[IPsec] Protocol Action: 'Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)' to Proposed Standard (draft-ietf-ipsecme-esp-ah-reqts-10.txt)

The IESG <iesg-secretary@ietf.org> Mon, 19 May 2014 21:12 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16C411A0404; Mon, 19 May 2014 14:12:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 89rq0SotYEI4; Mon, 19 May 2014 14:12:20 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B4BF1A0413; Mon, 19 May 2014 14:12:18 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 5.4.2.p3
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20140519211218.23839.71179.idtracker@ietfa.amsl.com>
Date: Mon, 19 May 2014 14:12:18 -0700
Archived-At: http://mailarchive.ietf.org/arch/msg/ipsec/erjHObhxc4pCx3U-9N7PJsQs_dA
Cc: ipsecme mailing list <ipsec@ietf.org>, ipsecme chair <ipsecme-chairs@tools.ietf.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: [IPsec] Protocol Action: 'Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)' to Proposed Standard (draft-ietf-ipsecme-esp-ah-reqts-10.txt)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 May 2014 21:12:21 -0000

The IESG has approved the following document:
- 'Cryptographic Algorithm Implementation Requirements and Usage Guidance
   for Encapsulating Security Payload (ESP) and Authentication Header
   (AH)'
  (draft-ietf-ipsecme-esp-ah-reqts-10.txt) as Proposed Standard

This document is the product of the IP Security Maintenance and
Extensions Working Group.

The IESG contact persons are Kathleen Moriarty and Stephen Farrell.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-ipsecme-esp-ah-reqts/





Technical Summary

  This document replaces RFC 4835 in specifying requirement levels for various cryptographic
  algorithms in the ESP and AH protocols. In the 7 years since that older RFC was published,
  the security of some algorithms diminished, while other, more secure algorithms were published
  and widely implemented.

  This information is essential for interoperable implementation of the protocols, and so the
  document is intended to be a Proposed Standard.

Working Group Summary

   There was lively WG discussion around the specific algorithms and requirement levels,
   but no major objections. There was wide consensus that the document should be published.


Document Quality

   Are there existing implementations of the protocol?  Yes, numerous.  This draft sets new
   new requirements for ESP and AH, motivating vendors to implement against the new
   recommendations.

Personnel

Yaron Sheffer (IPsecME WG co-chair) is the document shepherd and Kathleen Moriarty is the responsible AD.