Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security
draft-ietf-ipsecme-qr-ikev2-11
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2024-01-04
|
11 | Gunter Van de Velde | Request closed, assignment withdrawn: Will LIU Last Call OPSDIR review |
2024-01-04
|
11 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'Overtaken by Events' |
2020-06-29
|
11 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2020-05-19
|
11 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2020-03-30
|
11 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2020-01-22
|
11 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2020-01-22
|
11 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2020-01-22
|
11 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2020-01-21
|
11 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2020-01-17
|
11 | (System) | RFC Editor state changed to EDIT |
2020-01-17
|
11 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2020-01-17
|
11 | (System) | Announcement was received by RFC Editor |
2020-01-16
|
11 | (System) | IANA Action state changed to In Progress |
2020-01-16
|
11 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2020-01-16
|
11 | Cindy Morgan | IESG has approved the document |
2020-01-16
|
11 | Cindy Morgan | Closed "Approve" ballot |
2020-01-16
|
11 | Cindy Morgan | Ballot approval text was generated |
2020-01-16
|
11 | Benjamin Kaduk | IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup |
2020-01-16
|
11 | Benjamin Kaduk | RFC Editor Note was changed |
2020-01-16
|
11 | Benjamin Kaduk | RFC Editor Note for ballot was generated |
2020-01-16
|
11 | Benjamin Kaduk | RFC Editor Note for ballot was generated |
2020-01-14
|
11 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2020-01-14
|
11 | Panos Kampanakis | New version available: draft-ietf-ipsecme-qr-ikev2-11.txt |
2020-01-14
|
11 | (System) | New version approved |
2020-01-14
|
11 | (System) | Request for posting confirmation emailed to previous authors: Valery Smyslov , Scott Fluhrer , David McGrew , Panos Kampanakis |
2020-01-14
|
11 | Panos Kampanakis | Uploaded new revision |
2020-01-09
|
10 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::Revised I-D Needed from IESG Evaluation |
2020-01-08
|
10 | Adam Roach | [Ballot comment] Thanks for the work done on this protocol extension. I only have two relatively minor comments. --------------------------------------------------------------------------- §5.1: > It is anticipated > … [Ballot comment] Thanks for the work done on this protocol extension. I only have two relatively minor comments. --------------------------------------------------------------------------- §5.1: > It is anticipated > that later standards will extend this technique to allow dynamically > changing PPK values. It's likely that future specifications will extend the technique even before becoming standards. Consider changing "standards" to "specifications." --------------------------------------------------------------------------- §5.1: > Not all implementations are > able to configure arbitrary octet strings; to improve the > potential interoperability, it is recommended that, in the > PPK_ID_FIXED case, both the PPK and the PPK_ID strings be limited > to the base64 character set, namely the 64 characters 0-9, A-Z, > a-z, + and /. This is a little confusing, since the base64 character set has 65 characters in it (the 64 cited, plus '='). If the omission of '=' is intentional, please add a short statement indicating so -- otherwise, implementors may assume that its omission is unintentional and include it in their IDs. To the extent that the problem describes arises in the field, this has the potential to cause cause similar issues. |
2020-01-08
|
10 | Adam Roach | [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach |
2020-01-08
|
10 | Martin Vigoureux | [Ballot comment] Hi, It seems to me there are places where 2119/8174 keywords would make sense. Few examples, with suggestions: If the initiator is … [Ballot comment] Hi, It seems to me there are places where 2119/8174 keywords would make sense. Few examples, with suggestions: If the initiator is configured to use a post-quantum preshared key with the responder (whether or not the use of the PPK is mandatory), then it will include a notification USE_PPK in the IKE_SA_INIT request message as follows: >>MUST include If the initiator needs to resend this initial message with a cookie (because the responder response included a COOKIE notification), then the resend would include the USE_PPK notification if the original message did. >>MUST (or SHOULD?) include by the way, if it is a resend of the message described in the paragraph above, then "if the original message did" seems superfluous. Otherwise the responder replies with the IKE_SA_INIT message including a USE_PPK notification in the response: >>MUST reply initiator and the responder. The responder can use the PPK_ID to look up the corresponding PPK value. Not all implementations are able to configure arbitrary octet strings; to improve the potential interoperability, it is recommended that, in the PPK_ID_FIXED case, both the PPK and the PPK_ID strings be limited to the base64 character set, namely the 64 characters 0-9, A-Z, a-z, + and /. >>RECOMMENDED values 3-127 are reserved for IANA; Maybe it's just because I'm not used to that wording, but why "reserved for IANA" ? The table seems to qualify them as unassigned. |
2020-01-08
|
10 | Martin Vigoureux | Ballot comment text updated for Martin Vigoureux |
2020-01-08
|
10 | Martin Vigoureux | [Ballot comment] Hi, I would have expected more 2119/8174 keywords. Few examples, with suggestions: If the initiator is configured to use a post-quantum preshared … [Ballot comment] Hi, I would have expected more 2119/8174 keywords. Few examples, with suggestions: If the initiator is configured to use a post-quantum preshared key with the responder (whether or not the use of the PPK is mandatory), then it will include a notification USE_PPK in the IKE_SA_INIT request message as follows: >>MUST include If the initiator needs to resend this initial message with a cookie (because the responder response included a COOKIE notification), then the resend would include the USE_PPK notification if the original message did. >>MUST (or SHOULD?) include by the way, if it is a resend of the message described in the paragraph above, then "if the original message did" seems superfluous. Otherwise the responder replies with the IKE_SA_INIT message including a USE_PPK notification in the response: >>MUST reply initiator and the responder. The responder can use the PPK_ID to look up the corresponding PPK value. Not all implementations are able to configure arbitrary octet strings; to improve the potential interoperability, it is recommended that, in the PPK_ID_FIXED case, both the PPK and the PPK_ID strings be limited to the base64 character set, namely the 64 characters 0-9, A-Z, a-z, + and /. >>RECOMMENDED values 3-127 are reserved for IANA; Maybe it's just because I'm not used to that wording, but why "reserved for IANA" ? The table seems to qualify them as unassigned. |
2020-01-08
|
10 | Martin Vigoureux | [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux |
2020-01-08
|
10 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2020-01-08
|
10 | Roman Danyliw | [Ballot comment] These are all editorial. ** Section 1. Per “Recent achievements in developing quantum computers …”, is there a citation? ** Section 1. Per: … [Ballot comment] These are all editorial. ** Section 1. Per “Recent achievements in developing quantum computers …”, is there a citation? ** Section 1. Per: If the preshared key has sufficient entropy and the PRF, encryption and authentication transforms are quantum-secure, then the resulting system is believed to be quantum resistant, that is, invulnerable to an attacker with a quantum computer. -- The definition of quantum resistant doesn’t seem exactly precise. A quantum-resistant algorithm isn’t “invulnerable to an attacker with a quantum computer”, rather isn’t it instead no easier to attack than with known classical architectures? -- The first clause says the underlying primitives are quantum-secure, but then says that this translated into something being quantum-resistant. I found it confusing to mix both terms (which sometimes are used interchangeably) ** Section 1. Per “This document describes a way to extend IKEv2 to have a similar property; assuming that the two end systems share a long secret key then the resulting exchange is quantum resistant.”, I stumbled over this language a bit because I wasn’t sure which property you were referencing – was it the list of things in the previous paragraph’s last sentence that made it “quantum-secure”? ** Section 3. Per the description of modified IKEv2 key derivation: -- Recommend explicitly citing the relevant section: OLD: Then, it computes this modification of the standard IKEv2 key derivation: NEW: Then, it computes this modification of the standard IKEv2 key derivation from Section 2.14 of [RFC7296]: -- Recommend explaining the notation/relationship between the “prime versions” of the sub-keys (i.e., SK_d’ and SK_pi’ and SK_pr’) in the this SKEYSEED formula with the SKEYSEED formula in Section 2.14 of [RFC72196]. ** Editorial Nits: -- Section 1. Editorial. s/this note/this document/ -- trying to be consistent on how the I-D references itself. -- Section 4. Editorial. Recommended clarity: OLD: This will not affect the strength against a passive attacker; it would mean that an attacker with a quantum computer (which is sufficiently fast to be able to break the (EC)DH in real time) would not be able to perform a downgrade attack. NEW: This will not alter the resistance to a passive attack as even an attacker with a quantum computer (which is sufficiently fast to be able to break the (EC)DH in real time) would not be able to perform a downgrade attack. -- Section 5.2.3. Typo. s/Addtionally/Additionally/ -- Section 6. Typo. s/transmited/transmitted/ |
2020-01-08
|
10 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2020-01-07
|
10 | Barry Leiba | [Ballot comment] Yes, an interesting document, and thanks for that. A few editorial comments: — Section 1 — to be quantum resistant, that is, … [Ballot comment] Yes, an interesting document, and thanks for that. A few editorial comments: — Section 1 — to be quantum resistant, that is, invulnerable to an attacker with a quantum computer. “Invulnerable” isn’t the same as “not vulnerable”: it has a stronger connotation. You should probably use “not vulnerable” or “resistant” instead. By bringing post- quantum security to IKEv2, this note removes the need to use Make it “this document”, please. This document does not replace the authentication checks that the protocol does; instead, it is done as a parallel check. What’s the antecedent to “it”? Should “it is” instead be “they are”? — Section 3 — when the initiator believes it has a mandatory to use PPK You need hyphens in “mandatory-to-use”. — I also find it interesting that Alexey thought you needed to add a normative reference for “ASCII”, bit not for “base64”. Personally, I think both are sufficiently well known that you need neither. |
2020-01-07
|
10 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2020-01-07
|
10 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2020-01-07
|
10 | Deborah Brungard | [Ballot comment] Interesting read. Agree with Alissa, was this considered as update of RFC7296? It would give it the appropriate visibility for readers of … |
2020-01-07
|
10 | Deborah Brungard | Ballot comment text updated for Deborah Brungard |
2020-01-07
|
10 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2020-01-07
|
10 | Alexey Melnikov | [Ballot comment] Thank you for this document. One small suggestion below: 5.1. PPK_ID format o PPK_ID_FIXED (2) - in this case the format of … [Ballot comment] Thank you for this document. One small suggestion below: 5.1. PPK_ID format o PPK_ID_FIXED (2) - in this case the format of the PPK_ID and the PPK are fixed octet strings; the remaining bytes of the PPK_ID are a configured value. We assume that there is a fixed mapping between PPK_ID and PPK, which is configured locally to both the initiator and the responder. The responder can use the PPK_ID to look up the corresponding PPK value. Not all implementations are able to configure arbitrary octet strings; to improve the potential interoperability, it is recommended that, in the PPK_ID_FIXED case, both the PPK and the PPK_ID strings be limited to the base64 character set, namely the 64 characters 0-9, A-Z, a-z, + and /. In order to avoid any doubt, I suggest you make it clear that you mean ASCII encoding here. For this you should add a normative reference to RFC 20 in the last quoted sentence. |
2020-01-07
|
10 | Alexey Melnikov | Ballot comment text updated for Alexey Melnikov |
2020-01-07
|
10 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov |
2020-01-07
|
10 | Mirja Kühlewind | [Ballot comment] 1) One small question on section 3: "if using PPKs for communication with this responder is optional for the initiator, then the … [Ballot comment] 1) One small question on section 3: "if using PPKs for communication with this responder is optional for the initiator, then the initiator MAY include a notification NO_PPK_AUTH in the above message." This does mean that NO_PPK_AUTH notification should not be sent when the mandatory_or_not flag indicates that PPK is mandatory, right? Or is that a separate configuration? Would be good to clarify in the doc! 2) Section 6 says: "In this situation, it is RECOMMENDED that the initiator caches the negative result of the negotiation for some time and doesn't make attempts to create it again for some time," Would it be possible to give any hints about what "some time" means or at least the order of magnitude? Maybe it could be recommended to wait a couple of seconds? Or how long is it usually expected to take until the half-open connection will be expired? 3) Also here: "then the initiator doesn't abort the exchange immediately, but instead waits some time for more responses (possibly retransmitting the request)." How long should one wait? Probably 1-2 RTTs if the RTT is known or maybe there is some good max value like 500ms or 1s or more...? Is there any risk in waiting too long? 3) And one high-level comment (without knowing to much details about IKEv2): Would it be possible do a downgrade detection, meaning when non-PKK encryption is established the initiator would tell the responser again that it was initially requesting PKK, just to double-check...? |
2020-01-07
|
10 | Mirja Kühlewind | Ballot comment text updated for Mirja Kühlewind |
2020-01-07
|
10 | Mirja Kühlewind | [Ballot comment] 1) One small question on section 3: "if using PPKs for communication with this responder is optional for the initiator, then the … [Ballot comment] 1) One small question on section 3: "if using PPKs for communication with this responder is optional for the initiator, then the initiator MAY include a notification NO_PPK_AUTH in the above message." This does mean that NO_PPK_AUTH notification should not be sent when the mandatory_or_not flag indicates that PPK is mandatory, right? Or is that a separate configuration? Would be good to clarify in the doc! 2) Section 6 says: "In this situation, it is RECOMMENDED that the initiator caches the negative result of the negotiation for some time and doesn't make attempts to create it again for some time," Would it be possible to give any hints about what "some time" means or at least the order of magnitude? Maybe it could be recommended to wait a couple of seconds? Or how long is it usually expected to take until the half-open connection will be expired? 3) Also here: "then the initiator doesn't abort the exchange immediately, but instead waits some time for more responses (possibly retransmitting the request)." How long should one wait? Probably 1-2 RTTs if the RTT is known or maybe there is some good max value like 500ms or 1s or more...? Is there any risk in waiting too long? 3) And one high-level comment (without know to much details about IKEv2): Would it be possible to a downgrade detection, meaning even non-PKK encryption is established the initiator would tell the responser again that it was initially requesting PKK, just to double-check...? |
2020-01-07
|
10 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2020-01-06
|
10 | Alissa Cooper | [Ballot comment] I think this document should formally update RFC 7296. Was that discussed in the WG? I think the citation for [NISTPQCFP] should … [Ballot comment] I think this document should formally update RFC 7296. Was that discussed in the WG? I think the citation for [NISTPQCFP] should link to the actual call for proposals. Section 6: "In addition, the policy SHOULD be set to negotiate only quantum- resistant symmetric algorithms; while this RFC doesn't claim to give advice as to what algorithms are secure (as that may change based on future cryptographical results), below is a list of defined IKEv2 and IPsec algorithms that should not be used, as they are known to provide less than 128 bits of post-quantum security" This paragraph mixes normative SHOULD with non-normative "should not" in the same paragraph. I was wondering if that is intentional. |
2020-01-06
|
10 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2020-01-04
|
10 | Warren Kumari | [Ballot comment] Thank you - I also found this an interesting read, but must admit that I’m somewhat shaky on the math / security properties. |
2020-01-04
|
10 | Warren Kumari | [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari |
2020-01-03
|
10 | Éric Vyncke | [Ballot comment] Thank you for the work put into this document. I found it very interesting to read BTW. I have only one minor non-blocking … [Ballot comment] Thank you for the work put into this document. I found it very interesting to read BTW. I have only one minor non-blocking comment: please read RFC 8126 to have a correct IANA section about "type 16435" (and others). Same applies for section 5.1. I hope that this helps to improve this document or any future one of yours, Regards, -éric |
2020-01-03
|
10 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2020-01-02
|
10 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2020-01-02
|
10 | Amy Vezza | Placed on agenda for telechat - 2020-01-09 |
2019-12-31
|
10 | Benjamin Kaduk | IESG state changed to IESG Evaluation from Waiting for Writeup |
2019-12-27
|
10 | Benjamin Kaduk | Ballot has been issued |
2019-12-27
|
10 | Benjamin Kaduk | [Ballot Position Update] New position, Yes, has been recorded for Benjamin Kaduk |
2019-12-27
|
10 | Benjamin Kaduk | Created "Approve" ballot |
2019-12-27
|
10 | Benjamin Kaduk | Ballot writeup was changed |
2019-12-26
|
10 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2019-12-26
|
10 | Valery Smyslov | New version available: draft-ietf-ipsecme-qr-ikev2-10.txt |
2019-12-26
|
10 | (System) | New version accepted (logged-in submitter: Valery Smyslov) |
2019-12-26
|
10 | Valery Smyslov | Uploaded new revision |
2019-12-25
|
09 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2019-12-24
|
09 | Watson Ladd | Request for Last Call review by SECDIR Completed: Not Ready. Reviewer: Watson Ladd. Sent review to list. |
2019-12-23
|
09 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2019-12-23
|
09 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-ipsecme-qr-ikev2-09. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-ipsecme-qr-ikev2-09. If any part of this review is inaccurate, please let us know. The IANA Functions Operator has a question about one of the actions requested in the IANA Considerations section of this document. The IANA Functions Operator understands that, upon approval of this document, there are two actions which we must complete. First, in the IKEv2 Notify Message Types - Status Types registry on the Internet Key Exchange Version 2 (IKEv2) Parameters registry page located at: https://www.iana.org/assignments/ikev2-parameters/ the following three early registrations will have their references changed to [ RFC-to-be ]: 16435 USE_PPK [draft-ietf-ipsecme-qr-ikev2] 16436 PPK_IDENTITY [draft-ietf-ipsecme-qr-ikev2] 16437 NO_PPK_AUTH [draft-ietf-ipsecme-qr-ikev2] Second, a new registry is to be created. IANA Question --> What should the name of the registry be? IANA Question --> should the registry be located on the Internet Key Exchange Version 2 (IKEv2) Parameters registry page located at: https://www.iana.org/assignments/ikev2-parameters/ or, if not, does it belong in an existing category at http://www.iana.org/protocols? The new registry will be managed via Expert Review as defined in [ RFC 8126 ]. There are initial registrations in the new registry as follows: PPK_ID Type Value Reference ----------- ----- ------------ Reserved 0 PPK_ID_OPAQUE 1 [ RFC-to-be ] PPK_ID_FIXED 2 [ RFC-to-be ] Unassigned 3-127 Reserved for private use 128-255 The IANA Functions Operator understands that these are the only actions required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2019-12-17
|
09 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Will LIU |
2019-12-17
|
09 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Will LIU |
2019-12-13
|
09 | Christer Holmberg | Request for Last Call review by GENART Completed: Almost Ready. Reviewer: Christer Holmberg. Sent review to list. |
2019-12-12
|
09 | Jean Mahoney | Request for Last Call review by GENART is assigned to Christer Holmberg |
2019-12-12
|
09 | Jean Mahoney | Request for Last Call review by GENART is assigned to Christer Holmberg |
2019-12-12
|
09 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Watson Ladd |
2019-12-12
|
09 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Watson Ladd |
2019-12-11
|
09 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2019-12-11
|
09 | Amy Vezza | The following Last Call announcement was sent out (ends 2019-12-25): From: The IESG To: IETF-Announce CC: David Waltermire , ipsecme-chairs@ietf.org, draft-ietf-ipsecme-qr-ikev2@ietf.org, ipsec@ietf.org, … The following Last Call announcement was sent out (ends 2019-12-25): From: The IESG To: IETF-Announce CC: David Waltermire , ipsecme-chairs@ietf.org, draft-ietf-ipsecme-qr-ikev2@ietf.org, ipsec@ietf.org, david.waltermire@nist.gov, kaduk@mit.edu Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Postquantum Preshared Keys for IKEv2) to Proposed Standard The IESG has received a request from the IP Security Maintenance and Extensions WG (ipsecme) to consider the following document: - 'Postquantum Preshared Keys for IKEv2' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2019-12-25. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The possibility of Quantum Computers poses a serious challenge to cryptographic algorithms deployed widely today. IKEv2 is one example of a cryptosystem that could be broken; someone storing VPN communications today could decrypt them at a later time when a Quantum Computer is available. It is anticipated that IKEv2 will be extended to support quantum-secure key exchange algorithms; however that is not likely to happen in the near term. To address this problem before then, this document describes an extension of IKEv2 to allow it to be resistant to a Quantum Computer, by using preshared keys. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-ipsecme-qr-ikev2/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-ipsecme-qr-ikev2/ballot/ No IPR declarations have been submitted directly on this I-D. |
2019-12-11
|
09 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2019-12-11
|
09 | Amy Vezza | Last call announcement was changed |
2019-12-10
|
09 | Benjamin Kaduk | Last call was requested |
2019-12-10
|
09 | Benjamin Kaduk | Last call announcement was generated |
2019-12-10
|
09 | Benjamin Kaduk | Ballot approval text was generated |
2019-12-10
|
09 | Benjamin Kaduk | Ballot writeup was generated |
2019-12-10
|
09 | Benjamin Kaduk | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2019-11-27
|
09 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2019-11-27
|
09 | Valery Smyslov | New version available: draft-ietf-ipsecme-qr-ikev2-09.txt |
2019-11-27
|
09 | (System) | New version accepted (logged-in submitter: Valery Smyslov) |
2019-11-27
|
09 | Valery Smyslov | Uploaded new revision |
2019-11-05
|
08 | Benjamin Kaduk | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
2019-10-09
|
08 | Benjamin Kaduk | IESG state changed to AD Evaluation from Publication Requested |
2019-07-22
|
08 | Tero Kivinen | Added to session: IETF-105: ipsecme Tue-1520 |
2019-03-28
|
08 | David Waltermire | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The intended status is Proposed Standard, which is listed in the title page header. The document defines a protocol and for interoperability the Internet Standard status is appropriated. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. The possibility of Quantum Computers pose a serious challenge to cryptography algorithms deployed widely today. IKEv2 is one example of a cryptosystem that could be broken; someone storing VPN communications today could decrypt them at a later time when a Quantum Computer is available. It is anticipated that IKEv2 will be extended to support quantum secure key exchange algorithms; however that is not likely to happen in the near term. To address this problem before then, this document describes an extension of IKEv2 to allow it to be resistant to a Quantum Computer, by using preshared keys. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? The document has been highly reviewed and discussed and presented during multiple meetings and through the mailing list. The draft had no controversy. The draft has been discussed frequently on the mailing list and a lot of comments have been provided on list by people other than the authors, to include implementors. In addition to mailing list discussions, the draft has been presented and discussed during the 98 tru 102 IETF meetings. The draft has been supported by the participants in the room on various hums for the specific design decisions made in the document. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? The document is supported by implementors, and authors also represent a subset of implementors. Interoperability has been confirmed by at least four independent implementations from Cisco, Apple, libreswan and ELVIS-PLUS. There likely additional implementations that the WG are not aware of at this time. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? David Waltermire is the document shepherd and Benjamin Kaduk is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd has completely reviewed this draft to include review of idnits, the references, and IANA considerations sections. No issues have been found. The document is ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The document has been heavily discussed and reviewed by the WG, and has been presented during the IETF meetings. There has been a significant number of comments on the draft, which have been sufficiently addressed by the authors. The document represents the strong consensus of the WG. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. The idnits tool finds a single issue, which is an obsolete informational reference to RFC 2409. This is a false positive, since the draft is intentionally referencing IKEv1. No other issues were found. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. Three early assignments have been made in the IANA "IKEv2 Notify Message Types - Status Types" receiving the required expert review. The document does not need any additional external formal reviews. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA section adds three new status types to the IANA "IKEv2 Notify Message Types - Status Types" registry. Both of these entries have been requested for early assignment, have passed expert review, and already appear in the registry. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. None. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. There is no need to proceed to further checks. |
2019-03-28
|
08 | David Waltermire | Responsible AD changed to Benjamin Kaduk |
2019-03-28
|
08 | David Waltermire | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2019-03-28
|
08 | David Waltermire | IESG state changed to Publication Requested from I-D Exists |
2019-03-28
|
08 | David Waltermire | IESG process started in state Publication Requested |
2019-03-28
|
08 | David Waltermire | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The intended status is Proposed Standard, which is listed in the title page header. The document defines a protocol and for interoperability the Internet Standard status is appropriated. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. The possibility of Quantum Computers pose a serious challenge to cryptography algorithms deployed widely today. IKEv2 is one example of a cryptosystem that could be broken; someone storing VPN communications today could decrypt them at a later time when a Quantum Computer is available. It is anticipated that IKEv2 will be extended to support quantum secure key exchange algorithms; however that is not likely to happen in the near term. To address this problem before then, this document describes an extension of IKEv2 to allow it to be resistant to a Quantum Computer, by using preshared keys. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? The document has been highly reviewed and discussed and presented during multiple meetings and through the mailing list. The draft had no controversy. The draft has been discussed frequently on the mailing list and a lot of comments have been provided on list by people other than the authors, to include implementors. In addition to mailing list discussions, the draft has been presented and discussed during the 98 tru 102 IETF meetings. The draft has been supported by the participants in the room on various hums for the specific design decisions made in the document. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? The document is supported by implementors, and authors also represent a subset of implementors. Interoperability has been confirmed by at least four independent implementations from Cisco, Apple, libreswan and ELVIS-PLUS. There likely additional implementations that the WG are not aware of at this time. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? David Waltermire is the document shepherd and Benjamin Kaduk is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd has completely reviewed this draft to include review of idnits, the references, and IANA considerations sections. No issues have been found. The document is ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The document has been heavily discussed and reviewed by the WG, and has been presented during the IETF meetings. There has been a significant number of comments on the draft, which have been sufficiently addressed by the authors. The document represents the strong consensus of the WG. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. The idnits tool finds a single issue, which is an obsolete informational reference to RFC 2409. This is a false positive, since the draft is intentionally referencing IKEv1. No other issues were found. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. Three early assignments have been made in the IANA "IKEv2 Notify Message Types - Status Types" receiving the required expert review. The document does not need any additional external formal reviews. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA section adds three new status types to the IANA "IKEv2 Notify Message Types - Status Types" registry. Both of these entries have been requested for early assignment, have passed expert review, and already appear in the registry. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. None. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. There is no need to proceed to further checks. |
2019-03-28
|
08 | Valery Smyslov | New version available: draft-ietf-ipsecme-qr-ikev2-08.txt |
2019-03-28
|
08 | (System) | New version approved |
2019-03-28
|
08 | (System) | Request for posting confirmation emailed to previous authors: Valery Smyslov , Scott Fluhrer , David McGrew , Panos Kampanakis |
2019-03-28
|
08 | Valery Smyslov | Uploaded new revision |
2019-03-28
|
07 | David Waltermire | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2019-03-28
|
07 | David Waltermire | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The intended status is Proposed Standard, which is listed in the title page header. The document defines a protocol and for interoperability the Internet Standard status is appropriated. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. The possibility of Quantum Computers pose a serious challenge to cryptography algorithms deployed widely today. IKEv2 is one example of a cryptosystem that could be broken; someone storing VPN communications today could decrypt them at a later time when a Quantum Computer is available. It is anticipated that IKEv2 will be extended to support quantum secure key exchange algorithms; however that is not likely to happen in the near term. To address this problem before then, this document describes an extension of IKEv2 to allow it to be resistant to a Quantum Computer, by using preshared keys. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? The document has been highly reviewed and discussed and presented during multiple meetings and through the mailing list. The draft had no controversy. The draft has been discussed frequently on the mailing list and a lot of comments have been provided on list by people other than the authors, to include implementors. In addition to mailing list discussions, the draft has been presented and discussed during the 98 tru 102 IETF meetings. The draft has been supported by the participants in the room on various hums for the specific design decisions made in the document. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? The document is supported by implementors, and authors also represent a subset of implementors. Interoperability has been confirmed by at least four independent implementations from Cisco, Apple, libreswan and ELVIS-PLUS. There likely additional implementations that the WG are not aware of at this time. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? David Waltermire is the document shepherd and Benjamin Kaduk is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd has completely reviewed this draft to include review of idnits, the references, and IANA considerations sections. No issues have been found. The document is ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The document has been heavily discussed and reviewed by the WG, and has been presented during the IETF meetings. There has been a significant number of comments on the draft, which have been sufficiently addressed by the authors. The document represents the strong consensus of the WG. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. None. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. Three early assignments have been made in the IANA "IKEv2 Notify Message Types - Status Types" receiving the required expert review. The document does not need any additional external formal reviews. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA section adds three new status types to the IANA "IKEv2 Notify Message Types - Status Types" registry. Both of these entries have been requested for early assignment, have passed expert review, and already appear in the registry. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. None. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. There is no need to proceed to further checks. |
2019-03-14
|
07 | Tero Kivinen | Added to session: IETF-104: ipsecme Thu-1050 |
2019-01-21
|
07 | Valery Smyslov | New version available: draft-ietf-ipsecme-qr-ikev2-07.txt |
2019-01-21
|
07 | (System) | New version approved |
2019-01-21
|
07 | (System) | Request for posting confirmation emailed to previous authors: Valery Smyslov , Scott Fluhrer , David McGrew , Panos Kampanakis |
2019-01-21
|
07 | Valery Smyslov | Uploaded new revision |
2019-01-18
|
06 | Valery Smyslov | New version available: draft-ietf-ipsecme-qr-ikev2-06.txt |
2019-01-18
|
06 | (System) | New version approved |
2019-01-18
|
06 | (System) | Request for posting confirmation emailed to previous authors: Valery Smyslov , Scott Fluhrer , David McGrew , Panos Kampanakis |
2019-01-18
|
06 | Valery Smyslov | Uploaded new revision |
2018-12-25
|
05 | Valery Smyslov | New version available: draft-ietf-ipsecme-qr-ikev2-05.txt |
2018-12-25
|
05 | (System) | New version approved |
2018-12-25
|
05 | (System) | Request for posting confirmation emailed to previous authors: Valery Smyslov , Scott Fluhrer , David McGrew , Panos Kampanakis |
2018-12-25
|
05 | Valery Smyslov | Uploaded new revision |
2018-11-04
|
04 | Tero Kivinen | Added to session: IETF-103: ipsecme Wed-1350 |
2018-07-18
|
04 | David Waltermire | IETF WG state changed to In WG Last Call from WG Document |
2018-07-16
|
04 | Tero Kivinen | Added to session: IETF-102: ipsecme Wed-1520 |
2018-07-02
|
04 | Valery Smyslov | New version available: draft-ietf-ipsecme-qr-ikev2-04.txt |
2018-07-02
|
04 | (System) | New version approved |
2018-07-02
|
04 | (System) | Request for posting confirmation emailed to previous authors: Valery Smyslov , Scott Fluhrer , David McGrew , Panos Kampanakis |
2018-07-02
|
04 | Valery Smyslov | Uploaded new revision |
2018-06-18
|
03 | Panos Kampanakis | New version available: draft-ietf-ipsecme-qr-ikev2-03.txt |
2018-06-18
|
03 | (System) | New version approved |
2018-06-18
|
03 | (System) | Request for posting confirmation emailed to previous authors: Valery Smyslov , Scott Fluhrer , David McGrew , Panos Kampanakis |
2018-06-18
|
03 | Panos Kampanakis | Uploaded new revision |
2018-03-23
|
02 | Tero Kivinen | Changed consensus to Yes from Unknown |
2018-03-23
|
02 | Tero Kivinen | Intended Status changed to Proposed Standard from Informational |
2018-03-19
|
02 | Tero Kivinen | Added to session: IETF-101: ipsecme Fri-1150 |
2018-02-27
|
02 | Panos Kampanakis | New version available: draft-ietf-ipsecme-qr-ikev2-02.txt |
2018-02-27
|
02 | (System) | New version approved |
2018-02-27
|
02 | (System) | Request for posting confirmation emailed to previous authors: Valery Smyslov , Scott Fluhrer , David McGrew , Panos Kampanakis |
2018-02-27
|
02 | Panos Kampanakis | Uploaded new revision |
2017-12-21
|
01 | Panos Kampanakis | New version available: draft-ietf-ipsecme-qr-ikev2-01.txt |
2017-12-21
|
01 | (System) | New version approved |
2017-12-21
|
01 | (System) | Request for posting confirmation emailed to previous authors: Valery Smyslov , Scott Fluhrer , David McGrew , Panos Kampanakis |
2017-12-21
|
01 | Panos Kampanakis | Uploaded new revision |
2017-11-11
|
00 | David Waltermire | Added to session: IETF-100: ipsecme Mon-0930 |
2017-10-19
|
00 | Tero Kivinen | Notification list changed to David Waltermire <david.waltermire@nist.gov> |
2017-10-19
|
00 | Tero Kivinen | Document shepherd changed to David Waltermire |
2017-10-19
|
00 | Tero Kivinen | Intended Status changed to Informational from None |
2017-10-19
|
00 | Tero Kivinen | This document now replaces draft-fluhrer-qr-ikev2 instead of None |
2017-10-19
|
00 | Panos Kampanakis | New version available: draft-ietf-ipsecme-qr-ikev2-00.txt |
2017-10-19
|
00 | (System) | WG -00 approved |
2017-10-16
|
00 | Panos Kampanakis | Set submitter to "Panos Kampanakis ", replaces to (none) and sent approval email to group chairs: ipsecme-chairs@ietf.org |
2017-10-16
|
00 | Panos Kampanakis | Uploaded new revision |