[saag] IPsecME WG report for SAAG

Tero Kivinen <kivinen@iki.fi> Wed, 23 March 2022 13:08 UTC

Return-Path: <kivinen@iki.fi>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EA433A1142; Wed, 23 Mar 2022 06:08:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.109
X-Spam-Level:
X-Spam-Status: No, score=-2.109 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=iki.fi
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TF_jHtCOyBFM; Wed, 23 Mar 2022 06:08:01 -0700 (PDT)
Received: from meesny.iki.fi (meesny.iki.fi [IPv6:2001:67c:2b0:1c1::201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 01F8F3A1138; Wed, 23 Mar 2022 06:08:00 -0700 (PDT)
Received: from fireball.acr.fi (fireball.acr.fi [83.145.195.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: kivinen@iki.fi) by meesny.iki.fi (Postfix) with ESMTPSA id 555D720550; Wed, 23 Mar 2022 15:07:57 +0200 (EET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=iki.fi; s=meesny; t=1648040877; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=TdvNyzS7j/W404eOUt+sQxqQbnr8uBdb6FAtgV5p+o8=; b=tJPm/bR842WGt09wiR/2PsRdxCIKizGX9cVPmTsl3P30cvhmfgVfjgCfPwopgxzZV4L5qk QdlQciEJ4YMlRI2hTTtSrhySU91+Tc1Htt8AXoZ+DlmKnZBdzKlp5jqAmvyG0PY2kZ+UD1 2rOkbXLdqspdEWWuXU5IGC4R7Uc+ZCk=
Received: by fireball.acr.fi (Postfix, from userid 15204) id 8A30225C12E5; Wed, 23 Mar 2022 15:07:56 +0200 (EET)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-ID: <25147.7084.518337.665747@fireball.acr.fi>
Date: Wed, 23 Mar 2022 15:07:56 +0200
From: Tero Kivinen <kivinen@iki.fi>
To: saag@ietf.org
CC: ipsec@ietf.org
X-Mailer: VM 8.2.0b under 26.3 (x86_64--netbsd)
X-Edit-Time: 2 min
X-Total-Time: 2 min
ARC-Authentication-Results: i=1; ORIGINATING; auth=pass smtp.auth=kivinen@iki.fi smtp.mailfrom=kivinen@iki.fi
ARC-Seal: i=1; s=meesny; d=iki.fi; t=1648040877; a=rsa-sha256; cv=none; b=IJ5c636NXQ6gi4SmYKNHkqseXfAAFeX4L+mGD+0EtkxOkoGI6hq4l3xBdD0DC4V3Sq5Z2t WOQMKqSvkGiCMuqo0HUUe/nDs7qV/HWRm/SKZqnUSfKE0RwBb4RQnxdrWnLLU4xTvzSlr4 bv66pJ9r4QOarUi65uYPp3RFOzxCscE=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=iki.fi; s=meesny; t=1648040877; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=TdvNyzS7j/W404eOUt+sQxqQbnr8uBdb6FAtgV5p+o8=; b=g+mR3ZrpGjXaUVbMcuFCkqXBgT/a+gQ6N1t9nmnco65CXltf3Xu6CwBHYsi39wKUanNMpp +Pz0SHur0hEyk4Zh8Pq16IyiC5IC7va+E0Pqv9hyAqOWJqbCAZxv4lgbHT0aIyAMYYU8aP hc7T+OgH9ouVI3wTjrbXfVn/scL/iwU=
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/C5o0oXz2d22yww0fmV334RCZQow>
Subject: [saag] IPsecME WG report for SAAG
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2022 13:08:06 -0000

IPsecME will be meeting on Friday after the saag so I updated the
status on the datatracker to describe the current status
(https://datatracker.ietf.org/group/ipsecme/about/status/).
----------------------------------------------------------------------
Intermediate draft is now approved by the IESG and is now in the RFC
Editor queue. Publication has been requested for IPTFS drafts (base
draft, and yang and mib drafts), and the TCP Ecnapsulation
(rfc8229bis) draft. Labeled IPsec and Deprecation of IKEv1 and
obsoleted algorithms drafts are ready for publication and will be
submitted to the IESG immediately after this IETF. Multiple Key
Exchanges draft should also be ready for publication.

Group Key Management using IKEv2 has received some reviews during the
WGLC, and should be ready for publication now. IKEv2 configuration for
Encrypted DNS and Announcing Supported Authentication Methods in IKEv2
drafts are adopted as WG drafts.

There has been some work on the Optional SA & TS Payload in Child
Exchange, and it might be ready to be adopted as WG draft.

There has not been that much happening with other new work, like
modifying the base IKEv2 payload format, both to make it more compact
for constrained devices, and allow it to go over 64kB payload limit.
-- 
kivinen@iki.fi