{"draft":"draft-ietf-softwire-security-requirements-09","doc_id":"RFC5619","title":"Softwire Security Analysis and Requirements","authors":["S. Yamamoto","C. Williams","H. Yokota","F. Parent"],"format":["ASCII","HTML"],"page_count":"28","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Softwires","abstract":"This document describes security guidelines for the softwire \"Hubs\r\nand Spokes\" and \"Mesh\" solutions. Together with discussion of the\r\nsoftwire deployment scenarios, the vulnerability to security attacks\r\nis analyzed to provide security protection mechanisms such as\r\nauthentication, integrity, and confidentiality to the softwire\r\ncontrol and data packets. [STANDARDS-TRACK]","pub_date":"August 2009","keywords":["[--------]","IPv6","Tunnel","Softwire","Transition"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC5619","errata_url":null}