664:
674:
104:
on the "Experimental" track, but it is understood that their quality and security properties should match the standards track requirements. The main purpose for producing
Experimental documents instead of standards track ones are the unknown effects that the mechanisms may have on applications and on
70:
In networks that implement the Host
Identity Protocol, all occurrences of IP addresses in applications are eliminated and replaced with cryptographic host identifiers. The cryptographic keys are typically, but not necessarily, self-generated.
463:
74:
The effect of eliminating IP addresses in application and transport layers is a decoupling of the transport layer from the internetworking layer (
469:
620:
530:
519:
481:
426:
322:
141:- Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP) (Obsoleted by RFC 7402)
608:
487:
311:
713:
559:
708:
632:
614:
677:
638:
475:
395:
543:
419:
94:
698:
221:- Using the Encapsulating Security Payload (ESP) transport format with the Host Identity Protocol (HIP)
525:
121:- Host Identity Protocol (HIP) Architecture (early "informational" snapshot, obsoleted by RFC 9063)
667:
504:
412:
703:
101:
8:
576:
554:
171:- Host Identity Protocol (HIP) Domain Name System (DNS) Extension (obsoleted by RFC 8005)
451:
45:
334:
33:
294:
284:
274:
264:
254:
244:
234:
224:
214:
204:
194:
184:
174:
164:
154:
144:
134:
124:
114:
64:
457:
399:
386:
191:- NAT and Firewall Traversal Issues of Host Identity Protocol (HIP) Communication
21:
298:
288:
278:
268:
258:
248:
238:
228:
218:
208:
198:
188:
178:
168:
158:
148:
138:
128:
118:
718:
602:
586:
435:
75:
692:
391:
371:
151:- Host Identity Protocol (HIP) Registration Extension (obsoleted by RFC 8003)
90:
376:
161:- Host Identity Protocol (HIP) Rendezvous Extension (obsoleted by RFC 8004)
649:
581:
60:
53:
49:
41:
571:
328:
549:
381:
181:- End-Host Mobility and Multihoming with the Host Identity Protocol
37:
536:
404:
261:- Host Identity Protocol (HIP) Domain Name System (DNS) Extension
211:- Host identity protocol version 2 (HIPv2) (updated by RFC 8002)
644:
626:
597:
97:(IRTF) HIP research group looks at the broader impacts of HIP.
79:
48:. HIP separates the end-point identifier and locator roles of
592:
317:
52:. It introduces a Host Identity (HI) name space, based on a
514:
493:
86:
291:- Native NAT Traversal Mode for the Host Identity Protocol
59:
The Host
Identity Protocol provides secure methods for IP
241:- Host Identity Protocol (HIP) Registration Extension
131:- Host Identity Protocol base (Obsoleted by RFC 7401)
32:(HIP) is a host identification technology for use on
251:- Host Identity Protocol (HIP) Rendezvous Extension
201:- Basic Requirements for IPv6 Customer Edge Routers
281:- Host Multihoming with the Host Identity Protocol
690:
271:- Host Mobility with the Host Identity Protocol
470:Java Authentication and Authorization Service
420:
621:Protected Extensible Authentication Protocol
531:Challenge-Handshake Authentication Protocol
427:
413:
100:The working group is chartered to produce
356:Host Identity Protocol (HIP) Architecture
40:. The Internet has two main name spaces,
482:Simple Authentication and Security Layer
387:How HIP works - InfraHIP project archive
691:
323:Locator/Identifier Separation Protocol
408:
301:- Host Identity Protocol Architecture
231:- Host Identity Protocol Certificates
673:
609:Password-authenticated key agreement
392:HIP simulation framework for OMNeT++
488:Security Support Provider Interface
312:Identifier-Locator Network Protocol
13:
627:Remote Access Dial In User Service
560:Extensible Authentication Protocol
434:
14:
730:
365:
108:
672:
663:
662:
633:Resource Access Control Facility
615:Password Authentication Protocol
520:Authentication and Key Agreement
476:Pluggable Authentication Modules
639:Secure Remote Password protocol
544:Central Authentication Service
348:
1:
464:Generic Security Services API
341:
494:XCert Universal Database API
95:Internet Research Task Force
7:
305:
105:the Internet in the large.
36:(IP) networks, such as the
10:
735:
19:For more information, see
18:
714:Computer network security
658:
526:CAVE-based authentication
503:
442:
85:HIP was specified in the
56:security infrastructure.
709:Cryptographic protocols
377:IRTF HIP research group
372:IETF HIP working group
566:Host Identity Protocol
30:Host Identity Protocol
102:Requests for Comments
699:Internet protocols
452:BSD Authentication
398:2019-06-28 at the
46:Domain Name System
686:
685:
335:Proxy Mobile IPv6
34:Internet Protocol
16:Internet protocol
726:
676:
675:
666:
665:
429:
422:
415:
406:
405:
359:
352:
65:mobile computing
734:
733:
729:
728:
727:
725:
724:
723:
689:
688:
687:
682:
654:
506:
499:
458:eAuthentication
444:
438:
433:
400:Wayback Machine
382:OpenHIP project
368:
363:
362:
353:
349:
344:
308:
111:
26:
22:transport layer
17:
12:
11:
5:
732:
722:
721:
716:
711:
706:
701:
684:
683:
681:
680:
670:
659:
656:
655:
653:
652:
647:
642:
636:
630:
624:
618:
612:
606:
603:OpenID Connect
600:
595:
590:
587:NT LAN Manager
584:
579:
574:
569:
563:
557:
552:
547:
541:
540:
539:
528:
523:
517:
511:
509:
505:Authentication
501:
500:
498:
497:
491:
485:
479:
473:
467:
461:
455:
448:
446:
443:Authentication
440:
439:
436:Authentication
432:
431:
424:
417:
409:
403:
402:
389:
384:
379:
374:
367:
366:External links
364:
361:
360:
346:
345:
343:
340:
339:
338:
332:
326:
320:
315:
307:
304:
303:
302:
292:
282:
272:
262:
252:
242:
232:
222:
212:
202:
192:
182:
172:
162:
152:
142:
132:
122:
110:
109:RFC references
107:
76:Internet Layer
15:
9:
6:
4:
3:
2:
731:
720:
717:
715:
712:
710:
707:
705:
702:
700:
697:
696:
694:
679:
671:
669:
661:
660:
657:
651:
648:
646:
643:
640:
637:
634:
631:
628:
625:
622:
619:
616:
613:
610:
607:
604:
601:
599:
596:
594:
591:
588:
585:
583:
580:
578:
575:
573:
570:
567:
564:
561:
558:
556:
553:
551:
548:
545:
542:
538:
535:
534:
532:
529:
527:
524:
521:
518:
516:
513:
512:
510:
508:
502:
495:
492:
489:
486:
483:
480:
477:
474:
471:
468:
465:
462:
459:
456:
453:
450:
449:
447:
441:
437:
430:
425:
423:
418:
416:
411:
410:
407:
401:
397:
393:
390:
388:
385:
383:
380:
378:
375:
373:
370:
369:
358:, Section 4.1
357:
351:
347:
336:
333:
330:
327:
324:
321:
319:
316:
313:
310:
309:
300:
296:
293:
290:
286:
283:
280:
276:
273:
270:
266:
263:
260:
256:
253:
250:
246:
243:
240:
236:
233:
230:
226:
223:
220:
216:
213:
210:
206:
203:
200:
196:
193:
190:
186:
183:
180:
176:
173:
170:
166:
163:
160:
156:
153:
150:
146:
143:
140:
136:
133:
130:
126:
123:
120:
116:
113:
112:
106:
103:
98:
96:
92:
91:working group
88:
83:
81:
77:
72:
68:
66:
62:
57:
55:
51:
47:
43:
39:
35:
31:
24:
23:
565:
355:
350:
99:
84:
73:
69:
58:
50:IP addresses
42:IP addresses
29:
27:
20:
704:Multihoming
582:LAN Manager
61:multihoming
693:Categories
454:(BSD Auth)
354:RFC 4423,
342:References
54:public key
611:protocols
572:IndieAuth
507:protocols
329:Mobile IP
668:Category
629:(RADIUS)
577:Kerberos
555:Diameter
550:CRAM-MD5
466:(GSSAPI)
396:Archived
337:(PMIPv6)
306:See also
44:and the
38:Internet
678:Commons
650:Woo–Lam
537:MS-CHAP
533:(CHAP)
460:(eAuth)
645:TACACS
635:(RACF)
623:(PEAP)
605:(OIDC)
598:OpenID
589:(NTLM)
496:(XUDA)
490:(SSPI)
484:(SASL)
472:(JAAS)
325:(LISP)
314:(ILNP)
297:
287:
277:
267:
257:
247:
237:
227:
217:
207:
197:
187:
177:
167:
157:
147:
137:
127:
117:
80:TCP/IP
719:IPsec
641:(SRP)
617:(PAP)
593:OAuth
568:(HIP)
562:(EAP)
546:(CAS)
522:(AKA)
478:(PAM)
331:(MIP)
318:IPsec
93:. An
78:) in
515:ACF2
445:APIs
299:9063
289:9028
279:8047
269:8046
259:8005
249:8004
239:8003
229:8002
219:7402
209:7401
199:6092
189:5207
179:5206
169:5205
159:5204
149:5203
139:5202
129:5201
119:4423
89:HIP
87:IETF
63:and
28:The
295:RFC
285:RFC
275:RFC
265:RFC
255:RFC
245:RFC
235:RFC
225:RFC
215:RFC
205:RFC
195:RFC
185:RFC
175:RFC
165:RFC
155:RFC
145:RFC
135:RFC
125:RFC
115:RFC
695::
394:.
82:.
67:.
428:e
421:t
414:v
25:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.