{"draft":"draft-ietf-tsvwg-rsvp-security-groupkeying-11","doc_id":"RFC6411","title":"Applicability of Keying Methods for RSVP Security","authors":["M. Behringer","F. Le Faucheur","B. Weis"],"format":["ASCII","HTML"],"page_count":"19","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Transport and Services Working Group","abstract":"The Resource reSerVation Protocol (RSVP) allows hop-by-hop integrity\r\nprotection of RSVP neighbors. This requires messages to be\r\ncryptographically protected using a shared secret between\r\nparticipating nodes. This document compares group keying for RSVP\r\nwith per-neighbor or per-interface keying, and discusses the\r\nassociated key provisioning methods as well as applicability and\r\nlimitations of these approaches. This document also discusses\r\napplicability of encrypting RSVP messages. This document is not an \r\nInternet Standards Track specification; it is published for informational \r\npurposes.","pub_date":"October 2011","keywords":["RSVP authentication","RSVP integrity","Resource reservation protocol","GDOI","Group domain of interpretation"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC6411","errata_url":null}