[Ipsec] Protocol Action: 'Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH)' to Proposed Standard

The IESG <iesg-secretary@ietf.org> Tue, 30 January 2007 03:29 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HBjgX-00081u-RD; Mon, 29 Jan 2007 22:29:29 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HBjgW-00081l-B8 for ipsec@ietf.org; Mon, 29 Jan 2007 22:29:28 -0500
Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HBjgT-0000Zb-Gk for ipsec@ietf.org; Mon, 29 Jan 2007 22:29:28 -0500
Received: from [10.20.30.108] (dsl-63-249-108-169.cruzio.com [63.249.108.169]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l0U3THvP032486 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Mon, 29 Jan 2007 20:29:18 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06240820c1e4494e85cb@[10.20.30.108]>
Date: Mon, 29 Jan 2007 17:01:15 -0800
To: IPsec WG <ipsec@ietf.org>
From: The IESG <iesg-secretary@ietf.org>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 97adf591118a232206bdb5a27b217034
Subject: [Ipsec] Protocol Action: 'Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH)' to Proposed Standard
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
Errors-To: ipsec-bounces@ietf.org

The IESG has approved the following document:

- 'Cryptographic Algorithm Implementation Requirements for Encapsulating
    Security Payload (ESP) and Authentication Header (AH) '
    <draft-manral-ipsec-rfc4305-bis-errata-03.txt> as a Proposed Standard

This document has been reviewed in the IETF but is not the product of an
IETF Working Group.

The IESG contact person is Russ Housley.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-manral-ipsec-rfc4305-bis-errata-03.txt

Technical Summary

   To provide security services, the IPsec protocols make use of various
   cryptographic algorithms.  In particular, the Encapsulating Security
   Payload (ESP) and the Authentication Header (AH) protect data that is
   sent over an IPsec Security Association (SA).  To ensure
   interoperability, it is necessary to specify a set of mandatory-to-
   implement algorithms.  This document defines the current set of
   mandatory-to-implement algorithms for ESP and AH, as well as
   specifying algorithms that should be implemented because they may be
   promoted to mandatory at some future time.

Working Group Summary

   This is not part of any Working Group, but the document was discussed
   on the IPsec mail list.

Protocol Quality

   This document was reviewed by Russ Housley for the IESG.

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec