Knowledge

Host Identity Protocol

Source 📝

664: 674: 104:
on the "Experimental" track, but it is understood that their quality and security properties should match the standards track requirements. The main purpose for producing Experimental documents instead of standards track ones are the unknown effects that the mechanisms may have on applications and on
70:
In networks that implement the Host Identity Protocol, all occurrences of IP addresses in applications are eliminated and replaced with cryptographic host identifiers. The cryptographic keys are typically, but not necessarily, self-generated.
463: 74:
The effect of eliminating IP addresses in application and transport layers is a decoupling of the transport layer from the internetworking layer (
469: 620: 530: 519: 481: 426: 322: 141:- Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP) (Obsoleted by RFC 7402) 608: 487: 311: 713: 559: 708: 632: 614: 677: 638: 475: 395: 543: 419: 94: 698: 221:- Using the Encapsulating Security Payload (ESP) transport format with the Host Identity Protocol (HIP) 525: 121:- Host Identity Protocol (HIP) Architecture (early "informational" snapshot, obsoleted by RFC 9063) 667: 504: 412: 703: 101: 8: 576: 554: 171:- Host Identity Protocol (HIP) Domain Name System (DNS) Extension (obsoleted by RFC 8005) 451: 45: 334: 33: 294: 284: 274: 264: 254: 244: 234: 224: 214: 204: 194: 184: 174: 164: 154: 144: 134: 124: 114: 64: 457: 399: 386: 191:- NAT and Firewall Traversal Issues of Host Identity Protocol (HIP) Communication 21: 298: 288: 278: 268: 258: 248: 238: 228: 218: 208: 198: 188: 178: 168: 158: 148: 138: 128: 118: 718: 602: 586: 435: 75: 692: 391: 371: 151:- Host Identity Protocol (HIP) Registration Extension (obsoleted by RFC 8003) 90: 376: 161:- Host Identity Protocol (HIP) Rendezvous Extension (obsoleted by RFC 8004) 649: 581: 60: 53: 49: 41: 571: 328: 549: 381: 181:- End-Host Mobility and Multihoming with the Host Identity Protocol 37: 536: 404: 261:- Host Identity Protocol (HIP) Domain Name System (DNS) Extension 211:- Host identity protocol version 2 (HIPv2) (updated by RFC 8002) 644: 626: 597: 97:(IRTF) HIP research group looks at the broader impacts of HIP. 79: 48:. HIP separates the end-point identifier and locator roles of 592: 317: 52:. It introduces a Host Identity (HI) name space, based on a 514: 493: 86: 291:- Native NAT Traversal Mode for the Host Identity Protocol 59:
The Host Identity Protocol provides secure methods for IP
241:- Host Identity Protocol (HIP) Registration Extension 131:- Host Identity Protocol base (Obsoleted by RFC 7401) 32:(HIP) is a host identification technology for use on 251:- Host Identity Protocol (HIP) Rendezvous Extension 201:- Basic Requirements for IPv6 Customer Edge Routers 281:- Host Multihoming with the Host Identity Protocol 690: 271:- Host Mobility with the Host Identity Protocol 470:Java Authentication and Authorization Service 420: 621:Protected Extensible Authentication Protocol 531:Challenge-Handshake Authentication Protocol 427: 413: 100:The working group is chartered to produce 356:Host Identity Protocol (HIP) Architecture 40:. The Internet has two main name spaces, 482:Simple Authentication and Security Layer 387:How HIP works - InfraHIP project archive 691: 323:Locator/Identifier Separation Protocol 408: 301:- Host Identity Protocol Architecture 231:- Host Identity Protocol Certificates 673: 609:Password-authenticated key agreement 392:HIP simulation framework for OMNeT++ 488:Security Support Provider Interface 312:Identifier-Locator Network Protocol 13: 627:Remote Access Dial In User Service 560:Extensible Authentication Protocol 434: 14: 730: 365: 108: 672: 663: 662: 633:Resource Access Control Facility 615:Password Authentication Protocol 520:Authentication and Key Agreement 476:Pluggable Authentication Modules 639:Secure Remote Password protocol 544:Central Authentication Service 348: 1: 464:Generic Security Services API 341: 494:XCert Universal Database API 95:Internet Research Task Force 7: 305: 105:the Internet in the large. 36:(IP) networks, such as the 10: 735: 19:For more information, see 18: 714:Computer network security 658: 526:CAVE-based authentication 503: 442: 85:HIP was specified in the 56:security infrastructure. 709:Cryptographic protocols 377:IRTF HIP research group 372:IETF HIP working group 566:Host Identity Protocol 30:Host Identity Protocol 102:Requests for Comments 699:Internet protocols 452:BSD Authentication 398:2019-06-28 at the 46:Domain Name System 686: 685: 335:Proxy Mobile IPv6 34:Internet Protocol 16:Internet protocol 726: 676: 675: 666: 665: 429: 422: 415: 406: 405: 359: 352: 65:mobile computing 734: 733: 729: 728: 727: 725: 724: 723: 689: 688: 687: 682: 654: 506: 499: 458:eAuthentication 444: 438: 433: 400:Wayback Machine 382:OpenHIP project 368: 363: 362: 353: 349: 344: 308: 111: 26: 22:transport layer 17: 12: 11: 5: 732: 722: 721: 716: 711: 706: 701: 684: 683: 681: 680: 670: 659: 656: 655: 653: 652: 647: 642: 636: 630: 624: 618: 612: 606: 603:OpenID Connect 600: 595: 590: 587:NT LAN Manager 584: 579: 574: 569: 563: 557: 552: 547: 541: 540: 539: 528: 523: 517: 511: 509: 505:Authentication 501: 500: 498: 497: 491: 485: 479: 473: 467: 461: 455: 448: 446: 443:Authentication 440: 439: 436:Authentication 432: 431: 424: 417: 409: 403: 402: 389: 384: 379: 374: 367: 366:External links 364: 361: 360: 346: 345: 343: 340: 339: 338: 332: 326: 320: 315: 307: 304: 303: 302: 292: 282: 272: 262: 252: 242: 232: 222: 212: 202: 192: 182: 172: 162: 152: 142: 132: 122: 110: 109:RFC references 107: 76:Internet Layer 15: 9: 6: 4: 3: 2: 731: 720: 717: 715: 712: 710: 707: 705: 702: 700: 697: 696: 694: 679: 671: 669: 661: 660: 657: 651: 648: 646: 643: 640: 637: 634: 631: 628: 625: 622: 619: 616: 613: 610: 607: 604: 601: 599: 596: 594: 591: 588: 585: 583: 580: 578: 575: 573: 570: 567: 564: 561: 558: 556: 553: 551: 548: 545: 542: 538: 535: 534: 532: 529: 527: 524: 521: 518: 516: 513: 512: 510: 508: 502: 495: 492: 489: 486: 483: 480: 477: 474: 471: 468: 465: 462: 459: 456: 453: 450: 449: 447: 441: 437: 430: 425: 423: 418: 416: 411: 410: 407: 401: 397: 393: 390: 388: 385: 383: 380: 378: 375: 373: 370: 369: 358:, Section 4.1 357: 351: 347: 336: 333: 330: 327: 324: 321: 319: 316: 313: 310: 309: 300: 296: 293: 290: 286: 283: 280: 276: 273: 270: 266: 263: 260: 256: 253: 250: 246: 243: 240: 236: 233: 230: 226: 223: 220: 216: 213: 210: 206: 203: 200: 196: 193: 190: 186: 183: 180: 176: 173: 170: 166: 163: 160: 156: 153: 150: 146: 143: 140: 136: 133: 130: 126: 123: 120: 116: 113: 112: 106: 103: 98: 96: 92: 91:working group 88: 83: 81: 77: 72: 68: 66: 62: 57: 55: 51: 47: 43: 39: 35: 31: 24: 23: 565: 355: 350: 99: 84: 73: 69: 58: 50:IP addresses 42:IP addresses 29: 27: 20: 704:Multihoming 582:LAN Manager 61:multihoming 693:Categories 454:(BSD Auth) 354:RFC 4423, 342:References 54:public key 611:protocols 572:IndieAuth 507:protocols 329:Mobile IP 668:Category 629:(RADIUS) 577:Kerberos 555:Diameter 550:CRAM-MD5 466:(GSSAPI) 396:Archived 337:(PMIPv6) 306:See also 44:and the 38:Internet 678:Commons 650:Woo–Lam 537:MS-CHAP 533:(CHAP) 460:(eAuth) 645:TACACS 635:(RACF) 623:(PEAP) 605:(OIDC) 598:OpenID 589:(NTLM) 496:(XUDA) 490:(SSPI) 484:(SASL) 472:(JAAS) 325:(LISP) 314:(ILNP) 297:  287:  277:  267:  257:  247:  237:  227:  217:  207:  197:  187:  177:  167:  157:  147:  137:  127:  117:  80:TCP/IP 719:IPsec 641:(SRP) 617:(PAP) 593:OAuth 568:(HIP) 562:(EAP) 546:(CAS) 522:(AKA) 478:(PAM) 331:(MIP) 318:IPsec 93:. An 78:) in 515:ACF2 445:APIs 299:9063 289:9028 279:8047 269:8046 259:8005 249:8004 239:8003 229:8002 219:7402 209:7401 199:6092 189:5207 179:5206 169:5205 159:5204 149:5203 139:5202 129:5201 119:4423 89:HIP 87:IETF 63:and 28:The 295:RFC 285:RFC 275:RFC 265:RFC 255:RFC 245:RFC 235:RFC 225:RFC 215:RFC 205:RFC 195:RFC 185:RFC 175:RFC 165:RFC 155:RFC 145:RFC 135:RFC 125:RFC 115:RFC 695:: 394:. 82:. 67:. 428:e 421:t 414:v 25:.

Index

transport layer
Internet Protocol
Internet
IP addresses
Domain Name System
IP addresses
public key
multihoming
mobile computing
Internet Layer
TCP/IP
IETF
working group
Internet Research Task Force
Requests for Comments
RFC
4423
RFC
5201
RFC
5202
RFC
5203
RFC
5204
RFC
5205
RFC
5206
RFC

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.