{"draft":"draft-ietf-karp-ospf-analysis-06","doc_id":"RFC6863","title":"Analysis of OSPF Security According to the Keying and Authentication for Routing Protocols (KARP) Design Guide","authors":["S. Hartman","D. Zhang"],"format":["ASCII","HTML"],"page_count":"11","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Keying and Authentication for Routing Protocols","abstract":"This document analyzes OSPFv2 and OSPFv3 according to the guidelines\r\nset forth in Section 4.2 of the \"Keying and Authentication for \r\nRouting Protocols (KARP) Design Guidelines\" (RFC 6518). Key\r\ncomponents of solutions to gaps identified in this document are\r\nalready underway.","pub_date":"March 2013","keywords":[],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC6863","errata_url":null}