< draft-ietf-curdle-ssh-kex-sha2-01.txt   draft-ietf-curdle-ssh-kex-sha2-02.txt >
Internet Engineering Task Force M. Baushke Internet Engineering Task Force M. Baushke
Internet-Draft Juniper Networks, Inc. Internet-Draft Juniper Networks, Inc.
Updates: 4253, 4419, 4432, 4462, 5656 March 7, 2016 Updates: 4253, 4419, 4432, 4462, 5656 March 8, 2016
(if approved) (if approved)
Intended status: Standards Track Intended status: Standards Track
Expires: September 8, 2016 Expires: September 9, 2016
Key Exchange Method Updates for Secure Shell (SSH) Key Exchange Method Updates for Secure Shell (SSH)
draft-ietf-curdle-ssh-kex-sha2-01 draft-ietf-curdle-ssh-kex-sha2-02
Abstract Abstract
This document deprecates some previously specified Key Exchange This document deprecates some previously specified Key Exchange
Method algorithm names as well as defining a few added Modular Method algorithm names as well as defining a few added Modular
Exponential (MODP) Groups for the Secure Shell (SSH) protocol. It Exponential (MODP) Groups for the Secure Shell (SSH) protocol. It
also updates [RFC4253], [RFC4419], [RFC4462], and [RFC5656] by also updates [RFC4253], [RFC4419], [RFC4462], and [RFC5656] by
specifying the set key exchange algorithms that currently exist and specifying the set key exchange algorithms that currently exist and
which ones MUST, SHOULD, MAY, and SHOULD NOT be implemented. New key which ones MUST, SHOULD, MAY, and SHOULD NOT be implemented. New key
exchange methods use the SHA-2 family of hashes. exchange methods use the SHA-2 family of hashes.
skipping to change at page 1, line 38 skipping to change at page 1, line 38
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on September 8, 2016. This Internet-Draft will expire on September 9, 2016.
Copyright Notice Copyright Notice
Copyright (c) 2016 IETF Trust and the persons identified as the Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 3, line 40 skipping to change at page 3, line 40
part of the key exchange method name. part of the key exchange method name.
4. IANA Considerations 4. IANA Considerations
This document augments the Key Exchange Method Names in [RFC4253]. This document augments the Key Exchange Method Names in [RFC4253].
It downgrades the use of SHA-1 hashing for key exchange methods in It downgrades the use of SHA-1 hashing for key exchange methods in
[RFC4419], [RFC4432], and [RFC4462]. It also moves from MUST to MAY [RFC4419], [RFC4432], and [RFC4462]. It also moves from MUST to MAY
the ecdh-sha2-nistp256 given in [RFC5656]. the ecdh-sha2-nistp256 given in [RFC5656].
It is desirable to also include the ssh-curves from the It is desirable to also include the ssh-curves from the
[I-D.josefsson-ssh-curves] in this list. The "curve25519-sha256" is [I-D.ietf-curdle-ssh-curves] in this list. The "curve25519-sha256"
currently available in some Secure Shell implementations under the is currently available in some Secure Shell implementations under the
name "curve25519-sha256@libssh.org" and is the best candidate for a name "curve25519-sha256@libssh.org" and is the best candidate for a
fast, safe, and secure key exchange method. fast, safe, and secure key exchange method.
IANA is requested to update the SSH algorithm registry with the IANA is requested to update the SSH algorithm registry with the
following entries: following entries:
Key Exchange Method Name Reference Note Key Exchange Method Name Reference Note
diffie-hellman-group-exchange-sha1 RFC4419 SHOULD NOT diffie-hellman-group-exchange-sha1 RFC4419 SHOULD NOT
diffie-hellman-group-exchange-sha256 RFC4419 MAY diffie-hellman-group-exchange-sha256 RFC4419 MAY
diffie-hellman-group1-sha1 RFC4253 SHOULD NOT diffie-hellman-group1-sha1 RFC4253 SHOULD NOT
skipping to change at page 6, line 28 skipping to change at page 6, line 28
Diffie-Hellman groups for Internet Key Exchange (IKE)", Diffie-Hellman groups for Internet Key Exchange (IKE)",
RFC 3526, DOI 10.17487/RFC3526, May 2003, RFC 3526, DOI 10.17487/RFC3526, May 2003,
<http://www.rfc-editor.org/info/rfc3526>. <http://www.rfc-editor.org/info/rfc3526>.
[RFC4253] Ylonen, T. and C. Lonvick, Ed., "The Secure Shell (SSH) [RFC4253] Ylonen, T. and C. Lonvick, Ed., "The Secure Shell (SSH)
Transport Layer Protocol", RFC 4253, DOI 10.17487/RFC4253, Transport Layer Protocol", RFC 4253, DOI 10.17487/RFC4253,
January 2006, <http://www.rfc-editor.org/info/rfc4253>. January 2006, <http://www.rfc-editor.org/info/rfc4253>.
7.2. Informative References 7.2. Informative References
[I-D.josefsson-ssh-curves] [I-D.ietf-curdle-ssh-curves]
Adamantiadis, A. and S. Josefsson, "Secure Shell (SSH) Key Adamantiadis, A. and S. Josefsson, "Secure Shell (SSH) Key
Exchange Method using Curve25519 and Curve448", draft- Exchange Method using Curve25519 and Curve448", draft-
josefsson-ssh-curves-04 (work in progress), March 2016. ietf-curdle-ssh-curves-00 (work in progress), March 2016.
[MFQ-U-OO-815099-15] [MFQ-U-OO-815099-15]
"National Security Agency/Central Security Service", "CNSA "National Security Agency/Central Security Service", "CNSA
Suite and Quantum Computing FAQ", January 2016, Suite and Quantum Computing FAQ", January 2016,
<https://www.iad.gov/iad/library/ia-guidance/ia-solutions- <https://www.iad.gov/iad/library/ia-guidance/ia-solutions-
for-classified/algorithm-guidance/cnsa-suite-and-quantum- for-classified/algorithm-guidance/cnsa-suite-and-quantum-
computing-faq.cfm>. computing-faq.cfm>.
[NIST-SP-800-131Ar1] [NIST-SP-800-131Ar1]
Barker, and Roginsky, "Transitions: Recommendation for the Barker, and Roginsky, "Transitions: Recommendation for the
 End of changes. 7 change blocks. 
8 lines changed or deleted 8 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/