[Ipsec] Protocol Action: 'Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH)' to Proposed Standard
The IESG <iesg-secretary@ietf.org> Tue, 30 January 2007 03:29 UTC
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HBjgX-00081u-RD; Mon, 29 Jan 2007 22:29:29 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HBjgW-00081l-B8 for ipsec@ietf.org; Mon, 29 Jan 2007 22:29:28 -0500
Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HBjgT-0000Zb-Gk for ipsec@ietf.org; Mon, 29 Jan 2007 22:29:28 -0500
Received: from [10.20.30.108] (dsl-63-249-108-169.cruzio.com [63.249.108.169]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l0U3THvP032486 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Mon, 29 Jan 2007 20:29:18 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06240820c1e4494e85cb@[10.20.30.108]>
Date: Mon, 29 Jan 2007 17:01:15 -0800
To: IPsec WG <ipsec@ietf.org>
From: The IESG <iesg-secretary@ietf.org>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 97adf591118a232206bdb5a27b217034
Subject: [Ipsec] Protocol Action: 'Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH)' to Proposed Standard
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
Errors-To: ipsec-bounces@ietf.org
The IESG has approved the following document: - 'Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH) ' <draft-manral-ipsec-rfc4305-bis-errata-03.txt> as a Proposed Standard This document has been reviewed in the IETF but is not the product of an IETF Working Group. The IESG contact person is Russ Housley. A URL of this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-manral-ipsec-rfc4305-bis-errata-03.txt Technical Summary To provide security services, the IPsec protocols make use of various cryptographic algorithms. In particular, the Encapsulating Security Payload (ESP) and the Authentication Header (AH) protect data that is sent over an IPsec Security Association (SA). To ensure interoperability, it is necessary to specify a set of mandatory-to- implement algorithms. This document defines the current set of mandatory-to-implement algorithms for ESP and AH, as well as specifying algorithms that should be implemented because they may be promoted to mandatory at some future time. Working Group Summary This is not part of any Working Group, but the document was discussed on the IPsec mail list. Protocol Quality This document was reviewed by Russ Housley for the IESG. _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec