World Library  

QR link for Rsvp Security Properties
Add to Book Shelf
Flag as Inappropriate
Email this Book

Rsvp Security Properties

By Tschofenig, H.

Click here to view

Book Id: WPLBN0000693430
Format Type: PDF eBook
File Size: 114.96 KB.
Reproduction Date: 2005
Full Text

Title: Rsvp Security Properties  
Author: Tschofenig, H.
Volume:
Language: English
Subject: Topology, Reference Collection, Math
Collections: Technical eBooks Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Tschofenig, H. (n.d.). Rsvp Security Properties. Retrieved from http://community.worldlibrary.net/


Description
Technical Reference Publication

Excerpt
Introduction: HTTP/1.0 [3] and HTTP/1.1 [11] define protocol constructs (respectively, the HTTP-header and message-header BNF rules) that are used as message headers. These specifications also define a number of HTTP headers themselves, and they provide for extension through the use of new field-names.

Table of Contents
Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Terminology and Architectural Assumptions . . . . . . . . . 3 3. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . 5 3.1. The RSVP INTEGRITY Object . . . . . . . . . . . . . . 5 3.2. Security Associations . . . . . . . . . . . . . . . . 8 3.3. RSVP Key Management Assumptions . . . . . . . . . . . 8 3.4. Identity Representation . . . . . . . . . . . . . . . 9 3.5. RSVP Integrity Handshake . . . . . . . . . . . . . . 13 4. Detailed Security Property Discussion . . . . . . . . . . . 15 4.1. Network Topology . . . . . . . . . . . . . . . . . . 15 4.2. Host/Router . . . . . . . . . . . . . . . . . . . . . 15 4.3. User to PEP/PDP . . . . . . . . . . . . . . . . . . . 19 4.4. Communication between RSVP-Aware Routers . . . . . . . 28 5. Miscellaneous Issues . . . . . . . . . . . . . . . . . . . . 29 5.1. First-Hop Issue . . . . . . . . . . . . . . . . . . . 30 5.2. Next-Hop Problem . . . . . . . . . . . . . . . . . . . 30 5.3. Last-Hop Issue . . . . . . . . . . . . . . . . . . . 33 5.4. RSVP- and IPsec-protected data traffic . . . . . . . . 34 5.5. End-to-End Security Issues and RSVP . . . . . . . . . 36 5.6. IPsec protection of RSVP signaling messages . . . . . 36 5.7. Authorization . . . . . . . . . . . . . . . . . . . . 37 6. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . 38 7. Security Considerations . . . . . . . . . . . . . . . . . . 40 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 40 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 40 9.1. Normative References . . . . . . . . . . . . . . . . . 40 9.2. Informative References . . . . . . . . . . . . . . . . 41 A. Dictionary Attacks and Kerberos . . . . . . . . . . . . . . 45 B. Example of User-to-PDP Authentication . . . . . . . . . . . 45 C. Literature on RSVP Security . . . . . . . . . . . . . . . . 46

 

Click To View

Additional Books


  • Bryant and Stratton's Commercial Arithme... (by )
  • The Boundary Layer between a Plasma and ... (by )
  • The Bifürcation of Tracked Scalar Waves (by )
  • Bibliographie Nerlandaise Historique-Sci... (by )
  • Bryant and Stratton's Commercial Arithme... (by )
  • Brain Peeling : Viewing the inside of a ... (by )
  • Burnham's Arithmetic, Revised : A New Sy... (by )
  • The Beginner's Algebra (by )
  • The Beginner's Algebra (by )
  • The Boston Colloquium : Lectures on Math... (by )
  • Brief Course in Algebra (by )
  • Bifurcation Buckling of Spherical Caps (by )
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from World Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.