Virtual Private Networks: References
Note: A periodically updated version of this list is kept on-line at http://www.cse.wustl.edu/~jain/refs/refs_vpn.htm
Back to Hot Topics in Networking References
Back to Raj Jain's Home Page
Our Talks and Papers
Key On-line Sites
Books on VPN
See http://www.cse.wustl.edu/~jain/refs/vpn_book.htm
See also books on Security, http://www.cse.wustl.edu/~jain/refs/sec_book.htm
Web Pages
- Bitpipe: Virtual Private Networks, http://www.bitpipe.com/data/rlist?t=sys_40_14
- Brivida, Inc. - Technology for Virtual Private Networks "VPN", http://www.brivida.com/
- CIPE, http://sites.inka.de/sites/bigred/devel/cipe.html
- Cisco - VPN Services_ Quick Links to All VPN Information, http://www.cisco.com/warp/public/779/largeent/learn/technologies/VPNs.html
- Bruce Schneier, https://www.schneier.com
- Designing and Implementing a Virtual Private Network (VPN): ... , http://www.techguide.com/comm/vpnet.shtml
- Firewall - Webopedia Definition and Links, http://webopedia.internet.com/TERM/f/firewall.html
- Home PC Firewall Guide, http://www.firewallguide.com/
- IBM Software: Security: SecureWay Firewall : Overview, http://www.ibm.com/software/security/firewall/
- IPsec Implementation Survey, http://web.mit.edu/tytso/www/ipsec/results9710.html
- IPsec VPNs With Digital Certificates, http://img.cmpnet.com/internetwk/VPN/graphics/IPsec.pdf
- Managed VPN Services -- Marketing Opportunity And Paths For Implementation, http://img.cmpnet.com/internetwk/VPN/graphics/vpnet.pdf
- McGill: Virtual Private Network (VPN), http://www.mcgill.ca/ncs/access/remote/vpn/
- Overview of Virtual Private Networks, http://www.intranetjournal.com/foundation/vpn-1.shtml
- Q237751 - Virtual Private Networking Connection Stops ... , http://support.microsoft.com/support/kb/articles/Q237/7/51.ASP
- Redefining The Virtual Private Network, http://img.cmpnet.com/internetwk/VPN/graphics/Check_PointVPNwp.PDF
- Routing Protocols for Ad Hoc Mobile Wireless Networks, http://www.cse.wustl.edu/~jain/cis788-99/adhoc_routing/index.html
- SSL 3.0 Specification, http://home.netscape.com/eng/ssl3/draft302.txt
- TechGuide, Designing and Implementing a Virtual ... , http://techguide.zdnet.com/titles/vpnet.shtml
- The VPN HOWTO, http://www.linuxdoc.org/HOWTO/mini/VPN.html
- VPN - Glossary - CNET.com, http://cnet.com/Resources/Info/Glossary/Terms/vpn.html
- VPN - Virtual Private Network - Network Security Services - ... , http://www.vpndynamics.com/
- VPN - Webopedia Definition and Links, http://www.webopedia.com/TERM/V/VPN.html
- VPN HOWTO, http://www.linuxdoc.org/HOWTO/VPN-HOWTO.html
- Virtual Private Networking Version 2.0, http://www.commweb.com/article/NMG20000606S0001
- Virtual Private Networking for OS/400, http://www.ibm.com/link/redirect.www.ibm.com/www.as400.ibm.com/tcpip/vpn/
- Virtual Private Networks (VPN / PPTP), http://www.wown.com/j_helmig/vpn.htm
- Virtual Private Networks, http://www.networkmagazine.com/article/NMG20000727S0029
- Vrtual private network - Webopedia Definition and Links, http://webopedia.internet.com/TERM/v/virtual_private_network.html
- Wall Street & Technology Tech Library: Virtual Private ... , http://techlibrary.wallstreetandtech.com/data/rlist?t=sys_40_14
VPN Vendors
- Ascend Communications, http://www.ascend.com
- Assured Digital, Inc., http://www.assured-digital.com
- Astaro Corp., http://astaro.com
- Aventail Corp., http://www.aventail.com
- Cisco, http://www.cisco.com
- PSINet, http://www.psi.com
- RedCreek Communications, http://www.sonicwall.com
- Shiva Corp, http://www.shiva.com
- 3Com Corp., http://www.3com.com
- VPNet Technologies, http://www.vpnet.com
- Borderware, http://www.securecomputing.com
- Data Fellows, http://www.datafellows.com
- Trusted Information Systems, http://www.tis.com
- Microsoft, http://www.microsoft.com
- Sun Microsystems, http://www.sun.com
- See also:
Security Consulting and Testing Companies
IETF Working Groups on VPN
IETF Working Groups on Security
Usenet Newsgroups
IETF RFC's on VPN (non-Security Issues)
- RFC 3145, L2TP Disconnect Cause Information. R. Verma, M. Verma, J. Carlson. July 2001. http://www.ietf.org/rfc/rfc3145.txt
- RFC 3093, Firewall Enhancement Protocol (FEP). M. Gaynor, S. Bradner. 1 April 2001. http://www.ietf.org/rfc/rfc3093.txt
- RFC 3077, A Link-Layer Tunneling Mechanism for Unidirectional Links. E. Duros, W. Dabbous, H. Izumiyama, N. Fujii, Y. Zhang. March 2001. http://www.ietf.org/rfc/rfc3077.txt
- RFC 3070, Layer Two Tunneling Protocol (L2TP) over Frame Relay. V. Rawat, R. Tio, S. Nanji, R. Verma. February 2001. http://www.ietf.org/rfc/rfc3070.txt
- RFC 3069, VLAN Aggregation for Efficient IP Address Allocation. D. McPherson, B. Dykes. February 2001. http://www.ietf.org/rfc/rfc3069.txt
- RFC 3147, Generic Routing Encapsulation over CLNS Networks. P. Christian. July 2001. http://www.ietf.org/rfc/rfc3147.txt
- RFC 3127, Authentication, Authorization, and Accounting: Protocol Evaluation. D. Mitton, M. St.Johns, S. Barkley, D. Nelson, B. Patil, M. Stevens, B. Wolff. June 2001. http://www.ietf.org/rfc/rfc3127.txt
- RFC 2888, Secure Remote Access with L2TP. P. Srisuresh. August 2000. http://www.ietf.org/rfc/rfc2888.txt
- RFC 2865, Remote Authentication Dial In User Service (RADIUS). C. Rigney, S. Willens, A. Rubens, W. Simpson. June 2000. (Updated by RFC2868) http://www.ietf.org/rfc/rfc2865.txt
- RFC 2759, Microsoft PPP CHAP Extensions, Version 2. G. Zorn. January 2000. http://www.ietf.org/rfc/rfc2759.txt
- RFC 2989, Criteria for Evaluating AAA Protocols for Network Access. B. Aboba, P. Calhoun, S. Glass, T. Hiller, P. McCann, H. Shiino, G. Zorn, G. Dommety, C. Perkins, B. Patil, D. Mitton, S. Manning, M. Beadles, P. Walsh, X. Chen, S. Sivalingham, A. Hameed, M. Munson, S. Jacobs, B. Lim, B. Hirschman, R. Hsu, Y. Xu, E. Campbell, S. Baba, E. Jaques. November 2000. http://www.ietf.org/rfc/rfc2989.txt
- RFC 2979, Behavior of and Requirements for Internet Firewalls. N. Freed. October 2000. http://www.ietf.org/rfc/rfc2979.txt
- RFC 2924, Accounting Attributes and Record Formats. N. Brownlee, A. Blount. September 2000. http://www.ietf.org/rfc/rfc2924.txt
- RFC 2917, A Core MPLS IP VPN Architecture. K. Muthukrishnan, A. Malis. September 2000. http://www.ietf.org/rfc/rfc2917.txt
- RFC 2906, AAA Authorization Requirements. S. Farrell, J. Vollbrecht, P. Calhoun, L. Gommans, G. Gross, B. de Bruijn, C. de Laat, M. Holdrege, D. Spence. August 2000. http://www.ietf.org/rfc/rfc2906.txt
- RFC 2905, AAA Authorization Application Examples. J. Vollbrecht, P. Calhoun, S. Farrell, L. Gommans, G. Gross, B. de Bruijn, C. de Laat, M. Holdrege, D. Spence. August 2000. http://www.ietf.org/rfc/rfc2905.txt
- RFC 2904, AAA Authorization Framework. J. Vollbrecht, P. Calhoun, S. Farrell, L. Gommans, G. Gross, B. de Bruijn, C. de Laat, M. Holdrege, D. Spence. August 2000. http://www.ietf.org/rfc/rfc2904.txt
- RFC 2903, Generic AAA Architecture. C. de Laat, G. Gross, L. Gommans, J. Vollbrecht, D. Spence. August 2000. http://www.ietf.org/rfc/rfc2903.txt
- RFC 2882, Network Access Servers Requirements: Extended RADIUS Practices. D. Mitton. July 2000. http://www.ietf.org/rfc/rfc2882.txt
- RFC 2869, RADIUS Extensions. C. Rigney, W. Willats, P. Calhoun. June 2000. http://www.ietf.org/rfc/rfc2869.txt
- RFC 2868, RADIUS Attributes for Tunnel Protocol Support. G. Zorn, D. Leifer, A. Rubens, J. Shriver, M. Holdrege, I. Goyret. June 2000. (Updates RFC2865) http://www.ietf.org/rfc/rfc2868.txt
- RFC 2867, RADIUS Accounting Modifications for Tunnel Protocol Support. G. Zorn, B. Aboba, D. Mitton. June 2000. (Updates RFC2866) http://www.ietf.org/rfc/rfc2867.txt
- RFC 2866, RADIUS Accounting. C. Rigney. June 2000. (Updated by RFC2867) http://www.ietf.org/rfc/rfc2866.txt
- RFC 2809, Implementation of L2TP Compulsory Tunneling via RADIUS. B. Aboba, G. Zorn. April 2000. http://www.ietf.org/rfc/rfc2809.txt
- RFC 2787, Definitions of Managed Objects for the Virtual Router Redundancy Protocol. B. Jewell, D. Chuang. March 2000. http://www.ietf.org/rfc/rfc2787.txt
- RFC 2766, Network Address Translation - Protocol Translation (NAT-PT). G. Tsirtsis, P. Srisuresh. February 2000. http://www.ietf.org/rfc/rfc2766.txt
- RFC 2764, A Framework for IP Based Virtual Private Networks. B. Gleeson, A. Lin, J. Heinanen, G. Armitage, A. Malis. February 2000. http://www.ietf.org/rfc/rfc2764.txt
- RFC 2735, NHRP Support for Virtual Private Networks. B. Fox, B. Petri. December 1999. http://www.ietf.org/rfc/rfc2735.txt
- RFC 2685, Virtual Private Networks Identifier. B. Fox, B. Gleeson. September 1999. http://www.ietf.org/rfc/rfc2685.txt
- RFC 2667, IP Tunnel MIB. D. Thaler. August 1999. http://www.ietf.org/rfc/rfc2667.txt
- RFC 2663, IP Network Address Translator (NAT) Terminology and Considerations. P. Srisuresh, M. Holdrege. August 1999. http://www.ietf.org/rfc/rfc2663.txt
- RFC 2661, Layer Two Tunneling Protocol "L2TP". W. Townsley, A. Valencia, A. Rubens, G. Pall, G. Zorn, B. Palter. August 1999. http://www.ietf.org/rfc/rfc2661.txt
- RFC 2647, Benchmarking Terminology for Firewall Performance. D. Newman. August 1999. http://www.ietf.org/rfc/rfc2647.txt
- RFC 2637, Point-to-Point Tunneling Protocol. K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little, G. Zorn. July 1999. http://www.ietf.org/rfc/rfc2637.txt
- RFC 2621, RADIUS Accounting Server MIB. G. Zorn, B. Aboba. June 1999. http://www.ietf.org/rfc/rfc2621.txt
- RFC 2620, RADIUS Accounting Client MIB. B. Aboba, G. Zorn. June 1999. http://www.ietf.org/rfc/rfc2620.txt
- RFC 2619, RADIUS Authentication Server MIB. G. Zorn, B. Aboba. June 1999. http://www.ietf.org/rfc/rfc2619.txt
- RFC 2618, RADIUS Authentication Client MIB. B. Aboba, G. Zorn. June 1999. http://www.ietf.org/rfc/rfc2618.txt
- RFC 2607, Proxy Chaining and Policy Implementation in Roaming. B. Aboba, J. Vollbrecht. June 1999. http://www.ietf.org/rfc/rfc2607.txt
- RFC 2588, IP Multicast and Firewalls. R. Finlayson. May 1999. http://www.ietf.org/rfc/rfc2588.txt
- RFC 2548, Microsoft Vendor-specific RADIUS Attributes. G. Zorn. March 1999. http://www.ietf.org/rfc/rfc2548.txt
- RFC 2547, BGP/MPLS VPNs. E. Rosen, Y. Rekhter. March 1999. http://www.ietf.org/rfc/rfc2547.txt
- RFC 2341, "Cisco Layer Two Forwarding (Protocol) 'L2F'", 05/06/1998, 29 pp., RFC Index http://www.ietf.org/rfc/rfc2341.txt
- RFC 2340, Nortel's Virtual Network Switching (VNS) Overview. B. Jamoussi, D. Jamieson, D. Williston, S. Gabe. May 1998. http://www.ietf.org/rfc/rfc2340.txt
- RFC 2338, Virtual Router Redundancy Protocol. S. Knight, D. Weaver, D. Whipple, R. Hinden, D. Mitzel, P. Hunt, P. Higginson, M. Shand, A. Lindem. April 1998. http://www.ietf.org/rfc/rfc2338.txt
- RFC 2139, "RADIUS Accounting", 04/18/1997, 25 pp., http://www.ietf.org/rfc/rfc2139.txt
- RFC 2138, "Remote Authentication Dial In User Service (RADIUS)", 04/18/1997, 65 pp., http://www.ietf.org/rfc/rfc2138.txt
- RFC 2107, "Ascend Tunnel Management Protocol - ATMP", 02/06/1997, 21 pp., http://www.ietf.org/rfc/rfc2107.txt
- RFC 1795, "Data Link Switching: Switch-to-Switch Protocol AIW DLSw RIG: DLSw Closed Pages, DLSw Standard Version 1.0", 04/25/1995, 91 pp., http://www.ietf.org/rfc/rfc1795.txt
- RFC 1492, "An Access Control Protocol, Sometimes Called TACACS", 07/23/1993, 21 pp., http://www.ietf.org/rfc/rfc1492.txt
- RFC 927 , "TACACS user identification Telnet option", 12/01/1984, 4 pp., http://www.ietf.org/rfc/rfc927 .txt
IETF RFC's on Security
- RFC 3130, Notes from the State-Of-The-Technology: DNSSEC. E. Lewis. June 2001. http://www.ietf.org/rfc/rfc3130.txt
- RFC 3129, Requirements for Kerberized Internet Negotiation of Keys. M. Thomas. June 2001. http://www.ietf.org/rfc/rfc3129.txt
- RFC 3128, Protection Against a Variant of the Tiny Fragment Attack (RFC 1858). I. Miller. June 2001. (Updates RFC1858) http://www.ietf.org/rfc/rfc3128.txt
- RFC 3127, Authentication, Authorization, and Accounting: Protocol Evaluation. D. Mitton, M. St.Johns, S. Barkley, D. Nelson, B. Patil, M. Stevens, B. Wolff. June 2001. http://www.ietf.org/rfc/rfc3127.txt
- RFC 3118, Authentication for DHCP Messages. R. Droms, Editor, W. Arbaugh, Editor. June 2001. http://www.ietf.org/rfc/rfc3118.txt
- RFC 3112, LDAP Authentication Password Schema. K. Zeilenga. May 2001. http://www.ietf.org/rfc/rfc3112.txt
- RFC 3110, RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS). D. Eastlake 3rd. May 2001. http://www.ietf.org/rfc/rfc3110.txt
- RFC 3097, RSVP Cryptographic Authentication -- Updated Message Type Value. R. Braden, L. Zhang. April 2001. (Updates RFC2747) http://www.ietf.org/rfc/rfc3097.txt
- RFC 3090, DNS Security Extension Clarification on Zone Status. E. Lewis. March 2001. http://www.ietf.org/rfc/rfc3090.txt
- RFC 3079, Deriving Keys for use with Microsoft Point-to-Point Encryption (MPPE). G. Zorn. March 2001. http://www.ietf.org/rfc/rfc3079.txt
- RFC 3078, Microsoft Point-To-Point Encryption (MPPE) Protocol. G. Pall, G. Zorn. March 2001. http://www.ietf.org/rfc/rfc3078.txt
- RFC 3039, Internet X.509 Public Key Infrastructure Qualified Certificates Profile. S. Santesson, W. Polk, P. Barzin, M. Nystrom. January 2001. http://www.ietf.org/rfc/rfc3039.txt
- RFC 3013, Recommended Internet Service Provider Security Services and Procedures. T. Killalea. November 2000. (Also BCP0046) http://www.ietf.org/rfc/rfc3013.txt
- RFC 3008, Domain Name System Security (DNSSEC) Signing Authority. B. Wellington. November 2000. (Updates RFC2535) http://www.ietf.org/rfc/rfc3008.txt
- RFC 3007, Secure Domain Name System (DNS) Dynamic Update. B. Wellington. November 2000. (Updates RFC2535, RFC2136) http://www.ietf.org/rfc/rfc3007.txt
- RFC 2994, A Description of the MISTY1 Encryption Algorithm. H. Ohta, M. Matsui. November 2000. http://www.ietf.org/rfc/rfc2994.txt
- RFC 2994, A Description of the MISTY1 Encryption Algorithm. H. Ohta, M. Matsui. November 2000. http://www.ietf.org/rfc/rfc2994.txt
- RFC 2986, PKCS #10: Certification Request Syntax Specification Version 1.7. M. Nystrom, B. Kaliski. November 2000. http://www.ietf.org/rfc/rfc2986.txt
- RFC 2985, PKCS #9: Selected Object Classes and Attribute Types Version 2.0. M. Nystrom, B. Kaliski. November 2000. http://www.ietf.org/rfc/rfc2985.txt
- RFC 2984, Use of the CAST-128 Encryption Algorithm in CMS. C. Adams. October 2000. http://www.ietf.org/rfc/rfc2984.txt
- RFC 2984, Use of the CAST-128 Encryption Algorithm in CMS. C. Adams. October 2000. http://www.ietf.org/rfc/rfc2984.txt
- RFC 2977, Mobile IP Authentication, Authorization, and Accounting Requirements. S. Glass, T. Hiller, S. Jacobs, C. Perkins. October 2000. http://www.ietf.org/rfc/rfc2977.txt
- RFC 2953, Telnet Encryption: DES 64 bit Output Feedback. T. Ts'o. September 2000. http://www.ietf.org/rfc/rfc2953.txt
- RFC 2953, Telnet Encryption: DES 64 bit Output Feedback. T. Ts'o. September 2000. http://www.ietf.org/rfc/rfc2953.txt
- RFC 2952, Telnet Encryption: DES 64 bit Cipher Feedback. T. Ts'o. September 2000. http://www.ietf.org/rfc/rfc2952.txt
- RFC 2952, Telnet Encryption: DES 64 bit Cipher Feedback. T. Ts'o. September 2000. http://www.ietf.org/rfc/rfc2952.txt
- RFC 2951, TELNET Authentication Using KEA and SKIPJACK. R. Housley, T. Horting, P. Yee. September 2000. http://www.ietf.org/rfc/rfc2951.txt
- RFC 2950, Telnet Encryption: CAST-128 64 bit Cipher Feedback. J. Altman. September 2000. http://www.ietf.org/rfc/rfc2950.txt
- RFC 2949, Telnet Encryption: CAST-128 64 bit Output Feedback. J. Altman. September 2000. http://www.ietf.org/rfc/rfc2949.txt
- RFC 2948, Telnet Encryption: DES3 64 bit Output Feedback. J. Altman. September 2000. http://www.ietf.org/rfc/rfc2948.txt
- RFC 2947, Telnet Encryption: DES3 64 bit Cipher Feedback. J. Altman. September 2000. http://www.ietf.org/rfc/rfc2947.txt
- RFC 2946, Telnet Data Encryption Option. T. Ts'o. September 2000. http://www.ietf.org/rfc/rfc2946.txt
- RFC 2945, The SRP Authentication and Key Exchange System. T. Wu. September 2000. http://www.ietf.org/rfc/rfc2945.txt
- RFC 2944, Telnet Authentication: SRP. T. Wu. September 2000. http://www.ietf.org/rfc/rfc2944.txt
- RFC 2943, TELNET Authentication Using DSA. R. Housley, T. Horting, P. Yee. September 2000. http://www.ietf.org/rfc/rfc2943.txt
- RFC 2942, Telnet Authentication: Kerberos Version 5. T. Ts'o. September 2000. http://www.ietf.org/rfc/rfc2942.txt
- RFC 2941, Telnet Authentication Option. T. Ts'o, Editor, J. Altman. September 2000. http://www.ietf.org/rfc/rfc2941.txt
- RFC 2930, Secret Key Establishment for DNS (TKEY RR). D. Eastlake. September 2000. http://www.ietf.org/rfc/rfc2930.txt
- RFC 2898, PKCS #5: Password-Based Cryptography Specification Version 2.0. B. Kaliski. September 2000. http://www.ietf.org/rfc/rfc2898.txt
- RFC 2890, Key and Sequence Number Extensions to GRE. G. Dommety. August 2000. http://www.ietf.org/rfc/rfc2890.txt
- RFC 2876, Use of the KEA and SKIPJACK Algorithms in CMS. J. Pawling. July 2000. http://www.ietf.org/rfc/rfc2876.txt
- RFC 2875, Diffie-Hellman Proof-of-Possession Algorithms. H. Prafullchandra, J. Schaad. July 2000. http://www.ietf.org/rfc/rfc2875.txt
- RFC 2857, The Use of HMAC-RIPEMD-160-96 within ESP and AH. A. Keromytis, N. Provos. June 2000. http://www.ietf.org/rfc/rfc2857.txt
- RFC 2853, Generic Security Service API Version 2 : Java Bindings. J. Kabat, M. Upadhyay. June 2000. http://www.ietf.org/rfc/rfc2853.txt
- RFC 2847, LIPKEY - A Low Infrastructure Public Key Mechanism Using SPKM. M. Eisler. June 2000. http://www.ietf.org/rfc/rfc2847.txt
- RFC 2845, Secret Key Transaction Authentication for DNS (TSIG). P. Vixie, O. Gudmundsson, D. Eastlake, B. Wellington. May 2000. (Updates RFC1035) http://www.ietf.org/rfc/rfc2845.txt
- RFC 2841, IP Authentication using Keyed SHA1 with Interleaved Padding (IP-MAC). P. Metzger, W. Simpson. November 2000. http://www.ietf.org/rfc/rfc2841.txt
- RFC 2831, Using Digest Authentication as a SASL Mechanism. P. Leach, C. Newman. May 2000. http://www.ietf.org/rfc/rfc2831.txt
- RFC 2830, Lightweight Directory Access Protocol (v3): Extension for Transport Layer Security. J. Hodges, R. Morgan, M. Wahl. May 2000. http://www.ietf.org/rfc/rfc2830.txt
- RFC 2829, Authentication Methods for LDAP. M. Wahl, H. Alvestrand, J. Hodges, R. Morgan. May 2000. http://www.ietf.org/rfc/rfc2829.txt
- RFC 2828, Internet Security Glossary. R. Shirey. May 2000. (Also FYI0036) http://www.ietf.org/rfc/rfc2828.txt
- RFC 2808, The SecurID(r) SASL Mechanism. M. Nystrom. April 2000. http://www.ietf.org/rfc/rfc2808.txt
- RFC 2807, XML Signature Requirements. J. Reagle. July 2000. http://www.ietf.org/rfc/rfc2807.txt
- RFC 2802, Digital Signatures for the v1.0 Internet Open Trading Protocol (IOTP). K. Davidson, Y. Kawatsura. April 2000. http://www.ietf.org/rfc/rfc2802.txt
- RFC 2797, Certificate Management Messages over CMS. M. Myers, X. Liu, J. Schaad, J. Weinstein. April 2000. http://www.ietf.org/rfc/rfc2797.txt
- RFC 2792, DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System. M. Blaze, J. Ioannidis, A. Keromytis. March 2000. http://www.ietf.org/rfc/rfc2792.txt
- RFC 2786, Diffie-Helman USM Key Management Information Base and Textual Convention. M. St. Johns. March 2000. http://www.ietf.org/rfc/rfc2786.txt
- RFC 2785, Methods for Avoiding the "Small-Subgroup" Attacks on the Diffie-Hellman Key Agreement Method for. R. Zuccherato. March 2000. http://www.ietf.org/rfc/rfc2785.txt
- RFC 2784, Generic Routing Encapsulation (GRE). D. Farinacci, T. Li, S. Hanks, D. Meyer, P. Traina. March 2000. http://www.ietf.org/rfc/rfc2784.txt
- RFC 2773, Encryption using KEA and SKIPJACK. R. Housley, P. Yee, W. Nace. February 2000. (Updates RFC0959) http://www.ietf.org/rfc/rfc2773.txt
- RFC 2755, Security Negotiation for WebNFS. A. Chiu, M. Eisler, B. Callaghan. January 2000. http://www.ietf.org/rfc/rfc2755.txt
- RFC 2744, Generic Security Service API Version 2 : C-bindings. J. Wray. January 2000. http://www.ietf.org/rfc/rfc2744.txt
- RFC 2743, Generic Security Service Application Program Interface Version 2, Update 1. J. Linn. January 2000. http://www.ietf.org/rfc/rfc2743.txt
- RFC 2716, PPP EAP TLS Authentication Protocol. B. Aboba, D. Simon. October 1999. http://www.ietf.org/rfc/rfc2716.txt
- RFC 2712, Addition of Kerberos Cipher Suites to Transport Layer Security (TLS). A. Medvinsky, M. Hur. October 1999. http://www.ietf.org/rfc/rfc2712.txt
- RFC 2709, Security Model with Tunnel-mode IPsec for NAT Domains. P. Srisuresh. October 1999. http://www.ietf.org/rfc/rfc2709.txt
- RFC 2704, The KeyNote Trust-Management System Version 2. M. Blaze, J. Feigenbaum, J. Ioannidis, A. Keromytis. September 1999. http://www.ietf.org/rfc/rfc2704.txt
- RFC 2694, DNS extensions to Network Address Translators (DNS_ALG). P. Srisuresh, G. Tsirtsis, P. Akkiraju, A. Heffernan. September 1999. http://www.ietf.org/rfc/rfc2694.txt
- RFC 2693, SPKI Certificate Theory. C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen. September 1999. http://www.ietf.org/rfc/rfc2693.txt
- RFC 2692, SPKI Requirements. C. Ellison. September 1999. http://www.ietf.org/rfc/rfc2692.txt
- RFC 2660, The Secure HyperText Transfer Protocol. E. Rescorla, A. Schiffman. August 1999. http://www.ietf.org/rfc/rfc2660.txt
- RFC 2659, Security Extensions For HTML. E. Rescorla, A. Schiffman. August 1999. http://www.ietf.org/rfc/rfc2659.txt
- RFC 2634, Enhanced Security Services for S/MIME. P. Hoffman, Ed.. June 1999. http://www.ietf.org/rfc/rfc2634.txt
- RFC 2633, S/MIME Version 3 Message Specification. B. Ramsdell, Ed.. June 1999. http://www.ietf.org/rfc/rfc2633.txt
- RFC 2632, S/MIME Version 3 Certificate Handling. B. Ramsdell, Ed.. June 1999. http://www.ietf.org/rfc/rfc2632.txt
- RFC 2631, Diffie-Hellman Key Agreement Method. E. Rescorla. June 1999. http://www.ietf.org/rfc/rfc2631.txt
- RFC 2630, Cryptographic Message Syntax. R. Housley. June 1999. http://www.ietf.org/rfc/rfc2630.txt
- RFC 2628, Simple Cryptographic Program Interface (Crypto API). V. Smyslov. June 1999. http://www.ietf.org/rfc/rfc2628.txt
- RFC 2627, Key Management for Multicast: Issues and Architectures. D. Wallner, E. Harder, R. Agee. June 1999. http://www.ietf.org/rfc/rfc2627.txt
- RFC 2626, The Internet and the Millennium Problem (Year 2000). P. Nesser II. June 1999. http://www.ietf.org/rfc/rfc2626.txt
- RFC 2623, NFS Version 2 and Version 3 Security Issues and the NFS Protocol's Use of RPCSEC_GSS and Kerberos V5. M. Eisler. June 1999. http://www.ietf.org/rfc/rfc2623.txt
- RFC 2617, HTTP Authentication: Basic and Digest Access Authentication. J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, L. Stewart. June 1999. http://www.ietf.org/rfc/rfc2617.txt
- RFC 2612, The CAST-256 Encryption Algorithm. C. Adams, J. Gilchrist. June 1999. http://www.ietf.org/rfc/rfc2612.txt
- RFC 2587, Internet X.509 Public Key Infrastructure LDAPv2 Schema. S. Boeyen, T. Howes, P. Richard. June 1999. http://www.ietf.org/rfc/rfc2587.txt
- RFC 2585, Internet X.509 Public Key Infrastructure Operational Protocols: FTP and HTTP. R. Housley, P. Hoffman. May 1999. http://www.ietf.org/rfc/rfc2585.txt
- RFC 2577, FTP Security Considerations. M. Allman, S. Ostermann. May 1999. http://www.ietf.org/rfc/rfc2577.txt
- RFC 2575, View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). B. Wijnen, R. Presuhn, K. McCloghrie. April 1999. http://www.ietf.org/rfc/rfc2575.txt
- RFC 2574, User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3). U. Blumenthal, B. Wijnen. April 1999. http://www.ietf.org/rfc/rfc2574.txt
- RFC 2560, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams. June 1999. http://www.ietf.org/rfc/rfc2560.txt
- RFC 2559, Internet X.509 Public Key Infrastructure Operational Protocols - LDAPv2. S. Boeyen, T. Howes, P. Richard. April 1999. (Updates RFC1778) http://www.ietf.org/rfc/rfc2559.txt
- RFC 2541, DNS Security Operational Considerations. D. Eastlake. March 1999. http://www.ietf.org/rfc/rfc2541.txt
- RFC 2539, Storage of Diffie-Hellman Keys in the Domain Name System (DNS). D. Eastlake. March 1999. http://www.ietf.org/rfc/rfc2539.txt
- RFC 2538, Storing Certificates in the Domain Name System (DNS). D. Eastlake, O. Gudmundsson. March 1999. http://www.ietf.org/rfc/rfc2538.txt
- RFC 2537, RSA/MD5 KEYs and SIGs in the Domain Name System (DNS). D. Eastlake. March 1999. http://www.ietf.org/rfc/rfc2537.txt
- RFC 2536, DSA KEYs and SIGs in the Domain Name System (DNS). D. Eastlake. March 1999. http://www.ietf.org/rfc/rfc2536.txt
- RFC 2535, Domain Name System Security Extensions. D. Eastlake. March 1999. (Updates RFC2181, RFC1035, RFC1034) http://www.ietf.org/rfc/rfc2535.txt
- RFC 2528, Internet X.509 Public Key Infrastructure Representation of Key Exchange Algorithm (KEA) Keys in Internet X.509 Public Key Infrastructure Certificates. R. Housley, W. Polk. March 1999. http://www.ietf.org/rfc/rfc2528.txt
- RFC 2527, Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework. S. Chokhani, W. Ford. March 1999. http://www.ietf.org/rfc/rfc2527.txt
- RFC 2521, ICMP Security Failures Messages. P. Karn, W. Simpson. March 1999. http://www.ietf.org/rfc/rfc2521.txt
- RFC 2511, Internet X.509 Certificate Request Message Format. M. Myers, C. Adams, D. Solo, D. Kemp. March 1999. http://www.ietf.org/rfc/rfc2511.txt
- RFC 2510, Internet X.509 Public Key Infrastructure Certificate Management Protocols. C. Adams, S. Farrell. March 1999. http://www.ietf.org/rfc/rfc2510.txt
- RFC 2504, Users' Security Handbook. . Guttman, L. Leong, G. Malkin. February 1999. (Also FYI0034) http://www.ietf.org/rfc/rfc2504.txt
- RFC 2487, SMTP Service Extension for Secure SMTP over TLS. P. Hoffman. January 1999. http://www.ietf.org/rfc/rfc2487.txt
- RFC 2480, Gateways and MIME Security Multiparts. N. Freed. January 1999. http://www.ietf.org/rfc/rfc2480.txt
- RFC 2479, Independent Data Unit Protection Generic Security Service Application Program Interface (IDUP-GSS-API). C. Adams. December 1998. http://www.ietf.org/rfc/rfc2479.txt
- RFC 2459, Internet X.509 Public Key Infrastructure Certificate and CRL Profile. R. Housley, W. Ford, W. Polk, D. Solo. January 1999. http://www.ietf.org/rfc/rfc2459.txt
- RFC 2444, The One-Time-Password SASL Mechanism. C. Newman. October 1998. (Updates RFC2222) http://www.ietf.org/rfc/rfc2444.txt
- RFC 2440, OpenPGP Message Format. J. Callas, L. Donnerhacke, H. Finney, R. Thayer. November 1998. http://www.ietf.org/rfc/rfc2440.txt
- RFC 2437, PKCS #1: RSA Cryptography Specifications Version 2.0. B. Kaliski, J. Staddon. October 1998. http://www.ietf.org/rfc/rfc2437.txt
- RFC 2420, The PPP Triple-DES Encryption Protocol (3DESE). H. Kummert. September 1998. http://www.ietf.org/rfc/rfc2420.txt
- RFC 2419, The PPP DES Encryption Protocol, Version 2 (DESE-bis). K. Sklower, G. Meyer. September 1998. http://www.ietf.org/rfc/rfc2419.txt
- RFC 2391, Load Sharing using IP Network Address Translation (LSNAT). P. Srisuresh, D. Gan. August 1998. http://www.ietf.org/rfc/rfc2391.txt
- RFC 2367, "PF_KEY Key Management API, Version 2", 07/10/1998, 68 pp., http://www.ietf.org/rfc/rfc2367.txt
- RFC 2350, "Expectations for Computer Security Incident Response", 06/04/1998, 38 pp., http://www.ietf.org/rfc/rfc2350.txt
- RFC 2316, "Report of the IAB Security Architecture Workshop", 04/13/1998, 9 pp., http://www.ietf.org/rfc/rfc2316.txt
- RFC 2315, PKCS 7: Cryptographic Message Syntax Version 1-5. B. Kaliski. March 1998. http://www.ietf.org/rfc/rfc2315.txt
- RFC 2314, PKCS 10: Certification Request Syntax Version 1-5. B. Kaliski. March 1998. http://www.ietf.org/rfc/rfc2314.txt
- RFC 2313, "PKCS #1: RSA Encryption Version 1.5", 03/24/1998, 19 pp., http://www.ietf.org/rfc/rfc2313.txt
- RFC 2312, S/MIME Version 2 Certificate Handling. S. Dusse, P. Hoffman, B. Ramsdell, J. Weinstein. March 1998. http://www.ietf.org/rfc/rfc2312.txt
- RFC 2311, S/MIME Version 2 Message Specification. S. Dusse, P. Hoffman, B. Ramsdell, L. Lundblade, L. Repka. March 1998. http://www.ietf.org/rfc/rfc2311.txt
- RFC 2310, The Safe Response Header Field. K. Holtman. April 1998. http://www.ietf.org/rfc/rfc2310.txt
- RFC 2284, "PPP Extensible Authentication Protocol (EAP)", 03/04/1998, 15 pp., RFC Index http://www.ietf.org/rfc/rfc2284.txt
- RFC 2274, "User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)", 01/26/1998, 76 pp., http://www.ietf.org/rfc/rfc2274.txt
- RFC 2268, "A Description of the RC2(r) Encryption Algorithm", 03/04/1998, 11 pp., http://www.ietf.org/rfc/rfc2268.txt
- RFC 2228, "FTP Security Extensions", 10/28/1997, 27 pp., (Updates RFC959) RFC Index http://www.ietf.org/rfc/rfc2228.txt
- RFC 2222, "Simple Authentication and Security Layer (SASL)", 10/29/1997, 16 pp., http://www.ietf.org/rfc/rfc2222.txt
- RFC 2207, "RSVP Extensions for IPSEC Data Flows", 10/01/1997, 14 pp., http://www.ietf.org/rfc/rfc2207.txt
- RFC 2196, "Site Security Handbook", 09/15/1997, 75 pp., (FYI 8) http://www.ietf.org/rfc/rfc2196.txt
- RFC 2179, "Network Security For Trade Shows", 07/22/1997, 10 pp., http://www.ietf.org/rfc/rfc2179.txt
- RFC 2166, "APPN Implementer's Workshop Closed Pages Document DLSw v2.0 Enhancements", 06/19/1997, 34 pp., http://www.ietf.org/rfc/rfc2166.txt
- RFC 2144, "The CAST-128 Encryption Algorithm", 05/21/1997, 15 pp., http://www.ietf.org/rfc/rfc2144.txt
- RFC 2139, "RADIUS Accounting", 04/18/1997, 25 pp., http://www.ietf.org/rfc/rfc2139.txt
- RFC 2138, "Remote Authentication Dial In User Service (RADIUS)", 04/18/1997, 65 pp., http://www.ietf.org/rfc/rfc2138.txt
- RFC 2104, "HMAC: Keyed-Hashing for Message Authentication", 02/05/1997, 11 pp., http://www.ietf.org/rfc/rfc2104.txt
- RFC 2094, "Group Key Management Protocol (GKMP) Architecture", 07/02/1997, 22 pp., http://www.ietf.org/rfc/rfc2094.txt
- RFC 2093, "Group Key Management Protocol (GKMP) Specification", 07/02/1997, 23 pp., RFC Index http://www.ietf.org/rfc/rfc2093.txt
- RFC 2085, "HMAC-MD5 IP Authentication with Replay Prevention", 02/05/1997, 6 pp., http://www.ietf.org/rfc/rfc2085.txt
- RFC 2084, "Considerations for Web Transaction Security", 01/22/1997, 6 pp., http://www.ietf.org/rfc/rfc2084.txt
- RFC 2082, "RIP-2 MD5 Authentication", 01/10/1997, 12 pp., http://www.ietf.org/rfc/rfc2082.txt
- RFC 2078, "Generic Security Service Application Program Interface, Version 2", 01/10/1997, 85 pp., http://www.ietf.org/rfc/rfc2078.txt
- RFC 2069, "An Extension to HTTP: Digest Access Authentication", 01/03/1997, 18 pp., http://www.ietf.org/rfc/rfc2069.txt
- RFC 2065, "Domain Name System Security Extensions", 01/03/1997, 41 pp., (Updates RFC1035) http://www.ietf.org/rfc/rfc2065.txt
- RFC 2015, "MIME Security with Pretty Good Privacy (PGP)", 10/14/1996, 8 pp., http://www.ietf.org/rfc/rfc2015.txt
- RFC 2015, "MIME Security with Pretty Good Privacy (PGP)", 10/14/1996, 8 pp., http://www.ietf.org/rfc/rfc2015.txt
- RFC 1994, "PPP Challenge Handshake Authentication Protocol (CHAP)", 08/30/1996, 12 pp., http://www.ietf.org/rfc/rfc1994.txt
- RFC 1969, "The PPP DES Encryption Protocol (DESE)", 06/19/1996, 10 pp., http://www.ietf.org/rfc/rfc1969.txt
- RFC 1968, "The PPP Encryption Control Protocol (ECP)", 06/19/1996, 11 pp., http://www.ietf.org/rfc/rfc1968.txt
- RFC 1961, "GSS-API Authentication Method for SOCKS Version 5", 06/19/1996, 9 pp., http://www.ietf.org/rfc/rfc1961.txt
- RFC 1949, "Scalable Multicast Key Distribution", 05/17/1996, 18 pp., http://www.ietf.org/rfc/rfc1949.txt
- RFC 1929, "Username/Password Authentication for SOCKS V5", 04/03/1996, 2 pp., http://www.ietf.org/rfc/rfc1929.txt
- RFC 1915, "Variance for The PPP Connection Control Protocol and The PPP Encryption Control Protocol", 02/28/1996, 7 pp., http://www.ietf.org/rfc/rfc1915.txt
- RFC 1910, "User-based Security Model for SNMPv2", 02/28/1996, 44 pp., http://www.ietf.org/rfc/rfc1910.txt
- RFC 1858, "Security Considerations for IP Fragment Filtering", 10/25/1995, 10 pp., http://www.ietf.org/rfc/rfc1858.txt
- RFC 1852, "IP Authentication using Keyed SHA", 10/02/1995, 6 pp., http://www.ietf.org/rfc/rfc1852.txt
- RFC 1848, "MIME Object Security Services", 10/03/1995, 48 pp., http://www.ietf.org/rfc/rfc1848.txt
- RFC 1847, "Security Multiparts for MIME: Multipart/Signed and Multipart/Encrypted", 10/03/1995, 11 pp., http://www.ietf.org/rfc/rfc1847.txt
- RFC 1828, "IP Authentication using Keyed MD5", 08/09/1995, 5 pp., http://www.ietf.org/rfc/rfc1828.txt
- RFC 1827, "IP Encapsulating Security Payload (ESP)", 08/09/1995, 12 pp., http://www.ietf.org/rfc/rfc1827.txt
- RFC 1826, "IP Authentication Header", 08/09/1995, 13 pp., http://www.ietf.org/rfc/rfc1826.txt
- RFC 1825, "Security Architecture for the Internet Protocol", 08/09/1995, 22 pp., http://www.ietf.org/rfc/rfc1825.txt
- RFC 1824, "The Exponential Security System TESS: An Identity-Based Cryptographic Protocol for Authenticated Key-Exchange (E.I.S.S.-Report 1995/4)", 08/11/1995, 21 pp., http://www.ietf.org/rfc/rfc1824.txt
- RFC 1824, "The Exponential Security System TESS: An Identity-Based Cryptographic Protocol for Authenticated Key-Exchange (E.I.S.S.-Report 1995/4)", 08/11/1995, 21 pp., http://www.ietf.org/rfc/rfc1824.txt
- RFC 1750, "Randomness Recommendations for Security", 12/29/1994, 25 pp., http://www.ietf.org/rfc/rfc1750.txt
- RFC 1734, "POP3 AUTHentication command", 12/20/1994, 5 pp., http://www.ietf.org/rfc/rfc1734.txt
- RFC 1731, "IMAP4 Authentication mechanisms", 12/20/1994, 6 pp., http://www.ietf.org/rfc/rfc1731.txt
- RFC 1704, "On Internet Authentication", 10/26/1994, 17 pp., http://www.ietf.org/rfc/rfc1704.txt
- RFC 1675, "Security Concerns for IPng", 08/08/1994, 4 pp., http://www.ietf.org/rfc/rfc1675.txt
- RFC 1636, "Report of IAB Workshop on Security in the Internet Architecture - February 8-10, 1994", 06/09/1994, 52 pp., http://www.ietf.org/rfc/rfc1636.txt
- RFC 1535, "A Security Problem and Proposed Correction With Widely Deployed DNS Software", 10/06/1993, 5 pp., http://www.ietf.org/rfc/rfc1535.txt
- RFC 1511, "Common Authentication Technology Overview", 09/10/1993, 2 pp., http://www.ietf.org/rfc/rfc1511.txt
- RFC 1510, "The Kerberos Network Authentication Service (V5)", 09/10/1993, 112 pp., http://www.ietf.org/rfc/rfc1510.txt
- RFC 1509, "Generic Security Service API : C-bindings", 09/10/1993, 48 pp., http://www.ietf.org/rfc/rfc1509.txt
- RFC 1507, "DASS - Distributed Authentication Security Service", 09/10/1993, 119 pp., http://www.ietf.org/rfc/rfc1507.txt
- RFC 1472, "The Definitions of Managed Objects for the Security Protocols of the Point-to-Point Protocol", 06/08/1993, 11 pp., http://www.ietf.org/rfc/rfc1472.txt
- RFC 1457, "Security Label Framework for the Internet", 05/26/1993, 14 pp., http://www.ietf.org/rfc/rfc1457.txt
- RFC 1455, "Physical Link Security Type of Service", 05/26/1993, 6 pp., http://www.ietf.org/rfc/rfc1455.txt
- RFC 1446, "Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2)", 05/03/1993, 51 pp., http://www.ietf.org/rfc/rfc1446.txt
- RFC 1424, "Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services", 02/10/1993, 9 pp., http://www.ietf.org/rfc/rfc1424.txt
- RFC 1423, "Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers", 02/10/1993, 14 pp., http://www.ietf.org/rfc/rfc1423.txt
- RFC 1422, "Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management", 02/10/1993, 32 pp., http://www.ietf.org/rfc/rfc1422.txt
- RFC 1421, "Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures", 02/10/1993, 42 pp., RFC Index http://www.ietf.org/rfc/rfc1421.txt
- RFC 1416, "Telnet Authentication Option", 02/01/1993, 7 pp., http://www.ietf.org/rfc/rfc1416.txt
- RFC 1412, "Telnet Authentication : SPX", 01/27/1993, 4 pp., http://www.ietf.org/rfc/rfc1412.txt
- RFC 1411, "Telnet Authentication: Kerberos Version 4", 01/26/1993, 4 pp., http://www.ietf.org/rfc/rfc1411.txt
- RFC 1355, "Privacy and Accuracy Issues in Network Information Center Databases", 08/04/1992, 4 pp., (FYI 15) http://www.ietf.org/rfc/rfc1355.txt
- RFC 1352, "SNMP Security Protocols", 07/06/1992, 41 pp., http://www.ietf.org/rfc/rfc1352.txt
- RFC 1170, "Public Key Standards and Licenses", 01/11/1991, 2 pp., http://www.ietf.org/rfc/rfc1170.txt
- RFC 1108, "U.S. Department of Defense Security Options for the Internet Protocol", 11/27/1991, 17 pp., http://www.ietf.org/rfc/rfc1108.txt
- RFC 1004, "Distributed-protocol authentication scheme", 04/01/1987, 8 pp., http://www.ietf.org/rfc/rfc1004.txt
Internet Drafts
- Search for "vpn", "private", "secur*", "authenticat*", "Authoriz*", "crypt*", "Public Key", "radius", "diameter" or "encrypt*" at http://search.ietf.org/
Technical Papers
- Li Mo (li@metera.com) and B. Devalla, "Optical Network Architecture for IP Centric Data Network with VPN Services," Proc. National Fiber Optic Engineers Conference (NFOEC), July 8-12, 2001, Baltimore, MD, Volume 1, pp. 221-231.
Back to Raj Jain's Home Page