📄 rfc2699.txt
字号:
2628 Smyslov Jun 1999 Simple Cryptographic Program Interface (Crypto API)This document describes a simple Application Program Interface tocryptographic functions. This memo provides information for theInternet community.Ginoza Informational [Page 15]RFC 2699 Summary of 2600-2699 May 20002627 Wallner Jun 1999 Key Management for Multicast: Issues and ArchitecturesThis report contains a discussion of the difficult problem of keymanagement for multicast communication sessions. It focuses on two mainareas of concern with respect to key management, which are, initializingthe multicast group with a common net key and rekeying the multicastgroup. This memo provides information for the Internet community.2626 Nesser II Jun 1999 The Internet and the Millennium Problem (Year 2000)The Year 2000 Working Group (WG) has conducted an investigation into themillennium problem as it regards Internet related protocols. Thisinvestigation only targeted the protocols as documented in the RequestFor Comments Series (RFCs). This investigation discovered little reasonfor concern with regards to the functionality of the protocols. A fewminor cases of older implementations still using two digit years (alaRFC 850) were discovered, but almost all Internet protocols were given aclean bill of health. Several cases of "period" problems werediscovered, where a time field would "roll over" as the size of fieldwas reached. In particular, there are several protocols, which have 32bit, signed integer representations of the number of seconds sinceJanuary 1, 1970 which will turn negative at Tue Jan 19 03:14:07 GMT2038. Areas whose protocols will be effected by such problems have beennotified so that new revisions will remove this limitation. This memoprovides information for the Internet community.2625 Rajagopal Jun 1999 IP and ARP over Fibre ChannelThe purpose of this document is to specify a way of encapsulating IP andAddress Resolution Protocol(ARP) over Fibre Channel and also to describea mechanism(s) for IP address resolution. [STANDARDS-TRACK]2624 Shepler Jun 1999 NFS Version 4 Design ConsiderationsThis design considerations document is meant to present more detail thanthe working group charter. Specifically, it presents the areas that theworking group will investigate and consider while developing a protocolspecification for NFS version 4. This memo provides information for theInternet community.Ginoza Informational [Page 16]RFC 2699 Summary of 2600-2699 May 20002623 Eisler Jun 1999 NFS Version 2 and Version 3 Security Issues and the NFS Protocol's Use of RPCSEC_GSS and Kerberos V5This memorandum clarifies various security issues involving the NFSprotocol (Version 2 and Version 3 only) and then describes how theVersion 2 and Version 3 of the NFS protocol use the RPCSEC_GSS securityflavor protocol and Kerberos V5. [STANDARDS-TRACK]2622 Alaettinoglu Jun 1999 Routing Policy Specification Language (RPSL)RPSL allows a network operator to be able to specify routing policies atvarious levels in the Internet hierarchy; for example at the AutonomousSystem (AS) level. At the same time, policies can be specified withsufficient detail in RPSL so that low level router configurations can begenerated from them. RPSL is extensible; new routing protocols and newprotocol features can be introduced at any time. [STANDARDS-TRACK]2621 Zorn Jun 1999 RADIUS Accounting Server MIBThis memo defines a set of extensions which instrument RADIUS accountingserver functions. This memo provides information for the Internetcommunity.2620 Aboba Jun 1999 RADIUS Accounting Client MIBThis memo defines a set of extensions which instrument RADIUS accountingclient functions. This memo provides information for the Internetcommunity.2619 Zorn Jun 1999 RADIUS Authentication Server MIBThis memo defines a set of extensions which instrument RADIUSauthentication server functions. [STANDARDS-TRACK]2618 Aboba Jun 1999 RADIUS Authentication Client MIBThis memo defines a set of extensions which instrument RADIUSauthentication client functions. [STANDARDS-TRACK]Ginoza Informational [Page 17]RFC 2699 Summary of 2600-2699 May 20002617 Franks Jun 1999 HTTP Authentication: Basic and Digest Access AuthenticationThis document provides the specification for HTTP's authenticationframework, the original Basic authentication scheme and a scheme basedon cryptographic hashes, referred to as "Digest Access Authentication".[STANDARDS-TRACK]2616 Fielding Jun 1999 Hypertext Transfer Protocol -- HTTP/1.1HTTP has been in use by the World-Wide Web global information initiativesince 1990. This specification defines the protocol referred to as"HTTP/1.1", and is an update to RFC 2068. [STANDARDS-TRACK]2615 Malis Jun 1999 PPP over SONET/SDHThis document describes the use of PPP over Synchronous Optical Network(SONET) and Synchronous Digital Hierarchy (SDH) circuits. [STANDARDS-TRACK]2614 Kempf Jun 1999 An API for Service LocationThis document describes standardized APIs for SLP in C and Java. Thismemo provides information for the Internet community.2613 Waterman Jun 1999 Remote Network Monitoring MIB Extensions for Switched Networks Version 1.0This memo defines a portion of the Management Information Base (MIB) foruse with network management protocols in TCP/IP-based internets. Inparticular, it defines objects for managing remote network monitoringdevices in switched networks environments. [STANDARDS-TRACK]2612 Adams Jun 1999 The CAST-256 Encryption AlgorithmThis document describes an existing algorithm that can be used tosatisfy this requirement. Included are a description of the cipher andthe key scheduling algorithm, the s-boxes, and a set of test vectors(Appendix A). This memo provides information for the Internetcommunity.Ginoza Informational [Page 18]RFC 2699 Summary of 2600-2699 May 20002611 Daigle Jun 1999 URN Namespace Definition MechanismsThis document lays out general definitions of and mechanisms forestablishing URN "namespaces". This document specifies an Internet BestCurrent Practices for the Internet Community, and requests discussionand suggestions for improvements.2610 Perkins Jun 1999 DHCP Options for Service Location ProtocolThe Dynamic Host Configuration Protocol provides a framework for passingconfiguration information to hosts on a TCP/IP network. Entities usingthe Service Location Protocol need to find out the address of DirectoryAgents in order to transact messages. Another option provides anassignment of scope for configuration of SLP User and Service Agents.[STANDARDS-TRACK]2609 Guttman Jun 1999 Service Templates and Service: SchemesThis document describes a formal procedure for defining andstandardizing new service types and attributes for use with the"service:" scheme. [STANDARDS-TRACK]2608 Guttman Jun 1999 Service Location Protocol, Version 2The Service Location Protocol provides a scalable framework for thediscovery and selection of network services. Using this protocol,computers using the Internet need little or no static configuration ofnetwork services for network based applications. This is especiallyimportant as computers become more portable, and users less tolerant orable to fulfill the demands of network system administration.[STANDARDS-TRACK]2607 Aboba Jun 1999 Proxy Chaining and Policy Implementation in RoamingThis document describes how proxy chaining and policy implementation canbe supported in roaming systems. This memo provides information for theInternet community.Ginoza Informational [Page 19]RFC 2699 Summary of 2600-2699 May 20002606 Eastlake Jun 1999 Reserved Top Level DNS NamesTo reduce the likelihood of conflict and confusion, a few top leveldomain names are reserved for use in private testing, as examples indocumentation, and the like. In addition, a few second level domainnames reserved for use as examples are documented. This documentspecifies an Internet Best Current Practices for the Internet Community,and requests discussion and suggestions for improvements.2605 Mansfield Jun 1999 Directory Server Monitoring MIBThis memo defines a portion of the Management Information Base (MIB) foruse with network management protocols in the Internet community.[STANDARDS-TRACK]2604 Gellens Jun 1999 Wireless Device Configuration (OTASP/OTAPA) via ACAPThis paper describes a viable and attractive means to provideOTASP/OTAPA via IS-707, using the ACAP protocol. This memo providesinformation for the Internet community.2603 Davison Jun 1999 ILMI-Based Server Discovery for NHRPThis memo defines how ILMI-based Server Discovery, which provides amethod for ATM-attached hosts and routers to dynamically determine theATM addresses of servers, shall be used to locate NHRP servers.[STANDARDS-TRACK]2602 Davison Jun 1999 ILMI-Based Server Discovery for MARSThis memo defines how ILMI-based Server Discovery, which provides amethod for ATM-attached hosts and routers to dynamically determine theATM addresses of servers, shall be used to locate MARS servers.[STANDARDS-TRACK]Ginoza Informational [Page 20]RFC 2699 Summary of 2600-2699 May 20002601 Davison Jun 1999 ILMI-Based Server Discovery for ATMARPThis memo defines how ILMI-based Server Discovery, which provides amethod for ATM-attached hosts and routers to dynamically determine theATM addresses of servers, shall be used to locate ATMARP servers.[STANDARDS-TRACK]2600 Reynolds Mar 2000 Internet Official Protocol StandardsThis memo is published by the RFC Editor in accordance with Section 2.1of "The Internet Standards Process -- Revision 3", RFC 2026, whichspecifies the rules and procedures by which all Internet standards areset. This memo is prepared by the RFC Editor for the IESG and IAB.Please see http://www.rfc-editor.org for later updates to this document.[STANDARDS-TRACK]Security Considerations Security issues are not discussed in this memo.Author's Address Sandy Ginoza University of Southern California Information Sciences Institute 4676 Admiralty Way Marina Del Rey, CA 90292 Phone: (310) 822-1511 EMail: ginoza@isi.eduGinoza Informational [Page 21]RFC 2699 Summary of 2600-2699 May 2000Full Copyright Statement Copyright (C) The Internet Society (1998). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Ginoza Informational [Page 22]
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -