Objectives Document Key Types as well as Key Provisioning Methods that may be used for RSVP Security Discuss applicability of those to various deployment environments In doing so, explicitly cover the more “interesting” cases: Single-domain & Multi-domain Non-RSVP hops Notify messages (non hop-by-hop) Subverted node RSVP Authentication & RSVP Encryption RSVP Aggregation (over Aggregate RSVP, over RSVP-TE, over PCN clouds,..) Intended Status: Informational |