Keying and Authentication for Routing Protocols (KARP) Overview, Threats, and Requirements
draft-ietf-karp-threats-reqs-06
The information below is for an old version of the document | |||||
---|---|---|---|---|---|
Document | Type | Active Internet-Draft (karp WG) | |||
Authors | Gregory Lebovitz , Manav Bhatia | ||||
Last updated | 2012-09-26 | ||||
Stream | IETF | ||||
Intended RFC status | Informational | ||||
Formats | pdf htmlized (tools) htmlized bibtex | ||||
Reviews | |||||
Additional Resources |
|
||||
Stream | WG state | Submitted to IESG for Publication | |||
Document shepherd | Brian Weis | ||||
Shepherd write-up | Show (last changed 2012-09-13) | ||||
IESG | IESG state | IESG Evaluation::AD Followup | |||
Consensus Boilerplate | Unknown | ||||
Telechat date |
Needs a YES. |
||||
Responsible AD | Stewart Bryant | ||||
IESG note | Brian Weis (bew@cisco.com) is the document shepherd. | ||||
Send notices to | karp-chairs@tools.ietf.org, draft-ietf-karp-threats-reqs@tools.ietf.org |