| < draft-housley-suite-b-to-historic-00.txt | draft-housley-suite-b-to-historic-01.txt > | |||
|---|---|---|---|---|
| Network Working Group R. Housley | Network Working Group R. Housley | |||
| Internet-Draft Vigil Security | Internet-Draft Vigil Security | |||
| Intended status: Informational L. Zieglar | Intended status: Informational L. Zieglar | |||
| Expires: July 6, 2018 National Security Agency | Expires: August 5, 2018 National Security Agency | |||
| January 02, 2018 | February 01, 2018 | |||
| Reclassification of Suite B Documents to Historic Status | Reclassification of Suite B Documents to Historic Status | |||
| draft-housley-suite-b-to-historic-00 | draft-housley-suite-b-to-historic-01 | |||
| Abstract | Abstract | |||
| This document reclassifies the RFCs related to Suite B as Historic, | This document reclassifies the RFCs related to Suite B as Historic, | |||
| and it discusses the reasons for doing so. This document moves RFC | and it discusses the reasons for doing so. This document moves RFC | |||
| 5759, RFC 6239, RFC 6318, RFC 6379, RFC 6380, RFC 6403, and RFC 6460 | 5759, RFC 6239, RFC 6318, RFC 6379, RFC 6380, RFC 6403, and RFC 6460 | |||
| to Historic Status. | to Historic Status. | |||
| Status of This Memo | Status of This Memo | |||
| skipping to change at page 1, line 34 ¶ | skipping to change at page 1, line 34 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on July 6, 2018. | This Internet-Draft will expire on August 5, 2018. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2018 IETF Trust and the persons identified as the | Copyright (c) 2018 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 26 ¶ | skipping to change at page 2, line 26 ¶ | |||
| 5. Impact of Reclassifying the Suite-B-related RFCs to Historic 5 | 5. Impact of Reclassifying the Suite-B-related RFCs to Historic 5 | |||
| 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5 | 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 7. Security Considerations . . . . . . . . . . . . . . . . . . . 5 | 7. Security Considerations . . . . . . . . . . . . . . . . . . . 5 | |||
| 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 8.1. Normative References . . . . . . . . . . . . . . . . . . 5 | 8.1. Normative References . . . . . . . . . . . . . . . . . . 5 | |||
| 8.2. Informative References . . . . . . . . . . . . . . . . . 6 | 8.2. Informative References . . . . . . . . . . . . . . . . . 6 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 1. Introduction | 1. Introduction | |||
| Several RFCs profile security protocols for use with National | Several RFCs profile security protocols for use with the National | |||
| Security Agency (NSA) Suite B Cryptography. Suite B is no longer | Security Agency (NSA) Suite B Cryptography. Suite B is no longer | |||
| supported by NSA, and the web pages that specify the cryptographic | supported by NSA, and the web pages that specify the cryptographic | |||
| algorithms are no longer available. | algorithms are no longer available. | |||
| In July 2015, NSA published the Committee for National Security | In July 2015, NSA published the Committee for National Security | |||
| Systems Advisory Memorandum 02-15 as the first step in replacing | Systems Advisory Memorandum 02-15 as the first step in replacing | |||
| Suite B with NSA's Commercial National Security Algorithm (CNSA) | Suite B with NSA's Commercial National Security Algorithm (CNSA) | |||
| Suite. Information about the CNSA Suite can be found in [CNSA]. | Suite. Information about the CNSA Suite can be found in [CNSA]. | |||
| 2. Rationale | 2. Rationale | |||
| skipping to change at page 5, line 18 ¶ | skipping to change at page 5, line 18 ¶ | |||
| No interoperability or security concerns are raised by reclassifing | No interoperability or security concerns are raised by reclassifing | |||
| the Suite-B-related RFCs to Historic Status. | the Suite-B-related RFCs to Historic Status. | |||
| 6. IANA Considerations | 6. IANA Considerations | |||
| No changes are requested to any IANA registries. | No changes are requested to any IANA registries. | |||
| 7. Security Considerations | 7. Security Considerations | |||
| The CNSA Suite includes algorithms using the larger key sizes than | The CNSA Suite includes algorithms using the larger key sizes that | |||
| are included in Suite B. There are no interoperability or security | are included in Suite B. There are no interoperability or security | |||
| concerns raised by reclassifying the Suite-B-related RFCs to Historic | concerns raised by reclassifying the Suite-B-related RFCs to Historic | |||
| Status. | Status. | |||
| 8. References | 8. References | |||
| 8.1. Normative References | 8.1. Normative References | |||
| [RFC5759] Solinas, J. and L. Zieglar, "Suite B Certificate and | [RFC5759] Solinas, J. and L. Zieglar, "Suite B Certificate and | |||
| Certificate Revocation List (CRL) Profile", RFC 5759, | Certificate Revocation List (CRL) Profile", RFC 5759, | |||
| End of changes. 5 change blocks. | ||||
| 6 lines changed or deleted | 6 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||