Protocol Action: 'Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 With IPsec' to Proposed Standard

The IESG <iesg-secretary@ietf.org> Mon, 12 February 2007 19:52 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HGhDV-00086v-Dy; Mon, 12 Feb 2007 14:52:01 -0500
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HGhDS-00086V-GO for ietf-announce@ietf.org; Mon, 12 Feb 2007 14:51:58 -0500
Received: from ns4.neustar.com ([156.154.24.139]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1HGhDR-0001lW-6w for ietf-announce@ietf.org; Mon, 12 Feb 2007 14:51:58 -0500
Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com [10.31.47.10]) by ns4.neustar.com (Postfix) with ESMTP id 259732AD43; Mon, 12 Feb 2007 19:51:27 +0000 (GMT)
Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43) id 1HGhCw-00010V-PD; Mon, 12 Feb 2007 14:51:26 -0500
X-test-idtracker: no
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Message-Id: <E1HGhCw-00010V-PD@stiedprstage1.ietf.org>
Date: Mon, 12 Feb 2007 14:51:26 -0500
X-Spam-Score: -2.8 (--)
X-Scan-Signature: 4d87d2aa806f79fed918a62e834505ca
Cc: Internet Architecture Board <iab@iab.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: Protocol Action: 'Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 With IPsec' to Proposed Standard
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ietf-announce.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
Errors-To: ietf-announce-bounces@ietf.org

The IESG has approved the following document:

- 'Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 With IPsec '
   <draft-kelly-ipsec-ciph-sha2-01.txt> as a Proposed Standard

This document has been reviewed in the IETF but is not the product of an
IETF Working Group. 

The IESG contact person is Russ Housley.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-kelly-ipsec-ciph-sha2-01.txt

Technical Summary

  This specification describes the use of HMAC in conjunction with the
  SHA-256, SHA-384, and SHA-512 algorithms in IPsec.  These algorithms
  may be used as the basis for data origin authentication and integrity
  verification mechanisms for the AH, ESP, IKEv1 and IKEv2 protocols,
  and also as Pseudo-Random Functions (PRFs) for IKEv1 and IKEv2.
  Truncated output lengths are specified for the authentication-related
  variants.  The PRF variants are not truncated.

Working Group Summary

  This document is not the result of any IETF Working Group, but there
  has been some discussion of the document on the IPsec mail list.

Protocol Quality

  This document was reviewed by Russ Housley for the IESG.

Note to RFC Editor

  Please change the status of the [SHA2-2] reference.  This should
  be an informative reference, not a normative reference.

  The PRF using SHA-256 is referred to as "HMAC-SHA-PRF-256" and
  "HMAC-SHA-256-PRF" and "PRF_HMAC_SHA2_256" in various places
  in the document.  Please refer to it as "PRF-HMAC-SHA-256"
  everywhere.

  The PRF using SHA-384 is referred to as "HMAC-SHA-PRF-384" and
  "HMAC-SHA-384-PRF" and "PRF_HMAC_SHA2_384" in various places
  in the document.  Please refer to it as "PRF-HMAC-SHA-384"
  everywhere.

  The PRF using SHA-512 is referred to as "HMAC-SHA-PRF-512" and
  "HMAC-SHA-512-PRF" and "PRF_HMAC_SHA2_512" in various places
  in the document.  Please refer to it as "PRF-HMAC-SHA-512"
  everywhere.


_______________________________________________
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce