Last Call: <draft-ietf-krb-wg-camellia-cts-01.txt> (Camellia Encryption for Kerberos 5) to Informational RFC

The IESG <> Wed, 12 September 2012 18:15 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 2D4CB21F864A for <>; Wed, 12 Sep 2012 11:15:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -102.508
X-Spam-Status: No, score=-102.508 tagged_above=-999 required=5 tests=[AWL=0.091, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id FIDajsXUFVk0; Wed, 12 Sep 2012 11:15:22 -0700 (PDT)
Received: from (localhost []) by (Postfix) with ESMTP id BACC321F8604; Wed, 12 Sep 2012 11:15:22 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <>
To: IETF-Announce <>
Subject: Last Call: <draft-ietf-krb-wg-camellia-cts-01.txt> (Camellia Encryption for Kerberos 5) to Informational RFC
X-Test-IDTracker: no
X-IETF-IDTracker: 4.34
Message-ID: <>
Date: Wed, 12 Sep 2012 11:15:22 -0700
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IETF announcement list. No discussions." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Wed, 12 Sep 2012 18:15:23 -0000

The IESG has received a request from the Kerberos WG (krb-wg) to consider
the following document:
- 'Camellia Encryption for Kerberos 5'
  <draft-ietf-krb-wg-camellia-cts-01.txt> as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the mailing lists by 2012-09-26. Exceptionally, comments may be
sent to instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.


   This document specifies two encryption types and two corresponding
   checksum types for the Kerberos cryptosystem framework defined in RFC
   3961.  The new types use the Camellia block cipher in CBC-mode with
   ciphertext stealing and the CMAC algorithm for integrity protection.

The file can be obtained via

IESG discussion can be tracked via

The following IPR Declarations may be related to this I-D: