Protocol Action: 'Using the GOST R 34.10-94, GOST R 34.10-2001 and GOST R 34.11-94 algorithms with the Internet X.509 Public Key Infrastructure Certificate and CRL Profile.' to Proposed Standard
The IESG <iesg-secretary@ietf.org> Mon, 20 February 2006 20:58 UTC
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1FBI71-0001az-Tp; Mon, 20 Feb 2006 15:58:27 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FBI70-0001au-0O for ietf-announce@ietf.org; Mon, 20 Feb 2006 15:58:26 -0500
Received: from [156.154.16.129] (helo=pine.neustar.com) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FBI6x-00057H-Nx for ietf-announce@ietf.org; Mon, 20 Feb 2006 15:58:25 -0500
Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com [10.31.47.10]) by pine.neustar.com (8.12.8/8.12.8) with ESMTP id k1KKwFvP004518 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 20 Feb 2006 20:58:15 GMT
Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43) id 1FBI6p-0008IS-3J; Mon, 20 Feb 2006 15:58:15 -0500
X-test-idtracker: no
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Message-Id: <E1FBI6p-0008IS-3J@stiedprstage1.ietf.org>
Date: Mon, 20 Feb 2006 15:58:15 -0500
X-Spam-Score: -2.8 (--)
X-Scan-Signature: c1c65599517f9ac32519d043c37c5336
Cc: pkix mailing list <ietf-pkix@imc.org>, Internet Architecture Board <iab@iab.org>, pkix chair <kent@bbn.com>, pkix chair <wpolk@nist.gov>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: Protocol Action: 'Using the GOST R 34.10-94, GOST R 34.10-2001 and GOST R 34.11-94 algorithms with the Internet X.509 Public Key Infrastructure Certificate and CRL Profile.' to Proposed Standard
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ietf-announce.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
Errors-To: ietf-announce-bounces@ietf.org
The IESG has approved the following document: - 'Using the GOST R 34.10-94, GOST R 34.10-2001 and GOST R 34.11-94 algorithms with the Internet X.509 Public Key Infrastructure Certificate and CRL Profile. ' <draft-ietf-pkix-gost-cppk-05.txt> as a Proposed Standard This document is the product of the Public-Key Infrastructure (X.509) Working Group. The IESG contact persons are Russ Housley and Sam Hartman. A URL of this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-gost-cppk-05.txt Technical Summary This document describes how to use Russian national cryptographic standards for two digital signature algorithms and one hash algorithm with X.509 certificates, as specified by the PKIX WG in RFC 3280. The document specifies the object identifiers (OIDs) for these algorithms and the parameter encodings used when they are employed as hash and signature algorithms for signing certificates and CRLs. This document also describes appropriate keyUsage values for certificates when the certificates carry public signature keys for the signature algorithms. Finally, this document provides two sample certificates, each represented as an ASN.1 DER-encoded string with accompanying ASN.1 decoding of each field. Each certificate is signed using the GOST hash algorithm and one of the two signature algorithms, and contains a public key for the corresponding algorithm. Working Group Summary The PKIX WG expressed consensus to advance this document. Initially this document was expected to be an Informational RFC, but when the PKIX WG Chair suggested that this document become a Standards Track RFC, there was no objection. Protocol Quality This document has been reviewed by members of the PKIX WG mailing list and by the PKIX WG Chairs. The ASN.1 for the examples was verified, but only the authors attempted to verify the hash or signature values since implementations of these algorithms were not readily available. This document was reviewed by Russ Housley for the IESG. _______________________________________________ IETF-Announce mailing list IETF-Announce@ietf.org https://www1.ietf.org/mailman/listinfo/ietf-announce