5. Clock and Secret Distribution (original) (raw)

Connected: An Internet Encyclopedia
5. Clock and Secret Distribution


Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1446

Prev: 4.2. Receiving a Message
Next: 5.1. Initial Configuration


5. Clock and Secret Distribution

5. Clock and Secret Distribution

The protocols described in Sections 3 and 4 assume the existence of loosely synchronized clocks and shared secret values. Three requirements constrain the strategy by which clock values and secrets are distributed.

The first section below specifies the procedures by which a SNMPv2 entity is initially configured. The next two sections describe one strategy for distributing clock values and one for determining a synchronized clock value among SNMPv2 parties supporting the Digest Authentication Protocol. For SNMPv2 parties supporting the Symmetric Privacy Protocol, the next section describes a strategy for distributing secret values. The last section specifies the procedures by which a SNMPv2 entity recovers from a "crash."


Next: 5.1. Initial Configuration


Connected: An Internet Encyclopedia
5. Clock and Secret Distribution