 7905, RFC 7919, RFC 8447, RFC 9155
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5246
This document specifies Version 1.2 of the Transport Layer Security(TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.
 
RFC 5268 Mobile IPv6 Fast Handovers
 
Authors:R. Koodli, Ed..
Date:June 2008
Formats:txt json html
Obsoletes:RFC 4068
Obsoleted by:RFC 5568
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5268
Mobile IPv6 enables a Mobile Node (MN) to maintain its connectivity to the Internet when moving from one Access Router to another, a process referred to as handover. During handover, there is a period during which the Mobile Node is unable to send or receive packets because of link switching delay and IP protocol operations. This"handover latency" resulting from standard Mobile IPv6 procedures, namely movement detection, new Care-of Address configuration, andBinding Update, is often unacceptable to real-time traffic such asVoice over IP (VoIP). Reducing the handover latency could be beneficial to non-real-time, throughput-sensitive applications as well. This document specifies a protocol to improve handover latency due to Mobile IPv6 procedures. This document does not address improving the link switching latency.
 
RFC 5285 A General Mechanism for RTP Header Extensions
 
Authors:D. Singer, H. Desineni.
Date:July 2008
Formats:txt json html
Obsoleted by:RFC 8285
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5285
This document provides a general mechanism to use the header extension feature of RTP (the Real-Time Transport Protocol). It provides the option to use a small number of small extensions in eachRTP packet, where the universe of possible extensions is large and registration is de-centralized. The actual extensions in use in a session are signaled in the setup information for that session.
 
RFC 5296 EAP Extensions for EAP Re-authentication Protocol (ERP)
 
Authors:V. Narayanan, L. Dondeti.
Date:August 2008
Formats:txt html json
Obsoleted by:RFC 6696
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5296
The Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. This document specifies extensions to EAP and the EAP keying hierarchy to support an EAP method-independent protocol for efficient re-authentication between the peer and an EAP re-authentication server through any authenticator. The re-authentication server may be in the home network or in the local network to which the peer is connecting.
 
RFC 5306 Restart Signaling for IS-IS
 
Authors:M. Shand, L. Ginsberg.
Date:October 2008
Formats:txt html json
Obsoletes:RFC 3847
Obsoleted by:RFC 8706
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5306
This document describes a mechanism for a restarting router to signal to its neighbors that it is restarting, allowing them to reestablish their adjacencies without cycling through the down state, while still correctly initiating database synchronization.

This document additionally describes a mechanism for a restarting router to determine when it has achieved Link State Protocol DataUnit (LSP) database synchronization with its neighbors and a mechanism to optimize LSP database synchronization, while minimizing transient routing disruption when a router starts. This document obsoletes RFC 3847.

 
RFC 5316 ISIS Extensions in Support of Inter-Autonomous System (AS) MPLS and GMPLS Traffic Engineering
 
Authors:M. Chen, R. Zhang, X. Duan.
Date:December 2008
Formats:txt html json
Obsoleted by:RFC 9346
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5316
This document describes extensions to the ISIS (ISIS) protocol to support Multiprotocol Label Switching (MPLS) and Generalized MPLS(GMPLS) Traffic Engineering (TE) for multiple Autonomous Systems(ASes). It defines ISIS-TE extensions for the flooding of TE information about inter-AS links, which can be used to perform inter-AS TE path computation.

No support for flooding information from within one AS to another AS is proposed or defined in this document.

 
RFC 5335 Internationalized Email Headers
 
Authors:A. Yang, Ed..
Date:September 2008
Formats:txt json html
Obsoleted by:RFC 6532
Updates:RFC 2045, RFC 2822
Status:EXPERIMENTAL
DOI:10.17487/RFC 5335
Full internationalization of electronic mail requires not only the capabilities to transmit non-ASCII content, to encode selected information in specific header fields, and to use non-ASCII characters in envelope addresses. It also requires being able to express those addresses and the information based on them in mail header fields. This document specifies an experimental variant ofInternet mail that permits the use of Unicode encoded in UTF-8, rather than ASCII, as the base form for Internet email header field.This form is permitted in transmission only if authorized by an SMTP extension, as specified in an associated specification. This specification Updates section 6.4 of RFC 2045 to conform with the requirements.
 
RFC 5336 SMTP Extension for Internationalized Email Addresses
 
Authors:J. Yao, Ed., W. Mao, Ed..
Date:September 2008
Formats:txt html json
Obsoleted by:RFC 6531
Updates:RFC 2821, RFC 2822, RFC 4952
Status:EXPERIMENTAL
DOI:10.17487/RFC 5336
This document specifies an SMTP extension for transport and delivery of email messages with internationalized email addresses or header information. Communication with systems that do not implement this specification is specified in another document. This document updates some syntaxes and rules defined in RFC 2821 and RFC 2822, and has some material updating RFC 4952.
 
RFC 5337 Internationalized Delivery Status and Disposition Notifications
 
Authors:C. Newman, A. Melnikov, Ed..
Date:September 2008
Formats:txt html json
Obsoleted by:RFC 6533
Updates:RFC 3461, RFC 3462, RFC 3464, RFC 3798
Status:EXPERIMENTAL
DOI:10.17487/RFC 5337
Delivery status notifications (DSNs) are critical to the correct operation of an email system. However, the existing Draft Standards(RFC 3461, RFC 3462, RFC 3464) are presently limited to US-ASCII text in the machine-readable portions of the protocol. This specification adds a new address type for international email addresses so an original recipient address with non-US-ASCII characters can be correctly preserved even after downgrading. This also provides updated content return media types for delivery status notifications and message disposition notifications to support use of the new address type.

This document experimentally extends RFC 3461, RFC 3464, and RFC3798.

 
RFC 5342 IANA Considerations and IETF Protocol Usage for IEEE 802 Parameters
 
Authors:D. Eastlake 3rd.
Date:September 2008
Formats:txt json html
Obsoleted by:RFC 7042
Updates:RFC 2153
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 5342
Some IETF protocols make use of Ethernet frame formats and IEEE 802 parameters. This document discusses some use of such parameters inIETF protocols and specifies IANA considerations for allocation of code points under the IANA OUI (Organizationally Unique Identifier).
 
RFC 5377 Advice to the Trustees of the IETF Trust on Rights to Be Granted in IETF Documents
 
Authors:J. Halpern, Ed..
Date:November 2008
Formats:txt json html
Obsoleted by:RFC 8721
Status:INFORMATIONAL
DOI:10.17487/RFC 5377
Contributors grant intellectual property rights to the IETF. TheIETF Trust holds and manages those rights on behalf of the IETF. TheTrustees of the IETF Trust are responsible for that management. This management includes granting the licenses to copy, implement, and otherwise use IETF Contributions, among them Internet-Drafts andRFCs. The Trustees of the IETF Trust accepts direction from the IETF regarding the rights to be granted. This document describes the desires of the IETF regarding outbound rights to be granted in IETFContributions.
 
RFC 5389 Session Traversal Utilities for NAT (STUN)
 
Authors:J. Rosenberg, R. Mahy, P. Matthews, D. Wing.
Date:October 2008
Formats:txt html json
Obsoletes:RFC 3489
Obsoleted by:RFC 8489
Updated by:RFC 7350, RFC 8553
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5389
Session Traversal Utilities for NAT (STUN) is a protocol that serves as a tool for other protocols in dealing with Network AddressTranslator (NAT) traversal. It can be used by an endpoint to determine the IP address and port allocated to it by a NAT. It can also be used to check connectivity between two endpoints, and as a keep-alive protocol to maintain NAT bindings. STUN works with many existing NATs, and does not require any special behavior from them.

STUN is not a NAT traversal solution by itself. Rather, it is a tool to be used in the context of a NAT traversal solution. This is an important change from the previous version of this specification (RFC3489), which presented STUN as a complete solution.

This document obsoletes RFC 3489.

 
RFC 5395 Domain Name System (DNS) IANA Considerations
 
Authors:D. Eastlake 3rd.
Date:November 2008
Formats:txt html json
Obsoletes:RFC 2929
Obsoleted by:RFC 6195
Updates:RFC 1183, RFC 3597
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 5395
Internet Assigned Number Authority (IANA) parameter assignment considerations are specified for the allocation of Domain Name System(DNS) resource record types, CLASSes, operation codes, error codes,DNS protocol message header bits, and AFSDB resource record subtypes.
 
RFC 5405 Unicast UDP Usage Guidelines for Application Designers
 
Authors:L. Eggert, G. Fairhurst.
Date:November 2008
Formats:txt html json
Obsoleted by:RFC 8085
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 5405
The User Datagram Protocol (UDP) provides a minimal message-passing transport that has no inherent congestion control mechanisms.Because congestion control is critical to the stable operation of theInternet, applications and upper-layer protocols that choose to useUDP as an Internet transport must employ mechanisms to prevent congestion collapse and to establish some degree of fairness with concurrent traffic. This document provides guidelines on the use ofUDP for the designers of unicast applications and upper-layer protocols. Congestion control guidelines are a primary focus, but the document also provides guidance on other topics, including message sizes, reliability, checksums, and middlebox traversal.
 
RFC 5414 Wireless LAN Control Protocol (WiCoP)
 
Authors:S. Iino, S. Govindan, M. Sugiura, H. Cheng.
Date:February 2010
Formats:txt html json
Obsoleted by:RFC 5415
Status:HISTORIC
DOI:10.17487/RFC 5414
The popularity of wireless local area networks (WLANs) has led to widespread deployments across different establishments. It has also translated into an increasing scale of the WLANs. Large-scale deployments made of large numbers of wireless termination points(WTPs) and covering substantial areas are increasingly common.

The Wireless LAN Control Protocol (WiCoP) described in this document allows for the control and provisioning of large-scale WLANs. It enables central management of these networks and realizes the objectives set forth for the Control And Provisioning of WirelessAccess Points (CAPWAP).

 
RFC 5430 Suite B Profile for Transport Layer Security (TLS)
 
Authors:M. Salter, E. Rescorla, R. Housley.
Date:March 2009
Formats:txt html json
Obsoleted by:RFC 6460
Status:HISTORIC
DOI:10.17487/RFC 5430
The United States government has published guidelines for "NSA SuiteB Cryptography", which defines cryptographic algorithm policy for national security applications. This document defines a profile ofTransport Layer Security (TLS) version 1.2 that is fully conformant with Suite B. This document also defines a transitional profile for use with TLS version 1.0 and TLS version 1.1 which employs Suite B algorithms to the greatest extent possible.
 
RFC 5451 Message Header Field for Indicating Message Authentication Status
 
Authors:M. Kucherawy.
Date:April 2009
Formats:txt json html
Obsoleted by:RFC 7001
Updated by:RFC 6577
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5451
This memo defines a new header field for use with electronic mail messages to indicate the results of message authentication efforts.Any receiver-side software, such as mail filters or Mail User Agents(MUAs), may use this message header field to relay that information in a convenient way to users or to make sorting and filtering decisions.
 
RFC 5467 GMPLS Asymmetric Bandwidth Bidirectional Label Switched Paths (LSPs)
 
Authors:L. Berger, A. Takacs, D. Caviglia, D. Fedyk, J. Meuric.
Date:March 2009
Formats:txt html json
Obsoleted by:RFC 6387
Status:EXPERIMENTAL
DOI:10.17487/RFC 5467
This document defines a method for the support of GMPLS asymmetric bandwidth bidirectional Label Switched Paths (LSPs). The presented approach is applicable to any switching technology and builds on the original Resource Reservation Protocol (RSVP) model for the transport of traffic-related parameters. The procedures described in this document are experimental.
 
RFC 5469 DES and IDEA Cipher Suites for Transport Layer Security (TLS)
 
Authors:P. Eronen, Ed..
Date:February 2009
Formats:txt json html
Obsoleted by:RFC 8996
Status:HISTORIC
DOI:10.17487/RFC 5469
Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC4346) include cipher suites based on DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) algorithms. DES(when used in single-DES mode) and IDEA are no longer recommended for general use in TLS, and have been removed from TLS version 1.2 (RFC5246). This document specifies these cipher suites for completeness and discusses reasons why their use is no longer recommended.
 
RFC 5504 Downgrading Mechanism for Email Address Internationalization
 
Authors:K. Fujiwara, Ed., Y. Yoneya, Ed..
Date:March 2009
Formats:txt json html
Obsoleted by:RFC 6530
Status:EXPERIMENTAL
DOI:10.17487/RFC 5504
Traditional mail systems handle only ASCII characters in SMTP envelope and mail header fields. The Email AddressInternationalization (UTF8SMTP) extension allows UTF-8 characters inSMTP envelope and mail header fields. To avoid rejecting internationalized email messages when a server in the delivery path does not support the UTF8SMTP extension, some sort of converting mechanism is required. This document describes a downgrading mechanism for Email Address Internationalization. Note that this is a way to downgrade, not tunnel. There is no associated up-conversion mechanism, although internationalized email clients might use original internationalized addresses or other data when displaying or replying to downgraded messages.
 
RFC 5512 The BGP Encapsulation Subsequent Address Family Identifier (SAFI) and the BGP Tunnel Encapsulation Attribute
 
Authors:P. Mohapatra, E. Rosen.
Date:April 2009
Formats:txt html json
Obsoleted by:RFC 9012
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5512
In certain situations, transporting a packet from one Border GatewayProtocol (BGP) speaker to another (the BGP next hop) requires that the packet be encapsulated by the first BGP speaker and decapsulated by the second. To support these situations, there needs to be some agreement between the two BGP speakers with regard to the"encapsulation information", i.e., the format of the encapsulation header as well as the contents of various fields of the header.

The encapsulation information need not be signaled for all encapsulation types. In cases where signaling is required (such asLayer Two Tunneling Protocol - Version 3 (L2TPv3) or Generic RoutingEncapsulation (GRE) with key), this document specifies a method by which BGP speakers can signal encapsulation information to each other. The signaling is done by sending BGP updates using theEncapsulation Subsequent Address Family Identifier (SAFI) and theIPv4 or IPv6 Address Family Identifier (AFI). In cases where no encapsulation information needs to be signaled (such as GRE without key), this document specifies a BGP extended community that can be attached to BGP UPDATE messages that carry payload prefixes in order to indicate the encapsulation protocol type to be used.

 
RFC 5539 NETCONF over Transport Layer Security (TLS)
 
Authors:M. Badra.
Date:May 2009
Formats:txt json html
Obsoleted by:RFC 7589
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5539
The Network Configuration Protocol (NETCONF) provides mechanisms to install, manipulate, and delete the configuration of network devices.This document describes how to use the Transport Layer Security (TLS) protocol to secure NETCONF exchanges.
 
RFC 5549 Advertising IPv4 Network Layer Reachability Information with an IPv6 Next Hop
 
Authors:F. Le Faucheur, E. Rosen.
Date:May 2009
Formats:txt html json
Obsoleted by:RFC 8950
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5549
Multiprotocol BGP (MP-BGP) specifies that the set of network-layer protocols to which the address carried in the Next Hop field may belong is determined by the Address Family Identifier (AFI) and theSubsequent Address Family Identifier (SAFI). The current AFI/SAFI definitions for the IPv4 address family only have provisions for advertising a Next Hop address that belongs to the IPv4 protocol when advertising IPv4 Network Layer Reachability Information (NLRI) orVPN-IPv4 NLRI. This document specifies the extensions necessary to allow advertising IPv4 NLRI or VPN-IPv4 NLRI with a Next Hop address that belongs to the IPv6 protocol. This comprises an extension of the AFI/SAFI definitions to allow the address of the Next Hop forIPv4 NLRI or VPN-IPv4 NLRI to also belong to the IPv6 protocol, the encoding of the Next Hop in order to determine which of the protocols the address actually belongs to, and a new BGP Capability allowingMP-BGP Peers to dynamically discover whether they can exchange IPv4NLRI and VPN-IPv4 NLRI with an IPv6 Next Hop.
 
RFC 5566 BGP IPsec Tunnel Encapsulation Attribute
 
Authors:L. Berger, R. White, E. Rosen.
Date:June 2009
Formats:txt json html
Obsoleted by:RFC 9012
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5566
The BGP Encapsulation Subsequent Address Family Identifier (SAFI) provides a method for the dynamic exchange of encapsulation information and for the indication of encapsulation protocol types to be used for different next hops. Currently, support for GenericRouting Encapsulation (GRE), Layer 2 Tunneling Protocol (L2TPv3), andIP in IP tunnel types are defined. This document defines support forIPsec tunnel types.
 
RFC 5575 Dissemination of Flow Specification Rules
 
Authors:P. Marques, N. Sheth, R. Raszuk, B. Greene, J. Mauch, D. McPherson.
Date:August 2009
Formats:txt html json
Obsoleted by:RFC 8955
Updated by:RFC 7674
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5575
This document defines a new Border Gateway Protocol Network LayerReachability Information (BGP NLRI) encoding format that can be used to distribute traffic flow specifications. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.

Additionally, it defines two applications of that encoding format: one that can be used to automate inter-domain coordination of traffic filtering, such as what is required in order to mitigate(distributed) denial-of-service attacks, and a second application to provide traffic filtering in the context of a BGP/MPLS VPN service.

The information is carried via the BGP, thereby reusing protocol algorithms, operational experience, and administrative processes such as inter-provider peering agreements.

 
RFC 5581 The Camellia Cipher in OpenPGP
 
Authors:D. Shaw.
Date:June 2009
Formats:txt html json
Obsoleted by:RFC 9580
Updates:RFC 4880
Status:INFORMATIONAL
DOI:10.17487/RFC 5581
This document presents the necessary information to use the Camellia symmetric block cipher in the OpenPGP protocol.
 
RFC 5620 RFC Editor Model (Version 1)
 
Authors:O. Kolkman, Ed., IAB.
Date:August 2009
Formats:txt html json
Obsoleted by:RFC 6548, RFC 6635
Status:INFORMATIONAL
DOI:10.17487/RFC 5620
The RFC Editor performs a number of functions that may be carried out by various persons or entities. The RFC Editor model presented in this document divides the responsibilities for the RFC Series into four functions: The RFC Series Editor, the Independent SubmissionEditor, the RFC Production Center, and the RFC Publisher. It also introduces the RFC Series Advisory Group and an (optional)Independent Submission Stream Editorial Board. The model outlined here is intended to increase flexibility and operational support options, provide for the orderly succession of the RFC Editor, and ensure the continuity of the RFC series, while maintaining RFC quality and timely processing, ensuring document accessibility, reducing costs, and increasing cost transparency.
 
RFC 5633 Nominating Committee Process: Earlier Announcement of Open Positions and Solicitation of Volunteers
 
Authors:S. Dawkins, Ed..
Date:August 2009
Formats:txt json html
Obsoleted by:RFC 7437
Updates:RFC 3777
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 5633
This document updates RFC 3777, Section 4, Bullet 13 to allow announcement of open positions and solicitation of volunteers to be issued before a Nominating and Recall Committee Chair has been named by the Internet Society President.
 
RFC 5653 Generic Security Service API Version 2: Java Bindings Update
 
Authors:M. Upadhyay, S. Malkani.
Date:August 2009
Formats:txt html json
Obsoletes:RFC 2853
Obsoleted by:RFC 8353
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5653
The Generic Security Services Application Program Interface (GSS-API) offers application programmers uniform access to security services atop a variety of underlying cryptographic mechanisms. This document updates the Java bindings for the GSS-API that are specified in"Generic Security Service API Version 2 : Java Bindings" (RFC 2853).This document obsoletes RFC 2853 by making specific and incremental clarifications and corrections to it in response to identification of transcription errors and implementation experience.

The GSS-API is described at a language-independent conceptual level in "Generic Security Service Application Program Interface Version 2,Update 1" (RFC 2743). The GSS-API allows a caller application to authenticate a principal identity, to delegate rights to a peer, and to apply security services such as confidentiality and integrity on a per-message basis. Examples of security mechanisms defined for GSS-API are "The Simple Public-Key GSS-API Mechanism" (RFC 2025) and "TheKerberos Version 5 Generic Security Service Application ProgramInterface (GSS-API) Mechanism: Version 2" (RFC 4121).

 
RFC 5661 Network File System (NFS) Version 4 Minor Version 1 Protocol
 
Authors:S. Shepler, Ed., M. Eisler, Ed., D. Noveck, Ed..
Date:January 2010
Formats:txt json html
Obsoleted by:RFC 8881
Updated by:RFC 8178, RFC 8434
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5661
This document describes the Network File System (NFS) version 4 minor version 1, including features retained from the base protocol (NFS version 4 minor version 0, which is specified in RFC 3530) and protocol extensions made subsequently. Major extensions introduced in NFS version 4 minor version 1 include Sessions, DirectoryDelegations, and parallel NFS (pNFS). NFS version 4 minor version 1 has no dependencies on NFS version 4 minor version 0, and it is considered a separate protocol. Thus, this document neither updates nor obsoletes RFC 3530. NFS minor version 1 is deemed superior toNFS minor version 0 with no loss of functionality, and its use is preferred over version 0. Both NFS minor versions 0 and 1 can be used simultaneously on the same network, between the same client and server.
 
RFC 5666 Remote Direct Memory Access Transport for Remote Procedure Call
 
Authors:T. Talpey, B. Callaghan.
Date:January 2010
Formats:txt html json
Obsoleted by:RFC 8166
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5666
This document describes a protocol providing Remote Direct MemoryAccess (RDMA) as a new transport for Remote Procedure Call (RPC).The RDMA transport binding conveys the benefits of efficient, bulk- data transport over high-speed networks, while providing for minimal change to RPC applications and with no required revision of the application RPC protocol, or the RPC protocol itself.
 
RFC 5667 Network File System (NFS) Direct Data Placement
 
Authors:T. Talpey, B. Callaghan.
Date:January 2010
Formats:txt html json
Obsoleted by:RFC 8267
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5667
This document defines the bindings of the various Network File System(NFS) versions to the Remote Direct Memory Access (RDMA) operations supported by the RPC/RDMA transport protocol. It describes the use of direct data placement by means of server-initiated RDMA operations into client-supplied buffers for implementations of NFS versions 2,3, 4, and 4.1 over such an RDMA transport.
 
RFC 5672 RFC 4871 DomainKeys Identified Mail (DKIM) Signatures -- Update
 
Authors:D. Crocker, Ed..
Date:August 2009
Formats:txt html json
Obsoleted by:RFC 6376
Updates:RFC 4871
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5672
This document updates RFC 4871, "DomainKeys Identified Mail (DKIM)Signatures". Specifically, the document clarifies the nature, roles, and relationship of the two DKIM identifier tag values that are candidates for payload delivery to a receiving processing module.The Update is in the style of an Errata entry, albeit a rather long one.
 
RFC 5680 The Nominating Committee Process: Open Disclosure of Willing Nominees
 
Authors:S. Dawkins, Ed..
Date:October 2009
Formats:txt json html
Obsoleted by:RFC 7437
Updates:RFC 3777
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 5680
This document updates RFC 3777, Section 3, Bullet 6 to allow aNominating and Recall Committee to disclose the list of nominees who are willing to be considered to serve in positions the committee is responsible for filling.
 
RFC 5696 Baseline Encoding and Transport of Pre-Congestion Information
 
Authors:T. Moncaster, B. Briscoe, M. Menth.
Date:November 2009
Formats:txt html json
Obsoleted by:RFC 6660
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5696
The objective of the Pre-Congestion Notification (PCN) architecture is to protect the quality of service (QoS) of inelastic flows within a Diffserv domain. It achieves this by marking packets belonging toPCN-flows when the rate of traffic exceeds certain configured thresholds on links in the domain. These marks can then be evaluated to determine how close the domain is to being congested. This document specifies how such marks are encoded into the IP header by redefining the Explicit Congestion Notification (ECN) codepoints within such domains. The baseline encoding described here provides only two PCN encoding states: Not-marked and PCN-marked. Future extensions to this encoding may be needed in order to provide more than one level of marking severity.
 
RFC 5719 Updated IANA Considerations for Diameter Command Code Allocations
 
Authors:D. Romascanu, H. Tschofenig.
Date:January 2010
Formats:txt json html
Obsoleted by:RFC 6733
Updates:RFC 3588
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5719
The Diameter base specification, described in RFC 3588, provides a number of ways to extend Diameter, with new Diameter commands (i.e., messages used by Diameter applications) and applications as the most extensive enhancements. RFC 3588 illustrates the conditions that lead to the need to define a new Diameter application or a new command code. Depending on the scope of the Diameter extension, IETF actions are necessary. Although defining new Diameter applications does not require IETF consensus, defining new Diameter commands requires IETF consensus per RFC 3588. This has led to questionable design decisions by other Standards Development Organizations, which chose to define new applications on existing commands -- rather than asking for assignment of new command codes -- for the pure purpose of avoiding bringing their specifications to the IETF. In some cases, interoperability problems were an effect of the poor design caused by overloading existing commands.

This document aligns the extensibility rules of the Diameter application with the Diameter commands, offering ways to delegate work on Diameter to other SDOs to extend Diameter in a way that does not lead to poor design choices.

 
RFC 5721 POP3 Support for UTF-8
 
Authors:R. Gellens, C. Newman.
Date:February 2010
Formats:txt json html
Obsoleted by:RFC 6856
Status:EXPERIMENTAL
DOI:10.17487/RFC 5721
This specification extends the Post Office Protocol version 3 (POP3) to support un-encoded international characters in user names, passwords, mail addresses, message headers, and protocol-level textual error strings.
 
RFC 5735 Special Use IPv4 Addresses
 
Authors:M. Cotton, L. Vegoda.
Date:January 2010
Formats:txt json html
Obsoletes:RFC 3330
Obsoleted by:RFC 6890
Updated by:RFC 6598
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 5735
This document obsoletes RFC 3330. It describes the global and other specialized IPv4 address blocks that have been assigned by theInternet Assigned Numbers Authority (IANA). It does not address IPv4 address space assigned to operators and users through the RegionalInternet Registries, nor does it address IPv4 address space assigned directly by IANA prior to the creation of the Regional InternetRegistries. It also does not address allocations or assignments ofIPv6 addresses or autonomous system numbers.
 
RFC 5736 IANA IPv4 Special Purpose Address Registry
 
Authors:G. Huston, M. Cotton, L. Vegoda.
Date:January 2010
Formats:txt html json
Obsoleted by:RFC 6890
Status:INFORMATIONAL
DOI:10.17487/RFC 5736
This is a direction to IANA concerning the creation and management of the IANA IPv4 Special Purpose Address Registry.
 
RFC 5738 IMAP Support for UTF-8
 
Authors:P. Resnick, C. Newman.
Date:March 2010
Formats:txt json html
Obsoleted by:RFC 6855
Updates:RFC 3501
Status:EXPERIMENTAL
DOI:10.17487/RFC 5738
This specification extends the Internet Message Access Protocol version 4rev1 (IMAP4rev1) to support UTF-8 encoded international characters in user names, mail addresses, and message headers.
 
RFC 5741 RFC Streams, Headers, and Boilerplates
 
Authors:L. Daigle, Ed., O. Kolkman, Ed., IAB.
Date:December 2009
Formats:txt html json
Obsoleted by:RFC 7841
Updates:RFC 2223, RFC 4844
Status:INFORMATIONAL
DOI:10.17487/RFC 5741
RFC documents contain a number of fixed elements such as the title page header, standard boilerplates, and copyright/IPR statements.This document describes them and introduces some updates to reflect current usage and requirements of RFC publication. In particular, this updated structure is intended to communicate clearly the source of RFC creation and review.
 
RFC 5750 Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Certificate Handling
 
Authors:B. Ramsdell, S. Turner.
Date:January 2010
Formats:txt html json
Obsoletes:RFC 3850
Obsoleted by:RFC 8550
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5750
This document specifies conventions for X.509 certificate usage bySecure/Multipurpose Internet Mail Extensions (S/MIME) v3.2 agents.S/MIME provides a method to send and receive secure MIME messages, and certificates are an integral part of S/MIME agent processing.S/MIME agents validate certificates as described in RFC 5280, theInternet X.509 Public Key Infrastructure Certificate and CRL Profile.S/MIME agents must meet the certificate processing requirements in this document as well as those in RFC 5280. This document obsoletesRFC 3850.
 
RFC 5751 Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification
 
Authors:B. Ramsdell, S. Turner.
Date:January 2010
Formats:txt html json
Obsoletes:RFC 3851
Obsoleted by:RFC 8551
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5751
This document defines Secure/Multipurpose Internet Mail Extensions(S/MIME) version 3.2. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin.Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 3851.
 
RFC 5766 Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN)
 
Authors:R. Mahy, P. Matthews, J. Rosenberg.
Date:April 2010
Formats:txt json html
Obsoleted by:RFC 8656
Updated by:RFC 8155, RFC 8553
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5766
If a host is located behind a NAT, then in certain situations it can be impossible for that host to communicate directly with other hosts(peers). In these situations, it is necessary for the host to use the services of an intermediate node that acts as a communication relay. This specification defines a protocol, called TURN (TraversalUsing Relays around NAT), that allows the host to control the operation of the relay and to exchange packets with its peers using the relay. TURN differs from some other relay control protocols in that it allows a client to communicate with multiple peers using a single relay address.

The TURN protocol was designed to be used as part of the ICE(Interactive Connectivity Establishment) approach to NAT traversal, though it also can be used without ICE.

 
RFC 5785 Defining Well-Known Uniform Resource Identifiers (URIs)
 
Authors:M. Nottingham, E. Hammer-Lahav.
Date:April 2010
Formats:txt html json
Obsoleted by:RFC 8615
Updates:RFC 2616, RFC 2818
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5785
This memo defines a path prefix for "well-known locations","/.well-known/", in selected Uniform Resource Identifier (URI) schemes.
 
RFC 5787 OSPFv2 Routing Protocols Extensions for Automatically Switched Optical Network (ASON) Routing
 
Authors:D. Papadimitriou.
Date:March 2010
Formats:txt json html
Obsoleted by:RFC 6827
Status:EXPERIMENTAL
DOI:10.17487/RFC 5787
The ITU-T has defined an architecture and requirements for operating an Automatically Switched Optical Network (ASON).

The Generalized Multiprotocol Label Switching (GMPLS) protocol suite is designed to provide a control plane for a range of network technologies including optical networks such as time division multiplexing (TDM) networks including SONET/SDH and Optical TransportNetworks (OTNs), and lambda switching optical networks.

The requirements for GMPLS routing to satisfy the requirements ofASON routing, and an evaluation of existing GMPLS routing protocols are provided in other documents. This document defines extensions to the OSPFv2 Link State Routing Protocol to meet the requirements for routing in an ASON.

Note that this work is scoped to the requirements and evaluation expressed in RFC 4258 and RFC 4652 and the ITU-T Recommendations current when those documents were written. Future extensions of revisions of this work may be necessary if the ITU-T Recommendations are revised or if new requirements are introduced into a revision ofRFC 4258.

 
RFC 5798 Virtual Router Redundancy Protocol (VRRP) Version 3 for IPv4 and IPv6
 
Authors:S. Nadas, Ed..
Date:March 2010
Formats:txt html json
Obsoletes:RFC 3768
Obsoleted by:RFC 9568
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5798
This memo defines the Virtual Router Redundancy Protocol (VRRP) forIPv4 and IPv6. It is version three (3) of the protocol, and it is based on VRRP (version 2) for IPv4 that is defined in RFC 3768 and in"Virtual Router Redundancy Protocol for IPv6". VRRP specifies an election protocol that dynamically assigns responsibility for a virtual router to one of the VRRP routers on a LAN. The VRRP router controlling the IPv4 or IPv6 address(es) associated with a virtual router is called the Master, and it forwards packets sent to theseIPv4 or IPv6 addresses. VRRP Master routers are configured with virtual IPv4 or IPv6 addresses, and VRRP Backup routers infer the address family of the virtual addresses being carried based on the transport protocol. Within a VRRP router, the virtual routers in each of the IPv4 and IPv6 address families are a domain unto themselves and do not overlap. The election process provides dynamic failover in the forwarding responsibility should the Master become unavailable. For IPv4, the advantage gained from using VRRP is a higher-availability default path without requiring configuration of dynamic routing or router discovery protocols on every end-host. ForIPv6, the advantage gained from using VRRP for IPv6 is a quicker switchover to Backup routers than can be obtained with standard IPv6Neighbor Discovery mechanisms.
 
RFC 5815 Definitions of Managed Objects for IP Flow Information Export
 
Authors:T. Dietz, Ed., A. Kobayashi, B. Claise, G. Muenz.
Date:April 2010
Formats:txt json html
Obsoleted by:RFC 6615
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5815
This document defines managed objects for IP Flow Information eXport(IPFIX). These objects provide information for monitoring IPFIXExporters and IPFIX Collectors including the basic configuration information.
 
RFC 5825 Displaying Downgraded Messages for Email Address Internationalization
 
Authors:K. Fujiwara, B. Leiba.
Date:April 2010
Formats:txt json html
Obsoleted by:RFC 6530
Status:EXPERIMENTAL
DOI:10.17487/RFC 5825
This document describes a method for displaying downgraded messages that originally contained internationalized email addresses or internationalized header fields.
 
RFC 5849 The OAuth 1.0 Protocol
 
Authors:E. Hammer-Lahav, Ed..
Date:April 2010
Formats:txt html json
Obsoleted by:RFC 6749
Status:INFORMATIONAL
DOI:10.17487/RFC 5849
OAuth provides a method for clients to access server resources on behalf of a resource owner (such as a different client or an end- user). It also provides a process for end-users to authorize third- party access to their server resources without sharing their credentials (typically, a username and password pair), using user- agent redirections.
 
RFC 5953 Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)
 
Authors:W. Hardaker.
Date:August 2010
Formats:txt html json
Obsoleted by:RFC 6353
Updated by:RFC 8996
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5953
This document describes a Transport Model for the Simple NetworkManagement Protocol (SNMP), that uses either the Transport LayerSecurity protocol or the Datagram Transport Layer Security (DTLS) protocol. The TLS and DTLS protocols provide authentication and privacy services for SNMP applications. This document describes how the TLS Transport Model (TLSTM) implements the needed features of aSNMP Transport Subsystem to make this protection possible in an interoperable way.

This Transport Model is designed to meet the security and operational needs of network administrators. It supports the sending of SNMP messages over TLS/TCP and DTLS/UDP. The TLS mode can make use ofTCP's improved support for larger packet sizes and the DTLS mode provides potentially superior operation in environments where a connectionless (e.g., UDP) transport is preferred. Both TLS and DTLS integrate well into existing public keying infrastructures.

This document also defines a portion of the Management InformationBase (MIB) for use with network management protocols. In particular, it defines objects for managing the TLS Transport Model for SNMP.

 
RFC 5966 DNS Transport over TCP - Implementation Requirements
 
Authors:R. Bellis.
Date:August 2010
Formats:txt html json
Obsoleted by:RFC 7766
Updates:RFC 1035, RFC 1123
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5966
This document updates the requirements for the support of TCP as a transport protocol for DNS implementations.
 
RFC 5983 Mailing Lists and Internationalized Email Addresses
 
Authors:R. Gellens.
Date:October 2010
Formats:txt html json
Obsoleted by:RFC 6783
Status:EXPERIMENTAL
DOI:10.17487/RFC 5983
This document describes considerations for mailing lists with the introduction of internationalized email addresses.

This document makes some specific recommendations on how mailing lists should act in various situations.

 
RFC 5987 Character Set and Language Encoding for Hypertext Transfer Protocol (HTTP) Header Field Parameters
 
Authors:J. Reschke.
Date:August 2010
Formats:txt html json
Obsoleted by:RFC 8187
Status:HISTORIC
DOI:10.17487/RFC 5987
By default, message header field parameters in Hypertext TransferProtocol (HTTP) messages cannot carry characters outside the ISO-8859-1 character set. RFC 2231 defines an encoding mechanism for use in Multipurpose Internet Mail Extensions (MIME) headers. This document specifies an encoding suitable for use in HTTP header fields that is compatible with a profile of the encoding defined in RFC2231.
 
RFC 5988 Web Linking
 
Authors:M. Nottingham.
Date:October 2010
Formats:txt json html
Obsoleted by:RFC 8288
Updates:RFC 4287
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5988
This document specifies relation types for Web links, and defines a registry for them. It also defines the use of such links in HTTP headers with the Link header field.
 
RFC 5996 Internet Key Exchange Protocol Version 2 (IKEv2)
 
Authors:C. Kaufman, P. Hoffman, Y. Nir, P. Eronen.
Date:September 2010
Formats:txt html json
Obsoletes:RFC 4306, RFC 4718
Obsoleted by:RFC 7296
Updated by:RFC 5998, RFC 6989
Status:PROPOSED STANDARD
DOI:10.17487/RFC 5996
This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations(SAs). This document replaces and updates RFC 4306, and includes all of the clarifications from RFC 4718.
 
RFC 6006 Extensions to the Path Computation Element Communication Protocol (PCEP) for Point-to-Multipoint Traffic Engineering Label Switched Paths
 
Authors:Q. Zhao, Ed., D. King, Ed., F. Verhaeghe, T. Takeda, Z. Ali, J. Meuric.
Date:September 2010
Formats:txt html json
Obsoleted by:RFC 8306
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6006
Point-to-point Multiprotocol Label Switching (MPLS) and GeneralizedMPLS (GMPLS) Traffic Engineering Label Switched Paths (TE LSPs) may be established using signaling techniques, but their paths may first need to be determined. The Path Computation Element (PCE) has been identified as an appropriate technology for the determination of the paths of point-to-multipoint (P2MP) TE LSPs.

This document describes extensions to the PCE communication Protocol(PCEP) to handle requests and responses for the computation of paths for P2MP TE LSPs.

 
RFC 6013 TCP Cookie Transactions (TCPCT)
 
Authors:W. Simpson.
Date:January 2011
Formats:txt html json
Obsoleted by:RFC 7805
Status:HISTORIC
DOI:10.17487/RFC 6013
TCP Cookie Transactions (TCPCT) deter spoofing of connections and prevent resource exhaustion, eliminating Responder (server) state during the initial handshake. The Initiator (client) has sole responsibility for ensuring required delays between connections. The cookie exchange may carry data, limited to inhibit amplification and reflection denial of service attacks.
 
RFC 6021 Common YANG Data Types
 
Authors:J. Schoenwaelder, Ed..
Date:October 2010
Formats:txt json html
Obsoleted by:RFC 6991
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6021
This document introduces a collection of common data types to be used with the YANG data modeling language.
 
RFC 6036 Emerging Service Provider Scenarios for IPv6 Deployment
 
Authors:B. Carpenter, S. Jiang.
Date:October 2010
Formats:txt html json
Obsoleted by:RFC 9386
Status:INFORMATIONAL
DOI:10.17487/RFC 6036
This document describes practices and plans that are emerging amongInternet Service Providers for the deployment of IPv6 services. They are based on practical experience so far, as well as current plans and requirements, reported in a survey of a number of ISPs carried out in early 2010. This document identifies a number of technology gaps, but it does not make recommendations.
 
RFC 6044 Mapping and Interworking of Diversion Information between Diversion and History-Info Headers in the Session Initiation Protocol (SIP)
 
Authors:M. Mohali.
Date:October 2010
Formats:txt html json
Obsoleted by:RFC 7544
Status:INFORMATIONAL
DOI:10.17487/RFC 6044
Although the SIP History-Info header is the solution adopted in IETF, the non-standard Diversion header is nevertheless widely implemented and used for conveying call-diversion-related information in SIP signaling.

This document describes a recommended interworking guideline between the Diversion header and the History-Info header to handle call diversion information. In addition, an interworking policy is proposed to manage the headers' coexistence. The History-Info header is described in RFC 4244 and the non-standard Diversion header is described, as Historic, in RFC 5806.

Since the Diversion header is used in many existing network implementations for the transport of call diversion information, its interworking with the SIP History-Info standardized solution is needed. This work is intended to enable the migration from non- standard implementations and deployment toward IETF specification- based implementations and deployment.

 
RFC 6045 Real-time Inter-network Defense (RID)
 
Authors:K. Moriarty.
Date:November 2010
Formats:txt html json
Obsoleted by:RFC 6545
Status:INFORMATIONAL
DOI:10.17487/RFC 6045
Network security incidents, such as system compromises, worms, viruses, phishing incidents, and denial of service, typically result in the loss of service, data, and resources both human and system.Network providers and Computer Security Incident Response Teams need to be equipped and ready to assist in communicating and tracing security incidents with tools and procedures in place before the occurrence of an attack. Real-time Inter-network Defense (RID) outlines a proactive inter-network communication method to facilitate sharing incident handling data while integrating existing detection, tracing, source identification, and mitigation mechanisms for a complete incident handling solution. Combining these capabilities in a communication system provides a way to achieve higher security levels on networks. Policy guidelines for handling incidents are recommended and can be agreed upon by a consortium using the security recommendations and considerations.

RID has found use within the international research communities, but has not been widely adopted in other sectors. This publication provides the specification to those communities that have adopted it, and communities currently considering solutions for real-time inter- network defense. The specification may also accelerate development of solutions where different transports or message formats are required by leveraging the data elements and structures specified here.

 
RFC 6046 Transport of Real-time Inter-network Defense (RID) Messages
 
Authors:K. Moriarty, B. Trammell.
Date:November 2010
Formats:txt json html
Obsoleted by:RFC 6546
Status:INFORMATIONAL
DOI:10.17487/RFC 6046
The Incident Object Description Exchange Format (IODEF) defines a common XML format for document exchange, and Real-time Inter-networkDefense (RID) defines extensions to IODEF intended for the cooperative handling of security incidents within consortia of network operators and enterprises. This document specifies a transport protocol for RID based upon the passing of RID messages over HTTP/TLS (Transport Layer Security).
 
RFC 6087 Guidelines for Authors and Reviewers of YANG Data Model Documents
 
Authors:A. Bierman.
Date:January 2011
Formats:txt json html
Obsoleted by:RFC 8407
Status:INFORMATIONAL
DOI:10.17487/RFC 6087
This memo provides guidelines for authors and reviewers of StandardsTrack specifications containing YANG data model modules. Applicable portions may be used as a basis for reviews of other YANG data model documents. Recommendations and procedures are defined, which are intended to increase interoperability and usability of NetworkConfiguration Protocol (NETCONF) implementations that utilize YANG data model modules.
 
RFC 6093 On the Implementation of the TCP Urgent Mechanism
 
Authors:F. Gont, A. Yourtchenko.
Date:January 2011
Formats:txt json html
Obsoleted by:RFC 9293
Updates:RFC 0793, RFC 1011, RFC 1122
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6093
This document analyzes how current TCP implementations process TCP urgent indications and how the behavior of some widely deployed middleboxes affects how end systems process urgent indications. This document updates the relevant specifications such that they accommodate current practice in processing TCP urgent indications, raises awareness about the reliability of TCP urgent indications in the Internet, and recommends against the use of urgent indications(but provides advice to applications that do).
 
RFC 6096 Stream Control Transmission Protocol (SCTP) Chunk Flags Registration
 
Authors:M. Tuexen, R. Stewart.
Date:January 2011
Formats:txt json html
Obsoleted by:RFC 9260
Updates:RFC 4960
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6096
This document defines the procedure for registering chunk flags with the Internet Assigned Numbers Authority (IANA) for the Stream ControlTransmission Protocol (SCTP). It updates RFC 4960 and also defines the IANA registry for contents for currently defined chunk types. It does not change SCTP in any other way.
 
RFC 6106 IPv6 Router Advertisement Options for DNS Configuration
 
Authors:J. Jeong, S. Park, L. Beloeil, S. Madanapalli.
Date:November 2010
Formats:txt json html
Obsoletes:RFC 5006
Obsoleted by:RFC 8106
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6106
This document specifies IPv6 Router Advertisement options to allowIPv6 routers to advertise a list of DNS recursive server addresses and a DNS Search List to IPv6 hosts.
 
RFC 6112 Anonymity Support for Kerberos
 
Authors:L. Zhu, P. Leach, S. Hartman.
Date:April 2011
Formats:txt json html
Obsoleted by:RFC 8062
Updates:RFC 4120, RFC 4121, RFC 4556
Status:HISTORIC
DOI:10.17487/RFC 6112
This document defines extensions to the Kerberos protocol to allow aKerberos client to securely communicate with a Kerberos application service without revealing its identity, or without revealing more than its Kerberos realm. It also defines extensions that allow aKerberos client to obtain anonymous credentials without revealing its identity to the Kerberos Key Distribution Center (KDC). This document updates RFCs 4120, 4121, and 4556.
 
RFC 6122 Extensible Messaging and Presence Protocol (XMPP): Address Format
 
Authors:P. Saint-Andre.
Date:March 2011
Formats:txt json html
Obsoleted by:RFC 7622
Updates:RFC 3920
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6122
This document defines the format for addresses used in the ExtensibleMessaging and Presence Protocol (XMPP), including support for non-ASCII characters. This document updates RFC 3920.
 
RFC 6125 Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)
 
Authors:P. Saint-Andre, J. Hodges.
Date:March 2011
Formats:txt html json
Obsoleted by:RFC 9525
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6125
Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509(PKIX) certificates in the context of Transport Layer Security (TLS).This document specifies procedures for representing and verifying the identity of application services in such interactions.
 
RFC 6126 The Babel Routing Protocol
 
Authors:J. Chroboczek.
Date:April 2011
Formats:txt json html
Obsoleted by:RFC 8966
Updated by:RFC 7298, RFC 7557
Status:EXPERIMENTAL
DOI:10.17487/RFC 6126
Babel is a loop-avoiding distance-vector routing protocol that is robust and efficient both in ordinary wired networks and in wireless mesh networks.
 
RFC 6145 IP/ICMP Translation Algorithm
 
Authors:X. Li, C. Bao, F. Baker.
Date:April 2011
Formats:txt json html
Obsoletes:RFC 2765
Obsoleted by:RFC 7915
Updated by:RFC 6791, RFC 7757
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6145
This document describes the Stateless IP/ICMP Translation Algorithm(SIIT), which translates between IPv4 and IPv6 packet headers(including ICMP headers). This document obsoletes RFC 2765.
 
RFC 6156 Traversal Using Relays around NAT (TURN) Extension for IPv6
 
Authors:G. Camarillo, O. Novo, S. Perreault, Ed..
Date:April 2011
Formats:txt html json
Obsoleted by:RFC 8656
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6156
This document adds IPv6 support to Traversal Using Relays around NAT(TURN). IPv6 support in TURN includes IPv4-to-IPv6, IPv6-to-IPv6, and IPv6-to-IPv4 relaying. This document defines the REQUESTED-ADDRESS-FAMILY attribute for TURN. The REQUESTED-ADDRESS-FAMILY attribute allows a client to explicitly request the address type theTURN server will allocate (e.g., an IPv4-only node may request theTURN server to allocate an IPv6 address).
 
RFC 6166 A Registry for PIM Message Types
 
Authors:S. Venaas.
Date:April 2011
Formats:txt html json
Obsoleted by:RFC 8736
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6166
This document provides instructions to IANA for the creation of a registry for PIM message types. It specifies the initial content of the registry, based on existing RFCs specifying PIM message types.It also specifies a procedure for registering new types.

In addition to this, one message type is reserved, and may be used for a future extension of the message type space.

 
RFC 6170 Internet X.509 Public Key Infrastructure -- Certificate Image
 
Authors:S. Santesson, R. Housley, S. Bajaj, L. Rosenthol.
Date:May 2011
Formats:txt json html
Obsoleted by:RFC 9399
Updates:RFC 3709
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6170
This document specifies a method to bind a visual representation of a certificate in the form of a certificate image to a public key certificate as defined in RFC 5280, by defining a new "otherLogos" image type according to RFC 3709.
 
RFC 6195 Domain Name System (DNS) IANA Considerations
 
Authors:D. Eastlake 3rd.
Date:March 2011
Formats:txt json html
Obsoletes:RFC 5395
Obsoleted by:RFC 6895
Updates:RFC 1183, RFC 3597
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 6195
This document specifies Internet Assigned Number Authority (IANA) parameter assignment considerations for the allocation of Domain NameSystem (DNS) resource record types, CLASSes, operation codes, error codes, DNS protocol message header bits, and AFSDB resource record subtypes.
 
RFC 6204 Basic Requirements for IPv6 Customer Edge Routers
 
Authors:H. Singh, W. Beebee, C. Donley, B. Stark, O. Troan, Ed..
Date:April 2011
Formats:txt json html
Obsoleted by:RFC 7084
Status:INFORMATIONAL
DOI:10.17487/RFC 6204
This document specifies requirements for an IPv6 Customer Edge (CE) router. Specifically, the current version of this document focuses on the basic provisioning of an IPv6 CE router and the provisioning of IPv6 hosts attached to it.
 
RFC 6220 Defining the Role and Function of IETF Protocol Parameter Registry Operators
 
Authors:D. McPherson, Ed., O. Kolkman, Ed., J. Klensin, Ed., G. Huston, Ed., Internet Architecture Board.
Date:April 2011
Formats:txt json html
Obsoleted by:RFC 8722
Status:INFORMATIONAL
DOI:10.17487/RFC 6220
Many Internet Engineering Task Force (IETF) protocols make use of commonly defined values that are passed in messages or packets. To ensure consistent interpretation of these values between independent implementations, there is a need to ensure that the values and associated semantic intent are uniquely defined. The IETF uses registry functions to record assigned protocol parameter values and their associated semantic intentions. For each IETF protocol parameter, it is current practice for the IETF to delegate the role of Protocol Parameter Registry Operator to a nominated entity. This document provides a description of, and the requirements for, these delegated functions.
 
RFC 6222 Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs)
 
Authors:A. Begen, C. Perkins, D. Wing.
Date:April 2011
Formats:txt html json
Obsoleted by:RFC 7022
Updates:RFC 3550
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6222
The RTP Control Protocol (RTCP) Canonical Name (CNAME) is a persistent transport-level identifier for an RTP endpoint. While theSynchronization Source (SSRC) identifier of an RTP endpoint may change if a collision is detected or when the RTP application is restarted, its RTCP CNAME is meant to stay unchanged, so that RTP endpoints can be uniquely identified and associated with their RTP media streams. For proper functionality, RTCP CNAMEs should be unique within the participants of an RTP session. However, the existing guidelines for choosing the RTCP CNAME provided in the RTP standard are insufficient to achieve this uniqueness. This memo updates those guidelines to allow endpoints to choose unique RTCPCNAMEs.
 
RFC 6237 IMAP4 Multimailbox SEARCH Extension
 
Authors:B. Leiba, A. Melnikov.
Date:May 2011
Formats:txt html json
Obsoleted by:RFC 7377
Updates:RFC 4466
Status:EXPERIMENTAL
DOI:10.17487/RFC 6237
The IMAP4 specification allows the searching of only the selected mailbox. A user often wants to search multiple mailboxes, and a client that wishes to support this must issue a series of SELECT andSEARCH commands, waiting for each to complete before moving on to the next. This extension allows a client to search multiple mailboxes with one command, limiting the round trips and waiting for various searches to complete, and not requiring disruption of the currently selected mailbox. This extension also uses MAILBOX and TAG fields inESEARCH responses, allowing a client to pipeline the searches if it chooses. This document updates RFC 4466.
 
RFC 6253 Host Identity Protocol Certificates
 
Authors:T. Heer, S. Varjonen.
Date:May 2011
Formats:txt json html
Obsoleted by:RFC 8002
Updates:RFC 5201
Status:EXPERIMENTAL
DOI:10.17487/RFC 6253
The Certificate (CERT) parameter is a container for digital certificates. It is used for carrying these certificates in HostIdentity Protocol (HIP) control packets. This document specifies theCERT parameter and the error signaling in case of a failed verification. Additionally, this document specifies the representations of Host Identity Tags in X.509 version 3 (v3) andSimple Public Key Infrastructure (SPKI) certificates.

The concrete use of certificates, including how certificates are obtained, requested, and which actions are taken upon successful or failed verification, is specific to the scenario in which the certificates are used. Hence, the definition of these scenario- specific aspects is left to the documents that use the CERT parameter.

This document updates RFC 5201.

 
RFC 6277 Online Certificate Status Protocol Algorithm Agility
 
Authors:S. Santesson, P. Hallam-Baker.
Date:June 2011
Formats:txt json html
Obsoleted by:RFC 6960
Updates:RFC 2560
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6277
The Online Certificate Status Protocol (OCSP) requires server responses to be signed but does not specify a mechanism for selecting the signature algorithm to be used. This may lead to avoidable interoperability failures in contexts where multiple signature algorithms are in use. This document specifies rules for server signature algorithm selection and an extension that allows a client to advise a server that specific signature algorithms are supported.
 
RFC 6304 AS112 Nameserver Operations
 
Authors:J. Abley, W. Maton.
Date:July 2011
Formats:txt html json
Obsoleted by:RFC 7534
Status:INFORMATIONAL
DOI:10.17487/RFC 6304
Many sites connected to the Internet make use of IPv4 addresses that are not globally unique. Examples are the addresses designated inRFC 1918 for private use within individual sites.

Devices in such environments may occasionally originate Domain NameSystem (DNS) queries (so-called "reverse lookups") corresponding to those private-use addresses. Since the addresses concerned have only local significance, it is good practice for site administrators to ensure that such queries are answered locally. However, it is not uncommon for such queries to follow the normal delegation path in the public DNS instead of being answered within the site.

It is not possible for public DNS servers to give useful answers to such queries. In addition, due to the wide deployment of private-use addresses and the continuing growth of the Internet, the volume of such queries is large and growing. The AS112 project aims to provide a distributed sink for such queries in order to reduce the load on the IN-ADDR.ARPA authoritative servers. The AS112 project is named after the Autonomous System Number (ASN) that was assigned to it.

This document describes the steps required to install a new AS112 node and offers advice relating to such a node's operation.

 
RFC 6312 Mobile Networks Considerations for IPv6 Deployment
 
Authors:R. Koodli.
Date:July 2011
Formats:txt json html
Obsoleted by:RFC 6342
Status:INFORMATIONAL
DOI:10.17487/RFC 6312
Mobile Internet access from smartphones and other mobile devices is accelerating the exhaustion of IPv4 addresses. IPv6 is widely seen as crucial for the continued operation and growth of the Internet, and in particular, it is critical in mobile networks. This document discusses the issues that arise when deploying IPv6 in mobile networks. Hence, this document can be a useful reference for service providers and network designers.
 
RFC 6326 Transparent Interconnection of Lots of Links (TRILL) Use of IS-IS
 
Authors:D. Eastlake, A. Banerjee, D. Dutt, R. Perlman, A. Ghanwani.
Date:July 2011
Formats:txt json html
Obsoleted by:RFC 7176
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6326
The IETF has standardized the Transparent Interconnection of Lots ofLinks (TRILL) protocol, which provides transparent Layer 2 forwarding using encapsulation with a hop count and IS-IS link state routing.This document specifies the data formats and code points for theIS-IS extensions to support TRILL.
 
RFC 6327 Routing Bridges (RBridges): Adjacency
 
Authors:D. Eastlake 3rd, R. Perlman, A. Ghanwani, D. Dutt, V. Manral.
Date:July 2011
Formats:txt json html
Obsoleted by:RFC 7177
Updates:RFC 6325
Updated by:RFC 7180
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6327
The IETF TRILL (TRansparent Interconnection of Lots of Links) protocol provides optimal pair-wise data forwarding without configuration, safe forwarding even during periods of temporary loops, and support for multipathing of both unicast and multicast traffic. TRILL accomplishes this by using IS-IS (Intermediate System to Intermediate System) link state routing and by encapsulating traffic using a header that includes a hop count. Devices that implement TRILL are called Routing Bridges (RBridges).

TRILL supports multi-access LAN (Local Area Network) links that can have multiple end stations and RBridges attached. This document describes four aspects of the TRILL LAN Hello protocol used on such links, particularly adjacency, designated RBridge selection, and MTU(Maximum Transmission Unit) and pseudonode procedures, with state machines. There is no change for IS-IS point-to-point Hellos used on links configured as point-to-point in TRILL.

 
RFC 6336 IANA Registry for Interactive Connectivity Establishment (ICE) Options
 
Authors:M. Westerlund, C. Perkins.
Date:July 2011
Formats:txt json html
Obsoleted by:RFC 8839
Updates:RFC 5245
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6336
It has been identified that "Interactive Connectivity Establishment(ICE): A Protocol for Network Address Translator (NAT) Traversal forOffer/Answer Protocols" (RFC 5245) is missing a registry for ICE options. This document defines this missing IANA registry and updates RFC 5245.
 
RFC 6347 Datagram Transport Layer Security Version 1.2
 
Authors:E. Rescorla, N. Modadugu.
Date:January 2012
Formats:txt html json
Obsoletes:RFC 4347
Obsoleted by:RFC 9147
Updated by:RFC 7507, RFC 7905, RFC 8996, RFC 9146
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6347
This document specifies version 1.2 of the Datagram Transport LayerSecurity (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updatesDTLS 1.0 to work with TLS version 1.2.
 
RFC 6424 Mechanism for Performing Label Switched Path Ping (LSP Ping) over MPLS Tunnels
 
Authors:N. Bahadur, K. Kompella, G. Swallow.
Date:November 2011
Formats:txt json html
Obsoleted by:RFC 8029
Updates:RFC 4379
Updated by:RFC 7537
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6424
This document describes methods for performing LSP ping (specified inRFC 4379) traceroute over MPLS tunnels and for traceroute of stitchedMPLS Label Switched Paths (LSPs). The techniques outlined in RFC4379 are insufficient to perform traceroute Forwarding EquivalencyClass (FEC) validation and path discovery for an LSP that goes over other MPLS tunnels or for a stitched LSP. This document deprecates the Downstream Mapping TLV (defined in RFC 4379) in favor of a newTLV that, along with other procedures outlined in this document, can be used to trace such LSPs.
 
RFC 6429 TCP Sender Clarification for Persist Condition
 
Authors:M. Bashyam, M. Jethanandani, A. Ramaiah.
Date:December 2011
Formats:txt json html
Obsoleted by:RFC 9293
Status:INFORMATIONAL
DOI:10.17487/RFC 6429
This document clarifies the Zero Window Probes (ZWPs) described inRFC 1122 ("Requirements for Internet Hosts -- Communication Layers").In particular, it clarifies the actions that can be taken on connections that are experiencing the ZWP condition. Rather than making a change to the standard, this document clarifies what has been until now a misinterpretation of the standard as specified inRFC 1122.
 
RFC 6434 IPv6 Node Requirements
 
Authors:E. Jankiewicz, J. Loughney, T. Narten.
Date:December 2011
Formats:txt json html
Obsoletes:RFC 4294
Obsoleted by:RFC 8504
Status:INFORMATIONAL
DOI:10.17487/RFC 6434
This document defines requirements for IPv6 nodes. It is expected that IPv6 will be deployed in a wide range of devices and situations.Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments.

This document obsoletes RFC 4294.

 
RFC 6439 Routing Bridges (RBridges): Appointed Forwarders
 
Authors:R. Perlman, D. Eastlake, Y. Li, A. Banerjee, F. Hu.
Date:November 2011
Formats:txt json html
Obsoleted by:RFC 8139
Updates:RFC 6325
Updated by:RFC 7180
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6439
The IETF TRILL (TRansparent Interconnection of Lots of Links) protocol provides least cost pair-wise data forwarding without configuration in multi-hop networks with arbitrary topology, safe forwarding even during periods of temporary loops, and support for multipathing of both unicast and multicast traffic. TRILL accomplishes this by using IS-IS (Intermediate System to IntermediateSystem) link state routing and by encapsulating traffic using a header that includes a hop count. Devices that implement TRILL are called "RBridges" (Routing Bridges).

TRILL supports multi-access LAN (Local Area Network) links that can have multiple end stations and RBridges attached. Where multipleRBridges are attached to a link, native traffic to and from end stations on that link is handled by a subset of those RBridges called"Appointed Forwarders", with the intent that native traffic in eachVLAN (Virtual LAN) be handled by at most one RBridge. The purpose of this document is to improve the documentation of the AppointedForwarder mechanism; thus, it updates RFC 6325.

 
RFC 6482 A Profile for Route Origin Authorizations (ROAs)
 
Authors:M. Lepinski, S. Kent, D. Kong.
Date:February 2012
Formats:txt json html
Obsoleted by:RFC 9582
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6482
This document defines a standard profile for Route OriginAuthorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block.
 
RFC 6485 The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure (RPKI)
 
Authors:G. Huston.
Date:February 2012
Formats:txt html json
Obsoleted by:RFC 7935
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6485
This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate RevocationLists, and signed objects as well as for the relying parties (RPs) that verify these digital signatures.
 
RFC 6486 Manifests for the Resource Public Key Infrastructure (RPKI)
 
Authors:R. Austein, G. Huston, S. Kent, M. Lepinski.
Date:February 2012
Formats:txt json html
Obsoleted by:RFC 9286
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6486
This document defines a "manifest" for use in the Resource Public KeyInfrastructure (RPKI). A manifest is a signed object (file) that contains a listing of all the signed objects (files) in the repository publication point (directory) associated with an authority responsible for publishing in the repository. For each certificate,Certificate Revocation List (CRL), or other type of signed objects issued by the authority that are published at this repository publication point, the manifest contains both the name of the file containing the object and a hash of the file content. Manifests are intended to enable a relying party (RP) to detect certain forms of attacks against a repository. Specifically, if an RP checks a manifest's contents against the signed objects retrieved from a repository publication point, then the RP can detect "stale" (valid) data and deletion of signed objects.
 
RFC 6490 Resource Public Key Infrastructure (RPKI) Trust Anchor Locator
 
Authors:G. Huston, S. Weiler, G. Michaelson, S. Kent.
Date:February 2012
Formats:txt html json
Obsoleted by:RFC 7730
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6490
This document defines a Trust Anchor Locator (TAL) for the ResourcePublic Key Infrastructure (RPKI).
 
RFC 6506 Supporting Authentication Trailer for OSPFv3
 
Authors:M. Bhatia, V. Manral, A. Lindem.
Date:February 2012
Formats:txt json html
Obsoleted by:RFC 7166
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6506
Currently, OSPF for IPv6 (OSPFv3) uses IPsec as the only mechanism for authenticating protocol packets. This behavior is different from authentication mechanisms present in other routing protocols (OSPFv2,Intermediate System to Intermediate System (IS-IS), RIP, and RoutingInformation Protocol Next Generation (RIPng)). In some environments, it has been found that IPsec is difficult to configure and maintain and thus cannot be used. This document defines an alternative mechanism to authenticate OSPFv3 protocol packets so that OSPFv3 does not only depend upon IPsec for authentication.
 
RFC 6528 Defending against Sequence Number Attacks
 
Authors:F. Gont, S. Bellovin.
Date:February 2012
Formats:txt html json
Obsoletes:RFC 1948
Obsoleted by:RFC 9293
Updates:RFC 0793
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6528
This document specifies an algorithm for the generation of TCPInitial Sequence Numbers (ISNs), such that the chances of an off-path attacker guessing the sequence numbers in use by a target connection are reduced. This document revises (and formally obsoletes) RFC1948, and takes the ISN generation algorithm originally proposed in that document to Standards Track, formally updating RFC 793.
 
RFC 6536 Network Configuration Protocol (NETCONF) Access Control Model
 
Authors:A. Bierman, M. Bjorklund.
Date:March 2012
Formats:txt json html
Obsoleted by:RFC 8341
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6536
The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF protocol access for particular users to a pre-configured subset of all available NETCONF protocol operations and content. This document defines such an access control model.
 
RFC 6548 Independent Submission Editor Model
 
Authors:N. Brownlee, Ed., IAB.
Date:June 2012
Formats:txt json html
Obsoletes:RFC 5620
Obsoleted by:RFC 8730
Status:INFORMATIONAL
DOI:10.17487/RFC 6548
This document describes the function and responsibilities of the RFCIndependent Submission Editor (ISE). The Independent Submission stream is one of the stream producers that create draft RFCs, with the ISE as its stream approver. The ISE is overall responsible for activities within the Independent Submission stream, working with draft editors and reviewers, and interacts with the RFC ProductionCenter and Publisher, and the RFC Series Editor (RSE). The ISE is appointed by the IAB, and also interacts with the IETF AdministrativeOversight Committee (IAOC).
 
RFC 6555 Happy Eyeballs: Success with Dual-Stack Hosts
 
Authors:D. Wing, A. Yourtchenko.
Date:April 2012
Formats:txt json html
Obsoleted by:RFC 8305
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6555
When a server's IPv4 path and protocol are working, but the server'sIPv6 path and protocol are not working, a dual-stack client application experiences significant connection delay compared to anIPv4-only client. This is undesirable because it causes the dual- stack client to have a worse user experience. This document specifies requirements for algorithms that reduce this user-visible delay and provides an algorithm.
 
RFC 6577 Authentication-Results Registration Update for Sender Policy Framework (SPF) Results
 
Authors:M. Kucherawy.
Date:March 2012
Formats:txt html json
Obsoleted by:RFC 7001
Updates:RFC 5451
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6577
This memo updates the registry of authentication method results inAuthentication-Results: message header fields, correcting a discontinuity between the original registry creation and the SenderPolicy Framework (SPF) specification.

This memo updates RFC 5451.

 
RFC 6622 Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs)
 
Authors:U. Herberg, T. Clausen.
Date:May 2012
Formats:txt html json
Obsoleted by:RFC 7182
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6622
This document describes general and flexible TLVs for representing cryptographic Integrity Check Values (ICVs) (i.e., digital signatures or Message Authentication Codes (MACs)) as well as timestamps, using the generalized Mobile Ad Hoc Network (MANET) packet/message format defined in RFC 5444. It defines two Packet TLVs, two Message TLVs, and two Address Block TLVs for affixing ICVs and timestamps to a packet, a message, and an address, respectively.
 
RFC 6635 RFC Editor Model (Version 2)
 
Authors:O. Kolkman, Ed., J. Halpern, Ed., IAB.
Date:June 2012
Formats:txt json html
Obsoletes:RFC 5620
Obsoleted by:RFC 8728
Status:INFORMATIONAL
DOI:10.17487/RFC 6635
The RFC Editor model described in this document divides the responsibilities for the RFC Series into three functions: the RFCSeries Editor, the RFC Production Center, and the RFC Publisher.Internet Architecture Board (IAB) oversight via the RFC SeriesOversight Committee (RSOC) is described, as is the relationship between the IETF Administrative Oversight Committee (IAOC) and theRSOC. This document reflects the experience gained with "RFC EditorModel (Version 1)", documented in RFC 5620, and obsoletes that document.
 
RFC 6637 Elliptic Curve Cryptography (ECC) in OpenPGP
 
Authors:A. Jivsov.
Date:June 2012
Formats:txt html json
Obsoleted by:RFC 9580
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6637
This document defines an Elliptic Curve Cryptography extension to theOpenPGP public key format and specifies three Elliptic Curves that enjoy broad support by other standards, including standards published by the US National Institute of Standards and Technology. The document specifies the conventions for interoperability between compliant OpenPGP implementations that make use of this extension and these Elliptic Curves.
 
RFC 6685 Expert Review for Incident Object Description Exchange Format (IODEF) Extensions in IANA XML Registry
 
Authors:B. Trammell.
Date:July 2012
Formats:txt html json
Obsoleted by:RFC 7970
Updates:RFC 5070
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6685
This document specifies restrictions on additions to the subset of the IANA XML Namespace and Schema registries, to require ExpertReview for extensions to Incident Object Description Exchange Format(IODEF).
 
RFC 6691 TCP Options and Maximum Segment Size (MSS)
 
Authors:D. Borman.
Date:July 2012
Formats:txt html json
Obsoleted by:RFC 9293
Updates:RFC 0879, RFC 2385
Status:INFORMATIONAL
DOI:10.17487/RFC 6691
This memo discusses what value to use with the TCP Maximum SegmentSize (MSS) option, and updates RFC 879 and RFC 2385.
 
RFC 6722 Publishing the "Tao of the IETF" as a Web Page
 
Authors:P. Hoffman, Ed..
Date:August 2012
Formats:txt json html
Obsoletes:RFC 4677
Obsoleted by:RFC 9592
Status:INFORMATIONAL
DOI:10.17487/RFC 6722
This document describes how the "Tao of the IETF", which has been published as a series of RFCs in the past, is instead being published as a web page. It also contains the procedure for publishing and editing that web page.
 
RFC 6723 Update of the Pseudowire Control-Word Negotiation Mechanism
 
Authors:L. Jin, Ed., R. Key, Ed., S. Delord, T. Nadeau, S. Boutros.
Date:September 2012
Formats:txt json html
Obsoleted by:RFC 8077
Updates:RFC 4447, RFC 6073
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6723
The control-word negotiation mechanism specified in RFC 4447 has a problem when a PE (Provider Edge) changes the preference for the use of the control word from NOT PREFERRED to PREFERRED. This document updates RFC 4447 and RFC 6073 by adding the Label Request message to resolve this control-word negotiation issue for single-segment and multi-segment pseudowires.
 
RFC 6732 6to4 Provider Managed Tunnels
 
Authors:V. Kuarsingh, Ed., Y. Lee, O. Vautrin.
Date:September 2012
Formats:txt json html
Obsoleted by:RFC 7526
Status:HISTORIC
DOI:10.17487/RFC 6732
6to4 Provider Managed Tunnels (6to4-PMT) provide a framework that can help manage 6to4 tunnels operating in an anycast configuration. The6to4-PMT framework is intended to serve as an option for operators to help improve the experience of 6to4 operation when conditions of the network may provide sub-optimal performance or break normal 6to4 operation. 6to4-PMT supplies a stable provider prefix and forwarding environment by utilizing existing 6to4 relays with an added function of IPv6 Prefix Translation. This operation may be particularly important in NAT444 infrastructures where a customer endpoint may be assigned a non-RFC1918 address, thus breaking the return path for anycast-based 6to4 operation. 6to4-PMT has been successfully used in a production network, implemented as open source code, and implemented by a major routing vendor.
 
RFC 6779 Definition of Managed Objects for the Neighborhood Discovery Protocol
 
Authors:U. Herberg, R. Cole, I. Chakeres.
Date:October 2012
Formats:txt json html
Obsoleted by:RFC 7939
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6779
This document defines a portion of the Management Information Base(MIB) for use with network management protocols in the Internet community. In particular, it describes objects for configuring parameters of the Neighborhood Discovery Protocol (NHDP) process on a router. The MIB module defined in this document, denoted NHDP-MIB, also reports state, performance information, and notifications aboutNHDP. This additional state and performance information is useful to troubleshoot problems and performance issues during neighbor discovery.
 
RFC 6822 IS-IS Multi-Instance
 
Authors:S. Previdi, Ed., L. Ginsberg, M. Shand, A. Roy, D. Ward.
Date:December 2012
Formats:txt json html
Obsoleted by:RFC 8202
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6822
This document describes a mechanism that allows a single router to share one or more circuits among multiple Intermediate System toIntermediate System (IS-IS) routing protocol instances.

Multiple instances allow the isolation of resources associated with each instance. Routers will form instance-specific adjacencies.Each instance can support multiple topologies. Each topology has a unique Link State Database (LSDB). Each Protocol Data Unit (PDU) will contain a new Type-Length-Value (TLV) identifying the instance and the topology (or topologies) to which the PDU belongs.

 
RFC 6824 TCP Extensions for Multipath Operation with Multiple Addresses
 
Authors:A. Ford, C. Raiciu, M. Handley, O. Bonaventure.
Date:January 2013
Formats:txt html json
Obsoleted by:RFC 8684
Status:EXPERIMENTAL
DOI:10.17487/RFC 6824
TCP/IP communication is currently restricted to a single path per connection, yet multiple paths often exist between peers. The simultaneous use of these multiple paths for a TCP/IP session would improve resource usage within the network and, thus, improve user experience through higher throughput and improved resilience to network failure.

Multipath TCP provides the ability to simultaneously use multiple paths between peers. This document presents a set of extensions to traditional TCP to support multipath operation. The protocol offers the same type of service to applications as TCP (i.e., reliable bytestream), and it provides the components necessary to establish and use multiple TCP flows across potentially disjoint paths.

 
RFC 6829 Label Switched Path (LSP) Ping for Pseudowire Forwarding Equivalence Classes (FECs) Advertised over IPv6
 
Authors:M. Chen, P. Pan, C. Pignataro, R. Asati.
Date:January 2013
Formats:txt html json
Obsoleted by:RFC 8029
Updates:RFC 4379
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6829
The Multiprotocol Label Switching (MPLS) Label Switched Path (LSP)Ping and traceroute mechanisms are commonly used to detect and isolate data-plane failures in all MPLS LSPs, including LSPs used for each direction of an MPLS Pseudowire (PW). However, the LSP Ping and traceroute elements used for PWs are not specified for IPv6 address usage.

This document extends the PW LSP Ping and traceroute mechanisms so they can be used with PWs that are set up and maintained using IPv6LDP sessions. This document updates RFC 4379.

 
RFC 6830 The Locator/ID Separation Protocol (LISP)
 
Authors:D. Farinacci, V. Fuller, D. Meyer, D. Lewis.
Date:January 2013
Formats:txt html json
Obsoleted by:RFC 9300, RFC 9301
Updated by:RFC 8113
Status:EXPERIMENTAL
DOI:10.17487/RFC 6830
This document describes a network-layer-based protocol that enables separation of IP addresses into two new numbering spaces: EndpointIdentifiers (EIDs) and Routing Locators (RLOCs). No changes are required to either host protocol stacks or to the "core" of theInternet infrastructure. The Locator/ID Separation Protocol (LISP) can be incrementally deployed, without a "flag day", and offersTraffic Engineering, multihoming, and mobility benefits to early adopters, even when there are relatively few LISP-capable sites.

Design and development of LISP was largely motivated by the problem statement produced by the October 2006 IAB Routing and AddressingWorkshop.

 
RFC 6833 Locator/ID Separation Protocol (LISP) Map-Server Interface
 
Authors:V. Fuller, D. Farinacci.
Date:January 2013
Formats:txt json html
Obsoleted by:RFC 9301
Status:EXPERIMENTAL
DOI:10.17487/RFC 6833
This document describes the Mapping Service for the Locator/IDSeparation Protocol (LISP), implemented by two new types of LISP- speaking devices -- the LISP Map-Resolver and LISP Map-Server -- that provides a simplified "front end" for one or more Endpoint ID toRouting Locator mapping databases.

By using this service interface and communicating with Map-Resolvers and Map-Servers, LISP Ingress Tunnel Routers and Egress TunnelRouters are not dependent on the details of mapping database systems, which facilitates experimentation with different database designs.Since these devices implement the "edge" of the LISP infrastructure, connect directly to LISP-capable Internet end sites, and comprise the bulk of LISP-speaking devices, reducing their implementation and operational complexity should also reduce the overall cost and effort of deploying LISP.

 
RFC 6834 Locator/ID Separation Protocol (LISP) Map-Versioning
 
Authors:L. Iannone, D. Saucez, O. Bonaventure.
Date:January 2013
Formats:txt html json
Obsoleted by:RFC 9302
Status:EXPERIMENTAL
DOI:10.17487/RFC 6834
This document describes the LISP (Locator/ID Separation Protocol)Map-Versioning mechanism, which provides in-packet information aboutEndpoint ID to Routing Locator (EID-to-RLOC) mappings used to encapsulate LISP data packets. The proposed approach is based on associating a version number to EID-to-RLOC mappings and the transport of such a version number in the LISP-specific header ofLISP-encapsulated packets. LISP Map-Versioning is particularly useful to inform communicating Ingress Tunnel Routers (ITRs) andEgress Tunnel Routers (ETRs) about modifications of the mappings used to encapsulate packets. The mechanism is transparent to implementations not supporting this feature, since in the LISP- specific header and in the Map Records, bits used for Map-Versioning can be safely ignored by ITRs and ETRs that do not support the mechanism.
 
RFC 6844 DNS Certification Authority Authorization (CAA) Resource Record
 
Authors:P. Hallam-Baker, R. Stradling.
Date:January 2013
Formats:txt json html
Obsoleted by:RFC 8659
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6844
The Certification Authority Authorization (CAA) DNS Resource Record allows a DNS domain name holder to specify one or more CertificationAuthorities (CAs) authorized to issue certificates for that domain.CAA Resource Records allow a public Certification Authority to implement additional controls to reduce the risk of unintended certificate mis-issue. This document defines the syntax of the CAA record and rules for processing CAA records by certificate issuers.
 
RFC 6859 Update to RFC 3777 to Clarify Nominating Committee Eligibility of IETF Leadership
 
Authors:B. Leiba.
Date:January 2013
Formats:txt json html
Obsoleted by:RFC 7437
Updates:RFC 3777
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 6859
RFC 3777 specifies that "sitting members" of the IAB and IESG "may not volunteer to serve on the nominating committee". Since the time that document was written, the IETF Administrative OversightCommittee (IAOC) was formed; that body is not covered by RFC 3777.There is also ambiguity in RFC 3777 about whether ex officio members and liaisons are included as "sitting members". This document updates RFC 3777 to clarify the rules as they apply to members of theIAB, the IESG, and the IAOC.
 
RFC 6931 Additional XML Security Uniform Resource Identifiers (URIs)
 
Authors:D. Eastlake 3rd.
Date:April 2013
Formats:txt json html
Obsoletes:RFC 4051
Obsoleted by:RFC 9231
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6931
This document expands, updates, and establishes an IANA registry for the list of URIs intended for use with XML digital signatures, encryption, canonicalization, and key management. These URIs identify algorithms and types of information. This document obsoletes RFC 4051.
 
RFC 6944 Applicability Statement: DNS Security (DNSSEC) DNSKEY Algorithm Implementation Status
 
Authors:S. Rose.
Date:April 2013
Formats:txt html json
Obsoleted by:RFC 8624
Updates:RFC 2536, RFC 2539, RFC 3110, RFC 4034, RFC 4398, RFC 5155, RFC 5702, RFC 5933
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6944
The DNS Security Extensions (DNSSEC) requires the use of cryptographic algorithm suites for generating digital signatures overDNS data. There is currently an IANA registry for these algorithms, but there is no record of the recommended implementation status of each algorithm. This document provides an applicability statement on algorithm implementation status for DNSSEC component software. This document lists each algorithm's status based on the current reference. In the case that an algorithm is specified without an implementation status, this document assigns one. This document updates RFCs 2536, 2539, 3110, 4034, 4398, 5155, 5702, and 5933.
 
RFC 6961 The Transport Layer Security (TLS) Multiple Certificate Status Request Extension
 
Authors:Y. Pettersen.
Date:June 2013
Formats:txt html json
Obsoleted by:RFC 8446
Status:PROPOSED STANDARD
DOI:10.17487/RFC 6961
This document defines the Transport Layer Security (TLS) CertificateStatus Version 2 Extension to allow clients to specify and support several certificate status methods. (The use of the CertificateStatus extension is commonly referred to as "OCSP stapling".) Also defined is a new method based on the Online Certificate StatusProtocol (OCSP) that servers can use to provide status information about not only the server's own certificate but also the status of intermediate certificates in the chain.
 
RFC 6962 Certificate Transparency
 
Authors:B. Laurie, A. Langley, E. Kasper.
Date:June 2013
Formats:txt json html
Obsoleted by:RFC 9162
Status:EXPERIMENTAL
DOI:10.17487/RFC 6962
This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcingCAs to add all issued certificates to the logs.

Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.

 
RFC 6982 Improving Awareness of Running Code: The Implementation Status Section
 
Authors:Y. Sheffer, A. Farrel.
Date:July 2013
Formats:txt json html
Obsoleted by:RFC 7942
Status:EXPERIMENTAL
DOI:10.17487/RFC 6982
This document describes a simple process that allows authors ofInternet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.

The process in this document is offered as an experiment. Authors ofInternet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. The authors of this document intend to collate experiences with this experiment and to report them to the community.

 
RFC 7001 Message Header Field for Indicating Message Authentication Status
 
Authors:M. Kucherawy.
Date:September 2013
Formats:txt json html
Obsoletes:RFC 5451, RFC 6577
Obsoleted by:RFC 7601
Updated by:RFC 7410
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7001
This document specifies a message header field called Authentication-Results for use with electronic mail messages to indicate the results of message authentication efforts. Any receiver-side software, such as mail filters or Mail User Agents (MUAs), can use this header field to relay that information in a convenient and meaningful way to users or to make sorting and filtering decisions.
 
RFC 7042 IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters
 
Authors:D. Eastlake 3rd, J. Abley.
Date:October 2013
Formats:txt json html
Obsoletes:RFC 5342
Obsoleted by:RFC 9542
Updates:RFC 2153
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 7042
Some IETF protocols make use of Ethernet frame formats and IEEE 802 parameters. This document discusses several uses of such parameters in IETF protocols, specifies IANA considerations for assignment of points under the IANA OUI (Organizationally Unique Identifier), and provides some values for use in documentation. This document obsoletes RFC 5342.
 
RFC 7049 Concise Binary Object Representation (CBOR)
 
Authors:C. Bormann, P. Hoffman.
Date:October 2013
Formats:txt html json
Obsoleted by:RFC 8949
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7049
The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.
 
RFC 7053 SACK-IMMEDIATELY Extension for the Stream Control Transmission Protocol
 
Authors:M. Tuexen, I. Ruengeler, R. Stewart.
Date:November 2013
Formats:txt json html
Obsoleted by:RFC 9260
Updates:RFC 4960
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7053
This document updates RFC 4960 by defining a method for the sender of a DATA chunk to indicate that the corresponding SelectiveAcknowledgment (SACK) chunk should be sent back immediately and should not be delayed. It is done by specifying a bit in the DATA chunk header, called the (I)mmediate bit, which can get set by either the Stream Control Transmission Protocol (SCTP) implementation or the application using an SCTP stack. Since unknown flags in chunk headers are ignored by SCTP implementations, this extension does not introduce any interoperability problems.
 
RFC 7083 Modification to Default Values of SOL_MAX_RT and INF_MAX_RT
 
Authors:R. Droms.
Date:November 2013
Formats:txt json html
Obsoleted by:RFC 8415
Updates:RFC 3315
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7083
This document updates RFC 3315 by redefining the default values forSOL_MAX_RT and INF_MAX_RT and defining options through which a DHCPv6 server can override the client's default value for SOL_MAX_RT andINF_MAX_RT with new values.
 
RFC 7125 Revision of the tcpControlBits IP Flow Information Export (IPFIX) Information Element
 
Authors:B. Trammell, P. Aitken.
Date:February 2014
Formats:txt html json
Obsoleted by:RFC 9565
Status:INFORMATIONAL
DOI:10.17487/RFC 7125
This document revises the tcpControlBits IP Flow Information Export(IPFIX) Information Element as originally defined in RFC 5102 to reflect changes to the TCP Flags header field since RFC 793.
 
RFC 7150 Conveying Vendor-Specific Constraints in the Path Computation Element Communication Protocol
 
Authors:F. Zhang, A. Farrel.
Date:March 2014
Formats:txt json html
Obsoleted by:RFC 7470
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7150
The Path Computation Element communication Protocol (PCEP) is used to convey path computation requests and responses both between PathComputation Clients (PCCs) and Path Computation Elements (PCEs) and between cooperating PCEs. In PCEP, the path computation requests carry details of the constraints and objective functions that the PCC wishes the PCE to apply in its computation.

This document defines a facility to carry vendor-specific information in PCEP using a dedicated object and a new Type-Length-Variable that can be carried in any existing PCEP object.

 
RFC 7158 The JavaScript Object Notation (JSON) Data Interchange Format
 
Authors:T. Bray, Ed..
Date:March 2014
Formats:txt json html
Obsoleted by:RFC 7159
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7158
JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.

This document removes inconsistencies with other specifications ofJSON, repairs specification errors, and offers experience-based interoperability guidance.

 
RFC 7159 The JavaScript Object Notation (JSON) Data Interchange Format
 
Authors:T. Bray, Ed..
Date:March 2014
Formats:txt json html
Obsoletes:RFC 4627, RFC 7158
Obsoleted by:RFC 8259
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7159
JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.

This document removes inconsistencies with other specifications ofJSON, repairs specification errors, and offers experience-based interoperability guidance.

 
RFC 7180 Transparent Interconnection of Lots of Links (TRILL): Clarifications, Corrections, and Updates
 
Authors:D. Eastlake 3rd, M. Zhang, A. Ghanwani, V. Manral, A. Banerjee.
Date:May 2014
Formats:txt json html
Obsoleted by:RFC 7780
Updates:RFC 6325, RFC 6327, RFC 6439
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7180
The IETF Transparent Interconnection of Lots of Links (TRILL) protocol provides least-cost pair-wise data forwarding without configuration in multi-hop networks with arbitrary topology and link technology, safe forwarding even during periods of temporary loops, and support for multipathing of both unicast and multicast traffic.TRILL accomplishes this by using Intermediate System to IntermediateSystem (IS-IS) link-state routing and by encapsulating traffic using a header that includes a hop count. Since publication of the TRILL base protocol in July 2011, active development of TRILL has revealed errata in RFC 6325 and some cases that could use clarifications or updates.

RFCs 6327 and 6439 provide clarifications and updates with respect to adjacency and Appointed Forwarders. This document provides other known clarifications, corrections, and updates to RFCs 6325, 6327, and 6439.

 
RFC 7223 A YANG Data Model for Interface Management
 
Authors:M. Bjorklund.
Date:May 2014
Formats:txt html json
Obsoleted by:RFC 8343
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7223
This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document.The data model includes configuration data and state data (status information and counters for the collection of statistics).
 
RFC 7230 Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing
 
Authors:R. Fielding, Ed., J. Reschke, Ed..
Date:June 2014
Formats:txt json html
Obsoletes:RFC 2145, RFC 2616
Obsoleted by:RFC 9110, RFC 9112
Updates:RFC 2817, RFC 2818
Updated by:RFC 8615
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7230
The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document provides an overview of HTTP architecture and its associated terminology, defines the "http" and "https" UniformResource Identifier (URI) schemes, defines the HTTP/1.1 message syntax and parsing requirements, and describes related security concerns for implementations.
 
RFC 7231 Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content
 
Authors:R. Fielding, Ed., J. Reschke, Ed..
Date:June 2014
Formats:txt json html
Obsoletes:RFC 2616
Obsoleted by:RFC 9110
Updates:RFC 2817
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7231
The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document defines the semantics of HTTP/1.1 messages, as expressed by request methods, request header fields, response status codes, and response header fields, along with the payload of messages (metadata and body content) and mechanisms for content negotiation.
 
RFC 7232 Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests
 
Authors:R. Fielding, Ed., J. Reschke, Ed..
Date:June 2014
Formats:txt html json
Obsoletes:RFC 2616
Obsoleted by:RFC 9110
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7232
The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP/1.1 conditional requests, including metadata header fields for indicating state changes, request header fields for making preconditions on such state, and rules for constructing the responses to a conditional request when one or more preconditions evaluate to false.
 
RFC 7233 Hypertext Transfer Protocol (HTTP/1.1): Range Requests
 
Authors:R. Fielding, Ed., Y. Lafon, Ed., J. Reschke, Ed..
Date:June 2014
Formats:txt html json
Obsoletes:RFC 2616
Obsoleted by:RFC 9110
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7233
The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document defines range requests and the rules for constructing and combining responses to those requests.
 
RFC 7234 Hypertext Transfer Protocol (HTTP/1.1): Caching
 
Authors:R. Fielding, Ed., M. Nottingham, Ed., J. Reschke, Ed..
Date:June 2014
Formats:txt json html
Obsoletes:RFC 2616
Obsoleted by:RFC 9111
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7234
The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.
 
RFC 7235 Hypertext Transfer Protocol (HTTP/1.1): Authentication
 
Authors:R. Fielding, Ed., J. Reschke, Ed..
Date:June 2014
Formats:txt json html
Obsoletes:RFC 2616, RFC 2617
Obsoleted by:RFC 9110
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7235
The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypermedia information systems. This document defines the HTTP Authentication framework.
 
RFC 7238 The Hypertext Transfer Protocol Status Code 308 (Permanent Redirect)
 
Authors:J. Reschke.
Date:June 2014
Formats:txt json html
Obsoleted by:RFC 7538
Status:EXPERIMENTAL
DOI:10.17487/RFC 7238
This document specifies the additional Hypertext Transfer Protocol(HTTP) status code 308 (Permanent Redirect).
 
RFC 7248 Interworking between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP): Presence
 
Authors:P. Saint-Andre, A. Houri, J. Hildebrand.
Date:May 2014
Formats:txt html json
Obsoleted by:RFC 8048
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7248
This document defines a bidirectional protocol mapping for the exchange of presence information between the Session InitiationProtocol (SIP) and the Extensible Messaging and Presence Protocol(XMPP).
 
RFC 7277 A YANG Data Model for IP Management
 
Authors:M. Bjorklund.
Date:June 2014
Formats:txt json html
Obsoleted by:RFC 8344
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7277
This document defines a YANG data model for management of IP implementations. The data model includes configuration data and state data.
 
RFC 7283 Handling Unknown DHCPv6 Messages
 
Authors:Y. Cui, Q. Sun, T. Lemon.
Date:July 2014
Formats:txt json html
Obsoleted by:RFC 8415
Updates:RFC 3315
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7283
DHCPv6 is not specific about handling messages with unknown types.This memo describes the problems associated with receiving DHCPv6 messages with unknown types, and defines how a DHCPv6 server, client, or relay agent should behave when receiving unknown DHCPv6 messages.This document also provides advice for authors of future documents that define new messages to be sent from DHCP servers to DHCP relay agents. This document updates RFC 3315.
 
RFC 7298 Babel Hashed Message Authentication Code (HMAC) Cryptographic Authentication
 
Authors:D. Ovsienko.
Date:July 2014
Formats:txt html json
Obsoleted by:RFC 8967
Updates:RFC 6126
Status:EXPERIMENTAL
DOI:10.17487/RFC 7298
This document describes a cryptographic authentication mechanism for the Babel routing protocol. This document updates RFC 6126. The mechanism allocates two new TLV types for the authentication data, uses Hashed Message Authentication Code (HMAC), and is both optional and backward compatible.
 
RFC 7302 Entertainment Identifier Registry (EIDR) URN Namespace Definition
 
Authors:P. Lemieux.
Date:July 2014
Formats:txt json html
Obsoleted by:RFC 7972
Status:INFORMATIONAL
DOI:10.17487/RFC 7302
Entertainment Identifier Registry (EIDR) Identifiers are used for the globally unique identification of motion picture and television content. This document defines the formal Uniform Resource Name(URN) Namespace Identifier (NID) for EIDR Identifiers.
 
RFC 7320 URI Design and Ownership
 
Authors:M. Nottingham.
Date:July 2014
Formats:txt html json
Obsoleted by:RFC 8820
Updates:RFC 3986
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 7320
Section 1.1.1 of RFC 3986 defines URI syntax as "a federated and extensible naming system wherein each scheme's specification may further restrict the syntax and semantics of identifiers using that scheme." In other words, the structure of a URI is defined by its scheme. While it is common for schemes to further delegate their substructure to the URI's owner, publishing independent standards that mandate particular forms of URI substructure is inappropriate, because that essentially usurps ownership. This document further describes this problematic practice and provides some acceptable alternatives for use in standards.
 
RFC 7321 Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)
 
Authors:D. McGrew, P. Hoffman.
Date:August 2014
Formats:txt html json
Obsoletes:RFC 4835
Obsoleted by:RFC 8221
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7321
This document updates the Cryptographic Algorithm ImplementationRequirements for the Encapsulating Security Payload (ESP) andAuthentication Header (AH). It also adds usage guidance to help in the selection of these algorithms.

ESP and AH protocols make use of various cryptographic algorithms to provide confidentiality and/or data origin authentication to protected data communications in the IP Security (IPsec) architecture. To ensure interoperability between disparate implementations, the IPsec standard specifies a set of mandatory-to- implement algorithms. This document specifies the current set of mandatory-to-implement algorithms for ESP and AH, specifies algorithms that should be implemented because they may be promoted to mandatory at some future time, and also recommends against the implementation of some obsolete algorithms. Usage guidance is also provided to help the user of ESP and AH best achieve their security goals through appropriate choices of cryptographic algorithms.

This document obsoletes RFC 4835.

 
RFC 7329 A Session Identifier for the Session Initiation Protocol (SIP)
 
Authors:H. Kaplan.
Date:August 2014
Formats:txt html json
Obsoleted by:RFC 7989
Status:INFORMATIONAL
DOI:10.17487/RFC 7329
There is a need for having a globally unique session identifier for the same SIP session that can be consistently maintained across SIPProxies, Back-to-Back User Agents (B2BUAs), and other SIP middleboxes, for the purpose of troubleshooting. This document proposes a new SIP header to carry such a value: Session-ID.

The mechanism defined in this document has been widely deployed, and is being followed in a backward-compatible fashion for a newStandards Track document produced by the INSIPID Working Group.

 
RFC 7386 JSON Merge Patch
 
Authors:P. Hoffman, J. Snell.
Date:October 2014
Formats:txt html json
Obsoleted by:RFC 7396
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7386
This specification defines the JSON merge patch format and processing rules. The merge patch format is primarily intended for use with theHTTP PATCH method as a means of describing a set of modifications to a target resource's content.
 
RFC 7410 A Property Types Registry for the Authentication-Results Header Field
 
Authors:M. Kucherawy.
Date:December 2014
Formats:txt json html
Obsoleted by:RFC 7601
Updates:RFC 7001
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7410
This document updates RFC 7001 by creating a registry for property types in the Authentication-Results header field, used in email authentication work, rather than limiting participants to using the original, small set of fixed values.
 
RFC 7437 IAB, IESG, and IAOC Selection, Confirmation, and Recall Process: Operation of the Nominating and Recall Committees
 
Authors:M. Kucherawy, Ed..
Date:January 2015
Formats:txt html json
Obsoletes:RFC 3777, RFC 5078, RFC 5633, RFC 5680, RFC 6859
Obsoleted by:RFC 8713
Updated by:RFC 8318
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 7437
The process by which the members of the IAB and IESG, and some members of the IAOC, are selected, confirmed, and recalled is specified in this document. This document is a self-consistent, organized compilation of the process as it was known at the time of publication of RFC 3777, with various updates since that version was published.
 
RFC 7482 Registration Data Access Protocol (RDAP) Query Format
 
Authors:A. Newton, S. Hollenbeck.
Date:March 2015
Formats:txt json html
Obsoleted by:RFC 9082
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7482
This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries(including both Regional Internet Registries (RIRs) and Domain NameRegistries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration DataAccess Protocol (RDAP).
 
RFC 7483 JSON Responses for the Registration Data Access Protocol (RDAP)
 
Authors:A. Newton, S. Hollenbeck.
Date:March 2015
Formats:txt json html
Obsoleted by:RFC 9083
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7483
This document describes JSON data structures representing registration information maintained by Regional Internet Registries(RIRs) and Domain Name Registries (DNRs). These data structures are used to form Registration Data Access Protocol (RDAP) query responses.
 
RFC 7484 Finding the Authoritative Registration Data (RDAP) Service
 
Authors:M. Blanchet.
Date:March 2015
Formats:txt html json
Obsoleted by:RFC 9224
Updated by:RFC 8521
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7484
This document specifies a method to find which Registration DataAccess Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or AutonomousSystem numbers.
 
RFC 7500 Principles for Operation of Internet Assigned Numbers Authority (IANA) Registries
 
Authors:R. Housley, Ed., O. Kolkman, Ed..
Date:April 2015
Formats:txt html json
Obsoleted by:RFC 8720
Status:INFORMATIONAL
DOI:10.17487/RFC 7500
This document provides principles for the operation of InternetAssigned Numbers Authority (IANA) registries.
 
RFC 7507 TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventing Protocol Downgrade Attacks
 
Authors:B. Moeller, A. Langley.
Date:April 2015
Formats:txt json html
Obsoleted by:RFC 8996
Updates:RFC 2246, RFC 4346, RFC 4347, RFC 5246, RFC 6347
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7507
This document defines a Signaling Cipher Suite Value (SCSV) that prevents protocol downgrade attacks on the Transport Layer Security(TLS) and Datagram Transport Layer Security (DTLS) protocols. It updates RFCs 2246, 4346, 4347, 5246, and 6347. Server update considerations are included.
 
RFC 7525 Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
 
Authors:Y. Sheffer, R. Holz, P. Saint-Andre.
Date:May 2015
Formats:txt html json
Obsoleted by:RFC 9325
Updated by:RFC 8996
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 7525
Transport Layer Security (TLS) and Datagram Transport Layer Security(DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP. Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation. This document provides recommendations for improving the security of deployed services that use TLS and DTLS.The recommendations are applicable to the majority of use cases.
 
RFC 7537 IANA Registries for LSP Ping Code Points
 
Authors:B. Decraene, N. Akiya, C. Pignataro, L. Andersson, S. Aldrin.
Date:May 2015
Formats:txt json html
Obsoleted by:RFC 8029
Updates:RFC 4379, RFC 6424
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7537
RFCs 4379 and 6424 created name spaces for Multi-Protocol LabelSwitching (MPLS) Label Switched Path (LSP) Ping. However, those RFCs did not create the corresponding IANA registries for DownstreamMapping object Flags (DS Flags), Multipath Types, Pad TLVs, andInterface and Label Stack Address Types.

There is now a need to make further code point allocations from these name spaces. This document updates RFCs 4379 and 6424 in that it creates IANA registries for that purpose.

 
RFC 7538 The Hypertext Transfer Protocol Status Code 308 (Permanent Redirect)
 
Authors:J. Reschke.
Date:April 2015
Formats:txt html json
Obsoletes:RFC 7238
Obsoleted by:RFC 9110
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7538
This document specifies the additional Hypertext Transfer Protocol(HTTP) status code 308 (Permanent Redirect).
 
RFC 7539 ChaCha20 and Poly1305 for IETF Protocols
 
Authors:Y. Nir, A. Langley.
Date:May 2015
Formats:txt html json
Obsoleted by:RFC 8439
Status:INFORMATIONAL
DOI:10.17487/RFC 7539
This document defines the ChaCha20 stream cipher as well as the use of the Poly1305 authenticator, both as stand-alone algorithms and as a "combined mode", or Authenticated Encryption with Associated Data(AEAD) algorithm.

This document does not introduce any new crypto, but is meant to serve as a stable reference and an implementation guide. It is a product of the Crypto Forum Research Group (CFRG).

 
RFC 7540 Hypertext Transfer Protocol Version 2 (HTTP/2)
 
Authors:M. Belshe, R. Peon, M. Thomson, Ed..
Date:May 2015
Formats:txt json html
Obsoleted by:RFC 9113
Updated by:RFC 8740
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7540
This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection. It also introduces unsolicited push of representations from servers to clients.

This specification is an alternative to, but does not obsolete, theHTTP/1.1 message syntax. HTTP's existing semantics remain unchanged.

 
RFC 7550 Issues and Recommendations with Multiple Stateful DHCPv6 Options
 
Authors:O. Troan, B. Volz, M. Siodelski.
Date:May 2015
Formats:txt json html
Obsoleted by:RFC 8415
Updates:RFC 3315, RFC 3633
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7550
The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) specification defined two stateful options, IA_NA and IA_TA, but did not anticipate the development of additional stateful options.DHCPv6 Prefix Delegation added the IA_PD option, which is stateful.Applications that use IA_NA and IA_PD together have revealed issues that need to be addressed. This document updates RFCs 3315 and 3633 to address these issues.
 
RFC 7557 Extension Mechanism for the Babel Routing Protocol
 
Authors:J. Chroboczek.
Date:May 2015
Formats:txt html json
Obsoleted by:RFC 8966
Updates:RFC 6126
Status:EXPERIMENTAL
DOI:10.17487/RFC 7557
This document defines the encoding of extensions to the Babel routing protocol, as specified in RFC 6126.
 
RFC 7564 PRECIS Framework: Preparation, Enforcement, and Comparison of Internationalized Strings in Application Protocols
 
Authors:P. Saint-Andre, M. Blanchet.
Date:May 2015
Formats:txt json html
Obsoletes:RFC 3454
Obsoleted by:RFC 8264
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7564
Application protocols using Unicode characters in protocol strings need to properly handle such strings in order to enforce internationalization rules for strings placed in various protocol slots (such as addresses and identifiers) and to perform valid comparison operations (e.g., for purposes of authentication or authorization). This document defines a framework enabling application protocols to perform the preparation, enforcement, and comparison of internationalized strings ("PRECIS") in a way that depends on the properties of Unicode characters and thus is agile with respect to versions of Unicode. As a result, this framework provides a more sustainable approach to the handling of internationalized strings than the previous framework, known asStringprep (RFC 3454). This document obsoletes RFC 3454.
 
RFC 7601 Message Header Field for Indicating Message Authentication Status
 
Authors:M. Kucherawy.
Date:August 2015
Formats:txt json html
Obsoletes:RFC 7001, RFC 7410
Obsoleted by:RFC 8601
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7601
This document specifies a message header field called Authentication-Results for use with electronic mail messages to indicate the results of message authentication efforts. Any receiver-side software, such as mail filters or Mail User Agents (MUAs), can use this header field to relay that information in a convenient and meaningful way to users or to make sorting and filtering decisions.
 
RFC 7613 Preparation, Enforcement, and Comparison of Internationalized Strings Representing Usernames and Passwords
 
Authors:P. Saint-Andre, A. Melnikov.
Date:August 2015
Formats:txt html json
Obsoletes:RFC 4013
Obsoleted by:RFC 8265
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7613
This document describes updated methods for handling Unicode strings representing usernames and passwords. The previous approach was known as SASLprep (RFC 4013) and was based on stringprep (RFC 3454).The methods specified in this document provide a more sustainable approach to the handling of internationalized usernames and passwords. The preparation, enforcement, and comparison of internationalized strings (PRECIS) framework, RFC 7564, obsoletes RFC3454, and this document obsoletes RFC 4013.
 
RFC 7615 HTTP Authentication-Info and Proxy-Authentication-Info Response Header Fields
 
Authors:J. Reschke.
Date:September 2015
Formats:txt json html
Obsoletes:RFC 2617
Obsoleted by:RFC 9110
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7615
This specification defines the "Authentication-Info" and "Proxy-Authentication-Info" response header fields for use in HypertextTransfer Protocol (HTTP) authentication schemes that need to return information once the client's authentication credentials have been accepted.
 
RFC 7626 DNS Privacy Considerations
 
Authors:S. Bortzmeyer.
Date:August 2015
Formats:txt html json
Obsoleted by:RFC 9076
Status:INFORMATIONAL
DOI:10.17487/RFC 7626
This document describes the privacy issues associated with the use of the DNS by Internet users. It is intended to be an analysis of the present situation and does not prescribe solutions.
 
RFC 7630 HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3
 
Authors:J. Merkle, Ed., M. Lochter.
Date:October 2015
Formats:txt json html
Obsoleted by:RFC 7860
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7630
This memo specifies new HMAC-SHA-2 authentication protocols for theUser-based Security Model (USM) for SNMPv3 defined in RFC 3414.
 
RFC 7674 Clarification of the Flowspec Redirect Extended Community
 
Authors:J. Haas, Ed..
Date:October 2015
Formats:txt html json
Obsoleted by:RFC 8955
Updates:RFC 5575
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7674
This document updates RFC 5575 ("Dissemination of Flow SpecificationRules") to clarify the formatting of the BGP Flowspec RedirectExtended Community.
 
RFC 7691 Updating the Term Dates of IETF Administrative Oversight Committee (IAOC) Members
 
Authors:S. Bradner, Ed..
Date:November 2015
Formats:txt html json
Obsoleted by:RFC 8711
Updates:RFC 4071
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 7691
BCP 101 defines the start and end dates for the terms of IETFAdministrative Oversight Committee (IAOC) members; these terms have proven to be impractical. This memo updates BCP 101 to direct theIAOC to establish more practical start and end dates for terms ofIAOC members.
 
RFC 7694 Hypertext Transfer Protocol (HTTP) Client-Initiated Content-Encoding
 
Authors:J. Reschke.
Date:November 2015
Formats:txt html json
Obsoleted by:RFC 9110
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7694
In HTTP, content codings allow for payload encodings such as for compression or integrity checks. In particular, the "gzip" content coding is widely used for payload data sent in response messages.

Content codings can be used in request messages as well; however, discoverability is not on par with response messages. This document extends the HTTP "Accept-Encoding" header field for use in responses, to indicate the content codings that are supported in requests.

 
RFC 7700 Preparation, Enforcement, and Comparison of Internationalized Strings Representing Nicknames
 
Authors:P. Saint-Andre.
Date:December 2015
Formats:txt html json
Obsoleted by:RFC 8266
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7700
This document describes methods for handling Unicode strings representing memorable, human-friendly names (called "nicknames","display names", or "petnames") for people, devices, accounts, websites, and other entities.
 
RFC 7706 Decreasing Access Time to Root Servers by Running One on Loopback
 
Authors:W. Kumari, P. Hoffman.
Date:November 2015
Formats:txt json html
Obsoleted by:RFC 8806
Status:INFORMATIONAL
DOI:10.17487/RFC 7706
Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server. Some DNS recursive resolver operators want to prevent snooping of requests sent to DNS root servers by third parties. Such resolvers can greatly decrease the round-trip time and prevent observation of requests by running a copy of the full root zone on a loopback address (such as 127.0.0.1).This document shows how to start and maintain such a copy of the root zone that does not pose a threat to other users of the DNS, at the cost of adding some operational fragility for the operator.
 
RFC 7710 Captive-Portal Identification Using DHCP or Router Advertisements (RAs)
 
Authors:W. Kumari, O. Gudmundsson, P. Ebersman, S. Sheng.
Date:December 2015
Formats:txt html json
Obsoleted by:RFC 8910
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7710
In many environments offering short-term or temporary Internet access(such as coffee shops), it is common to start new connections in a captive-portal mode. This highly restricts what the customer can do until the customer has authenticated.

This document describes a DHCP option (and a Router Advertisement(RA) extension) to inform clients that they are behind some sort of captive-portal device and that they will need to authenticate to getInternet access. It is not a full solution to address all of the issues that clients may have with captive portals; it is designed to be used in larger solutions. The method of authenticating to and interacting with the captive portal is out of scope for this document.

 
RFC 7719 DNS Terminology
 
Authors:P. Hoffman, A. Sullivan, K. Fujiwara.
Date:December 2015
Formats:txt html json
Obsoleted by:RFC 8499
Status:INFORMATIONAL
DOI:10.17487/RFC 7719
The DNS is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.
 
RFC 7730 Resource Public Key Infrastructure (RPKI) Trust Anchor Locator
 
Authors:G. Huston, S. Weiler, G. Michaelson, S. Kent.
Date:January 2016
Formats:txt html json
Obsoletes:RFC 6490
Obsoleted by:RFC 8630
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7730
This document defines a Trust Anchor Locator (TAL) for the ResourcePublic Key Infrastructure (RPKI). This document obsoletes RFC 6490 by adding support for multiple URIs in a TAL.
 
RFC 7749 The "xml2rfc" Version 2 Vocabulary
 
Authors:J. Reschke.
Date:February 2016
Formats:txt json html
Obsoletes:RFC 2629
Obsoleted by:RFC 7991
Status:INFORMATIONAL
DOI:10.17487/RFC 7749
This document defines the "xml2rfc" version 2 vocabulary: an XML- based language used for writing RFCs and Internet-Drafts.

Version 2 represents the state of the vocabulary (as implemented by several tools and as used by the RFC Editor) around 2014.

This document obsoletes RFC 2629.

 
RFC 7752 North-Bound Distribution of Link-State and Traffic Engineering (TE) Information Using BGP
 
Authors:H. Gredler, Ed., J. Medved, S. Previdi, A. Farrel, S. Ray.
Date:March 2016
Formats:txt html json
Obsoleted by:RFC 9552
Updated by:RFC 9029
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7752
In a number of environments, a component external to a network is called upon to perform computations based on the network topology and current state of the connections within the network, includingTraffic Engineering (TE) information. This is information typically distributed by IGP routing protocols within the network.

This document describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol. This is achieved using a new BGP Network Layer Reachability Information (NLRI) encoding format. The mechanism is applicable to physical and virtual IGP links. The mechanism described is subject to policy control.

Applications of this technique include Application-Layer TrafficOptimization (ALTO) servers and Path Computation Elements (PCEs).

 
RFC 7807 Problem Details for HTTP APIs
 
Authors:M. Nottingham, E. Wilde.
Date:March 2016
Formats:txt json html
Obsoleted by:RFC 9457
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7807
This document defines a "problem detail" as a way to carry machine- readable details of errors in a HTTP response to avoid the need to define new error response formats for HTTP APIs.
 
RFC 7810 IS-IS Traffic Engineering (TE) Metric Extensions
 
Authors:S. Previdi, Ed., S. Giacalone, D. Ward, J. Drake, Q. Wu.
Date:May 2016
Formats:txt html json
Obsoleted by:RFC 8570
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7810
In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network- performance criteria (e.g., latency) are becoming as critical to data-path selection as other metrics.

This document describes extensions to IS-IS Traffic EngineeringExtensions (RFC 5305) such that network-performance information can be distributed and collected in a scalable fashion. The information distributed using IS-IS TE Metric Extensions can then be used to make path-selection decisions based on network performance.

Note that this document only covers the mechanisms with which network-performance information is distributed. The mechanisms for measuring network performance or acting on that information, once distributed, are outside the scope of this document.

 
RFC 7816 DNS Query Name Minimisation to Improve Privacy
 
Authors:S. Bortzmeyer.
Date:March 2016
Formats:txt json html
Obsoleted by:RFC 9156
Status:EXPERIMENTAL
DOI:10.17487/RFC 7816
This document describes a technique to improve DNS privacy, a technique called "QNAME minimisation", where the DNS resolver no longer sends the full original QNAME to the upstream name server.
 
RFC 7895 YANG Module Library
 
Authors:A. Bierman, M. Bjorklund, K. Watsen.
Date:June 2016
Formats:txt json html
Obsoleted by:RFC 8525
Status:PROPOSED STANDARD
DOI:10.17487/RFC 7895
This document describes a YANG library that provides information about all the YANG modules used by a network management server (e.g., a Network Configuration Protocol (NETCONF) server). Simple caching mechanisms are provided to allow clients to minimize retrieval of this information.
 
RFC 8022 A YANG Data Model for Routing Management
 
Authors:L. Lhotka, A. Lindem.
Date:November 2016
Formats:txt json html
Obsoleted by:RFC 8349
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8022
This document contains a specification of three YANG modules and one submodule. Together they form the core routing data model that serves as a framework for configuring and managing a routing subsystem. It is expected that these modules will be augmented by additional YANG modules defining data models for control-plane protocols, route filters, and other functions. The core routing data model provides common building blocks for such extensions -- routes,Routing Information Bases (RIBs), and control-plane protocols.
 
RFC 8049 YANG Data Model for L3VPN Service Delivery
 
Authors:S. Litkowski, L. Tomotaki, K. Ogaki.
Date:February 2017
Formats:txt json html
Obsoleted by:RFC 8299
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8049
This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.
 
RFC 8113 Locator/ID Separation Protocol (LISP): Shared Extension Message & IANA Registry for Packet Type Allocations
 
Authors:M. Boucadair, C. Jacquenet.
Date:March 2017
Formats:txt html json
Obsoleted by:RFC 9304
Updates:RFC 6830
Status:EXPERIMENTAL
DOI:10.17487/RFC 8113
This document specifies a Locator/ID Separation Protocol (LISP) shared message type for defining future extensions and conducting experiments without consuming a LISP packet type codepoint for each extension. It also defines a registry for LISP Packet Type allocations, thus updating RFC 6830.
 
RFC 8152 CBOR Object Signing and Encryption (COSE)
 
Authors:J. Schaad.
Date:July 2017
Formats:txt json html
Obsoleted by:RFC 9052, RFC 9053
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8152
Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format.This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.
 
RFC 8203 BGP Administrative Shutdown Communication
 
Authors:J. Snijders, J. Heitz, J. Scudder.
Date:July 2017
Formats:txt json html
Obsoleted by:RFC 9003
Updates:RFC 4486
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8203
This document enhances the BGP Cease NOTIFICATION message"Administrative Shutdown" and "Administrative Reset" subcodes for operators to transmit a short freeform message to describe why a BGP session was shutdown or reset. This document updates RFC 4486.
 
RFC 8208 BGPsec Algorithms, Key Formats, and Signature Formats
 
Authors:S. Turner, O. Borchert.
Date:September 2017
Formats:txt html json
Obsoleted by:RFC 8608
Updates:RFC 7935
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8208
This document specifies the algorithms, algorithm parameters, asymmetric key formats, asymmetric key sizes, and signature formats used in BGPsec (Border Gateway Protocol Security). This document updates RFC 7935 ("The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure").

This document also includes example BGPsec UPDATE messages as well as the private keys used to generate the messages and the certificates necessary to validate those signatures.

 
RFC 8229 TCP Encapsulation of IKE and IPsec Packets
 
Authors:T. Pauly, S. Touati, R. Mantha.
Date:August 2017
Formats:txt html json
Obsoleted by:RFC 9329
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8229
This document describes a method to transport Internet Key ExchangeProtocol (IKE) and IPsec packets over a TCP connection for traversing network middleboxes that may block IKE negotiation over UDP. This method, referred to as "TCP encapsulation", involves sending both IKE packets for Security Association establishment and EncapsulatingSecurity Payload (ESP) packets over a TCP connection. This method is intended to be used as a fallback option when IKE cannot be negotiated over UDP.
 
RFC 8312 CUBIC for Fast Long-Distance Networks
 
Authors:I. Rhee, L. Xu, S. Ha, A. Zimmermann, L. Eggert, R. Scheffenegger.
Date:February 2018
Formats:txt html json
Obsoleted by:RFC 9438
Status:INFORMATIONAL
DOI:10.17487/RFC 8312
CUBIC is an extension to the current TCP standards. It differs from the current TCP standards only in the congestion control algorithm on the sender side. In particular, it uses a cubic function instead of a linear window increase function of the current TCP standards to improve scalability and stability under fast and long-distance networks. CUBIC and its predecessor algorithm have been adopted as defaults by Linux and have been used for many years. This document provides a specification of CUBIC to enable third-party implementations and to solicit community feedback through experimentation on the performance of CUBIC.
 
RFC 8318 IAB, IESG, and IAOC Selection, Confirmation, and Recall Process: IAOC Advisor for the Nominating Committee
 
Authors:S. Dawkins.
Date:January 2018
Formats:txt json html
Obsoleted by:RFC 8713
Updates:RFC 7437
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 8318
The process by which the members of the IAB and IESG, and some members of the IAOC, are selected, confirmed, and recalled is specified in this document. This document is a self-consistent, organized compilation of the process as it was known at the time of publication of RFC 3777, with various updates since that version was published.
 
RFC 8321 Alternate-Marking Method for Passive and Hybrid Performance Monitoring
 
Authors:G. Fioccola, Ed., A. Capello, M. Cociglio, L. Castaldelli, M. Chen, L. Zheng, G. Mirsky, T. Mizrahi.
Date:January 2018
Formats:txt json html
Obsoleted by:RFC 9341
Status:EXPERIMENTAL
DOI:10.17487/RFC 8321
This document describes a method to perform packet loss, delay, and jitter measurements on live traffic. This method is based on anAlternate-Marking (coloring) technique. A report is provided in order to explain an example and show the method applicability. This technology can be applied in various situations, as detailed in this document, and could be considered Passive or Hybrid depending on the application.
 
RFC 8398 Internationalized Email Addresses in X.509 Certificates
 
Authors:A. Melnikov, Ed., W. Chuang, Ed..
Date:May 2018
Formats:txt html json
Obsoleted by:RFC 9598
Updates:RFC 5280
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8398
This document defines a new name form for inclusion in the otherName field of an X.509 Subject Alternative Name and Issuer AlternativeName extension that allows a certificate subject to be associated with an internationalized email address.

This document updates RFC 5280.

 
RFC 8399 Internationalization Updates to RFC 5280
 
Authors:R. Housley.
Date:May 2018
Formats:txt html json
Obsoleted by:RFC 9549
Updates:RFC 5280
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8399
The updates to RFC 5280 described in this document provide alignment with the 2008 specification for Internationalized Domain Names (IDNs) and add support for internationalized email addresses in X.509 certificates.
 
RFC 8478 Zstandard Compression and the application/zstd Media Type
 
Authors:Y. Collet, M. Kucherawy, Ed..
Date:October 2018
Formats:txt json html
Obsoleted by:RFC 8878
Status:INFORMATIONAL
DOI:10.17487/RFC 8478
Zstandard, or "zstd" (pronounced "zee standard"), is a data compression mechanism. This document describes the mechanism and registers a media type and content encoding to be used when transporting zstd-compressed content via Multipurpose Internet MailExtensions (MIME).

Despite use of the word "standard" as part of its name, readers are advised that this document is not an Internet Standards Track specification; it is being published for informational purposes only.

 
RFC 8499 DNS Terminology
 
Authors:P. Hoffman, A. Sullivan, K. Fujiwara.
Date:January 2019
Formats:txt json html
Obsoletes:RFC 7719
Obsoleted by:RFC 9499
Updates:RFC 2308
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 8499
The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in theDNS in a single document.

This document obsoletes RFC 7719 and updates RFC 2308.

 
RFC 8536 The Time Zone Information Format (TZif)
 
Authors:A. Olson, P. Eggert, K. Murchison.
Date:February 2019
Formats:txt html json
Obsoleted by:RFC 9636
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8536
This document specifies the Time Zone Information Format (TZif) for representing and exchanging time zone information, independent of any particular service or protocol. Two media types for this format are also defined.
 
RFC 8540 Stream Control Transmission Protocol: Errata and Issues in RFC 4960
 
Authors:R. Stewart, M. Tuexen, M. Proshin.
Date:February 2019
Formats:txt html json
Obsoleted by:RFC 9260
Status:INFORMATIONAL
DOI:10.17487/RFC 8540
This document is a compilation of issues found since the publication of RFC 4960 in September 2007, based on experience with implementing, testing, and using the Stream Control Transmission Protocol (SCTP) along with the suggested fixes. This document provides deltas to RFC4960 and is organized in a time-ordered way. The issues are listed in the order in which they were brought up. Because some text is changed several times, the last delta in the text is the one that should be applied. In addition to the deltas, a description of each problem and the details of the solution for each are also provided.
 
RFC 8728 RFC Editor Model (Version 2)
 
Authors:O. Kolkman, Ed., J. Halpern, Ed., R. Hinden, Ed..
Date:February 2020
Formats:txt pdf xml json html
Obsoletes:RFC 6635
Obsoleted by:RFC 9280
Status:INFORMATIONAL
DOI:10.17487/RFC 8728
The RFC Editor model described in this document divides the responsibilities for the RFC Series into three functions: the RFCSeries Editor, the RFC Production Center, and the RFC Publisher.Internet Architecture Board (IAB) oversight via the RFC SeriesOversight Committee (RSOC) is described, as is the relationship between the IETF Administration Limited Liability Company and theRSOC. This document reflects the experience gained with "RFC EditorModel (Version 1)", documented in RFC 5620; and obsoletes RFC 6635 to replace all references to the IETF Administrative Support Activity(IASA) and related structures with those defined by the IASA 2.0Model.
 
RFC 8736 PIM Message Type Space Extension and Reserved Bits
 
Authors:S. Venaas, A. Retana.
Date:February 2020
Formats:txt xml pdf html json
Obsoletes:RFC 6166
Obsoleted by:RFC 9436
Updates:RFC 3973, RFC 5015, RFC 5059, RFC 6754, RFC 7761, RFC 8364
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8736
The PIM version 2 messages share a common message header format. The common header definition contains eight reserved bits. This document specifies how these bits may be used by individual message types and creates a registry containing the per-message-type usage. This document also extends the PIM type space by defining three new message types. For each of the new types, four of the previously reserved bits are used to form an extended type range.

This document updates RFCs 7761 and 3973 by defining the use of the currently Reserved field in the PIM common header. This document further updates RFCs 7761 and 3973, along with RFCs 5015, 5059, 6754, and 8364, by specifying the use of the currently reserved bits for each PIM message.

This document obsoletes RFC 6166.

 
RFC 8740 Using TLS 1.3 with HTTP/2
 
Authors:D. Benjamin.
Date:February 2020
Formats:txt html pdf json xml
Obsoleted by:RFC 9113
Updates:RFC 7540
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8740
This document updates RFC 7540 by forbidding TLS 1.3 post-handshake authentication, as an analog to the existing TLS 1.2 renegotiation restriction.
 
RFC 8782 Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification
 
Authors:T. Reddy.K, Ed., M. Boucadair, Ed., P. Patil, A. Mortensen, N. Teague.
Date:May 2020
Formats:txt pdf xml json html
Obsoleted by:RFC 9132
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8782
This document specifies the Distributed Denial-of-Service Open ThreatSignaling (DOTS) signal channel, a protocol for signaling the need for protection against Distributed Denial-of-Service (DDoS) attacks to a server capable of enabling network traffic mitigation on behalf of the requesting client.

A companion document defines the DOTS data channel, a separate reliable communication layer for DOTS management and configuration purposes.

 
RFC 8788 Eligibility for the 2020-2021 Nominating Committee
 
Authors:B. Leiba.
Date:May 2020
Formats:txt html json xml pdf
Obsoleted by:RFC 9389
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 8788
The 2020-2021 Nominating Committee (NomCom) is to be formed between the IETF 107 and IETF 108 meetings, and the issue of eligibility of who can serve on that NomCom needs clarification. This document provides a one-time interpretation of the eligibility rules that is required for the exceptional situation of the cancellation of the in- person IETF 107 meeting. This document only affects the seating of the 2020-2021 NomCom and any rules or processes that relate to NomCom eligibility before IETF 108; it does not set a precedent to be applied in the future.
 
RFC 8829 JavaScript Session Establishment Protocol (JSEP)
 
Authors:J. Uberti, C. Jennings, E. Rescorla, Ed..
Date:January 2021
Formats:txt xml json pdf html
Obsoleted by:RFC 9429
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8829
This document describes the mechanisms for allowing a JavaScript application to control the signaling plane of a multimedia session via the interface specified in the W3C RTCPeerConnection API and discusses how this relates to existing signaling protocols.
 
RFC 8843 Negotiating Media Multiplexing Using the Session Description Protocol (SDP)
 
Authors:C. Holmberg, H. Alvestrand, C. Jennings.
Date:January 2021
Formats:txt pdf json xml html
Obsoleted by:RFC 9143
Updates:RFC 3264, RFC 5888, RFC 7941
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8843
This specification defines a new Session Description Protocol (SDP)Grouping Framework extension called 'BUNDLE'. The extension can be used with the SDP offer/answer mechanism to negotiate the usage of a single transport (5-tuple) for sending and receiving media described by multiple SDP media descriptions ("m=" sections). Such transport is referred to as a BUNDLE transport, and the media is referred to as bundled media. The "m=" sections that use the BUNDLE transport form a BUNDLE group.

This specification defines a new RTP Control Protocol (RTCP) SourceDescription (SDES) item and a new RTP header extension.

This specification updates RFCs 3264, 5888, and 7941.

 
RFC 8889 Multipoint Alternate-Marking Method for Passive and Hybrid Performance Monitoring
 
Authors:G. Fioccola, Ed., M. Cociglio, A. Sapio, R. Sisto.
Date:August 2020
Formats:txt html pdf xml json
Obsoleted by:RFC 9342
Status:EXPERIMENTAL
DOI:10.17487/RFC 8889
The Alternate-Marking method, as presented in RFC 8321, can only be applied to point-to-point flows, because it assumes that all the packets of the flow measured on one node are measured again by a single second node. This document generalizes and expands this methodology to measure any kind of unicast flow whose packets can follow several different paths in the network -- in wider terms, a multipoint-to-multipoint network. For this reason, the technique here described is called "Multipoint Alternate Marking".
 
RFC 8919 IS-IS Application-Specific Link Attributes
 
Authors:L. Ginsberg, P. Psenak, S. Previdi, W. Henderickx, J. Drake.
Date:October 2020
Formats:txt html json xml pdf
Obsoleted by:RFC 9479
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8919
Existing traffic-engineering-related link attribute advertisements have been defined and are used in RSVP-TE deployments. Since the original RSVP-TE use case was defined, additional applications (e.g.,Segment Routing Policy and Loop-Free Alternates) that also make use of the link attribute advertisements have been defined. In cases where multiple applications wish to make use of these link attributes, the current advertisements do not support application- specific values for a given attribute, nor do they support indication of which applications are using the advertised value for a given link. This document introduces new link attribute advertisements that address both of these shortcomings.
 
RFC 8920 OSPF Application-Specific Link Attributes
 
Authors:P. Psenak, Ed., L. Ginsberg, W. Henderickx, J. Tantsura, J. Drake.
Date:October 2020
Formats:txt pdf xml html json
Obsoleted by:RFC 9492
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8920
Existing traffic-engineering-related link attribute advertisements have been defined and are used in RSVP-TE deployments. Since the original RSVP-TE use case was defined, additional applications (e.g.,Segment Routing Policy and Loop-Free Alternates) that also make use of the link attribute advertisements have been defined. In cases where multiple applications wish to make use of these link attributes, the current advertisements do not support application- specific values for a given attribute, nor do they support indication of which applications are using the advertised value for a given link. This document introduces new link attribute advertisements inOSPFv2 and OSPFv3 that address both of these shortcomings.
 
RFC 8941 Structured Field Values for HTTP
 
Authors:M. Nottingham, P-H. Kamp.
Date:February 2021
Formats:txt json pdf xml html
Obsoleted by:RFC 9651
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8941
This document describes a set of data types and associated algorithms that are intended to make it easier and safer to define and handleHTTP header and trailer fields, known as "Structured Fields","Structured Headers", or "Structured Trailers". It is intended for use by specifications of new HTTP fields that wish to use a common syntax that is more restrictive than traditional HTTP field values.
 
RFC 8954 Online Certificate Status Protocol (OCSP) Nonce Extension
 
Authors:M. Sahni, Ed..
Date:November 2020
Formats:txt pdf json xml html
Obsoleted by:RFC 9654
Updates:RFC 6960
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8954
This document specifies the updated format of the Nonce extension in the Online Certificate Status Protocol (OCSP) request and response messages. OCSP is used to check the status of a certificate, and theNonce extension is used to cryptographically bind an OCSP response message to a particular OCSP request message. This document updatesRFC 6960.
 
RFC 8989 Additional Criteria for Nominating Committee Eligibility
 
Authors:B. Carpenter, S. Farrell.
Date:February 2021
Formats:txt json xml pdf html
Obsoleted by:RFC 9389
Status:EXPERIMENTAL
DOI:10.17487/RFC 8989
This document defines a process experiment under RFC 3933 that temporarily updates the criteria for qualifying volunteers to participate in the IETF Nominating Committee. It therefore also updates the criteria for qualifying signatories to a community recall petition. The purpose is to make the criteria more flexible in view of increasing remote participation in the IETF and a reduction in face-to-face meetings. The experiment is of fixed duration and will apply to one, or at most two, consecutive Nominating Committee cycles, starting in 2021. This document temporarily varies the rules in RFC 8713.
 
RFC 9029 Updates to the Allocation Policy for the Border Gateway Protocol - Link State (BGP-LS) Parameters Registries
 
Authors:A. Farrel.
Date:June 2021
Formats:txt html xml pdf json
Obsoleted by:RFC 9552
Updates:RFC 7752
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9029
RFC 7752 defines the Border Gateway Protocol - Link State (BGP-LS).IANA created a registry consistent with that document called "BorderGateway Protocol - Link State (BGP-LS) Parameters" with a number of subregistries. The allocation policy applied by IANA for those registries is "Specification Required", as defined in RFC 8126.

This document updates RFC 7752 by changing the allocation policy for all of the registries to "Expert Review" and by updating the guidance to the designated experts.

 
RFC 9092 Finding and Using Geofeed Data
 
Authors:R. Bush, M. Candela, W. Kumari, R. Housley.
Date:July 2021
Formats:txt pdf html xml json
Obsoleted by:RFC 9632
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9092
This document specifies how to augment the Routing PolicySpecification Language inetnum: class to refer specifically to geofeed data comma-separated values (CSV) files and describes an optional scheme that uses the Routing Public Key Infrastructure to authenticate the geofeed data CSV files.