Number 2, June 2002
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Implementing the Intrusion Detection Exchange Protocol
Implementing the Intrusion Detection Exchange Protocol Tim Buchheim, Michael Erlinger, Ben Feinstein, Harvey Mudd College, Harvey Mudd College, Guardent, Inc. [email protected], [email protected], [email protected] Greg Matthews,∗ Roy Pollock, Harvey Mudd College, Harvey Mudd College [email protected], [email protected] Joseph Betser, Andy Walther The Aerospace Corporation, The Aerospace Corporation [email protected], [email protected] † Abstract We describe the goals of the IETF’s Intrusion Detection Working Group (IDWG) and the requirements for a trans- port protocol to communicate among intrusion detection systems. We then describe the design and implementation of IAP, the first attempt at such a protocol. After a discussion of IAP’s limitations, we discuss BEEP, a new IETF general framework for application protocols. We then describe the Intrusion Detection Exchange Protocol (IDXP), a transport protocol designed and implemented within the BEEP framework that fulfills the IDWG requirements for its transport protocol. We conclude by discussing probable future directions for this ongoing effort. 1 Introduction 2 The IETF-IDWG 2.1 IETF Intrusion detection is an area of increasing concern in the Internet community. In response to this, many The IETF is the engineering, development and stan- automated intrusion detection systems have been devel- dardization arm of the Internet Architecture Board oped. However, there is no standardized way for them (IAB). The IETF is where the Internet protocol speci- to communicate. To remedy this, the Intrusion Detec- fications are developed. tion Working Group was chartered under the auspices of The IETF’s mission includes: the Internet Engineering Task Force. -
4643 Cornell University Updates: 2980 K
Network Working Group J. Vinocur Request for Comments: 4643 Cornell University Updates: 2980 K. Murchison Category: Standards Track Carnegie Mellon University October 2006 Network News Transfer Protocol (NNTP) Extension for Authentication Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). Abstract This document defines an extension to the Network News Transfer Protocol (NNTP) that allows a client to indicate an authentication mechanism to the server, to perform an authentication protocol exchange, and optionally to negotiate a security layer for subsequent protocol interactions during the remainder of an NNTP session. This document updates and formalizes the AUTHINFO USER/PASS authentication method specified in RFC 2980 and deprecates the AUTHINFO SIMPLE and AUTHINFO GENERIC authentication methods. Additionally, this document defines a profile of the Simple Authentication and Security Layer (SASL) for NNTP. Vinocur, et al. Standards Track [Page 1] RFC 4643 NNTP Authentication October 2006 Table of Contents 1. Introduction ............................................. 3 1.1. Conventions Used in This Document ................... 3 2. The AUTHINFO Extension ................................... 4 2.1. Advertising the AUTHINFO Extension .................. 4 2.2. Authenticating with the AUTHINFO Extension .......... 5 2.3. AUTHINFO USER/PASS Command .......................... 6 2.3.1. Usage ........................................ 7 2.3.2. Description .................................. 7 2.3.3. Examples ..................................... 9 2.4. AUTHINFO SASL Command ............................... 9 2.4.1. Usage ....................................... -
Simple Authentication and Security Layer - SASL CCERT-PUBDOC-2005-06-125
Simple Authentication and Security Layer - SASL CCERT-PUBDOC-2005-06-125 Sigurnosni problemi u računalnim programima i operativnim sustavima područje je na kojem CARNet CERT kontinuirano radi. Rezultat toga rada ovaj je dokument, koji je nastao suradnjom CARNet CERT-a i LS&S-a, a za koji se nadamo se da će Vam koristiti u poboljšanju sigurnosti Vašeg sustava. CARNet CERT, www.cert.hr - nacionalno središte za sigurnost računalnih mreža i sustava. LS&S, www.lss.hr - laboratorij za sustave i signale pri Zavodu za elektroničke sustave i obradbu informacija Fakulteta elektrotehnike i računarstva Sveučilišta u Zagrebu. Ovaj dokument predstavlja vlasništvo CARNet-a (CARNet CERT-a). Namijenjen je za javnu objavu, njime se može svatko koristiti, na njega se pozivati, ali samo u originalnom obliku, bez ikakvih izmjena, uz obavezno navođenje izvora podataka. Korištenje ovog dokumenta protivno gornjim navodima, povreda je autorskih prava CARNet-a, sukladno Zakonu o autorskim pravima. Počinitelj takve aktivnosti podliježe kaznenoj odgovornosti koja je regulirana Kaznenim zakonom RH. Revizija v1.1 CCERT-PUBDOC-2005-06-125 Stranica 2 / 13 Sadržaj 1. UVOD..................................................................................................................................................4 2. SASL – SIMPLE AUTHENTICATION AND SECURITY LAYER ............................................................................5 2.1. KONCEPT IDENTITETA.............................................................................................................................. -
The Blocks Extensible Exchange Protocol Core, RFC 3080
Network Working Group M. Rose Request For Comments: 3080 Invisible Worlds, Inc. Category: Standards Track March 2001 The Blocks Extensible Exchange Protocol Core Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2001). All Rights Reserved. Abstract This memo describes a generic application protocol kernel for connection-oriented, asynchronous interactions called the BEEP (Blocks Extensible Exchange Protocol) core. BEEP permits simultaneous and independent exchanges within the context of a single application user-identity, supporting both textual and binary messages. Rose Standards Track [Page 1] RFC 3080 The BEEP Core March 2001 Table of Contents 1. Introduction . 4 2. The BEEP Core . 5 2.1 Roles . 6 2.1.1 Exchange Styles . 6 2.2 Messages and Frames . 7 2.2.1 Frame Syntax . 8 2.2.1.1 Frame Header . 9 2.2.1.2 Frame Payload . 12 2.2.1.3 Frame Trailer . 13 2.2.2 Frame Semantics . 14 2.2.2.1 Poorly-formed Messages . 14 2.3 Channel Management . 15 2.3.1 Message Semantics . 16 2.3.1.1 The Greeting Message . 16 2.3.1.2 The Start Message . 17 2.3.1.3 The Close Message . 20 2.3.1.4 The OK Message . 23 2.3.1.5 The Error Message . 23 2.4 Session Establishment and Release . -
You're Writing a Networked Application, and You Want Instances of Your
Rheinisch-Westfälische Technische Hochschule Aachen Lehrstuhl für Informatik IV Prof. Dr. rer. nat. Otto Spaniol Blocks Extensible Exchange Protocol (BEEP) Seminar: Datenkommunikation und verteilte Systeme Wintersemster 2003/2004 Sandra Cüsters Matrikelnummer: 223195 Betreuung: Torsten Dinsing Ericsson Eurolab Deutschland GmbH, Herzogenrath 1 1. Introduction........................................................................................................... 3 2. The Design of Application Protocols..................................................................... 4 2.1 Protocol Mechanisms ..................................................................................... 4 2.2 Protocol Properties ......................................................................................... 4 2.3 Pipelining ........................................................................................................ 5 3. BEEP.................................................................................................................... 6 3.1 BEEP Concepts.............................................................................................. 7 3.1.1 BEEP Sessions..................................................................................... 7 3.1.2 Types of Interaction .............................................................................. 8 3.1.3 Framing of Messages ........................................................................... 8 3.1.4 Message Semantics...........................................................................