[IPsec] feedback on draft-ietf-ipsecme-esp-ah-reqts-00

David McGrew <mcgrew@cisco.com> Tue, 02 July 2013 14:32 UTC

Return-Path: <mcgrew@cisco.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CAB1321F9EDD for <ipsec@ietfa.amsl.com>; Tue, 2 Jul 2013 07:32:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.599
X-Spam-Level:
X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eNA3z9s1FBGA for <ipsec@ietfa.amsl.com>; Tue, 2 Jul 2013 07:32:09 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) by ietfa.amsl.com (Postfix) with ESMTP id 4BED521F9EDB for <ipsec@ietf.org>; Tue, 2 Jul 2013 07:32:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=804; q=dns/txt; s=iport; t=1372775529; x=1373985129; h=message-id:subject:from:to:cc:date:mime-version: content-transfer-encoding; bh=9TsNJd3MhoEOqDa7pRWDpCk0HoQgt/d7dLFzNHtMG8M=; b=M6gSAN1mTqK2JZkZ76X86S4No3y0y7MK3XJilm8WmUinTq3ZX7K9tznR 25I2OlgPb61O2zqBcmeXniOwPqjEYEZ8Z7O602WcQDqwA+FgZzS7izh1/ QiuVyMgsTupHShqzxkoCwiHitE6Wc8biT4bWlTI0v+OCfmJfhfWJTvBFA A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AjgFACHk0lGtJV2a/2dsb2JhbABagwkyAYMIR7xGgQEWdIJNVjUCJgKJAQyqYZE4gSaONB2CO4EaA5hyhHiLJIMtIA
X-IronPort-AV: E=Sophos;i="4.87,980,1363132800"; d="scan'208";a="229974958"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by rcdn-iport-3.cisco.com with ESMTP; 02 Jul 2013 14:31:55 +0000
Received: from [10.0.2.15] (rtp-mcgrew-8912.cisco.com [10.117.10.227]) by rcdn-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id r62EVsrS019795 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO); Tue, 2 Jul 2013 14:31:55 GMT
Message-ID: <1372775513.3983.77.camel@darkstar>
From: David McGrew <mcgrew@cisco.com>
To: ipsec@ietf.org
Date: Tue, 02 Jul 2013 10:31:53 -0400
Content-Type: text/plain; charset="UTF-8"
X-Mailer: Evolution 3.4.4-3
Mime-Version: 1.0
Content-Transfer-Encoding: 7bit
Cc: "wajdi.k.feghali@intel.com" <wajdi.k.feghali@intel.com>, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: [IPsec] feedback on draft-ietf-ipsecme-esp-ah-reqts-00
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2013 14:32:13 -0000

Hi,

"Cryptographic Algorithm Implementation Requirements and Usage Guidance
for Encapsulating Security Payload (ESP) and Authentication Header (AH)"
is an active standards-track draft that updates the ESP and AH algorithm
requirements (RFC 4835).  It was published in March of this year, and
has seen little comment since then.   There were several comments on the
earlier (individual submission) version of this draft, which hopefully
have been addressed.  Let us know if you have comments.

The usage guidance section is new, and it offers advice on how to use
ESP and AH to achieve cryptographic security goals.  We have solicited
review from the CFRG on that section.  

thanks,

David

Quick link:
http://datatracker.ietf.org/doc/draft-ietf-ipsecme-esp-ah-reqts/?include_text=1