| < draft-housley-suite-b-to-historic-02.txt | draft-housley-suite-b-to-historic-03.txt > | |||
|---|---|---|---|---|
| Network Working Group R. Housley | Network Working Group R. Housley | |||
| Internet-Draft Vigil Security | Internet-Draft Vigil Security | |||
| Intended status: Informational L. Zieglar | Intended status: Informational L. Zieglar | |||
| Expires: August 12, 2018 National Security Agency | Expires: August 17, 2018 National Security Agency | |||
| February 08, 2018 | February 13, 2018 | |||
| Reclassification of Suite B Documents to Historic Status | Reclassification of Suite B Documents to Historic Status | |||
| draft-housley-suite-b-to-historic-02 | draft-housley-suite-b-to-historic-03 | |||
| Abstract | Abstract | |||
| This document reclassifies the RFCs related to the U.S. National | This document reclassifies the RFCs related to the U.S. National | |||
| Security Agency (NSA) Suite B cryptographic algorithms as Historic, | Security Agency (NSA) Suite B cryptographic algorithms as Historic, | |||
| and it discusses the reasons for doing so. This document moves RFC | and it discusses the reasons for doing so. This document moves seven | |||
| 5759, RFC 6239, RFC 6318, RFC 6379, RFC 6380, RFC 6403, and RFC 6460 | informational RFCs to Historic Status: RFC 5759, RFC 6239, RFC 6318, | |||
| to Historic Status. | RFC 6379, RFC 6380, RFC 6403, and RFC 6460. In addition, this | |||
| document moves three obsolete informational RFCs to Historic Status: | ||||
| RFC 4869, RFC 5008, and RFC 5430. | ||||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on August 12, 2018. | This Internet-Draft will expire on August 17, 2018. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2018 IETF Trust and the persons identified as the | Copyright (c) 2018 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 5, line 32 ¶ | skipping to change at page 5, line 32 ¶ | |||
| The CNSA Suite includes algorithms using the larger key sizes that | The CNSA Suite includes algorithms using the larger key sizes that | |||
| are included in Suite B. There are no interoperability or security | are included in Suite B. There are no interoperability or security | |||
| concerns raised by reclassifying the Suite-B-related RFCs to Historic | concerns raised by reclassifying the Suite-B-related RFCs to Historic | |||
| Status. | Status. | |||
| 8. References | 8. References | |||
| 8.1. Normative References | 8.1. Normative References | |||
| [RFC4869] Law, L. and J. Solinas, "Suite B Cryptographic Suites for | ||||
| IPsec", RFC 4869, DOI 10.17487/RFC4869, May 2007, | ||||
| <https://www.rfc-editor.org/info/rfc4869>. | ||||
| [RFC5008] Housley, R. and J. Solinas, "Suite B in Secure/ | ||||
| Multipurpose Internet Mail Extensions (S/MIME)", RFC 5008, | ||||
| DOI 10.17487/RFC5008, September 2007, | ||||
| <https://www.rfc-editor.org/info/rfc5008>. | ||||
| [RFC5430] Salter, M., Rescorla, E., and R. Housley, "Suite B Profile | ||||
| for Transport Layer Security (TLS)", RFC 5430, | ||||
| DOI 10.17487/RFC5430, March 2009, | ||||
| <https://www.rfc-editor.org/info/rfc5430>. | ||||
| [RFC5759] Solinas, J. and L. Zieglar, "Suite B Certificate and | [RFC5759] Solinas, J. and L. Zieglar, "Suite B Certificate and | |||
| Certificate Revocation List (CRL) Profile", RFC 5759, | Certificate Revocation List (CRL) Profile", RFC 5759, | |||
| DOI 10.17487/RFC5759, January 2010, | DOI 10.17487/RFC5759, January 2010, | |||
| <https://www.rfc-editor.org/info/rfc5759>. | <https://www.rfc-editor.org/info/rfc5759>. | |||
| [RFC6239] Igoe, K., "Suite B Cryptographic Suites for Secure Shell | [RFC6239] Igoe, K., "Suite B Cryptographic Suites for Secure Shell | |||
| (SSH)", RFC 6239, DOI 10.17487/RFC6239, May 2011, | (SSH)", RFC 6239, DOI 10.17487/RFC6239, May 2011, | |||
| <https://www.rfc-editor.org/info/rfc6239>. | <https://www.rfc-editor.org/info/rfc6239>. | |||
| [RFC6318] Housley, R. and J. Solinas, "Suite B in Secure/ | [RFC6318] Housley, R. and J. Solinas, "Suite B in Secure/ | |||
| skipping to change at page 6, line 26 ¶ | skipping to change at page 6, line 39 ¶ | |||
| Layer Security (TLS)", RFC 6460, DOI 10.17487/RFC6460, | Layer Security (TLS)", RFC 6460, DOI 10.17487/RFC6460, | |||
| January 2012, <https://www.rfc-editor.org/info/rfc6460>. | January 2012, <https://www.rfc-editor.org/info/rfc6460>. | |||
| 8.2. Informative References | 8.2. Informative References | |||
| [CNSA] National Security Agency, "Commercial National Security | [CNSA] National Security Agency, "Commercial National Security | |||
| Algorithm (CNSA) Suite", 2015, | Algorithm (CNSA) Suite", 2015, | |||
| <https://www.iad.gov/iad/programs/iad-initiatives/ | <https://www.iad.gov/iad/programs/iad-initiatives/ | |||
| cnsa-suite.cfm>. | cnsa-suite.cfm>. | |||
| [RFC4869] Law, L. and J. Solinas, "Suite B Cryptographic Suites for | ||||
| IPsec", RFC 4869, DOI 10.17487/RFC4869, May 2007, | ||||
| <https://www.rfc-editor.org/info/rfc4869>. | ||||
| [RFC5008] Housley, R. and J. Solinas, "Suite B in Secure/ | ||||
| Multipurpose Internet Mail Extensions (S/MIME)", RFC 5008, | ||||
| DOI 10.17487/RFC5008, September 2007, | ||||
| <https://www.rfc-editor.org/info/rfc5008>. | ||||
| [RFC5289] Rescorla, E., "TLS Elliptic Curve Cipher Suites with SHA- | [RFC5289] Rescorla, E., "TLS Elliptic Curve Cipher Suites with SHA- | |||
| 256/384 and AES Galois Counter Mode (GCM)", RFC 5289, | 256/384 and AES Galois Counter Mode (GCM)", RFC 5289, | |||
| DOI 10.17487/RFC5289, August 2008, | DOI 10.17487/RFC5289, August 2008, | |||
| <https://www.rfc-editor.org/info/rfc5289>. | <https://www.rfc-editor.org/info/rfc5289>. | |||
| [RFC5430] Salter, M., Rescorla, E., and R. Housley, "Suite B Profile | ||||
| for Transport Layer Security (TLS)", RFC 5430, | ||||
| DOI 10.17487/RFC5430, March 2009, | ||||
| <https://www.rfc-editor.org/info/rfc5430>. | ||||
| [RFC6071] Frankel, S. and S. Krishnan, "IP Security (IPsec) and | [RFC6071] Frankel, S. and S. Krishnan, "IP Security (IPsec) and | |||
| Internet Key Exchange (IKE) Document Roadmap", RFC 6071, | Internet Key Exchange (IKE) Document Roadmap", RFC 6071, | |||
| DOI 10.17487/RFC6071, February 2011, | DOI 10.17487/RFC6071, February 2011, | |||
| <https://www.rfc-editor.org/info/rfc6071>. | <https://www.rfc-editor.org/info/rfc6071>. | |||
| [RFC6187] Igoe, K. and D. Stebila, "X.509v3 Certificates for Secure | [RFC6187] Igoe, K. and D. Stebila, "X.509v3 Certificates for Secure | |||
| Shell Authentication", RFC 6187, DOI 10.17487/RFC6187, | Shell Authentication", RFC 6187, DOI 10.17487/RFC6187, | |||
| March 2011, <https://www.rfc-editor.org/info/rfc6187>. | March 2011, <https://www.rfc-editor.org/info/rfc6187>. | |||
| [RFC6402] Schaad, J., "Certificate Management over CMS (CMC) | [RFC6402] Schaad, J., "Certificate Management over CMS (CMC) | |||
| End of changes. 7 change blocks. | ||||
| 21 lines changed or deleted | 23 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||