ARMWARE RFC Archive <- All BCP Indices & Search for BCPs

BCP Index (101..200)

Powered by mnoGoSearch Search Archive

Search for in section


BCP Description Author(s) Status Obsoleted by Updated by
101 Structure of the IETF Administrative Support Activity (IASA) R. Austein, Ed., B. Wijnen, Ed., B. Carpenter, Ed., L. Lynch, Ed., S. Bradner, Ed.
102 IAB Processes for Management of IETF Liaison Relationships L. Daigle, Ed., Internet Architecture Board
103 Procedures for Handling Liaison Statements to and from the IETF S. Trowbridge, S. Bradner, F. Baker
104 Terminology for Describing Internet Connectivity J. Klensin
105 Embedding Globally-Routable Internet Addresses Considered Harmful D. Plonka
106 Randomness Requirements for Security D. Eastlake 3rd, J. Schiller, S. Crocker
107 Guidelines for Cryptographic Key Management S. Bellovin, R. Housley
108 IP Performance Metrics (IPPM) Metrics Registry E. Stephan RFC 6248
109 Deprecation of "ip6.int" G. Huston
110 Tunneling Multiplexed Compressed RTP (TCRTP) B. Thompson, T. Koren, D. Wing
111 Guidelines for Authors and Reviewers of MIB Documents C. Heard, Ed.
112 Prioritized Treatment of Specific OSPF Version 2 Packets and Congestion Avoidance G. Choudhury, Ed.
113 The IETF Administrative Oversight Committee (IAOC) Member Selection Guidelines and Process G. Huston, Ed., B. Wijnen, Ed.
114 BGP Communities for Data Collection D. Meyer
116 IANA Allocations for Pseudowire Edge to Edge Emulation (PWE3) L. Martini
117 Interworking between the Session Initiation Protocol (SIP) and QSIG J. Elwell, F. Derks, P. Mourot, O. Rousseau
118 Considerations for Lightweight Directory Access Protocol (LDAP) Extensions K. Zeilenga
119 Session Initiation Protocol (SIP) Call Control - Conferencing for User Agents A. Johnston, O. Levin
120 Source-Specific Protocol Independent Multicast in 232/8 D. Meyer, R. Rockell, G. Shepherd
121 Multicast Source Discovery Protocol (MSDP) Deployment Scenarios M. McBride, J. Meylor, D. Meyer
122 Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan V. Fuller, T. Li
123 Observed DNS Resolution Misbehavior M. Larson, P. Barber
124 Specifying Alternate Semantics for the Explicit Congestion Notification (ECN) Field S. Floyd RFC 6040
125 Procedures for Protocol Extensions and Variations S. Bradner, B. Carpenter, Ed., T. Narten
126 Operation of Anycast Services J. Abley, K. Lindqvist
127 Network Address Translation (NAT) Behavioral Requirements for Unicast UDP F. Audet, Ed., C. Jennings, S. Perreault, Ed., I. Yamagata, S. Miyakawa, A. Nakagawa, H. Ashida, R. Penno, S. Perreault, M. Boucadair, Ed., S. Sivakumar, K. Naito
128 Avoiding Equal Cost Multipath Treatment in MPLS Networks G. Swallow, S. Bryant, L. Andersson RFC 7274
129 Change Process for Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Protocols and Procedures L. Andersson, Ed., A. Farrel, Ed.
130 IANA Considerations for OSPF K. Kompella, B. Fenner
131 Symmetric RTP / RTP Control Protocol (RTCP) D. Wing
132 Guidance for Authentication, Authorization, and Accounting (AAA) Key Management R. Housley, B. Aboba
133 Specifying New Congestion Control Algorithms S. Floyd, M. Allman
134 Email Submission Operations: Access and Accountability Requirements C. Hutzler, D. Crocker, P. Resnick, E. Allman, T. Finch
135 IP Multicast Requirements for a Network Address Translator (NAT) and a Network Address Port Translator (NAPT) D. Wing, T. Eckert
136 Secure Connectivity and Mobility Using Mobile IPv4 and IKEv2 Mobility and Multihoming (MOBIKE) V. Devarapalli, P. Eronen
137 ASCII Escaping of Unicode Characters J. Klensin
138 A Registry for SMTP Enhanced Mail System Status Codes T. Hansen, J. Klensin
139 Templates for Internet-Drafts Containing MIB Modules D. Harrington, Ed.
140 Preventing Use of Recursive Nameservers in Reflector Attacks J. Damas, F. Neves
141 IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters D. Eastlake 3rd, J. Abley
142 NAT Behavioral Requirements for TCP S. Guha, Ed., K. Biswas, B. Ford, S. Sivakumar, P. Srisuresh RFC 7857
143 Deployment Considerations for Lemonade-Compliant Mobile Email R. Gellens
144 Session Initiation Protocol Service Examples A. Johnston, Ed., R. Sparks, C. Cunningham, S. Donovan, K. Summers
145 UDP Usage Guidelines L. Eggert, G. Fairhurst, G. Shepherd
146 Guidelines for Specifying the Use of IPsec Version 2 S. Bellovin
147 Example Call Flows of Race Conditions in the Session Initiation Protocol (SIP) M. Hasebe, J. Koshiko, Y. Suzuki, T. Yoshikawa, P. Kyzivat
148 NAT Behavioral Requirements for ICMP P. Srisuresh, B. Ford, S. Sivakumar, S. Guha RFC 7857
149 Session Initiation Protocol (SIP) Call Control - Transfer R. Sparks, A. Johnston, Ed., D. Petrie
150 Network Address Translation (NAT) Behavioral Requirements for the Datagram Congestion Control Protocol R. Denis-Courmont
151 H.248/MEGACO Registration Procedures C. Groves, Y. Lin
152 DNS Proxy Implementation Guidelines R. Bellis
153 Special-Purpose IP Address Registries J. Weil, V. Kuarsingh, C. Donley, C. Liljenstolpe, M. Azinger, M. Cotton, L. Vegoda, R. Bonica, Ed., B. Haberman
154 Considerations for Civic Addresses in the Presence Information Data Format Location Object (PIDF-LO): Guidelines and IANA Registry Definition K. Wolf, A. Mayrhofer
155 Nameservers for IPv4 and IPv6 Reverse Zones J. Abley, T. Manderson
156 Recommendations for Transport-Protocol Port Randomization M. Larsen, F. Gont
157 IPv6 Address Assignment to End Sites T. Narten, G. Huston, L. Roberts
158 RADIUS Design Guidelines A. DeKok, Ed., G. Weber RFC 6929, RFC 8044
159 Reducing the TIME-WAIT State Using TCP Timestamps F. Gont
160 An Architecture for Location and Location Privacy in Internet Applications R. Barnes, M. Lepinski, A. Cooper, J. Morris, H. Tschofenig, H. Schulzrinne
161 Guidelines for the Use of the "OAM" Acronym in the IETF L. Andersson, H. van Helvoort, R. Bonica, D. Romascanu, S. Mansfield
162 Logging Recommendations for Internet-Facing Servers A. Durand, I. Gashinsky, D. Lee, S. Sheppard
163 Locally Served DNS Zones. M
164 IANA Considerations for Network Layer Protocol Identifiers D. Eastlake 3rd
165 Internet Assigned Numbers Authority (IANA) Procedures for the Management of the Service Name and Transport Protocol Port Number Registry M. Cotton, L. Eggert, J. Touch, M. Westerlund, S. Cheshire
166 Terminology Used in Internationalization in the IETF P. Hoffman, J. Klensin
167 DomainKeys Identified Mail (DKIM) and Mailing Lists M. Kucherawy
168 IP Router Alert Considerations and Usage F. Le Faucheur, Ed.
169 Unique Origin Autonomous System Numbers (ASNs) per Node for Globally Anycasted Services D. McPherson, R. Donnelly, F. Scalzo
170 Guidelines for Considering New Performance Metric Development A. Clark, B. Claise
171 Time to Remove Filters for Previously Unallocated IPv4 /8s L. Vegoda
172 Recommendation for Not Using AS_SET and AS_CONFED_SET in BGP W. Kumari, K. Sriram
173 Certificate Policy (CP) for the Resource Public Key Infrastructure (RPKI) S. Kent, D. Kong, K. Seo, R. Watro
174 Certification Authority (CA) Key Rollover in the Resource Public Key Infrastructure (RPKI) G. Huston, G. Michaelson, S. Kent
175 Procedures for Maintaining the Time Zone Database E. Lear, P. Eggert
176 IP Performance Metrics (IPPM) Standard Advancement Testing R. Geib, Ed., A. Morton, R. Fardid, A. Steinmitz
177 IPv6 Support Required for All IP-Capable Nodes W. George, C. Donley, C. Liljenstolpe, L. Howard
178 Deprecating the "X-" Prefix and Similar Constructs in Application Protocols P. Saint-Andre, D. Crocker, M. Nottingham
179 Deprecate DES, RC4-HMAC-EXP, and Other Weak Cryptographic Algorithms in Kerberos L. Hornquist Astrand, T. Yu
180 DHCPv6 Redundancy Deployment Considerations J. Brzozowski, J. Tremblay, J. Chen, T. Mrugalski
181 Best Current Practice for Communications Services in Support of Emergency Calling B. Rosen, J. Polk RFC 7840, RFC 7852
182 Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI) R. Gagliano, S. Kent, S. Turner
183 A Uniform Resource Name (URN) Namespace for Examples P. Saint-Andre
184 Guidelines for Authors and Reviewers of IP Flow Information Export (IPFIX) Information Elements B. Trammell, B. Claise
185 Origin Validation Operation Based on the Resource Public Key Infrastructure (RPKI) R. Bush
186 Recommendations on Filtering of IPv4 Packets Containing IPv4 Options F. Gont, R. Atkinson, C. Pignataro
187 Guidelines for Creating New DHCPv6 Options D. Hankins, T. Mrugalski, M. Siodelski, S. Jiang, S. Krishnan
188 Pervasive Monitoring Is an Attack S. Farrell, H. Tschofenig
189 An Acceptable Use Policy for New ICMP Types and Codes M. Shore, C. Pignataro
190 URI Design and Ownership M. Nottingham
191 IANA Considerations for Connectivity Fault Management (CFM) Code Points D. Eastlake 3rd
193 Diameter Applications Design Guidelines L. Morand, Ed., V. Fajardo, H. Tschofenig
194 BGP Operations and Security J. Durand, I. Pepelnjak, G. Doering
195 Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Y. Sheffer, R. Holz, P. Saint-Andre
196 Deprecating the Anycast Prefix for 6to4 Relay Routers O. Troan, B. Carpenter, Ed.
197 IETF Recommendations Regarding Active Queue Management F. Baker, Ed., G. Fairhurst, Ed.
198 IPv6 Prefix Length Recommendation for Forwarding M. Boucadair, A. Petrescu, F. Baker
199 DHCPv6-Shield: Protecting against Rogue DHCPv6 Servers F. Gont, W. Liu, G. Van de Velde
200 IAB and IESG Statement on Cryptographic Technology and the Internet IAB, IESG