


default search action
Request for Comments (RFC) 9200-9299
2022
9200Ludwig Seitz, Göran Selander, Erik Wahlstroem, Samuel Erdtman, Hannes Tschofenig:
Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth). 1-72
9201Ludwig Seitz:
Additional OAuth Parameters for Authentication and Authorization for Constrained Environments (ACE). 1-11
9202Stefanie Gerdes, Olaf Bergmann, Carsten Bormann
, Göran Selander, Ludwig Seitz:
Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE). 1-23
9203Francesca Palombini, Ludwig Seitz, Göran Selander, Martin Gunnarsson:
The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework. 1-28
9204Charles Krasic, Mike Bishop, Alan Frindell:
QPACK: Field Compression for HTTP/3. 1-41
9205Mark Nottingham:
Building Protocols with HTTP. 1-27
9206Laura Corcoran, Michael Jenkins:
Commercial National Security Algorithm (CNSA) Suite Cryptography for Internet Protocol Security (IPsec). 1-13
9207Karsten Meyer zu Selhausen, Daniel Fett:
OAuth 2.0 Authorization Server Issuer Identification. 1-9
9208Alexey Melnikov:
IMAP QUOTA Extension. 1-19
9209Mark Nottingham, Piotr Sikora:
The Proxy-Status HTTP Response Header Field. 1-22
9210John Kristoff
, Duane Wessels:
DNS Transport over TCP - Operational Requirements. 1-29
9211Mark Nottingham:
The Cache-Status HTTP Response Header Field. 1-9
9212Nicholas Gajcowski, Michael Jenkins:
Commercial National Security Algorithm (CNSA) Suite Cryptography for Secure Shell (SSH). 1-10
9213Stephen Ludin, Mark Nottingham, Yuchen Wu:
Targeted HTTP Cache Control. 1-8
9214Nagendra Kumar Nainar, Carlos Pignataro, Mustapha Aïssaoui:
OSPFv3 Code Point for MPLS LSP Ping. 1-6
9215Dmitry Baryshkov, Vasily Nikolaev, Alexander Chelpanov:
Using GOST R 34.10-2012 and GOST R 34.11-2012 Algorithms with the Internet X.509 Public Key Infrastructure. 1-38
9216Daniel Kahn Gillmor:
S/MIME Example Keys and Certificates. 1-32
9217Brian Trammell:
Current Open Questions in Path-Aware Networking. 1-9
9218Kazuho Oku, Lucas Pardue:
Extensible Prioritization Scheme for HTTP. 1-21
9219Alexey Melnikov:
S/MIME Signature Verification Extension to the JSON Meta Application Protocol (JMAP). 1-10
9220Ryan Hamilton:
Bootstrapping WebSockets with HTTP/3. 1-4
9221Tommy Pauly, Eric Kinnear, David Schinazi:
An Unreliable Datagram Extension to QUIC. 1-9
9222Brian E. Carpenter
, Laurent Ciavaglia, Sheng Jiang, Pierre Peloso:
Guidelines for Autonomic Service Agents. 1-23
9223Waqar Zia, Thomas Stockhammer, Lenaig Chaponniere, Giridhar D. Mandyam, Michael Luby:
Real-Time Transport Object Delivery over Unidirectional Transport (ROUTE). 1-35
9224Marc Blanchet:
Finding the Authoritative Registration Data Access Protocol (RDAP) Service. 1-15
9225Job Snijders, Chris Morrow, Remco van Mook:
Software Defects Considered Harmful. 1-6
9226Michael Breen:
Bioctal: Hexadecimal 2.0. 1-7
9227Valery Smyslov:
Using GOST Ciphers in the Encapsulating Security Payload (ESP) and Internet Key Exchange Version 2 (IKEv2) Protocols. 1-22
9228Dave Crocker:
Delivered-To Email Header Field. 1-10
9229Juliusz Chroboczek:
IPv4 Routes with an IPv6 Next Hop in the Babel Routing Protocol. 1-9
9230Eric Kinnear, Patrick McManus, Tommy Pauly, Tanya Verma, Christopher A. Wood:
Oblivious DNS over HTTPS. 1-19
9231Donald E. Eastlake III:
Additional XML Security Uniform Resource Identifiers (URIs). 1-47
9232Haoyu Song, Fengwei Qin, Pedro Martinez-Julia, Laurent Ciavaglia, Aijun Wang:
Network Telemetry Framework. 1-33
9233Patrik Fältström:
Internationalized Domain Names for Applications 2008 (IDNA2008) and Unicode 12.0.0. 1-26
9234Alexander Azimov, Eugene Bogomazov, Randy Bush, Keyur Patel, Kotikalapudi Sriram:
Route Leak Prevention and Detection Using Roles in UPDATE and OPEN Messages. 1-12
9235Joe Touch, Juhamatti Kuusisaari:
TCP Authentication Option (TCP-AO) Test Vectors. 1-25
9236Jungha Hong, Taewan You, Ved P. Kafle:
Architectural Considerations of Information-Centric Networking (ICN) Using a Name Resolution Service. 1-11
9237Carsten Bormann
:
An Authorization Information Format (AIF) for Authentication and Authorization for Constrained Environments (ACE). 1-14
9238Michael Richardson, Jacques Latour, Hassan Habibi Gharakheili:
Loading Manufacturer Usage Description (MUD) URLs from QR Codes. 1-12
9239Matthew A. Miller, Myles Borins, Mathias Bynens, Bradley Farias:
Updates to ECMAScript Media Types. 1-13
9240Wendy Roome, Sabine Randriamasy, Yang Richard Yang, Jingxuan Jensen Zhang, Kai Gao:
An Extension for Application-Layer Traffic Optimization (ALTO): Entity Property Maps. 1-53
9241Jan Seedorf, Yang Richard Yang, Kevin J. Ma, Jon Peterson, Jingxuan Jensen Zhang:
Content Delivery Network Interconnection (CDNI) Footprint and Capabilities Advertisement Using Application-Layer Traffic Optimization (ALTO). 1-42
9242Valery Smyslov:
Intermediate Exchange in the Internet Key Exchange Protocol Version 2 (IKEv2). 1-14
9243Ian Farrer:
A YANG Data Model for DHCPv6 Configuration. 1-92
9244Mohamed Boucadair, T. Reddy K., Ehud Doron, Meiling Chen, Jon Shallow:
Distributed Denial-of-Service Open Threat Signaling (DOTS) Telemetry. 1-108
9245Lars Eggert, Susan Harris:
IETF Discussion List Charter. 1-7
9246Ray van Brandenburg, Kent Leung, Phil Sorber:
URI Signing for Content Delivery Network Interconnection (CDNI). 1-37
9247Zhenbin Li, Shunwan Zhuang, Ketan Talaulikar, Sam Aldrin, Jeff Tantsura, Greg Mirsky:
BGP - Link State (BGP-LS) Extensions for Seamless Bidirectional Forwarding Detection (S-BFD). 1-6
9248Brian Rosen:
Interoperability Profile for Relay User Equipment. 1-36
9249Nan Wu, Dhruv Dhody, Ankit Kumar Sinha, Anil Kumar S. N., Yi Zhao:
A YANG Data Model for NTP. 1-56
9250Christian Huitema, Sara Dickinson, Allison Mankin:
DNS over Dedicated QUIC Connections. 1-27
9251Ali Sajassi, Samir Thoria, Mankamana Mishra, Keyur Patel, John Drake, Wen Lin:
Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Proxies for Ethernet VPN (EVPN). 1-30
9252Gaurav Dawra, Ketan Talaulikar, Robert Raszuk, Bruno Decraene, Shunwan Zhuang, Jorge Rabadan:
BGP Overlay Services Based on Segment Routing over IPv6 (SRv6). 1-29
9253Michael Douglass:
Support for iCalendar Relationships. 1-19
9254Michel Veillette, Ivaylo Petrov, Alexander Pelov, Carsten Bormann
, Michael Richardson:
Encoding of Data Modeled with YANG in the Concise Binary Object Representation (CBOR). 1-45
9255Randy Bush, Russ Housley:
The 'I' in RPKI Does Not Stand for Identity. 1-7
9256Clarence Filsfils, Ketan Talaulikar, Daniel Voyer, Alex Bogdanov, Paul Mattes:
Segment Routing Policy Architecture. 1-35
9257Russ Housley, Jonathan Hoyland
, Mohit Sethi, Christopher A. Wood:
Guidance for External Pre-Shared Key (PSK) Usage in TLS. 1-13
9258David Benjamin, Christopher A. Wood:
Importing External Pre-Shared Keys (PSKs) for TLS 1.3. 1-11
9259Zafar Ali, Clarence Filsfils, Satoru Matsushima, Daniel Voyer, Mach (Guoyi) Chen:
Operations, Administration, and Maintenance (OAM) in Segment Routing over IPv6 (SRv6). 1-19
9260Randall R. Stewart, Michael Tüxen, Karen E. E. Nielsen:
Stream Control Transmission Protocol. 1-133
9261Nick Sullivan:
Exported Authenticators in TLS. 1-14
9262Toerless Eckert, Michael Menth, Gregory Cauchie:
Tree Engineering for Bit Index Explicit Replication (BIER-TE). 1-43
9263Yuehua Wei, Uri Elzur, Sumandra Majee, Carlos Pignataro, Donald E. Eastlake III:
Network Service Header (NSH) Metadata Type 2 Variable-Length Context Headers. 1-15
9264Erik Wilde, Herbert Van de Sompel:
Linkset: Media Types and a Link Relation Type for Link Sets. 1-31
9265Nicolas Kuhn, Emmanuel Lochin, François Michel, Michael Welzl:
Forward Erasure Correction (FEC) Coding and Congestion Control in Transport. 1-21
9266Sam Whited:
Channel Bindings for TLS 1.3. 1-7
9267Stanislav Dashevskyi, Daniel Ricardo dos Santos, Jos Wetzels, Amine Amri:
Common Implementation Anti-Patterns Related to Domain Name System (DNS) Resource Record (RR) Processing. 1-16
9268Robert M. Hinden, Godred Fairhurst:
IPv6 Minimum Path MTU Hop-by-Hop Option. 1-20
9269Prakash Suthar, Milan Stolic, Anil Jangam, Dirk Trossen, Ravi Ravindran:
Experimental Scenarios of Information-Centric Networking (ICN) Integration in 4G Mobile Networks. 1-33
9270Jia He, Italo Busi, Jeong-dong Ryoo, Bin-Yeong Yoon, Peter Park:
GMPLS Signaling Extensions for Shared Mesh Protection. 1-13
9271Roger Price:
Uninterruptible Power Supply (UPS) Management Protocol - Commands and Responses. 1-52
9272Jeffrey (Zhaohui) Zhang, Antoni Przygienda, Andrew Dolganow, Hooman Bidgoli, IJsbrand Wijnands, Arkadiy Gulko:
Underlay Path Calculation Algorithm and Constraints for Bit Index Explicit Replication (BIER). 1-6
9273Kazuhisa Matsuzono, Hitoshi Asaeda, Cédric Westphal:
Network Coding for Content-Centric Networking / Named Data Networking: Considerations and Challenges. 1-20
9274Mohamed Boucadair, Qin Wu:
A Cost Mode Registry for the Application-Layer Traffic Optimization (ALTO) Protocol. 1-7
9275Kai Gao, Young Lee, Sabine Randriamasy, Yang Richard Yang, Jingxuan Jensen Zhang:
An Extension for Application-Layer Traffic Optimization (ALTO): Path Vector. 1-54
9276Wes Hardaker, Viktor Dukhovni:
Guidance for NSEC3 Parameter Settings. 1-10
9277Michael Richardson, Carsten Bormann
:
On Stable Storage for Items in Concise Binary Object Representation (CBOR). 1-18
9278Michael B. Jones, Kristina Yasuda:
JWK Thumbprint URI. 1-6
9279Mahesh Sivakumar, Stig Venaas, Jeffrey (Zhaohui) Zhang, Hitoshi Asaeda:
Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener Discovery Version 2 (MLDv2) Message Extension. 1-12
9280Peter Saint-Andre:
RFC Model (Version 3). 1-27
9281Rich Salz:
Entities Involved in the IETF Standards Process. 1-12
9282Brian Rosen:
Responsibility Change for the RFC Series. 1-3
9283Brian E. Carpenter
:
IAB Charter Update for RFC Model. 1-3
9284Mohamed Boucadair, T. Reddy K., Wei Pan:
Multihoming Deployment Considerations for DDoS Open Threat Signaling (DOTS). 1-14
9285Patrik Fältström, Fredrik Ljunggren, Dirk-Willem van Gulik:
The Base45 Data Encoding. 1-8
9286Rob Austein, Geoff Huston, Stephen T. Kent, Matt Lepinski:
Manifests for the Resource Public Key Infrastructure (RPKI). 1-16
9287Martin Thomson:
Greasing the QUIC Bit. 1-6
9288Fernando Gont, Will (Shucheng) Liu:
Recommendations on the Filtering of IPv6 Packets Containing IPv6 Extension Headers at Transit Routers. 1-33
9289Trond Myklebust, Charles Lever:
Towards Remote Procedure Call Encryption by Default. 1-21
9290Thomas Fossati, Carsten Bormann
:
Concise Problem Details for Constrained Application Protocol (CoAP) APIs. 1-21
9291Mohamed Boucadair, Óscar González de Dios, Samier Barguil, Luis Angel Munoz:
A YANG Network Data Model for Layer 2 VPNs. 1-139
9292Martin Thomson, Christopher A. Wood:
Binary Representation of HTTP Messages. 1-16
9293Wesley M. Eddy:
Transmission Control Protocol (TCP). 1-98
9294Ketan Talaulikar, Peter Psenak, Jeff Tantsura:
Application-Specific Link Attributes Advertisement Using the Border Gateway Protocol - Link State (BGP-LS). 1-12
9295Sean Turner, Simon Josefsson, Daniel McCarney, Tadahiko Ito:
Clarifications for Ed25519, Ed448, X25519, and X448 Algorithm Identifiers. 1-5
9296Daiying Liu, Joel M. Halpern, Congjie Zhang:
ifStackTable for the Point-to-Point (P2P) Interface over a LAN Type: Definition and Examples. 1-9
9297David Schinazi, Lucas Pardue:
HTTP Datagrams and the Capsule Protocol. 1-14
9298David Schinazi:
Proxying UDP in HTTP. 1-16
9299Albert Cabellos, Damien Saucez:
An Architectural Introduction to the Locator/ID Separation Protocol (LISP). 1-24

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














