| < draft-xu-savi-transition-13.txt | draft-xu-savi-transition-14.txt > | |||
|---|---|---|---|---|
| SAVI K.Xu, G.Hu, J.Bi, M.Xu | SAVI K.Xu, G.Hu, J.Bi, M.Xu | |||
| Internet Draft Tsinghua Univ. | Internet Draft Tsinghua Univ. | |||
| Intended status: Standard Tracks F.Shi | Intended status: Standard Tracks F.Shi | |||
| Expires: November 2018 China Telecom | Expires: May 2019 China Telecom | |||
| May 10, 2018 | November 5,2018 | |||
| A General Framework of Source Address Validation and Traceback for | A General Framework of Source Address Validation and Traceback for | |||
| IPv4/IPv6 Transition Scenarios | IPv4/IPv6 Transition Scenarios | |||
| draft-xu-savi-transition-13.txt | draft-xu-savi-transition-14.txt | |||
| Abstract | Abstract | |||
| SAVI (Source Address Validation Improvement) is an excellent | SAVI (Source Address Validation Improvement) is an excellent | |||
| mechanism for anti-IP-spoofing, which was advocated by IETF but only | mechanism for anti-IP-spoofing, which was advocated by IETF but only | |||
| focused on single-stack or simple network scenarios right now. To the | focused on single-stack or simple network scenarios right now. To the | |||
| best of our knowledge, existing studies have not paid attention to | best of our knowledge, existing studies have not paid attention to | |||
| the IPv4/IPv6 transition scenarios. However, since IPv4/IPv6 | the IPv4/IPv6 transition scenarios. However, since IPv4/IPv6 | |||
| transition schemes are plenty and various, one solution cannot meet | transition schemes are plenty and various, one solution cannot meet | |||
| all requirements of them. In this draft, we present a SAVI-based | all requirements of them. In this draft, we present a SAVI-based | |||
| skipping to change at page 2, line 4 ¶ | skipping to change at page 2, line 4 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current. | Drafts is at http://datatracker.ietf.org/drafts/current. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on November 10, 2018. | This Internet-Draft will expire on May 4, 2019. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2015 IETF Trust and the persons identified as the | Copyright (c) 2015 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents carefully, | publication of this document. Please review these documents carefully, | |||
| skipping to change at page 19, line 10 ¶ | skipping to change at line 767 ¶ | |||
| 8. Acknowledgments | 8. Acknowledgments | |||
| This document was prepared using 2-Word-v2.0.template.dot. | This document was prepared using 2-Word-v2.0.template.dot. | |||
| Authors' Addresses | Authors' Addresses | |||
| Ke Xu | Ke Xu | |||
| Tsinghua University | Tsinghua University | |||
| Department of Computer Science, Tsinghua University | Department of Computer Science, Tsinghua University | |||
| Beijing, 100084 | Beijing 100084 | |||
| China | China | |||
| Email: xuke@mail.tsinghua.edu.cn | Email: xuke@mail.tsinghua.edu.cn | |||
| Guangwu Hu | Guangwu Hu | |||
| Tsinghua University | Shenzhen Institute of Information Technology | |||
| Department of Computer Science, Tsinghua University | School of Cyber-Security, Shenzhen Institute of Information Technology | |||
| Beijing 100084 | Shenzhen,Guangdong 518172 | |||
| China | China | |||
| EMail: hgw09@mails.tsinghua.edu.cn | EMail: hgw09@mails.tsinghua.edu.cn | |||
| Fan Shi | Fan Shi | |||
| China Telecom | China Telecom | |||
| Beijing Research Institute, China Telecom | Beijing Research Institute, China Telecom | |||
| Beijing 100035 | Beijing 100035 | |||
| China | China | |||
| EMail: shifan@ctbri.com.cn | EMail: shifan@ctbri.com.cn | |||
| End of changes. 5 change blocks. | ||||
| 8 lines changed or deleted | 8 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||