The Certification Authority Authorization (CAA) DNS resource record (RR) provides a mechanism for domains to express the allowed set of
To improve cybersecurity posture, automation is necessary to locate the software a device is using, whether that software has known
This document defines a new Traffic Selector Type (TS Type) for the Internet Key Exchange Protocol version 2 (IKEv2) to add support for
Existing traffic-engineering-related link attribute advertisements have been defined and are used in RSVP-TE deployments. Since the
This document describes SPAKE2, which is a protocol for two parties that share a password to derive a strong shared key without
This document describes SPAKE2+, a Password-Authenticated Key Exchange (PAKE) protocol run between two parties for deriving a
The DNS uses glue records to allow iterative clients to find the addresses of name servers that are contained within a delegated zone.
In PIM Sparse Mode (PIM-SM) networks, PIM Null-Register messages are sent by the Designated Router (DR) to the Rendezvous Point (RP) to
This document describes a method that allows a Message Originator to specify a Complaint Feedback Loop (CFBL) address as a message header
In situ Operations, Administration, and Maintenance (IOAM) records operational and telemetry information in the packet while the packet