This document describes the queries that a DNS resolver should emit to initialize its cache. The result is that the resolver gets both a
Recently published RFCs
Recently published RFCs
Most HTTP authentication schemes are probeable in the sense that it is possible for an unauthenticated client to probe whether an origin
Recently published RFCs
The RSA Key Encapsulation Mechanism (RSA-KEM) algorithm is a one-pass (store-and-forward) cryptographic mechanism for an originator to
Recently published RFCs
RFC 5280 specifies several extended key purpose identifiers (KeyPurposeIds) for X.509 certificates. This document defines an
Recently published RFCs
The Segment Routing (SR) architecture leverages source routing and can be directly applied to the use of an MPLS data plane. A Segment
Recently published RFCs
This document defines how to use the Address Family Identifier (AFI) 17 "Distinguished Name" in the Locator/ID Separation Protocol (LISP).
Recently published RFCs
This specification proposes an additional response secured by JSON Web Token (JWT) for OAuth 2.0 Token Introspection.
Recently published RFCs
This document describes best current security practice for OAuth 2.0. It updates and extends the threat model and security advice given in
Recently published RFCs
When split-horizon DNS is deployed by a network, certain domain names can be resolved authoritatively by a network-provided DNS resolver.
Recently published RFCs
Following a review of the IETF meeting venue requirements, this document updates RFC 8718 ("IETF Plenary Meeting Venue Selection