| < draft-ietf-ipsecme-esp-ah-reqts-04.txt | draft-ietf-ipsecme-esp-ah-reqts-05.txt > | |||
|---|---|---|---|---|
| Network Working Group D. McGrew | Network Working Group D. McGrew | |||
| Internet-Draft Cisco Systems | Internet-Draft Cisco Systems | |||
| Obsoletes: 4835 (if approved) W. Feghali | Obsoletes: 4835 (if approved) P. Hoffman | |||
| Intended status: Standards Track Intel Corp. | Intended status: Standards Track VPN Consortium | |||
| Expires: October 5, 2014 P. Hoffman | Expires: October 13, 2014 April 11, 2014 | |||
| VPN Consortium | ||||
| April 3, 2014 | ||||
| Cryptographic Algorithm Implementation Requirements and Usage Guidance | Cryptographic Algorithm Implementation Requirements and Usage Guidance | |||
| for Encapsulating Security Payload (ESP) and Authentication Header (AH) | for Encapsulating Security Payload (ESP) and Authentication Header (AH) | |||
| draft-ietf-ipsecme-esp-ah-reqts-04 | draft-ietf-ipsecme-esp-ah-reqts-05 | |||
| Abstract | Abstract | |||
| This Internet Draft is standards track proposal to update to the | This Internet Draft is standards track proposal to update to the | |||
| Cryptographic Algorithm Implementation Requirements for ESP and AH; | Cryptographic Algorithm Implementation Requirements for ESP and AH; | |||
| it also adds usage guidance to help in the selection of these | it also adds usage guidance to help in the selection of these | |||
| algorithms. | algorithms. | |||
| The Encapsulating Security Payload (ESP) and Authentication Header | The Encapsulating Security Payload (ESP) and Authentication Header | |||
| (AH) protocols makes use of various cryptographic algorithms to | (AH) protocols makes use of various cryptographic algorithms to | |||
| skipping to change at page 2, line 4 ¶ | skipping to change at page 1, line 48 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on October 5, 2014. | ||||
| This Internet-Draft will expire on October 13, 2014. | ||||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2014 IETF Trust and the persons identified as the | Copyright (c) 2014 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 8, line 42 ¶ | skipping to change at page 8, line 42 ¶ | |||
| would be caused if such a flaw were found would be so large. | would be caused if such a flaw were found would be so large. | |||
| 6. Acknowledgements | 6. Acknowledgements | |||
| Much of the wording herein was adapted from [RFC4835], the parent | Much of the wording herein was adapted from [RFC4835], the parent | |||
| document of this document. That RFC itself borrows from [RFC4305], | document of this document. That RFC itself borrows from [RFC4305], | |||
| which borrows in turn from [RFC4307]. RFC4835, RFC4305, and RFC4307 | which borrows in turn from [RFC4307]. RFC4835, RFC4305, and RFC4307 | |||
| were authored by Vishwas Manral, Donald Eastlake, and Jeffrey | were authored by Vishwas Manral, Donald Eastlake, and Jeffrey | |||
| Schiller respectively. | Schiller respectively. | |||
| Thanks are due to Brian Weis, Cheryl Madson, Dan Harkins, Paul | Thanks are due to Wajdi Feghali, Brian Weis, Cheryl Madson, Dan | |||
| Wouters, Ran Atkinson, Scott Fluhrer, Tero Kivinen, and Valery | Harkins, Paul Wouters, Ran Atkinson, Scott Fluhrer, Tero Kivinen, and | |||
| Smyslov for insightful feedback on this draft. | Valery Smyslov for insightful feedback on this draft. | |||
| 7. IANA Considerations | 7. IANA Considerations | |||
| None. | None. | |||
| 8. Security Considerations | 8. Security Considerations | |||
| The security of a system that uses cryptography depends on both the | The security of a system that uses cryptography depends on both the | |||
| strength of the cryptographic algorithms chosen and the strength of | strength of the cryptographic algorithms chosen and the strength of | |||
| the keys used with those algorithms. The security also depends on | the keys used with those algorithms. The security also depends on | |||
| the engineering and administration of the protocol used by the system | the engineering and administration of the protocol used by the system | |||
| skipping to change at page 11, line 13 ¶ | skipping to change at page 11, line 13 ¶ | |||
| Authors' Addresses | Authors' Addresses | |||
| David McGrew | David McGrew | |||
| Cisco Systems | Cisco Systems | |||
| 13600 Dulles Technology Drive | 13600 Dulles Technology Drive | |||
| Herndon, Virginia 20171 | Herndon, Virginia 20171 | |||
| USA | USA | |||
| Phone: 408 525 8651 | Phone: 408 525 8651 | |||
| Email: mcgrew@cisco.com | Email: mcgrew@cisco.com | |||
| Wajdi Feghali | ||||
| Intel Corp. | ||||
| 75 Reed Road | ||||
| Hudson, Massachusetts | ||||
| USA | ||||
| Email: wajdi.k.feghali@intel.com | ||||
| Paul Hoffman | Paul Hoffman | |||
| VPN Consortium | VPN Consortium | |||
| Email: paul.hoffman@vpnc.org | Email: paul.hoffman@vpnc.org | |||
| End of changes. 5 change blocks. | ||||
| 18 lines changed or deleted | 9 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||