RE: Crypto algorithms for IKEv2
Paul Hoffman / VPNC <paul.hoffman@vpnc.org> Tue, 29 April 2003 19:11 UTC
Received: from lists.tislabs.com (portal.gw.tislabs.com [192.94.214.101]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA06738 for <ipsec-archive@lists.ietf.org>; Tue, 29 Apr 2003 15:11:39 -0400 (EDT)
Received: by lists.tislabs.com (8.9.1/8.9.1) id MAA05403 Tue, 29 Apr 2003 12:56:14 -0400 (EDT)
Mime-Version: 1.0
X-Sender: phoffvpnc@mail.vpnc.org
Message-Id: <p05210622bad45a30b9b6@[63.202.92.152]>
In-Reply-To: <000001c30de3$902b4d00$0300a8c0@riverside>
References: <000001c30de3$902b4d00$0300a8c0@riverside>
X-Habeas-SWE-1: winter into spring
X-Habeas-SWE-2: brightly anticipated
X-Habeas-SWE-3: like Habeas SWE (tm)
X-Habeas-SWE-4: Copyright 2002 Habeas (tm)
X-Habeas-SWE-5: Sender Warranted Email (SWE) (tm). The sender of this
X-Habeas-SWE-6: email in exchange for a license for this Habeas
X-Habeas-SWE-7: warrant mark warrants that this is a Habeas Compliant
X-Habeas-SWE-8: Message (HCM) and not spam. Please report use of this
X-Habeas-SWE-9: mark in spam to <http://www.habeas.com/report>.
Date: Tue, 29 Apr 2003 09:35:25 -0700
To: ipsec@lists.tislabs.com
From: Paul Hoffman / VPNC <paul.hoffman@vpnc.org>
Subject: RE: Crypto algorithms for IKEv2
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Sender: owner-ipsec@lists.tislabs.com
Precedence: bulk
To: IETF-Announce: ; From: Internet-Drafts@ietf.org Reply-to: Internet-Drafts@ietf.org Subject: I-D ACTION:draft-hoffman-ipsec-algorithms-00.txt Date: Tue, 29 Apr 2003 07:39:59 -0400 Sender: owner-ietf-announce@ietf.org A New Internet-Draft is available from the on-line Internet-Drafts directories. Title : Security Algorithms for IKEv2 Author(s) : P. Hoffman Filename : draft-hoffman-ipsec-algorithms-00.txt Pages : 6 Date : 2003-4-28 The IKEv2 protocol [IKEv2] relies on security algorithms to provide privacy and authentication between the initiator and responder. There are many such algorithms available, and two IKEv2 systems cannot interoperate unless they are using the same algorithms. This document specifies an initial set of algorithms for registration with IANA, and specifies which are mandatory to implement. This document also specifies optional suites of algorithms and attributes that can be used to simplify the administration of IKEv2. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-hoffman-ipsec-algorithms-00.txt --Paul Hoffman, Director --VPN Consortium
- Re: Crypto algorithms for IKEv2 Paul Hoffman / VPNC
- Crypto algorithms for IKEv2 Paul Hoffman / VPNC
- RE: Crypto algorithms for IKEv2 Jimmy Zhang
- RE: Crypto algorithms for IKEv2 Hallam-Baker, Phillip
- RE: Crypto algorithms for IKEv2 Paul Koning
- Re: Crypto algorithms for IKEv2 Michael Richardson
- Re: Crypto algorithms for IKEv2 Michael Richardson
- RE: Crypto algorithms for IKEv2 Paul Hoffman / VPNC
- Re: Crypto algorithms for IKEv2 Paul Koning
- Re: Crypto algorithms for IKEv2 Paul Hoffman / VPNC
- Re: Crypto algorithms for IKEv2 David Wagner
- Re: Crypto algorithms for IKEv2 David Wagner
- Re: Crypto algorithms for IKEv2 Michael Richardson
- Re: Crypto algorithms for IKEv2 Michael Richardson
- Re: Crypto algorithms for IKEv2 Andrew Krywaniuk
- Re: Crypto algorithms for IKEv2 Stephen Kent
- Re: Crypto algorithms for IKEv2 Paul Koning
- Re: Crypto algorithms for IKEv2 Stephen Kent
- RE: Crypto algorithms for IKEv2 Van Aken Dirk
- Re: Crypto algorithms for IKEv2 Charlie_Kaufman
- Re: Crypto algorithms for IKEv2 Andrew Krywaniuk
- Re: Crypto algorithms for IKEv2 Paul Hoffman / VPNC