References to rfc4949

These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.

Showing RFCs and active Internet-Drafts, sorted by reference type, then document name.

Document Title Status Type Downref
draft-hallambaker-mesh-dare Mathematical Mesh 3.0 Part III : Data At Rest Encryption (DARE)
References Referenced by
normatively references
draft-hallambaker-mesh-dare
As fyi36
Mathematical Mesh 3.0 Part III : Data At Rest Encryption (DARE)
References Referenced by
normatively references
draft-hardt-gnap-advanced The Grant Negotiation and Authorization Protocol - Advanced Features
References Referenced by
normatively references
draft-hardt-gnap-advanced
As fyi36
The Grant Negotiation and Authorization Protocol - Advanced Features
References Referenced by
normatively references
draft-hardt-gnap-jose JOSE Authentication
References Referenced by
normatively references
draft-hardt-gnap-jose
As fyi36
JOSE Authentication
References Referenced by
normatively references
draft-hardt-xauth-protocol The Grant Negotiation and Authorization Protocol
References Referenced by
normatively references
draft-hardt-xauth-protocol
As fyi36
The Grant Negotiation and Authorization Protocol
References Referenced by
normatively references
draft-ietf-ace-aif An Authorization Information Format (AIF) for ACE
References Referenced by
normatively references
draft-ietf-ace-aif
As fyi36
An Authorization Information Format (AIF) for ACE
References Referenced by
normatively references
draft-ietf-ace-oauth-authz Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)
References Referenced by
Proposed Standard normatively references Downref
draft-ietf-ace-oauth-authz
As fyi36
Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)
References Referenced by
Proposed Standard normatively references Downref
draft-ietf-acme-authority-token-tnauthlist TNAuthList profile of ACME Authority Token
References Referenced by
Proposed Standard normatively references Downref
draft-ietf-acme-authority-token-tnauthlist
As fyi36
TNAuthList profile of ACME Authority Token
References Referenced by
Proposed Standard normatively references Downref
draft-ietf-i2nsf-nsf-monitoring-data-model I2NSF NSF Monitoring YANG Data Model
References Referenced by
normatively references
draft-ietf-i2nsf-nsf-monitoring-data-model
As fyi36
I2NSF NSF Monitoring YANG Data Model
References Referenced by
normatively references
draft-ietf-kitten-password-storage Best practices for password hashing and storage
References Referenced by
normatively references
draft-ietf-kitten-password-storage
As fyi36
Best practices for password hashing and storage
References Referenced by
normatively references
draft-ietf-oauth-v2-1 The OAuth 2.1 Authorization Framework
References Referenced by
normatively references
draft-ietf-oauth-v2-1
As fyi36
The OAuth 2.1 Authorization Framework
References Referenced by
normatively references
draft-kucherawy-dmarc-dmarcbis Domain-based Message Authentication, Reporting, and Conformance (DMARC)
References Referenced by
normatively references
draft-kucherawy-dmarc-dmarcbis
As fyi36
Domain-based Message Authentication, Reporting, and Conformance (DMARC)
References Referenced by
normatively references
draft-marques-pep-handshake pretty Easy privacy (pEp): Contact and Channel Authentication through Handshake
References Referenced by
normatively references
draft-marques-pep-handshake
As fyi36
pretty Easy privacy (pEp): Contact and Channel Authentication through Handshake
References Referenced by
normatively references
draft-melnikov-scram-2fa Extensions to Salted Challenge Response (SCRAM) for 2 factor authentication
References Referenced by
normatively references
draft-melnikov-scram-2fa
As fyi36
Extensions to Salted Challenge Response (SCRAM) for 2 factor authentication
References Referenced by
normatively references
draft-pep-email pretty Easy privacy (pEp): Email Formats and Protocols
References Referenced by
normatively references
draft-pep-email
As fyi36
pretty Easy privacy (pEp): Email Formats and Protocols
References Referenced by
normatively references
draft-pep-keysync pretty Easy privacy (pEp): Key Synchronization Protocol (KeySync)
References Referenced by
normatively references
draft-pep-keysync
As fyi36
pretty Easy privacy (pEp): Key Synchronization Protocol (KeySync)
References Referenced by
normatively references
draft-sheffer-uta-bcp195bis Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
References Referenced by
normatively references
draft-sheffer-uta-bcp195bis
As fyi36
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
References Referenced by
normatively references
draft-sheffer-uta-rfc7525bis Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
References Referenced by
normatively references
draft-sheffer-uta-rfc7525bis
As fyi36
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
References Referenced by
normatively references
RFC 6341 Use Cases and Requirements for SIP-Based Media Recording (SIPREC)
References Referenced by
Informational normatively references
RFC 6341
As fyi36
Use Cases and Requirements for SIP-Based Media Recording (SIPREC)
References Referenced by
Informational normatively references
RFC 6749 The OAuth 2.0 Authorization Framework
References Referenced by
Proposed Standard normatively references Downref
RFC 7165 Use Cases and Requirements for JSON Object Signing and Encryption (JOSE)
References Referenced by
Informational normatively references
RFC 7435 Opportunistic Security: Some Protection Most of the Time
References Referenced by
Informational normatively references
RFC 7489 Domain-based Message Authentication, Reporting, and Conformance (DMARC)
References Referenced by
Informational normatively references
RFC 7489
As fyi36
Domain-based Message Authentication, Reporting, and Conformance (DMARC)
References Referenced by
Informational normatively references
RFC 7515 JSON Web Signature (JWS)
References Referenced by
Proposed Standard normatively references Downref
RFC 7516 JSON Web Encryption (JWE)
References Referenced by
Proposed Standard normatively references Downref
RFC 7517 JSON Web Key (JWK)
References Referenced by
Proposed Standard normatively references Downref
RFC 7518 JSON Web Algorithms (JWA)
References Referenced by
Proposed Standard normatively references Downref
RFC 7519 JSON Web Token (JWT)
References Referenced by
Proposed Standard normatively references Downref
RFC 7525 Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
References Referenced by
Best Current Practice normatively references Downref
RFC 7590 Use of Transport Layer Security (TLS) in the Extensible Messaging and Presence Protocol (XMPP)
References Referenced by
Proposed Standard normatively references Downref
RFC 7590
As fyi36
Use of Transport Layer Security (TLS) in the Extensible Messaging and Presence Protocol (XMPP)
References Referenced by
Proposed Standard normatively references Downref
RFC 7712 Domain Name Associations (DNA) in the Extensible Messaging and Presence Protocol (XMPP)
References Referenced by
Proposed Standard normatively references Downref
RFC 8165 Design Considerations for Metadata Insertion
References Referenced by
Informational normatively references
RFC 8165
As fyi36
Design Considerations for Metadata Insertion
References Referenced by
Informational normatively references
RFC 8241 Interface to the Routing System (I2RS) Security-Related Requirements
References Referenced by
Informational normatively references
RFC 8241
As fyi36
Interface to the Routing System (I2RS) Security-Related Requirements
References Referenced by
Informational normatively references
draft-birkholz-rats-mud MUD-Based RATS Resources Discovery
References Referenced by
informatively references
draft-birkholz-rats-mud
As fyi36
MUD-Based RATS Resources Discovery
References Referenced by
informatively references
draft-birkholz-rats-tuda Time-Based Uni-Directional Attestation
References Referenced by
informatively references
draft-birkholz-rats-tuda
As fyi36
Time-Based Uni-Directional Attestation
References Referenced by
informatively references
draft-ietf-ace-mqtt-tls-profile MQTT-TLS profile of ACE
References Referenced by
informatively references
draft-ietf-ace-mqtt-tls-profile
As fyi36
MQTT-TLS profile of ACE
References Referenced by
informatively references
draft-ietf-ace-oscore-profile OSCORE profile of the Authentication and Authorization for Constrained Environments Framework
References Referenced by
Proposed Standard informatively references
draft-ietf-ace-oscore-profile
As fyi36
OSCORE profile of the Authentication and Authorization for Constrained Environments Framework
References Referenced by
Proposed Standard informatively references
draft-ietf-core-oscore-groupcomm Group OSCORE - Secure Group Communication for CoAP
References Referenced by
informatively references
draft-ietf-core-oscore-groupcomm
As fyi36
Group OSCORE - Secure Group Communication for CoAP
References Referenced by
informatively references
draft-ietf-cose-rfc8152bis-struct CBOR Object Signing and Encryption (COSE): Structures and Process
References Referenced by
Internet Standard informatively references
draft-ietf-cose-rfc8152bis-struct
As fyi36
CBOR Object Signing and Encryption (COSE): Structures and Process
References Referenced by
Internet Standard informatively references
draft-ietf-dots-signal-call-home Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Call Home
References Referenced by
Proposed Standard informatively references
draft-ietf-dots-signal-call-home
As fyi36
Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Call Home
References Referenced by
Proposed Standard informatively references
draft-ietf-drip-reqs Drone Remote Identification Protocol (DRIP) Requirements
References Referenced by
informatively references
draft-ietf-drip-reqs
As fyi36
Drone Remote Identification Protocol (DRIP) Requirements
References Referenced by
informatively references
draft-ietf-lamps-header-protection Header Protection for S/MIME
References Referenced by
informatively references
draft-ietf-lamps-header-protection
As fyi36
Header Protection for S/MIME
References Referenced by
informatively references
draft-ietf-rats-architecture Remote Attestation Procedures Architecture
References Referenced by
informatively references
draft-ietf-rats-architecture
As fyi36
Remote Attestation Procedures Architecture
References Referenced by
informatively references
draft-ietf-rats-eat The Entity Attestation Token (EAT)
References Referenced by
informatively references
draft-ietf-rats-eat
As fyi36
The Entity Attestation Token (EAT)
References Referenced by
informatively references
draft-ietf-regext-rdap-openid Federated Authentication for the Registration Data Access Protocol (RDAP) using OpenID Connect
References Referenced by
Proposed Standard informatively references
draft-ietf-regext-rdap-openid
As fyi36
Federated Authentication for the Registration Data Access Protocol (RDAP) using OpenID Connect
References Referenced by
Proposed Standard informatively references
draft-ietf-teep-architecture Trusted Execution Environment Provisioning (TEEP) Architecture
References Referenced by
informatively references
draft-ietf-teep-architecture
As fyi36
Trusted Execution Environment Provisioning (TEEP) Architecture
References Referenced by
informatively references
draft-irtf-hrpc-guidelines Guidelines for Human Rights Protocol and Architecture Considerations
References Referenced by
informatively references
draft-irtf-hrpc-guidelines
As fyi36
Guidelines for Human Rights Protocol and Architecture Considerations
References Referenced by
informatively references
draft-irtf-pearg-safe-internet-measurement Guidelines for Performing Safe Measurement on the Internet
References Referenced by
Informational informatively references
draft-mcd-identifier-access-security Security Services for the Industrial Internet Identifier Data Access Protocol (IIIDAP)
References Referenced by
informatively references
draft-moriarty-caris2 Coordinating Attack Response at Internet Scale 2 (CARIS2) Workshop Report
References Referenced by
Informational informatively references
draft-moriarty-caris2
As fyi36
Coordinating Attack Response at Internet Scale 2 (CARIS2) Workshop Report
References Referenced by
Informational informatively references
draft-nakajima-crypto-asset-terminology Terminology for Cryptoassets
References Referenced by
informatively references
draft-nakajima-crypto-asset-terminology
As fyi36
Terminology for Cryptoassets
References Referenced by
informatively references
RFC 5042 Direct Data Placement Protocol (DDP) / Remote Direct Memory Access Protocol (RDMAP) Security
References Referenced by
Proposed Standard informatively references
RFC 5197 On the Applicability of Various Multimedia Internet KEYing (MIKEY) Modes and Extensions
References Referenced by
Informational informatively references
RFC 5217 Memorandum for Multi-Domain Public Key Infrastructure Interoperability
References Referenced by
Informational informatively references
RFC 5479 Requirements and Analysis of Media Security Management Protocols
References Referenced by
Informational informatively references
RFC 5479
As fyi36
Requirements and Analysis of Media Security Management Protocols
References Referenced by
Informational informatively references
RFC 5802 Salted Challenge Response Authentication Mechanism (SCRAM) SASL and GSS-API Mechanisms
References Referenced by
Proposed Standard informatively references
RFC 6029 A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem
References Referenced by
Informational informatively references
RFC 6029
As fyi36
A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem
References Referenced by
Informational informatively references
RFC 6092 Recommended Simple Security Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service
References Referenced by
Informational informatively references
RFC 6120 Extensible Messaging and Presence Protocol (XMPP): Core
References Referenced by
Proposed Standard informatively references
RFC 6125 Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)
References Referenced by
Proposed Standard informatively references
RFC 6280 An Architecture for Location and Location Privacy in Internet Applications
References Referenced by
Best Current Practice informatively references
RFC 6280
As fyi36
An Architecture for Location and Location Privacy in Internet Applications
References Referenced by
Best Current Practice informatively references
RFC 6711 An IANA Registry for Level of Assurance (LoA) Profiles
References Referenced by
Informational informatively references
RFC 6781 DNSSEC Operational Practices, Version 2
References Referenced by
Informational informatively references
RFC 6797 HTTP Strict Transport Security (HSTS)
References Referenced by
Proposed Standard informatively references
RFC 6862 Keying and Authentication for Routing Protocols (KARP) Overview, Threats, and Requirements
References Referenced by
Informational informatively references
RFC 6862
As fyi36
Keying and Authentication for Routing Protocols (KARP) Overview, Threats, and Requirements
References Referenced by
Informational informatively references
RFC 6943 Issues in Identifier Comparison for Security Purposes
References Referenced by
Informational informatively references
RFC 6973 Privacy Considerations for Internet Protocols
References Referenced by
Informational informatively references
RFC 7126 Recommendations on Filtering of IPv4 Packets Containing IPv4 Options
References Referenced by
Best Current Practice informatively references
RFC 7186 Security Threats for the Neighborhood Discovery Protocol (NHDP)
References Referenced by
Informational informatively references
RFC 7201 Options for Securing RTP Sessions
References Referenced by
Informational informatively references
RFC 7204 Requirements for Labeled NFS
References Referenced by
Informational informatively references
RFC 7258 Pervasive Monitoring Is an Attack
References Referenced by
Best Current Practice informatively references
RFC 7288 Reflections on Host Firewalls
References Referenced by
Informational informatively references
RFC 7321 Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)
References Referenced by
Proposed Standard informatively references
RFC 7397 Report from the Smart Object Security Workshop
References Referenced by
Informational informatively references
RFC 7416 A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs)
References Referenced by
Informational informatively references
RFC 7481 Security Services for the Registration Data Access Protocol (RDAP)
References Referenced by
Proposed Standard informatively references
RFC 7624 Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement
References Referenced by
Informational informatively references
RFC 7672 SMTP Security via Opportunistic DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS)
References Referenced by
Proposed Standard informatively references
RFC 7754 Technical Considerations for Internet Service Blocking and Filtering
References Referenced by
Informational informatively references
RFC 7754
As fyi36
Technical Considerations for Internet Service Blocking and Filtering
References Referenced by
Informational informatively references
RFC 7804 Salted Challenge Response HTTP Authentication Mechanism
References Referenced by
Experimental informatively references
RFC 7804
As fyi36
Salted Challenge Response HTTP Authentication Mechanism
References Referenced by
Experimental informatively references
RFC 7861 Remote Procedure Call (RPC) Security Version 3
References Referenced by
Proposed Standard informatively references
RFC 7862 Network File System (NFS) Version 4 Minor Version 2 Protocol
References Referenced by
Proposed Standard informatively references
RFC 7877 Session Peering Provisioning Framework (SPPF)
References Referenced by
Proposed Standard informatively references
RFC 7877
As fyi36
Session Peering Provisioning Framework (SPPF)
References Referenced by
Proposed Standard informatively references
RFC 7985 Security Threats to Simplified Multicast Forwarding (SMF)
References Referenced by
Informational informatively references
RFC 8152 CBOR Object Signing and Encryption (COSE)
References Referenced by
Proposed Standard informatively references
RFC 8152
As fyi36
CBOR Object Signing and Encryption (COSE)
References Referenced by
Proposed Standard informatively references
RFC 8176 Authentication Method Reference Values
References Referenced by
Proposed Standard informatively references
RFC 8176
As fyi36
Authentication Method Reference Values
References Referenced by
Proposed Standard informatively references
RFC 8280 Research into Human Rights Protocol Considerations
References Referenced by
Informational informatively references
RFC 8280
As fyi36
Research into Human Rights Protocol Considerations
References Referenced by
Informational informatively references
RFC 8295 EST (Enrollment over Secure Transport) Extensions
References Referenced by
Proposed Standard informatively references
RFC 8551 Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
References Referenced by
Proposed Standard informatively references
RFC 8551
As fyi36
Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification
References Referenced by
Proposed Standard informatively references
RFC 8612 DDoS Open Threat Signaling (DOTS) Requirements
References Referenced by
Informational informatively references
RFC 8612
As fyi36
DDoS Open Threat Signaling (DOTS) Requirements
References Referenced by
Informational informatively references
RFC 8793 Information-Centric Networking (ICN): Content-Centric Networking (CCNx) and Named Data Networking (NDN) Terminology
References Referenced by
Informational informatively references
RFC 8793
As fyi36
Information-Centric Networking (ICN): Content-Centric Networking (CCNx) and Named Data Networking (NDN) Terminology
References Referenced by
Informational informatively references
RFC 3060
As fyi36
Policy Core Information Model -- Version 1 Specification
References Referenced by
Proposed Standard Reference Possible Downref
RFC 3067
As fyi36
TERENA'S Incident Object Description and Exchange Format Requirements
References Referenced by
Informational Reference
RFC 3254
As fyi36
Definitions for talking about directories
References Referenced by
Informational Reference
RFC 3275
As fyi36
(Extensible Markup Language) XML-Signature Syntax and Processing
References Referenced by
Draft Standard Reference Possible Downref