Protocol Action: 'Cryptographic Algorithms for use in the Internet Key Exchange Version 2' to Proposed Standard

The IESG <iesg-secretary@ietf.org> Thu, 23 September 2004 18:52 UTC

Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA09815; Thu, 23 Sep 2004 14:52:00 -0400 (EDT)
Received: from megatron.ietf.org ([132.151.6.71]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1CAYo6-0006sw-HG; Thu, 23 Sep 2004 14:59:06 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1CAYVE-0008Hy-LN; Thu, 23 Sep 2004 14:39:36 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1CAYIc-0005Bc-N7; Thu, 23 Sep 2004 14:26:34 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA07763; Thu, 23 Sep 2004 14:26:32 -0400 (EDT)
Received: from megatron.ietf.org ([132.151.6.71]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1CAYPS-0006P7-Lz; Thu, 23 Sep 2004 14:33:38 -0400
Received: from apache by megatron.ietf.org with local (Exim 4.32) id 1CAYGw-0004eB-Qx; Thu, 23 Sep 2004 14:24:50 -0400
X-test-idtracker: no
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Message-Id: <E1CAYGw-0004eB-Qx@megatron.ietf.org>
Date: Thu, 23 Sep 2004 14:24:50 -0400
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 50a516d93fd399dc60588708fd9a3002
Cc: ipsec mailing list <ipsec@ietf.org>, ipsec chair <tytso@mit.edu>, Internet Architecture Board <iab@iab.org>, ipsec chair <byfraser@cisco.com>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: Protocol Action: 'Cryptographic Algorithms for use in the Internet Key Exchange Version 2' to Proposed Standard
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ietf-announce.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
Sender: ietf-announce-bounces@ietf.org
Errors-To: ietf-announce-bounces@ietf.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7aafa0432175920a4b3e118e16c5cb64

The IESG has approved the following documents:

- 'Cryptographic Algorithms for use in the Internet Key Exchange Version 2 '
   <draft-ietf-ipsec-ikev2-algorithms-05.txt> as a Proposed Standard
- 'Cryptographic Suites for IPsec '
   <draft-ietf-ipsec-ui-suites-06.txt> as a Proposed Standard

These documents are products of the IP Security Protocol Working Group. 

The IESG contact persons are Russ Housley and Steve Bellovin.

Technical Summary

  The IPSec series of protocols makes use of various cryptographic
  algorithms to provide security services.  The Internet Key Exchange
  (both IKEv1 and IKEv2) provide a mechanism to negotiate which
  algorithms should be used for a particular association.  However to
  ensure interoperability between disparate implementations, this
  document specifies a set of mandatory to implement algorithms, thereby
  ensuring that there will be at least one algorithm that all
  implementations will have available.  This document also specifies
  algorithms that should be implemented because they made be promoted to
  mandatory at some future time.

Working Group Summary

  The IPsec Working Group came to rough consensus on this document.

Protocol Quality

  This document was reviewed by Russell Housley for the IESG.

RFC Editor Note

  Please change "MUST" to "MUST-" in the last paragraph of 
  section 4.1.1 to make it consistent with section 4.1.3.

  OLD

    For confidentiality, implementations MUST implement 3DES-CBC and
    SHOULD+ implement AES-128-CBC. For integrity, HMAC-SHA1 MUST be
    implemented.

  NEW

    For confidentiality, implementations MUST- implement 3DES-CBC and
    SHOULD+ implement AES-128-CBC. For integrity, HMAC-SHA1 MUST be
    implemented.


_______________________________________________
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce