References from draft-ietf-curdle-ssh-kex-sha2
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Document | Title | Status | Type | Downref |
---|---|---|---|---|
BCP 106 |
References Referenced by |
informatively references | ||
BCP 14 |
References Referenced by |
normatively references | ||
RFC 2119 |
Key words for use in RFCs to Indicate Requirement Levels
References Referenced by |
Best Current Practice | normatively references | |
RFC 3526 |
More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)
References Referenced by |
Proposed Standard | informatively references | |
RFC 4086 |
Randomness Requirements for Security
References Referenced by |
Best Current Practice | informatively references | |
RFC 4250 |
The Secure Shell (SSH) Protocol Assigned Numbers
References Referenced by |
Proposed Standard | normatively references | |
RFC 4251 |
The Secure Shell (SSH) Protocol Architecture
References Referenced by |
Proposed Standard | informatively references | |
RFC 4253 |
The Secure Shell (SSH) Transport Layer Protocol
References Referenced by |
Proposed Standard | normatively references | |
RFC 4419 |
Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol
References Referenced by |
Proposed Standard | informatively references | |
RFC 4432 |
RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol
References Referenced by |
Proposed Standard | informatively references | |
RFC 4462 |
Generic Security Service Application Program Interface (GSS-API) Authentication and Key Exchange for the Secure Shell (SSH) Protocol
References Referenced by |
Proposed Standard | informatively references | |
RFC 5656 |
Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer
References Referenced by |
Proposed Standard | informatively references | |
RFC 6194 |
Security Considerations for the SHA-0 and SHA-1 Message-Digest Algorithms
References Referenced by |
Informational | informatively references | |
RFC 6234 |
US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)
References Referenced by |
Informational | informatively references | |
RFC 7748 |
Elliptic Curves for Security
References Referenced by |
Informational | informatively references | |
RFC 8031 |
Curve25519 and Curve448 for the Internet Key Exchange Protocol Version 2 (IKEv2) Key Agreement
References Referenced by |
Proposed Standard | informatively references | |
RFC 8174 |
Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words
References Referenced by |
Best Current Practice | normatively references | |
RFC 8268 |
More Modular Exponentiation (MODP) Diffie-Hellman (DH) Key Exchange (KEX) Groups for Secure Shell (SSH)
References Referenced by |
Proposed Standard | normatively references | |
RFC 8270 |
Increase the Secure Shell Minimum Recommended Diffie-Hellman Modulus Size to 2048 Bits
References Referenced by |
Proposed Standard | normatively references | |
RFC 8308 |
Extension Negotiation in the Secure Shell (SSH) Protocol
References Referenced by |
Proposed Standard | normatively references | |
RFC 8731 |
Secure Shell (SSH) Key Exchange Method Using Curve25519 and Curve448
References Referenced by |
Proposed Standard | normatively references | |
RFC 8732 |
Generic Security Service Application Program Interface (GSS-API) Key Exchange with SHA-2
References Referenced by |
Proposed Standard | informatively references |