{"draft":"draft-ietf-ancp-security-threats-08","doc_id":"RFC5713","title":"Security Threats and Security Requirements for the Access Node Control Protocol (ANCP)","authors":["H. Moustafa","H. Tschofenig","S. De Cnodder"],"format":["ASCII","HTML"],"page_count":"18","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Access Node Control Protocol","abstract":"The Access Node Control Protocol (ANCP) aims to communicate Quality\r\nof Service (QoS)-related, service-related, and subscriber-related\r\nconfigurations and operations between a Network Access Server (NAS)\r\nand an Access Node (e.g., a Digital Subscriber Line Access\r\nMultiplexer (DSLAM)). The main goal of this protocol is to allow the\r\nNAS to configure, manage, and control access equipment, including the\r\nability for the Access Nodes to report information to the NAS.\r\n\r\nThis present document investigates security threats that all ANCP\r\nnodes could encounter. This document develops a threat model for\r\nANCP security, with the aim of deciding which security functions are\r\nrequired. Based on this, security requirements regarding the Access\r\nNode Control Protocol are defined. This document is not an Internet \r\nStandards Track specification; it is published for informational purposes.","pub_date":"January 2010","keywords":["ANCP security","ANCP threats","ANCP attacks"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC5713","errata_url":null}