RFC 3694

Threat Analysis of the Geopriv Protocol, February 2004

File formats:
icon for text file icon for PDF icon for HTML
Status:
INFORMATIONAL
Updated by:
RFC 6280
Authors:
M. Danley
D. Mulligan
J. Morris
J. Peterson
Stream:
IETF
Source:
geopriv (rai)

Cite this RFC: TXT  |  XML  |   BibTeX

DOI:  https://doi.org/10.17487/RFC3694

Discuss this RFC: Send questions or comments to the mailing list geopriv@ietf.org

Other actions: Submit Errata  |  Find IPR Disclosures from the IETF  |  View History of RFC 3694


Abstract

This document provides some analysis of threats against the Geopriv protocol architecture. It focuses on protocol threats, threats that result from the storage of data by entities in the architecture, and threats posed by the abuse of information yielded by Geopriv. Some security properties that meet these threats are enumerated as a reference for Geopriv requirements. This memo provides information for the Internet community.


For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 8729.




Advanced Search