Operations Model for Router Keying

The information below is for an old version of the document
Document Type Expired Internet-Draft (karp WG)
Last updated 2012-04-25 (latest revision 2011-10-23)
Replaces draft-hartman-karp-ops-model
Stream IETF
Intended RFC status (None)
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream WG state WG Document
Document shepherd None
IESG IESG state Expired
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


Developing an operational and management model for routing protocol security that works across protocols will be critical to the success of routing protocol security efforts. This document discusses issues and begins to consider development of these models.


Dacheng Zhang (zhangdacheng@huawei.com)
Sam Hartman (hartmans-ietf@mit.edu)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)