WG Action: Rechartered IP Security Maintenance and Extensions (ipsecme)

The IESG <iesg-secretary@ietf.org> Tue, 15 January 2013 16:50 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ietf-announce@ietfa.amsl.com
Delivered-To: ietf-announce@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D3C421F860A; Tue, 15 Jan 2013 08:50:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.469
X-Spam-Level:
X-Spam-Status: No, score=-102.469 tagged_above=-999 required=5 tests=[AWL=0.130, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X+jdQ1q88PaC; Tue, 15 Jan 2013 08:50:28 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A0D6C21F8929; Tue, 15 Jan 2013 08:50:27 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: WG Action: Rechartered IP Security Maintenance and Extensions (ipsecme)
X-Test-IDTracker: no
X-IETF-IDTracker: 4.37
Message-ID: <20130115165027.12612.2475.idtracker@ietfa.amsl.com>
Date: Tue, 15 Jan 2013 08:50:27 -0800
Cc: ipsecme WG <ipsec@ietf.org>
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-announce>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Jan 2013 16:50:29 -0000

The IP Security Maintenance and Extensions (ipsecme) working group in the
Security Area of the IETF has been rechartered. For additional
information please contact the Area Directors or the WG Chairs.

IP Security Maintenance and Extensions (ipsecme)
------------------------------------------------
Current Status: Active Working Group

Chairs:
  Paul Hoffman <paul.hoffman@vpnc.org>
  Yaron Sheffer <yaronf.ietf@gmail.com>

Assigned Area Director:
  Sean Turner <turners@ieca.com>

Mailing list
  Address: ipsec@ietf.org
  To Subscribe: https://www.ietf.org/mailman/listinfo/ipsec
  Archive: http://www.ietf.org/mail-archive/web/ipsec/

Charter of Working Group:

 The IPsec suite of protocols includes IKEv1 (RFC 2409
 and associated RFCs), IKEv2 (RFC 5996), and the IPsec
 security architecture (RFC 4301). IPsec is widely
 deployed in VPN gateways, VPN remote access clients,
 and as a substrate for host-to-host, host-to-network,
 and network-to-network security.

 The IPsec Maintenance and Extensions Working Group
 continues the work of the earlier IPsec Working Group
 which was concluded in 2005. Its purpose is to maintain
 the IPsec standard and to facilitate discussion of
 clarifications, improvements, and extensions to IPsec,
 mostly to IKEv2. The working group also serves as a
 focus point for other IETF Working Groups who use IPsec
 in their own protocols.

 The current work items include:

 In an environment with many IPsec gateways and remote
 clients that share an established trust infrastructure
 (in a single administrative domain or across multiple
 domains), customers want to get on-demand point-to-point
 IPsec capability for efficiency. However, this cannot be
 feasibly accomplished only with today's IPsec and IKE due
 to problems with address lookup, reachability, policy
 configuration, and so on.

 The IPsecME Working Group will handle this large scale
 VPN problem by:

  * Creating a problem statement document including use
    cases, definitions and proper requirements for discovery
    and updates. This document would be solution-agnostic.

  * Publishing a common solution for the discovery and
    update problems that will satisfy the requirements
    in the problem statement document.  The working group
    may standardize one of the vendor solutions, a combination,
    an superset of such a solution, or a new protocol.

  * Reviewing and helping publish Informational documents
    describing current vendor proprietary solutions.

 Recently discovered incorrect behavior of ISPs poses a
 challenge to IKE, whose UDP messages (especially #3 and #4)
 sometimes get fragmented at the IP level and then dropped
 by these ISPs. There is interest in solving this issue by
 allowing transport of IKE over TCP; this is currently
 implemented by some vendors. The group will standardize such
 a solution, using draft-nir-ipsecme-ike-tcp as a starting point.

 The WG will review and possibly revise the list of mandatory-to-
 implement algorithms for ESP and AH based on five years of experience 
 with newer algorithms and cryptographic modes. This work will be based 
 on draft-mcgrew-ipsec-me-esp-ah-reqts.

 The WG will update the way IKEv2 uses public keys that are
 trusted out-of-band (that is, not through a common PKIX trust
 anchor). This work will be based on
 draft-kivinen-ipsecme-oob-pubkey.

 The WG will revise the IKEv2 specification with a small number
 of mandatory tests required for the secure operation of IKEv2
 when using elliptic curve cryptography. This work will be based
 on draft-sheffer-ipsecme-dh-checks.

 This charter will expire in January 2015 (24 months from approval).
 If the charter is not updated before that time, the WG will be
 closed and any remaining documents revert back to individual
 Internet-Drafts.



Milestones:
  Done     - WG last call on IPv6 configuration payloads
  Done     - WG last call on IPsec roadmap
  Done     - WG last call on session resumption
  Done     - WG last call on redirect
  Done     - WG last call on IKEv2bis
  Done     - WG last call on ESP NULL traffic visibility
  Done     - WG last call on HA requirements
  Done     - WG last call on quick crash discovery
  Done     - WG last call on EAP-only authentication
  Nov 2012 - IETF Last Call on large scale VPN use cases and requirements
  Feb 2013 - IETF Last Call on IKE over TCP
  Feb 2013 - IETF LC new MITM algorithms
  Apr 2013 - IETF LC out-of-band public key draft
  Jun 2013 - IETF Last Call on large scale VPN protocol