| < draft-ietf-curdle-ssh-kex-sha2-01.txt | draft-ietf-curdle-ssh-kex-sha2-02.txt > | |||
|---|---|---|---|---|
| Internet Engineering Task Force M. Baushke | Internet Engineering Task Force M. Baushke | |||
| Internet-Draft Juniper Networks, Inc. | Internet-Draft Juniper Networks, Inc. | |||
| Updates: 4253, 4419, 4432, 4462, 5656 March 7, 2016 | Updates: 4253, 4419, 4432, 4462, 5656 March 8, 2016 | |||
| (if approved) | (if approved) | |||
| Intended status: Standards Track | Intended status: Standards Track | |||
| Expires: September 8, 2016 | Expires: September 9, 2016 | |||
| Key Exchange Method Updates for Secure Shell (SSH) | Key Exchange Method Updates for Secure Shell (SSH) | |||
| draft-ietf-curdle-ssh-kex-sha2-01 | draft-ietf-curdle-ssh-kex-sha2-02 | |||
| Abstract | Abstract | |||
| This document deprecates some previously specified Key Exchange | This document deprecates some previously specified Key Exchange | |||
| Method algorithm names as well as defining a few added Modular | Method algorithm names as well as defining a few added Modular | |||
| Exponential (MODP) Groups for the Secure Shell (SSH) protocol. It | Exponential (MODP) Groups for the Secure Shell (SSH) protocol. It | |||
| also updates [RFC4253], [RFC4419], [RFC4462], and [RFC5656] by | also updates [RFC4253], [RFC4419], [RFC4462], and [RFC5656] by | |||
| specifying the set key exchange algorithms that currently exist and | specifying the set key exchange algorithms that currently exist and | |||
| which ones MUST, SHOULD, MAY, and SHOULD NOT be implemented. New key | which ones MUST, SHOULD, MAY, and SHOULD NOT be implemented. New key | |||
| exchange methods use the SHA-2 family of hashes. | exchange methods use the SHA-2 family of hashes. | |||
| skipping to change at page 1, line 38 ¶ | skipping to change at page 1, line 38 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on September 8, 2016. | This Internet-Draft will expire on September 9, 2016. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2016 IETF Trust and the persons identified as the | Copyright (c) 2016 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 3, line 40 ¶ | skipping to change at page 3, line 40 ¶ | |||
| part of the key exchange method name. | part of the key exchange method name. | |||
| 4. IANA Considerations | 4. IANA Considerations | |||
| This document augments the Key Exchange Method Names in [RFC4253]. | This document augments the Key Exchange Method Names in [RFC4253]. | |||
| It downgrades the use of SHA-1 hashing for key exchange methods in | It downgrades the use of SHA-1 hashing for key exchange methods in | |||
| [RFC4419], [RFC4432], and [RFC4462]. It also moves from MUST to MAY | [RFC4419], [RFC4432], and [RFC4462]. It also moves from MUST to MAY | |||
| the ecdh-sha2-nistp256 given in [RFC5656]. | the ecdh-sha2-nistp256 given in [RFC5656]. | |||
| It is desirable to also include the ssh-curves from the | It is desirable to also include the ssh-curves from the | |||
| [I-D.josefsson-ssh-curves] in this list. The "curve25519-sha256" is | [I-D.ietf-curdle-ssh-curves] in this list. The "curve25519-sha256" | |||
| currently available in some Secure Shell implementations under the | is currently available in some Secure Shell implementations under the | |||
| name "curve25519-sha256@libssh.org" and is the best candidate for a | name "curve25519-sha256@libssh.org" and is the best candidate for a | |||
| fast, safe, and secure key exchange method. | fast, safe, and secure key exchange method. | |||
| IANA is requested to update the SSH algorithm registry with the | IANA is requested to update the SSH algorithm registry with the | |||
| following entries: | following entries: | |||
| Key Exchange Method Name Reference Note | Key Exchange Method Name Reference Note | |||
| diffie-hellman-group-exchange-sha1 RFC4419 SHOULD NOT | diffie-hellman-group-exchange-sha1 RFC4419 SHOULD NOT | |||
| diffie-hellman-group-exchange-sha256 RFC4419 MAY | diffie-hellman-group-exchange-sha256 RFC4419 MAY | |||
| diffie-hellman-group1-sha1 RFC4253 SHOULD NOT | diffie-hellman-group1-sha1 RFC4253 SHOULD NOT | |||
| skipping to change at page 6, line 28 ¶ | skipping to change at page 6, line 28 ¶ | |||
| Diffie-Hellman groups for Internet Key Exchange (IKE)", | Diffie-Hellman groups for Internet Key Exchange (IKE)", | |||
| RFC 3526, DOI 10.17487/RFC3526, May 2003, | RFC 3526, DOI 10.17487/RFC3526, May 2003, | |||
| <http://www.rfc-editor.org/info/rfc3526>. | <http://www.rfc-editor.org/info/rfc3526>. | |||
| [RFC4253] Ylonen, T. and C. Lonvick, Ed., "The Secure Shell (SSH) | [RFC4253] Ylonen, T. and C. Lonvick, Ed., "The Secure Shell (SSH) | |||
| Transport Layer Protocol", RFC 4253, DOI 10.17487/RFC4253, | Transport Layer Protocol", RFC 4253, DOI 10.17487/RFC4253, | |||
| January 2006, <http://www.rfc-editor.org/info/rfc4253>. | January 2006, <http://www.rfc-editor.org/info/rfc4253>. | |||
| 7.2. Informative References | 7.2. Informative References | |||
| [I-D.josefsson-ssh-curves] | [I-D.ietf-curdle-ssh-curves] | |||
| Adamantiadis, A. and S. Josefsson, "Secure Shell (SSH) Key | Adamantiadis, A. and S. Josefsson, "Secure Shell (SSH) Key | |||
| Exchange Method using Curve25519 and Curve448", draft- | Exchange Method using Curve25519 and Curve448", draft- | |||
| josefsson-ssh-curves-04 (work in progress), March 2016. | ietf-curdle-ssh-curves-00 (work in progress), March 2016. | |||
| [MFQ-U-OO-815099-15] | [MFQ-U-OO-815099-15] | |||
| "National Security Agency/Central Security Service", "CNSA | "National Security Agency/Central Security Service", "CNSA | |||
| Suite and Quantum Computing FAQ", January 2016, | Suite and Quantum Computing FAQ", January 2016, | |||
| <https://www.iad.gov/iad/library/ia-guidance/ia-solutions- | <https://www.iad.gov/iad/library/ia-guidance/ia-solutions- | |||
| for-classified/algorithm-guidance/cnsa-suite-and-quantum- | for-classified/algorithm-guidance/cnsa-suite-and-quantum- | |||
| computing-faq.cfm>. | computing-faq.cfm>. | |||
| [NIST-SP-800-131Ar1] | [NIST-SP-800-131Ar1] | |||
| Barker, and Roginsky, "Transitions: Recommendation for the | Barker, and Roginsky, "Transitions: Recommendation for the | |||
| End of changes. 7 change blocks. | ||||
| 8 lines changed or deleted | 8 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||