[Curdle] Last Call: <draft-ietf-curdle-des-des-des-die-die-die-05.txt> (Deprecate 3DES and RC4 in Kerberos) to Best Current Practice

The IESG <iesg-secretary@ietf.org> Tue, 27 March 2018 14:25 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: curdle@ietf.org
Delivered-To: curdle@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 00B0E12DA2B; Tue, 27 Mar 2018 07:25:54 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.76.1
Auto-Submitted: auto-generated
Precedence: bulk
CC: ekr@rtfm.com, draft-ietf-curdle-des-des-des-die-die-die@ietf.org, Daniel Migault <daniel.migault@ericsson.com>, curdle-chairs@ietf.org, curdle@ietf.org, daniel.migault@ericsson.com
Reply-To: ietf@ietf.org
Sender: <iesg-secretary@ietf.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Message-ID: <152216075399.5269.2159941313567732239.idtracker@ietfa.amsl.com>
Date: Tue, 27 Mar 2018 07:25:53 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/-icQhMUmqP3QC-vJDYIJ-WxDkN8>
Subject: [Curdle] Last Call: <draft-ietf-curdle-des-des-des-die-die-die-05.txt> (Deprecate 3DES and RC4 in Kerberos) to Best Current Practice
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.22
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Mar 2018 14:25:54 -0000

The IESG has received a request from the CURves, Deprecating and a Little
more Encryption WG (curdle) to consider the following document: - 'Deprecate
3DES and RC4 in Kerberos'
  <draft-ietf-curdle-des-des-des-die-die-die-05.txt> as Best Current Practice

The Last Call for the document draft-ietf-curdle-des-des-des-die-die-die is related to 
the status change document, also in Last Call, for status-change-kerberos-3des-rc4-to-historic.

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2018-04-24. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.


   The 3DES and RC4 encryption types are steadily weakening in
   cryptographic strength, and the deprecation process should be begun
   for their use in Kerberos.  Accordingly, RFC 4757 is moved to
   Historic status, as none of the encryption types it specifies should
   be used, and RFC 3961 is updated to note the deprecation of the
   triple-DES encryption types.

The file can be obtained via

IESG discussion can be tracked via

No IPR declarations have been submitted directly on this I-D.

The document contains these normative downward references.
See RFC 3967 for additional information: 
    rfc3961: Encryption and Checksum Specifications for Kerberos 5 (Proposed Standard - IETF stream)
    rfc4120: The Kerberos Network Authentication Service (V5) (Proposed Standard - IETF stream)