[IPsec] Fwd: RFC 6617 on Secure Pre-Shared Key (PSK) Authentication for the Internet Key Exchange Protocol (IKE)

Paul Hoffman <paul.hoffman@vpnc.org> Sat, 02 June 2012 02:29 UTC

Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B7FCD11E80C4 for <ipsec@ietfa.amsl.com>; Fri, 1 Jun 2012 19:29:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.335
X-Spam-Level:
X-Spam-Status: No, score=-102.335 tagged_above=-999 required=5 tests=[AWL=0.264, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VUhnlITj+Feb for <ipsec@ietfa.amsl.com>; Fri, 1 Jun 2012 19:29:16 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id ECEBC11E80BB for <ipsec@ietf.org>; Fri, 1 Jun 2012 19:29:15 -0700 (PDT)
Received: from [10.20.30.102] (50-0-66-4.dsl.dynamic.fusionbroadband.com [50.0.66.4]) (authenticated bits=0) by hoffman.proper.com (8.14.5/8.14.5) with ESMTP id q522TC2C011643 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for <ipsec@ietf.org>; Fri, 1 Jun 2012 19:29:13 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Fri, 01 Jun 2012 19:29:12 -0700
References: <20120602015052.A0A13B1E003@rfc-editor.org>
To: IPsecme WG <ipsec@ietf.org>
Message-Id: <004A2FCF-EF3B-4D80-8366-D612C8740976@vpnc.org>
Mime-Version: 1.0 (Apple Message framework v1278)
X-Mailer: Apple Mail (2.1278)
Subject: [IPsec] Fwd: RFC 6617 on Secure Pre-Shared Key (PSK) Authentication for the Internet Key Exchange Protocol (IKE)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 02 Jun 2012 02:29:16 -0000

Begin forwarded message:

> From: rfc-editor@rfc-editor.org
> Subject: RFC 6617 on Secure Pre-Shared Key (PSK) Authentication for the Internet Key Exchange Protocol (IKE)
> Date: June 1, 2012 6:50:52 PM PDT
> To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
> Cc: rfc-editor@rfc-editor.org
> 
> 
> A new Request for Comments is now available in online RFC libraries.
> 
> 
>        RFC 6617
> 
>        Title:      Secure Pre-Shared Key (PSK) Authentication 
>                    for the Internet Key Exchange Protocol 
>                    (IKE) 
>        Author:     D. Harkins
>        Status:     Experimental
>        Stream:     IETF
>        Date:       June 2012
>        Mailbox:    dharkins@arubanetworks.com
>        Pages:      24
>        Characters: 53805
>        Updates/Obsoletes/SeeAlso:   None
> 
>        I-D Tag:    draft-harkins-ipsecme-spsk-auth-08.txt
> 
>        URL:        http://www.rfc-editor.org/rfc/rfc6617.txt
> 
> This memo describes a secure pre-shared key (PSK) authentication
> method for the Internet Key Exchange Protocol (IKE).  It is resistant
> to dictionary attack and retains security even when used with weak
> pre-shared keys.  This document defines an Experimental Protocol 
> for the Internet community.
> 
> 
> EXPERIMENTAL: This memo defines an Experimental Protocol for the
> Internet community.  It does not specify an Internet standard of any
> kind. Discussion and suggestions for improvement are requested.
> Distribution of this memo is unlimited.