Hannes Tschofenig

Learn More
This RFC is not a candidate for any level of Internet Standard. The IETF disclaims any knowledge of the fitness of this RFC for any purpose and in particular notes that the decision to publish is not based on IETF review for such things as security, congestion control, or inappropriate interaction with deployed protocols. The RFC Editor has chosen to(More)
The Internet of Things (IoT) is the next wave of innovation that promises to improve and optimize our daily life based on intelligent sensors and smart objects working together. Through Internet Protocol (IP) connectivity, devices can now be connected to the Internet, thus allowing them to be read, controlled, and managed at any time and at any place.(More)
Signaling in communication networks is defined as the exchange of information between nodes to establish, maintain, and remove control state in network nodes. The concept of signaling is not new. The industry recognized the need for a way to create and remove circuits, each associated with an end-toend communications channel, for transporting information(More)
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.(More)
The Internet is facing ever-increasing complexity in the construction, configuration and management of heterogeneous networks. New communication paradigms are undermining its original design principles. The mobile Internet demands a level of optimum that is hard to achieve with a strictly-layered protocol stack. Questioning if layering is still an adequate(More)
The IKEv2 Mobility and Multihoming (MOBIKE) protocol is an extension of the Internet Key Exchange Protocol version 2 (IKEv2). These extensions should enable an efficient management of IKE and IPsec Security Associations when a host possesses multiple IP addresses and/or where IP addresses of an IPsec host change over time (for example, due to mobility).(More)
The security assertion markup language (SAML) standard supports the expression of security assertions such as authentication, role membership, or permissions. SAML assertions may be used to realize single-sign-on between Web servers located in different domains. After a short introduction to SAML, this article describes the application of SAML to protect(More)
This document provides a problem statement, lists requirements, and captures design aspects for a GEOPRIV Layer 7 (L7) Location Configuration Protocol (LCP). This protocol aims to allow an end host to obtain location information, by value or by reference, from a Location Information Server (LIS) that is located in the access network. The obtained location(More)
Tackling the major Internet security, scalability and mobility problems without essentially changing the existing Internet architecture has turned out to be a very challenging task. The overlay routing approaches fortunately seem to offer a sound way to mitigate most of these issues. Basically, they decouple the end-point identifiers from locators by(More)