…ernet community. (See: security incident.) (C) Guidelines to be produced by the WG will address technology vendors, network service providers, and response teams in their roles assisting organizations in resolving security incidents. These relationships are functional and can exi…
…pdated by RFC 8553 RFC 7590 Obsoletes RFC 3920 Was draft-ietf-xmpp-3920bis xmpp WG Select version 22 RFC 6120 Compare versions Author Peter Saint-Andre Email authors RFC stream Other formats txt html pdf bibtex Additional resources Mailing list discussion Report a datatracker bug…
…pdated by RFC 8553 RFC 7590 Obsoletes RFC 3920 Was draft-ietf-xmpp-3920bis xmpp WG Select version 22 RFC 6120 Compare versions Author Peter Saint-Andre Email authors RFC stream Other formats txt html pdf bibtex Additional resources Mailing list discussion Report a datatracker bug…
…ho, in the context of the work on RFC 1995bis, recently has provided the DNSEXT WG access to a privately archived DNSIND mailing list thread on RFC 1995, in which such issues have been discussed in November 1999. For the record, the technical issues in RFC 1995 that can be addres…
…ho, in the context of the work on RFC 1995bis, recently has provided the DNSEXT WG access to a privately archived DNSIND mailing list thread on RFC 1995, in which such issues have been discussed in November 1999. For the record, the technical issues in RFC 1995 that can be addres…
…ally within the Jabber open-source community, mainly in 1999. In 2002, the XMPP WG was chartered with developing an adaptation of the Jabber protocol that would be suitable as an IETF instant messaging (IM) and presence technology. As a result of work by the XMPP WG, the current …
…ally within the Jabber open-source community, mainly in 1999. In 2002, the XMPP WG was chartered with developing an adaptation of the Jabber protocol that would be suitable as an IETF instant messaging (IM) and presence technology. As a result of work by the XMPP WG, the current …
…ally within the Jabber open-source community, mainly in 1999. In 2002, the XMPP WG was chartered with developing an adaptation of the Jabber protocol that would be suitable as an IETF instant messaging (IM) and presence technology. As a result of work by the XMPP WG, the current …
…ally within the Jabber open-source community, mainly in 1999. In 2002, the XMPP WG was chartered with developing an adaptation of the Jabber protocol that would be suitable as an IETF instant messaging (IM) and presence technology. As a result of work by the XMPP WG, the current …
… March 2009 View errata Report errata Was draft-ietf-lemonade-msgevent lemonade WG Select version 07 RFC 5423 Compare versions Authors Chris Newman Randall Gellens Email authors RFC stream Other formats txt html pdf w/errata bibtex Additional resources Mailing list discussion Rep…
…f round-trips required to complete authentication exchange is not minimal. SASL WG is working on a separate document that should address these limitations. 1.1 . Relationship to Other Documents This document, together with RFC 4422 , obsoletes RFC 2222 in its entirety. This docum…
…md0 b24uZWR1oi0wK6ADAgEDoSQwIhsEaW1hcBsac2hpdmFtcy5jYW Mud2FzaGluZ3Rvbi5lZHWjgdMwgdCgAwIBAaEDAgEDooHDBIHA cS1GSa5b+fXnPZNmXB9SjL8Ollj2SKyb+3S0iXMljen/jNkpJX AleKTz6BQPzj8duz8EtoOuNfKgweViyn/9B9bccy1uuAE2HI0y C/PHXNNU9ZrBziJ8Lm0tTNc98kUpjXnHZhsMcz5Mx2GR6dGknb I0iaGcRerMUsWOuBmKKKR…
…md0 b24uZWR1oi0wK6ADAgEDoSQwIhsEaW1hcBsac2hpdmFtcy5jYW Mud2FzaGluZ3Rvbi5lZHWjgdMwgdCgAwIBAaEDAgEDooHDBIHA cS1GSa5b+fXnPZNmXB9SjL8Ollj2SKyb+3S0iXMljen/jNkpJX AleKTz6BQPzj8duz8EtoOuNfKgweViyn/9B9bccy1uuAE2HI0y C/PHXNNU9ZrBziJ8Lm0tTNc98kUpjXnHZhsMcz5Mx2GR6dGknb I0iaGcRerMUsWOuBmKKKR…
…md0 b24uZWR1oi0wK6ADAgEDoSQwIhsEaW1hcBsac2hpdmFtcy5jYW Mud2FzaGluZ3Rvbi5lZHWjgdMwgdCgAwIBAaEDAgEDooHDBIHA cS1GSa5b+fXnPZNmXB9SjL8Ollj2SKyb+3S0iXMljen/jNkpJX AleKTz6BQPzj8duz8EtoOuNfKgweViyn/9B9bccy1uuAE2HI0y C/PHXNNU9ZrBziJ8Lm0tTNc98kUpjXnHZhsMcz5Mx2GR6dGknb I0iaGcRerMUsWOuBmKKKR…
…lass of mechanisms). RFC 2945 [ RFC2945 ] is an example of such technology. The WG elected not to use EKE like mechanisms as a basis for SCRAM. If an attacker obtains the authentication information from the authentication repository and either eavesdrops on one authentication exc…