Stronger, Automatic Integrity Checks for OSPF Packets
draft-jakma-ospf-integrity-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Paul Jakma , Manav Bhatia | ||
Last updated | 2010-10-13 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document describes an extension to OSPFv2 and OSPFv3 to allow a stronger integrity check to be applied to the protocol packets, than the default OSPF checksum, which is known to be weak. The extension allows OSPF speakers to negotiate the use of a CRC integrity check, as a new psuedo-authentication type.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)