FYI - This draft describes the key-chain YANG data model. Key-chains have
been implemented by most networking vendors and are used for routing
protocol authentication. One of the authors will be presenting the draft
in Dallas. 
Thanks,
Acee

On 12/1/14, 10:13 AM, "[email protected]"
<[email protected]> wrote:

>
>A new version of I-D, draft-acee-rtg-yang-key-chain-00.txt
>has been successfully submitted by Acee Lindem and posted to the
>IETF repository.
>
>Name:          draft-acee-rtg-yang-key-chain
>Revision:      00
>Title:         Key Chain YANG Data Model
>Document date: 2014-12-01
>Group:         Individual Submission
>Pages:         17
>URL:            
>http://www.ietf.org/internet-drafts/draft-acee-rtg-yang-key-chain-00.txt
>Status:         
>https://datatracker.ietf.org/doc/draft-acee-rtg-yang-key-chain/
>Htmlized:       
>http://tools.ietf.org/html/draft-acee-rtg-yang-key-chain-00
>
>
>Abstract:
>   This document describes the key chain YANG data model.  Industry
>   standard key chains are lists of keys, send lifetimes, accept
>   lifetimes, and algorithms.  By properly overlapping the send and
>   accept lifetimes of multiple key chain entries, keys and algorithms
>   may be gracefully updated.  By representing them in a YANG data
>   model, key distribution can be automated.  Key chains are commonly
>   used for routing protocol authentication and other applications.  In
>   some applications, the protocols do not directly use the key chain
>   entry keys, but rather a key derivation function is used to derive a
>   short-lived key from the key-chain key.
>
>                  
>        
>
>
>Please note that it may take a couple of minutes from the time of
>submission
>until the htmlized version and diff are available at tools.ietf.org.
>
>The IETF Secretariat
>

_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

Reply via email to