


default search action
Request for Comments (RFC) 8700-8799
2019
8700Heather Flanagan:
Fifty Years of RFCs. 1-22
2020
8701David Benjamin:
Applying Generate Random Extensions And Sustain Extensibility (GREASE) to TLS Extensibility. 1-12
8702Panos Kampanakis, Quynh Dang:
Use of the SHAKE One-Way Hash Functions in the Cryptographic Message Syntax (CMS). 1-16
8703Rick Taylor, Stan Ratliff:
Dynamic Link Exchange Protocol (DLEP) Link Identifier Extension. 1-9
8704Kotikalapudi Sriram, Doug Montgomery, Jeffrey Haas:
Enhanced Feasible-Path Unicast Reverse Path Forwarding. 1-17
8705Brian Campbell, John Bradley, Nat Sakimura, Torsten Lodderstedt:
OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens. 1-24
8706Les Ginsberg, Paul Wells:
Restart Signaling for IS-IS. 1-22
8707Brian Campbell, John Bradley, Hannes Tschofenig:
Resource Indicators for OAuth 2.0. 1-11
8708Russ Housley:
Use of the HSS/LMS Hash-Based Signature Algorithm in the Cryptographic Message Syntax (CMS). 1-14
8709Ben Harris, Loganaden Velvindron:
Ed25519 and Ed448 Public Key Algorithms for the Secure Shell (SSH) Protocol. 1-7
8710Thomas Fossati, Klaus Hartke, Carsten Bormann
:
Multipart Content-Format for the Constrained Application Protocol (CoAP). 1-9
8711Brian Haberman, Joseph Lorenzo Hall, Jason Livingood:
Structure of the IETF Administrative Support Activity, Version 2.0. 1-22
8712Gonzalo Camarillo, Jason Livingood:
The IETF-ISOC Relationship. 1-8
8713Murray S. Kucherawy, Robert M. Hinden, Jason Livingood:
IAB, IESG, IETF Trust, and IETF LLC Selection, Confirmation, and Recall Process: Operation of the IETF Nominating and Recall Committees. 1-33
8714Jari Arkko, Ted Hardie:
Update to the Process for Selection of Trustees for the IETF Trust. 1-6
8715Jari Arkko:
IETF Administrative Support Activity 2.0: Update to the Process for Selection of Trustees for the IETF Trust. 1-6
8716Pete Resnick, Adrian Farrel:
Update to the IETF Anti-Harassment Procedures for the Replacement of the IETF Administrative Oversight Committee (IAOC) with the IETF Administration LLC. 1-7
8717John C. Klensin:
IETF Administrative Support Activity 2.0: Consolidated Updates to IETF Administrative Terminology. 1-7
8718Eliot Lear:
IETF Plenary Meeting Venue Selection Process. 1-10
8719Suresh Krishnan:
High-Level Guidance for the Meeting Policy of the IETF. 1-5
8720Russ Housley, Olaf Kolkman:
Principles for Operation of Internet Assigned Numbers Authority (IANA) Registries. 1-7
8721Joel M. Halpern:
Advice to the Trustees of the IETF Trust on Rights to Be Granted in IETF Documents. 1-8
8722Danny McPherson, Olaf Kolkman, John C. Klensin, Geoff Huston:
Defining the Role and Function of IETF Protocol Parameter Registry Operators. 1-11
8723Cullen Jennings, Paul E. Jones, Richard Barnes, Adam B. Roach:
Double Encryption Procedures for the Secure Real-Time Transport Protocol (SRTP). 1-18
8724Ana Minaburo, Laurent Toutain, Carles Gomez, Dominique Barthel, Juan Carlos Zúñiga:
SCHC: Generic Framework for Static Context Header Compression and Fragmentation. 1-71
8725Yaron Sheffer
, Dick Hardt, Michael B. Jones:
JSON Web Token Best Current Practices. 1-13
8726Adrian Farrel:
How Requests for IANA Action Will Be Handled on the Independent Stream. 1-6
8727Takeshi Takahashi, Roman Danyliw, Mio Suzuki:
JSON Binding of the Incident Object Description Exchange Format. 1-88
8728Olaf Kolkman, Joel M. Halpern, Robert M. Hinden:
RFC Editor Model (Version 2). 1-19
8729Russ Housley, Leslie Daigle:
The RFC Series and RFC Editor. 1-18
8730Nevil Brownlee, Bob Hinden:
Independent Submission Editor Model. 1-6
8731Aris Adamantiadis, Simon Josefsson, Mark D. Baushke:
Secure Shell (SSH) Key Exchange Method Using Curve25519 and Curve448. 1-6
8732Simo Sorce, Hubert Kario
:
Generic Security Service Application Program Interface (GSS-API) Key Exchange with SHA-2. 1-12
8733Dhruv Dhody, Rakesh Gandhi, Udayasree Palle, Ravi Singh, Luyuan Fang:
Path Computation Element Communication Protocol (PCEP) Extensions for MPLS-TE Label Switched Path (LSP) Auto-Bandwidth Adjustment with Stateful PCE. 1-32
8734Leonie Bruckert, Johannes Merkle, Manfred Lochter:
Elliptic Curve Cryptography (ECC) Brainpool Curves for Transport Layer Security (TLS) Version 1.3. 1-11
8735Aijun Wang, Xiaohong Huang, Caixia Kou, Zhenqiang Li, Penghui Mi:
Scenarios and Simulation Results of PCE in a Native IP Network. 1-16
8736Stig Venaas, Alvaro Retana:
PIM Message Type Space Extension and Reserved Bits. 1-8
8737Roland Bracewell Shoemaker:
Automated Certificate Management Environment (ACME) TLS Application‑Layer Protocol Negotiation (ALPN) Challenge Extension. 1-8
8738Roland Bracewell Shoemaker:
Automated Certificate Management Environment (ACME) IP Identifier Validation Extension. 1-5
8739Yaron Sheffer
, Diego R. López, Óscar González de Dios, Antonio Pastor Perales, Thomas Fossati:
Support for Short-Term, Automatically Renewed (STAR) Certificates in the Automated Certificate Management Environment (ACME). 1-22
8740David Benjamin:
Using TLS 1.3 with HTTP/2. 1-5
8741Aswatnarayan Raghuram, Alvin Goddard, Jay Karthik, Siva Sivabalan, Mahendra Singh Negi:
Ability for a Stateful Path Computation Element (PCE) to Request and Obtain Control of a Label Switched Path (LSP). 1-11
8742Carsten Bormann
:
Concise Binary Object Representation (CBOR) Sequences. 1-10
8743Satish Kanugovi, Florin Baboescu, Jing Zhu, SungHoon Seo:
Multiple Access Management Services Multi-Access Management Services (MAMS). 1-143
8744Christian Huitema:
Issues and Requirements for Server Name Identification (SNI) Encryption in TLS. 1-13
8745Hariharan Ananthakrishnan, Siva Sivabalan, Colby Barth, Ina Minei, Mahendra Singh Negi:
Path Computation Element Communication Protocol (PCEP) Extensions for Associating Working and Protection Label Switched Paths (LSPs) with Stateful PCE. 1-15
8746Carsten Bormann
:
Concise Binary Object Representation (CBOR) Tags for Typed Arrays. 1-13
8747Michael B. Jones, Ludwig Seitz, Göran Selander, Samuel Erdtman, Hannes Tschofenig:
Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs). 1-14
8748Roger Carney, Gavin Brown, Jothan Frakes:
Registry Fee Extension for the Extensible Provisioning Protocol (EPP). 1-30
8749W. (Matthijs) Mekking, Dan Mahoney:
Moving DNSSEC Lookaside Validation (DLV) to Historic Status. 1-6
8750Daniel Migault, Tobias Guggemos, Yoav Nir:
Implicit Initialization Vector (IV) for Counter-Based Ciphers in Encapsulating Security Payload (ESP). 1-8
8751Dhruv Dhody, Young Lee, Daniele Ceccarelli, Jongyoon Shin, Daniel King
:
Hierarchical Stateful Path Computation Element (PCE). 1-21
8752Martin Thomson, Mark Nottingham:
Report from the IAB Workshop on Exploring Synergy between Content Aggregation and the Publisher Ecosystem (ESCAPE). 1-23
8753John C. Klensin, Patrik Fältström:
Internationalized Domain Names for Applications (IDNA) Review for New Unicode Versions. 1-13
8754Clarence Filsfils, Darren Dukes, Stefano Previdi, John Leddy, Satoru Matsushima, Daniel Voyer:
IPv6 Segment Routing Header (SRH). 1-27
8755Michael Jenkins:
Using Commercial National Security Algorithm Suite Algorithms in Secure/Multipurpose Internet Mail Extensions. 1-17
8756Michael Jenkins, Lydia Zieglar:
Commercial National Security Algorithm (CNSA) Suite Profile of Certificate Management over CMS. 1-17
8757Bow-Nan Cheng, Lou Berger:
Dynamic Link Exchange Protocol (DLEP) Latency Range Extension. 1-5
8758Loganaden Velvindron:
Deprecating RC4 in Secure Shell (SSH). 1-5
8759James Sandford:
RTP Payload for Timed Text Markup Language (TTML). 1-15
8760Rifaat Shekh-Yusef:
The Session Initiation Protocol (SIP) Digest Access Authentication Scheme. 1-9
8761Alexey Filippov, Andrey Norkin, José Roberto Alvarez:
Video Codec Requirements and Evaluation Methodology. 1-22
8762Greg Mirsky, Guo Jun, Henrik Nydell, Richard Foote:
Simple Two-Way Active Measurement Protocol. 1-15
8763Akbar Rahman, Dirk Trossen, Dirk Kutscher, Ravi Ravindran:
Deployment Considerations for Information-Centric Networking (ICN). 1-30
8764Stuart Cheshire, Marc Krochmal:
Apple's DNS Long-Lived Queries Protocol. 1-20
8765Tom Pusateri, Stuart Cheshire:
DNS Push Notifications. 1-32
8766Stuart Cheshire:
Discovery Proxy for Multicast DNS-Based Service Discovery. 1-33
8767David C. Lawrence, Warren Kumari, Puneet Sood:
Serving Stale Data to Improve DNS Resiliency. 1-12
8768Mohamed Boucadair, Tirumaleswar Reddy, Jon Shallow:
Constrained Application Protocol (CoAP) Hop-Limit Option. 1-8
8769Jim Schaad:
Cryptographic Message Syntax (CMS) Content Types for Concise Binary Object Representation (CBOR). 1-6
8770Keyur Patel, Padma Pillay-Esnault, Manish Bhardwaj, Serpil Bayraktar:
Host Router Support for OSPFv2. 1-8
8771Alexander Mayrhofer, Jim Hague:
The Internationalized Deliberately Unreadable Network NOtation (I-DUNNO). 1-10
8772Shujun Hu, Donald E. Eastlake III, Fengwei Qin, Tee Mong Chua, Daniel Huang:
The China Mobile, Huawei, and ZTE Broadband Network Gateway (BNG) Simple Control and User Plane Separation Protocol (S-CUSP). 1-124
8773Russ Housley:
TLS 1.3 Extension for Certificate-Based Authentication with an External Pre-Shared Key. 1-11
8774Michael Welzl:
The Quantum Bug. 1-6
8775Yiqun Cai, Heidi Ou, Sri Vallepalli, Mankamana Mishra, Stig Venaas, Andy Green:
PIM Designated Router Load Balancing. 1-18
8776Tarek Saad, Rakesh Gandhi, Xufeng Liu, Vishnu Pavan Beeram, Igor Bryskin:
Common YANG Data Types for Traffic Engineering. 1-84
8777Jake Holland:
DNS Reverse IP Automatic Multicast Tunneling (AMT) Discovery. 1-33
8778Russ Housley:
Use of the HSS/LMS Hash-Based Signature Algorithm with CBOR Object Signing and Encryption (COSE). 1-15
8779Cyril Margaria, Óscar González de Dios, Fatai Zhang:
Path Computation Element Communication Protocol (PCEP) Extensions for GMPLS. 1-38
8780Young Lee, Ramon Casellas:
The Path Computation Element Communication Protocol (PCEP) Extension for Wavelength Switched Optical Network (WSON) Routing and Wavelength Assignment (RWA). 1-26
8781Lorenzo Colitti, Jen Linkova:
Discovering PREF64 in Router Advertisements. 1-10
8782T. Reddy K., Mohamed Boucadair, Prashanth Patil, Andrew Mortensen, Nik Teague:
Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification. 1-100
8783Turumaleswar Reddy Konda, Mohamed Boucadair:
Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel Specification. 1-66
8784Scott R. Fluhrer, Panos Kampanakis, David A. McGrew, Valery Smyslov:
Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security. 1-16
8785Anders Rundgren, Bret Jordan, Samuel Erdtman:
JSON Canonicalization Scheme (JCS). 1-20
8786Adrian Farrel:
Updated Rules for Processing Stateful PCE Request Parameters Flags. 1-6
8787James Winterbottom, Roland Jesske, Bruno Chatras, Andrew Hutton:
Location Source Parameter for the SIP Geolocation Header Field. 1-8
8788Barry Leiba:
Eligibility for the 2020-2021 Nominating Committee. 1-5
8789Joel M. Halpern, Eric Rescorla:
IETF Stream Documents Require IETF Rough Consensus. 1-4
8790Ari Keränen, Mojan Mohajer:
FETCH and PATCH with Sensor Measurement Lists (SenML). 1-11
8791Andy Bierman, Martin Björklund, Kent Watsen:
YANG Data Structure Extensions. 1-16
8792Kent Watsen, Erik Auerswald, Adrian Farrel, Qin Wu:
Handling Long Lines in Content of Internet-Drafts and RFCs. 1-28
8793Bastiaan Wissingh, Christopher A. Wood, Alexander Afanasyev, Lixia Zhang, David Oran, Christian F. Tschudin:
Information-Centric Networking (ICN): Content-Centric Networking (CCNx) and Named Data Networking (NDN) Terminology. 1-17
8794Steve Lhomme, Dave Rice, Moritz Bunkus:
Extensible Binary Meta Language. 1-51
8795Xufeng Liu, Igor Bryskin, Vishnu Pavan Beeram, Tarek Saad, Himanshu Shah, Óscar González de Dios:
YANG Data Model for Traffic Engineering (TE) Topologies. 1-170
8796Mike Taillon, Tarek Saad, Rakesh Gandhi, Abhishek Deshmukh, Markus Jork, Vishnu Pavan Beeram:
RSVP-TE Summary Fast Reroute Extensions for Label Switched Path (LSP) Tunnels. 1-18
8797Charles Lever:
Remote Direct Memory Access - Connection Manager (RDMA-CM) Private Data for RPC-over-RDMA Version 1. 1-12
8798Carsten Bormann
:
Additional Units for Sensor Measurement Lists (SenML). 1-9
8799Brian E. Carpenter
, Bing Liu:
Limited Domains and Internet Protocols. 1-23

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














