One document matched: draft-irtf-dtnrg-bundle-retrans-block-05.txt
Differences from draft-irtf-dtnrg-bundle-retrans-block-04.txt
DTN Research Group S. Symington
Internet-Draft The MITRE Corporation
Intended status: Experimental April 3, 2009
Expires: October 5, 2009
Delay-Tolerant Networking Retransmission Block
draft-irtf-dtnrg-bundle-retrans-block-05
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on October 5, 2009.
Copyright Notice
Copyright (c) 2009 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents in effect on the date of
publication of this document (http://trustee.ietf.org/license-info).
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document.
Symington Expires October 5, 2009 [Page 1]
Internet-Draft DTN Retransmission Block April 2009
Abstract
This document defines an optional extension block, called a
Retransmission Block (RB), that may be used with the Bundle Protocol
[refs.DTNBP] within the context of a Delay-Tolerant Network
architecture [refs.DTNarch]. The Retransmission Block (RB) is
designed to be used within a DTN that, as a matter of policy, deletes
all replayed bundles from the network. It is designed to be used in
a network that permits duplicate bundles to be forwarded if those
bundles have been retransmitted by a custodian, that may (if
possible) permit duplicate bundles to be forwarded if those bundles
are in intentional or unintentional routing loops (contingent on the
availability of mechanisms to distinguish looping bundles from other
bundles), but that will consider all other duplicate bundles to be
maliciously replayed bundles and delete them as such. The
Retransmission Block is designed to be inserted into a bundle by a
custodian when the custodian is retransmitting that bundle. The
purpose of the RB is to mark the bundle as a custody-based
retransmission so that it can be distinguished from other types of
duplicate bundles and thereby be spared from deletion. This document
defines the format and processing of this new Retransmission Block.
Symington Expires October 5, 2009 [Page 2]
Internet-Draft DTN Retransmission Block April 2009
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Applicability Statement . . . . . . . . . . . . . . . . . . . 7
2.1. Bundle Authentication Requirement . . . . . . . . . . . . 7
2.2. Deletion of All Replays, including Bundles in Routing
Loops . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.3. Universal Support for Replay Suppression . . . . . . . . . 8
2.4. Universal Support for the Retransmission Block . . . . . . 8
3. Retransmission Block Format . . . . . . . . . . . . . . . . . 9
4. Retransmission Block Processing . . . . . . . . . . . . . . . 10
4.1. Bundle Reception . . . . . . . . . . . . . . . . . . . . . 10
4.2. Detecting Duplicates and Determining which ones are
Custodial Retransmissions . . . . . . . . . . . . . . . . 10
4.3. Keeping Track of Bundles Received . . . . . . . . . . . . 11
4.4. Purging stored bundle information . . . . . . . . . . . . 11
4.5. Bundle Forwarding . . . . . . . . . . . . . . . . . . . . 11
4.6. Custodial Retransmission . . . . . . . . . . . . . . . . . 11
5. Non-Uniform Support for the Retransmission Block . . . . . . . 12
6. Security Considerations . . . . . . . . . . . . . . . . . . . 14
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 16
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 17
8.1. Normative References . . . . . . . . . . . . . . . . . . . 17
8.2. Informative References . . . . . . . . . . . . . . . . . . 17
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 18
Symington Expires October 5, 2009 [Page 3]
Internet-Draft DTN Retransmission Block April 2009
1. Introduction
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119
[refs.RFC2119].
The DTN bundle protocol [refs.DTNBP] defines the bundle as its
protocol data unit. As discussed in the DTN Security Overview
[refs.DTNsecOver], due to the resource-scarcity that characterizes
DTNs, unauthorized access and use of DTNs is a serious concern. As
described in the Bundle Security Protocol [refs.DTNBPsec], use of the
Bundle Authentication Block (BAB) at every node in the DTN can be
used to thwart an attacker wanting to launch a denial of service
attack by injecting bogus or modified bundles into the network. Use
of the BAB enables bogus or modified bundles to be detected and
deleted at the very first node at which they are received. Use of
the BAB, however, does not enable maliciously replayed bundles to be
detected, because such replayed bundles will contain valid
authenticators. Replayed bundles will only be deleted from the
network when they expire. Given the high latency typical in some
DTNs, bundles may be valid for days or weeks. For those networks in
which waiting for replayed bundles to expire is not an adequate form
of protection against the unauthorized use of the network posed by
replayed bundles, additional measures will be required to actively
detect and delete maliciously replayed bundles.
The detection and deletion of maliciously replayed bundles at any
given node is not simply a matter of configuring the node to maintain
a record of every bundle it receives, comparing each new bundle
received against the list of already-received bundles, and deleting
all duplicates. While such an approach would result in the deletion
of maliciously replayed bundles, it could also result in the deletion
of other types of duplicate bundles that are not replays and that
shouldn't be deleted.
Indiscriminate deletion of all duplicates could result in the
deletion of bundles that are in intentional or unintentional routing
loops. Such bundles may legitimately be found in DTNs and their
deletion may not be desirable. Unfortunately, there are currently no
mechanisms available to enable a DTN node to distinguish bundles that
are in loops from maliciously replayed bundles; suppression of
replays currently requires suppression of looping bundles. If replay
suppression is needed in a DTN that employs routing strategies that
result in routing loops, the routing protocols will need to provide a
mechanism for distinguishing looping bundles from maliciously
replayed bundles. If such a mechanism is provided, it can be used in
conjunction with the Retransmission Block as defined in this
Symington Expires October 5, 2009 [Page 4]
Internet-Draft DTN Retransmission Block April 2009
document.
Indiscriminate deletion of all duplicates could also result in the
deletion of bundles that have been retransmitted by a custodian as
part of the custody transfer process. The Bundle Protocol includes a
custody-based retransmission mechanism that may result in a custodian
retransmitting a stored bundle when the bundle's retransmission timer
expires or when the custodian receives a "failed" custody signal for
the bundle. Such retransmitted bundles are duplicates of previously
forwarded bundles. A DTN node that is configured to simply delete
all duplicates received would delete such custodial retransmissions,
thereby rendering custody transfer ineffective. In order to be able
to enable custody transfer to operate correctly while also detecting
and deleting malicious replays, DTN nodes need a way to determine
whether or not a duplicate bundle received is a custodial
retransmission so that custodial retransmissions can be spared from
deletion.
This document defines an optional bundle block called a
Retransmission Block (RB) that is intended to be used in DTNs that,
as a matter of policy, delete all replayed bundles from the network.
Such a DTN may be configured to permit duplicate bundles to be
forwarded only if those duplicate bundles are bundles that have been
retransmitted by a custodian. In this case, the DTN would be one in
which not only replayed bundles, but also bundles resulting from
intentional or unintentional routing loops would also be deleted.
If, on the other hand, the routing protocols being used in the DTN
enable bundles that are in loops to be distinguished from replayed
bundles, then the DTN could be configured such that only those
duplicate bundles that are replayed bundles are deleted.
In either case, the RB is designed to be inserted into a bundle by a
custodian when the custodian is retransmitting that bundle in
response to a custody transfer failure or retransmission timer
expiration. The intent of the RB is to mark a custodially
retransmitted bundle as such, so that when the bundle is received at
downstream nodes that detect it to be a duplicate of a previously-
received bundle, those nodes can understand it to be a custody-based
retransmission that should be preserved rather than another type of
duplicate that may (according to network policy) be deleted.
The RB is intended to enable custodially retransmitted bundles to be
distinguished from other duplicates. Other mechanisms would need to
be defined in order to be able to distinguish looping bundles from
other duplicates. If the RB is used with duplicate suppression in
the absence of these other mechanisms, then it will result in the
deletion of all looping bundles in addition to all replays.
Symington Expires October 5, 2009 [Page 5]
Internet-Draft DTN Retransmission Block April 2009
This document defines the format and processing of this new
Retransmission Block. The capabilities described in this document
are OPTIONAL for deployment with the Bundle Protocol. Bundle
Protocol implementations claiming to support Retransmission Blocks
MUST be capable of:
-Generating a Retransmission Block and inserting it into a bundle,
-Logging the relevant fields of all bundles received until those
bundles expire,
-Calculating a checksum or digest (as determined by local policy)
of the payload block of a bundle,
-Receiving bundles containing a Retransmission Block and using the
information contained in this Retransmission Block (in conjunction
with information from logged bundles and with a mechanism, if
available, for determining whether a bundle is in a routing loop)
to make duplicate deletion decisions, and
-Deleting a Retransmission Block from a bundle
as defined in this document.
Symington Expires October 5, 2009 [Page 6]
Internet-Draft DTN Retransmission Block April 2009
2. Applicability Statement
The objective of the Retransmission Block (RB) is to make
custodially-retransmitted bundles distinguishable from other
duplicate bundles. As such, the RB is designed to be used within a
DTN that does not, as a matter of policy, permit replayed bundles to
be forwarded and that is willing to enforce the detection and
deletion of replayed bundles by having every node
-Authenticate all bundles
-Keep track of bundles that have been received to identify which
newly-received bundles are duplicates
-Implement and use the RB as a way to enable nodes to determine
which duplicate bundles are custodial retransmissions
-Spare from deletion those duplicate bundles that are custodial
retransmissions
2.1. Bundle Authentication Requirement
Use of the RB to distinguish custodial retransmissions from replayed
bundles requires that bundles be authenticated in order to ensure
that the RB was in fact inserted by a legitimate node and that the RB
has not been modified since its insertion. There is no point in
using the RB within a DTN that does not perform bundle authentication
because DTNs that do not perform bundle authentication are
susceptible to denial of service attacks caused by all types of
bundles that can be modified or inserted by an adversary, not just
replays; in such an environment, detecting and deleting replays does
little to protect against denial of service attacks.
2.2. Deletion of All Replays, including Bundles in Routing Loops
Note that the RB is intended to be used only in DTNs that do not
permit the forwarding of replayed bundles. If a DTN does permit
replayed bundles to be forwarded, there is no point in using the RB.
Use of the RB makes it possible to distinguish which duplicate
bundles are custodial retransmissions so that they can be spared from
deletion. The RB may be used in DTNs that are configured to delete
all duplicates that are not custodial retransmissions. In this case,
duplicates that are the result of intentional or unintentional
routing loops will also be deleted along with replayed bundles. In
order to be able to suppress replays in a DTN that employs routing
strategies that result in routing loops, a mechanism for
distinguishing a bundle that is in a routing loop from a replayed
bundle will need to be provided for use in conjunction with the RB.
Symington Expires October 5, 2009 [Page 7]
Internet-Draft DTN Retransmission Block April 2009
Currently, no such mechanisms are known to exist, so replay deletion
will also result in the deletion of bundles that are in routing
loops.
2.3. Universal Support for Replay Suppression
One component of a DTN node's security policy should be whether or
not replays are allowed to be forwarded by that node. A node that is
not allowed to forward replays should delete all duplicate bundles
that are not custodial retransmissions and that cannot be determined
to be the result of routing loops. In order to be applied
consistently, correctly, and effectively, replay detection and
deletion is something that should be enforced at all nodes in the DTN
rather than something that is enforced on a node-by-node basis. If
not every node supports replay detection and deletion then some
replays will be allowed to remain in the network. The RB is designed
to be used within a DTN in which every node is configured to detect
and delete replays.
2.4. Universal Support for the Retransmission Block
While implementation of and support for the RB is optional, the RB is
designed to be used within a DTN in which every node supports the RB.
Failure to support the RB at one or more nodes in a DTN that, as a
matter of policy, deletes replays may result in the erroneous
deletion of custodially retransmitted bundles. Section 5 further
discusses the ramifications of non-uniform support of the RB.
Symington Expires October 5, 2009 [Page 8]
Internet-Draft DTN Retransmission Block April 2009
3. Retransmission Block Format
The Retransmission Block (RB) MAY be included in a bundle. A RB uses
the Canonical Bundle Block Format as defined in the Bundle Protocol
[refs.DTNBP]. That is, it is comprised of the following elements:
-Block-type code (one byte) - defined as in all bundle protocol
blocks except the primary bundle block. The block type code for
the Retransmission Block is 0x07.
-Block processing control flags (SDNV) - defined as in all bundle
protocol blocks except the primary bundle block. The following
block processing control flag MUST NOT be set:
-Block must be replicated in every fragment
The following block processing control flag MUST be set:
-Block contains an EID-reference field
- Block EID reference count and EID reference - composite field
containing a count of EID references with a value of 1 (expressed
as an SDNV) followed by a single EID reference (expressed as a
pair of SDNVs). Presence of this field is indicated by the
setting of the "block contains an EID reference field" flag in the
block processing control flags to 1. The EID referenced MUST be
that of the retransmitting custodian that inserted this block.
-Block data length (SDNV) - defined as in all bundle protocol
blocks except the primary bundle block.
-Block-type-specific data field as follows:
- Retransmission sequence number (SDNV) - An unsigned integer
indicating the number of times this bundle has been
retransmitted by this custodian.
The Retransmission Block format is as follows:
+------+--------------+------------------------------+--------------+
|type |flags (SDNV) |EID ref count and list (comp) |length (SDNV) |
+------+--------------+------------------------------+--------------+
| Retransmission Sequence Number (SDNV) |
+-------------------------------------------------------------------+
Figure 1
Symington Expires October 5, 2009 [Page 9]
Internet-Draft DTN Retransmission Block April 2009
4. Retransmission Block Processing
The following are the processing steps that a bundle node must take
relative to generation, reception, and processing of Retransmission
Blocks, assuming that the node is configured to detect and discard
replays.
4.1. Bundle Reception
According to the Bundle Protocol, if a node receives a bundle that it
currently has in custody as custodian, the received bundle will be
discarded.
Upon receipt of any other type of bundle, the node SHALL delete the
bundle's Retransmission Block if the custodian EID referenced in the
RB is not the same as the custodian EID referenced in the Primary
Bundle Block.
4.2. Detecting Duplicates and Determining which ones are Custodial
Retransmissions
We define a duplicate to be a bundle that has the same source
endpoint ID, creation timestamp, fragment offset and payload length
(if the bundle is a fragment), and checksum or digest of the payload
block as another bundle. (Whether to use a checksum or a digest of
the payload block is determined by local policy.)
If a bundle is received that is a duplicate of a previously received
bundle, then
-If the received bundle does not include a Retransmission Block,
the bundle is not a custodial retransmission.
-If the received bundle does include a Retransmission Block and
the RB's EID reference and retransmission sequence number values
are the same as those in the Retransmission Block (if any) of the
previously-received, duplicate bundle, the bundle is not a
custodial retransmission.
-Otherwise, the received bundle is a custodial retransmission.
The receiving node MUST delete this bundle if it is a duplicate, if
it is not a custodial retransmission, and if it cannot be determined
(by some mechanism that may be defined elsewhere) to be a result of a
routing loop.
Symington Expires October 5, 2009 [Page 10]
Internet-Draft DTN Retransmission Block April 2009
4.3. Keeping Track of Bundles Received
If the bundle is not deleted as a replay, the node must store at
least the following information from or about the bundle for
comparison with future received bundles: source EID; creation
timestamp; fragment offset and payload length (if the bundle is a
fragment); checksum or digest of the payload block; custodian EID (if
the bundle does not include a Retransmission Block) and
Retransmission Block EID reference and retransmission sequence number
(if the bundle does include a Retransmission Block).
4.4. Purging stored bundle information
The stored information for all bundles whose creation timestamp +
lifetime is less than the current time MAY be deleted.
4.5. Bundle Forwarding
As part of the custody acceptance procedures, the accepting node MUST
delete the bundle's Retransmission Block (if it has one).
4.6. Custodial Retransmission
Upon deciding to re-forward a bundle as a result of custody transfer
failure, the re-forwarding custodian MUST:
- insert a RB with a retransmission sequence number value of 0
into the bundle if the bundle does not already include a RB, or
- increment the retransmission sequence number value in the
Retransmission Block if the bundle does already include a RB.
- Store the inserted/modified retransmission block values along
with the other information from the bundle as part of its custody
storage procedures.
The EID reference in the Retransmission Block MUST refer to the re-
forwarding custodian.
If a custodian decides to re-forward only a fragment of a bundle that
it had previously forwarded, the re-forwarded fragment will not be a
duplicate of any bundle that had previously been transmitted by this
custodian. Therefore, the re-forwarded fragment SHALL NOT include a
Retransmission Block.
Symington Expires October 5, 2009 [Page 11]
Internet-Draft DTN Retransmission Block April 2009
5. Non-Uniform Support for the Retransmission Block
Failure to support the RB at one or more nodes in a DTN in which, as
a matter of policy, all nodes are configured to delete replayed
bundles may result in the erroneous deletion of custodially
retransmitted bundles in the following cases:
A node that does not support the RB but that is configured to
delete replays could delete duplicate bundles even if they include
RBs that mark them as being custodial retransmissions.
A custodial node that does not support the RB but that retransmits
a bundle would not include a RB to mark the bundle as a custodial
retransmission, so that when the bundle is received at a
downstream node that is configured to suppress replays, the bundle
would be deleted by that downstream node (even if that downstream
node supports the RB).
Consequently, the RB SHOULD be supported at all nodes in a DTN that,
as a matter of policy, deletes replayed bundles. If not all nodes in
the DTN support the RB, then to preserve support for custodial
retransmission while maximizing replay suppression, the security
policies of the nodes and the Block Processing Flags in the RB should
be configured as follows:
-The "Discard bundle if block can't be processed" Block Processing
Flag SHOULD NOT be set,
-The "Discard block if it can't be processed" Block Processing
Flag SHOULD NOT be set,
-Nodes that support the RB should be configured to delete
duplicates that are not custodial retransmissions,
-Nodes that do not support the RB should be configured to forward
duplicates (so that they don't inadvertently delete custodial
retransmissions), and
-Nodes that do not support the RB should be configured not to take
custody of bundles (to ensure that custodial retransmissions will
always include RBs).
The above configuration ensures that custodial retransmissions will
not be erroneously deleted, and that all duplicate that are received
at nodes that support the RB will be deleted. Only duplicates that
are received at nodes that do not support the RB will be forwarded
and allowed to remain in the network. If these are forwarded to a
node that supports the RB, however, they will be deleted at that
Symington Expires October 5, 2009 [Page 12]
Internet-Draft DTN Retransmission Block April 2009
node. Therefore, a network configured in this way is vulnerable to a
denial-of-service attack only from duplicate bundles that circulate
exclusively among nodes that do not support the RB.
Symington Expires October 5, 2009 [Page 13]
Internet-Draft DTN Retransmission Block April 2009
6. Security Considerations
As mentioned in the Applicability Statement Section, it does not make
sense to detect and suppress replayed bundles without first
authenticating that those bundles have not been modified. Without
authentication that a bundle has been forwarded intact, a network is
vulnerable to denial of service attacks launched merely by the
injection of any spurious bundles into the network or the
modification of any authentic bundles. There seems little value in
protecting against denial-of-service attacks resulting from replayed
bundles if denial-of-service attacks resulting from such modified or
spurious bundles will be permitted. Therefore, in determining the
security policy of a node, nodes that support the RB and that are
configured to suppress replays should also be required to
authenticate bundles. Furthermore, all nodes in the DTN should be
configured in the same way, to ensure that replays will be suppressed
consistently without also resulting in the erroneous deletion of
custodial retransmissions.
If the integrity of the RB is not protected, an adversary could
inject many replayed bundles into the network yet include an RB in
each that makes these bundles appear to be legitimate
retransmissions. Integrity protection for the entire bundle,
including the RB, MUST be provided by using the BAB with a
ciphersuite, such as the BAB-HMAC ciphersuite defined in the Bundle
Security Protocol, that uses a strict canonicalisation algorithm to
protect the entire bundle between one hop and the next. Because of
the hop-by-hop nature of the protection provided by the BAB, every
node in the network would need to require all bundles to be protected
with the BAB in order to ensure bundle authentication across the
network. If, instead, integrity protection were to be provided using
the PIB, with a ciphersuite that uses mutable canonicalization, the
DTN would still be vulnerable to a replay attack in which an
adversary modifies the fragment offset information of a previously-
transmitted, valid bundle, and injects this modified bundle into the
network. Such a bundle would not be deleted as a replay because its
offset information is unique, but it would authenticate using the PIB
because ciphersuites using mutable canonicalization do not calculate
their security results over the fragment offset information (due to
the fact that this information may change as the bundle traverses the
network).
If a node or BAB key is compromised, authentication provided through
use of the BAB does not help to protect against replays, but in this
case the network's vulnerability to denial-of-service attacks is much
larger than just a vulnerability to replays. If a node is
compromised, any bundle could be created and injected into the
network.
Symington Expires October 5, 2009 [Page 14]
Internet-Draft DTN Retransmission Block April 2009
If a node or key is compromised, however, payload content must be
taken into consideration in order to protect the DTN from insertion
attacks that may be possible as a result of the RB being used. In
some cases it might be possible for an adversary to know or guess
that a specific source will emit a bundle at a specific time. In
this case, the adversary could send out its own bundle that purports
to be from that source and that contains correctly-guessed timestamp
information, with the intent that this bundle be received at a
forwarding node before the authentic bundle from the actual source.
If the adversary that is injecting the spurious bundle is in
possession of a compromised BAB key, this spurious bundle would
appear to be valid when received by a forwarding node. If the
forwarding node were to use only bundle source, creation timestamp,
and fragment information (and not a checksum or digest of the payload
block, as is required) to identify duplicates, then when the
forwarding node receives the second bundle, it would delete this
bundle as a duplicate even though this second bundle is actually the
authentic bundle from the actual source. If payload block content is
being used to identify duplicates, on the other hand, then the two
bundles would not appear to be duplicates and the second one would
not be deleted. The fact that the bundle source, creation timestamp,
and fragment information of the bundles match whereas the payloads do
not, however, would serve as a red flag that something is amiss and
needs to be investigated. If an adversary launching this kind of
insertion attack is in possession of a compromised BAB key, then
insertion of a PIB into the bundle by the bundle's source would
enable the forwarding node to determine which of the bundles is
legitimate and which is not (assuming the forwarding node is in
possession of the keying material necessary to authenticate the PIB
security result). If the adversary launching this attack is in
possession of the source's PIB key, however, then determining which
bundle is legitimate would be impossible. Still, the presence of two
bundles with identical bundle source, creation timestamp, and
fragment information but different payloads would serve as a red
flag.
Symington Expires October 5, 2009 [Page 15]
Internet-Draft DTN Retransmission Block April 2009
7. IANA Considerations
If the bundle protocol becomes a standards track protocol, then we
may want to consider having IANA establish a register of block types,
of which the Retransmission Block would be one.
Symington Expires October 5, 2009 [Page 16]
Internet-Draft DTN Retransmission Block April 2009
8. References
8.1. Normative References
[refs.RFC2119]
Bradner, S. and J. Reynolds, "Key words for use in RFCs to
Indicate Requirement Levels", RFC 2119, October 1997.
[refs.DTNBP]
Scott, K. and S. Burleigh, "Bundle Protocol
Specification", RFC 5050, November 2007.
[refs.DTNBPsec]
Symington, S., Farrell, S., Weiss, H., and P. Lovell,
"Bundle Security Protocol Specification",
draft-irtf-dtnrg-bundle-security-06.txt, work-in-progress,
November 2008.
8.2. Informative References
[refs.DTNarch]
Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst,
R., Scott, K., Fall, K., and H. Weiss, "Delay-Tolerant
Network Architecture", RFC 4838, April 2007.
[refs.DTNsecOver]
Farrell, S., Symington, S., Weiss, H., and P. Lovell,
"Delay-Tolerant Network Security Overview",
draft-irtf-dtnrg-sec-overview-05.txt, work-in-progress,
November 2008.
Symington Expires October 5, 2009 [Page 17]
Internet-Draft DTN Retransmission Block April 2009
Author's Address
Susan Flynn Symington
The MITRE Corporation
7515 Colshire Drive
McLean, VA 22102
US
Phone: +1 (703) 983-7209
Email: susan@mitre.org
URI: http://mitre.org/
Symington Expires October 5, 2009 [Page 18]
| PAFTECH AB 2003-2026 | 2026-04-24 10:31:18 |