Protocol Action: 'Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 With IPsec' to Proposed Standard
The IESG <iesg-secretary@ietf.org> Mon, 12 February 2007 19:52 UTC
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HGhDV-00086v-Dy; Mon, 12 Feb 2007 14:52:01 -0500
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HGhDS-00086V-GO for ietf-announce@ietf.org; Mon, 12 Feb 2007 14:51:58 -0500
Received: from ns4.neustar.com ([156.154.24.139]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1HGhDR-0001lW-6w for ietf-announce@ietf.org; Mon, 12 Feb 2007 14:51:58 -0500
Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com [10.31.47.10]) by ns4.neustar.com (Postfix) with ESMTP id 259732AD43; Mon, 12 Feb 2007 19:51:27 +0000 (GMT)
Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43) id 1HGhCw-00010V-PD; Mon, 12 Feb 2007 14:51:26 -0500
X-test-idtracker: no
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Message-Id: <E1HGhCw-00010V-PD@stiedprstage1.ietf.org>
Date: Mon, 12 Feb 2007 14:51:26 -0500
X-Spam-Score: -2.8 (--)
X-Scan-Signature: 4d87d2aa806f79fed918a62e834505ca
Cc: Internet Architecture Board <iab@iab.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: Protocol Action: 'Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 With IPsec' to Proposed Standard
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ietf-announce.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
Errors-To: ietf-announce-bounces@ietf.org
The IESG has approved the following document: - 'Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 With IPsec ' <draft-kelly-ipsec-ciph-sha2-01.txt> as a Proposed Standard This document has been reviewed in the IETF but is not the product of an IETF Working Group. The IESG contact person is Russ Housley. A URL of this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-kelly-ipsec-ciph-sha2-01.txt Technical Summary This specification describes the use of HMAC in conjunction with the SHA-256, SHA-384, and SHA-512 algorithms in IPsec. These algorithms may be used as the basis for data origin authentication and integrity verification mechanisms for the AH, ESP, IKEv1 and IKEv2 protocols, and also as Pseudo-Random Functions (PRFs) for IKEv1 and IKEv2. Truncated output lengths are specified for the authentication-related variants. The PRF variants are not truncated. Working Group Summary This document is not the result of any IETF Working Group, but there has been some discussion of the document on the IPsec mail list. Protocol Quality This document was reviewed by Russ Housley for the IESG. Note to RFC Editor Please change the status of the [SHA2-2] reference. This should be an informative reference, not a normative reference. The PRF using SHA-256 is referred to as "HMAC-SHA-PRF-256" and "HMAC-SHA-256-PRF" and "PRF_HMAC_SHA2_256" in various places in the document. Please refer to it as "PRF-HMAC-SHA-256" everywhere. The PRF using SHA-384 is referred to as "HMAC-SHA-PRF-384" and "HMAC-SHA-384-PRF" and "PRF_HMAC_SHA2_384" in various places in the document. Please refer to it as "PRF-HMAC-SHA-384" everywhere. The PRF using SHA-512 is referred to as "HMAC-SHA-PRF-512" and "HMAC-SHA-512-PRF" and "PRF_HMAC_SHA2_512" in various places in the document. Please refer to it as "PRF-HMAC-SHA-512" everywhere. _______________________________________________ IETF-Announce mailing list IETF-Announce@ietf.org https://www1.ietf.org/mailman/listinfo/ietf-announce