Algorithms for Cryptographic Message Syntax (CMS) Encrypted Key Package Content Type
draft-turner-encryptedkeypackagecontenttype-algs-02
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
02 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
2010-05-24
|
02 | Cindy Morgan | State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan |
2010-05-24
|
02 | (System) | IANA Action state changed to No IC from In Progress |
2010-05-24
|
02 | (System) | IANA Action state changed to In Progress |
2010-05-24
|
02 | Amy Vezza | IESG state changed to Approved-announcement sent |
2010-05-24
|
02 | Amy Vezza | IESG has approved the document |
2010-05-24
|
02 | Amy Vezza | Closed "Approve" ballot |
2010-05-20
|
02 | Cindy Morgan | State Changes to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation by Cindy Morgan |
2010-05-20
|
02 | (System) | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by IESG Secretary |
2010-05-20
|
02 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2010-05-20
|
02 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded by Stewart Bryant |
2010-05-20
|
02 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2010-05-20
|
02 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded by Adrian Farrel |
2010-05-20
|
02 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo |
2010-05-20
|
02 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
2010-05-19
|
02 | Amy Vezza | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Amy Vezza |
2010-05-19
|
02 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms |
2010-05-18
|
02 | Peter Saint-Andre | [Ballot Position Update] New position, No Objection, has been recorded by Peter Saint-Andre |
2010-05-14
|
02 | Russ Housley | [Ballot discuss] Section 2 needs to specify a content-encryption algorithm. Based on the other choices in this document, the mandatory-to-implement content-encryption algorithm ought … [Ballot discuss] Section 2 needs to specify a content-encryption algorithm. Based on the other choices in this document, the mandatory-to-implement content-encryption algorithm ought to be AES-CBC with a 128 bit key. Section 3 specifiesd a key-encryption algorithm, when a content- encryption algorithm is required. Based on the other choices in this document, the mandatory-to-implement content-encryption algorithm ought to be AES-CBC with a 128 bit key. |
2010-05-14
|
02 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley |
2010-05-08
|
02 | Alexey Melnikov | [Ballot comment] |
2010-05-07
|
02 | (System) | New version available: draft-turner-encryptedkeypackagecontenttype-algs-02.txt |
2010-04-28
|
02 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2010-04-26
|
02 | Amanda Baber | IANA comments: As described in the IANA Considerations section, we understand this document to have NO IANA Actions. |
2010-04-26
|
02 | Tim Polk | Telechat date was changed to 2010-05-20 from 2010-05-06 by Tim Polk |
2010-04-26
|
02 | Tim Polk | [Note]: 'Carl Wallace (cwallace@cygnacom.com) is the document Shepherd.' added by Tim Polk |
2010-04-24
|
02 | Alexey Melnikov | [Ballot comment] 2. EnvelopedData EnvelopedData supports a number of key management techniques. Implementations that claim conformance to this document MUST support the … [Ballot comment] 2. EnvelopedData EnvelopedData supports a number of key management techniques. Implementations that claim conformance to this document MUST support the key transport mechanisms and SHOULD support the key agreement mechanisms. Other techniques MAY be supported. [...] When key agreement is used, Diffie-Hellman ephemeral-static [RFC3370] SHOULD be supported. It doesn't look like there is a mandatory to implement key agreement protocol. Maybe the last SHOULD needs to be replaced with a MUST. |
2010-04-24
|
02 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded by Alexey Melnikov |
2010-04-24
|
02 | Alexey Melnikov | Area acronymn has been changed to sec from gen |
2010-04-24
|
02 | Alexey Melnikov | [Note]: 'Carl Wallace (cwallace@cygnacom.com) is the document Shepherd.' added by Alexey Melnikov |
2010-04-23
|
02 | Sean Turner | [Ballot Position Update] Position for Sean Turner has been changed to Recuse from Abstain by Sean Turner |
2010-04-23
|
02 | Sean Turner | [Ballot Position Update] New position, Abstain, has been recorded by Sean Turner |
2010-04-23
|
02 | Tim Polk | Placed on agenda for telechat - 2010-05-06 by Tim Polk |
2010-04-23
|
02 | Tim Polk | [Note]: 'Carl Wallace (cwallace@cygnacom.com) is the document Shepherd.' added by Tim Polk |
2010-04-23
|
02 | Tim Polk | [Ballot Position Update] New position, Yes, has been recorded for Tim Polk |
2010-04-23
|
02 | Tim Polk | Ballot has been issued by Tim Polk |
2010-04-23
|
02 | Tim Polk | Created "Approve" ballot |
2010-04-01
|
02 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to David McGrew |
2010-04-01
|
02 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to David McGrew |
2010-03-31
|
02 | Amy Vezza | Last call sent |
2010-03-31
|
02 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2010-03-31
|
02 | Tim Polk | Last Call was requested by Tim Polk |
2010-03-31
|
02 | Tim Polk | State Changes to Last Call Requested from Publication Requested by Tim Polk |
2010-03-31
|
02 | Tim Polk | Last Call was requested by Tim Polk |
2010-03-31
|
02 | (System) | Ballot writeup text was added |
2010-03-31
|
02 | (System) | Last call text was added |
2010-03-31
|
02 | (System) | Ballot approval text was added |
2010-02-04
|
02 | Cindy Morgan | (Please ignore earlier Proto write-up; that was for a different document.) **BEGIN DOWNREF ALERT** This document is headed for standards track, but there are normative … (Please ignore earlier Proto write-up; that was for a different document.) **BEGIN DOWNREF ALERT** This document is headed for standards track, but there are normative references to two informative RFCs. RFC3394 if for AES Key Wrap and RFC5649 and is for AES Key Wrap with Padding. **END DOWNRED ALERT** PROTO write-up: 1.a - Carl Wallace is the Shepherd. He's personally reviewed the ID and personally knows it's ready for IESG publication. 1.b - The document has been reviewed by key IETF participants. There are no concerns about depth or breadth of the reviews. 1.c - There is no need for wider review. 1.d - There are no specific concerns that the AD and/or IESG should be aware of. 1.e - The consensus is solid. 1.f - There has been no threat of an appeal. 1.g - The Shepherd has personally verified that the document satisfies all ID nits. 1.h - The document splits it references. 1.i - The document has an IANA consideration and it is consistent with the main body (there are no IANA considerations). 1.j - The Shepherd has personally compiled the ASN.1 modules. Note that dummy OID values were used while we await final assignment. Technical Summary This document specifies algorithms to secure the encrypted key content type defined in draft-turner-encryptedkeypackagecontenttype. The algorithm choices and key sizes are based on RFC 5751, with the exception of content encryption algorithm and key wrap algorithm being AES Key Wrap with Padding. This rationale for the choice is in the security considerations. Working Group Summary This document is not the product of an IETF Working Group. Document Quality The document is short and lists the algorithms to be used based on the encapsulation mechanism. Personnel Carl Wallace is the document Shepherd. Tim Polk is the responsible Security Area AD. |
2010-02-04
|
02 | Cindy Morgan | **BEGIN DOWNREF ALERT** This document is headed for standards track, but there are normative references to two informative IDs and 4 superseded ITU/ISO standards. All … **BEGIN DOWNREF ALERT** This document is headed for standards track, but there are normative references to two informative IDs and 4 superseded ITU/ISO standards. All of these references (NEWPKIXASN, NEWSMIMEASN, X.680, X.681, X.682, X.683) all result from the choice of '02 ASN.1. I chose the '02 ASN.1 because I want to use the latest available ASN.1 that has a freeware compiler and I'd rather import than redefine ASN.1 structures. **END DOWNRED ALERT** PROTO write-up: 1.a - Carl Wallace is the Shepherd. He's personally reviewed the ID and personally knows it's ready for IESG publication. 1.b - The document has been reviewed by key IETF participants. There are no concerns about depth or breadth of the reviews. 1.c - There is no need for wider review. 1.d - There are no specific concerns that the AD and/or IESG should be aware of. 1.e - The consensus is solid. 1.f - There has been no threat of an appeal. 1.g - The Shepherd has personally verified that the document satisfies all ID nits. 1.h - The document splits it references. 1.i - The document has an IANA consideration and it is consistent with the main body (there are no IANA considerations). 1.j - The Shepherd has personally compiled the ASN.1 modules. Note that dummy OID values were used while we await final assignment. Technical Summary This document specifies a content type for encrypted key packages. It is a choice of: EnvelopedData, EncryptedData, or AuthEnvelopedData. The rationale for it's use is based on the CMS content constraints documented in draft-housley-cms-content-constraints-extn. This document also defines an attribute that provides a hint as to which key should be used to decrypt the content when the EncryptedData choice is used. Working Group Summary This document is not the product of an IETF Working Group. Document Quality The document is short, but provides enough background to explain why why the content type is needed. Personnel Carl Wallace is the document Shepherd. Tim Polk is the responsible Security Area AD. |
2010-02-04
|
02 | Cindy Morgan | Draft Added by Cindy Morgan in state Publication Requested |
2010-02-04
|
02 | Cindy Morgan | [Note]: 'Carl Wallace (cwallace@cygnacom.com) is the document Shepherd.' added by Cindy Morgan |
2010-02-02
|
01 | (System) | New version available: draft-turner-encryptedkeypackagecontenttype-algs-01.txt |
2009-09-10
|
00 | (System) | New version available: draft-turner-encryptedkeypackagecontenttype-algs-00.txt |