{"draft":"draft-ietf-karp-ops-model-10","doc_id":"RFC7211","title":"Operations Model for Router Keying","authors":["S. Hartman","D. Zhang"],"format":["ASCII","HTML"],"page_count":"18","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Keying and Authentication for Routing Protocols","abstract":"The IETF is engaged in an effort to analyze the security of routing\r\nprotocol authentication according to design guidelines discussed in\r\nRFC 6518, \"Keying and Authentication for Routing Protocols (KARP) \r\nDesign Guidelines\". Developing an operational and management model\r\nfor routing protocol security that works with all the routing\r\nprotocols will be critical to the deployability of these efforts.\r\nThis document gives recommendations to operators and implementors\r\nregarding management and operation of router authentication. These\r\nrecommendations will also assist protocol designers in understanding\r\nmanagement issues they will face.","pub_date":"June 2014","keywords":[],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC7211","errata_url":null}