Skip to main content

Cryptographic Suites for IPsec
RFC 4308

Revision differences

Document history

Date Rev. By Action
2020-01-21
06 (System) Received changes through RFC Editor sync (added Verified Errata tag)
2012-08-22
06 (System) post-migration administrative database adjustment to the No Objection position for Thomas Narten
2012-08-22
06 (System) post-migration administrative database adjustment to the Yes position for Russ Housley
2005-12-27
06 (System) This was part of a ballot set with: draft-ietf-ipsec-ikev2-algorithms
2005-12-27
06 Amy Vezza State Changes to RFC Published from RFC Ed Queue by Amy Vezza
2005-12-27
06 Amy Vezza [Note]: 'RFC 4308' added by Amy Vezza
2005-12-22
06 (System) RFC published
2004-09-27
06 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2004-09-23
06 Amy Vezza IESG state changed to Approved-announcement sent
2004-09-23
06 Amy Vezza IESG has approved the document
2004-09-23
06 Amy Vezza Closed "Approve" ballot
2004-09-22
06 Russ Housley State Changes to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup by Russ Housley
2004-04-22
06 Russ Housley State Changes to Approved-announcement to be sent::AD Followup from IESG Evaluation::Revised ID Needed by Russ Housley
2004-04-22
06 Thomas Narten [Ballot Position Update] Position for Thomas Narten has been changed to No Objection from Discuss by Thomas Narten
2004-04-21
06 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to Yes from Discuss by Russ Housley
2004-04-20
06 Russ Housley State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Russ Housley
2004-04-14
06 (System) New version available: draft-ietf-ipsec-ui-suites-06.txt
2004-04-12
05 (System) New version available: draft-ietf-ipsec-ui-suites-05.txt
2004-04-08
06 Russ Housley
[Ballot discuss]
In section 4.1.1, please change 3DES-CBC to a MUST-.

In section 4.1.2, please change MODP group 2 to a MUST-.

In section 4.1.3, …
[Ballot discuss]
In section 4.1.1, please change 3DES-CBC to a MUST-.

In section 4.1.2, please change MODP group 2 to a MUST-.

In section 4.1.3, please change ENCR_3DES to a MUST-.
2004-04-08
06 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to Discuss from Yes by Russ Housley
2004-04-05
06 Thomas Narten
[Ballot comment]
In draft-ietf-ipsec-ikev2-algorithms-04.txt

The scope of this document could be a bit clearer, i.e, that the
transforms are about IKE, and not IPsec.

Rewording …
[Ballot comment]
In draft-ietf-ipsec-ikev2-algorithms-04.txt

The scope of this document could be a bit clearer, i.e, that the
transforms are about IKE, and not IPsec.

Rewording suggestion. Change:

> The Internet Key Exchange protocol provides for the negotiation of
> cryptographic algorithms between both end points of a cryptographic
> association. Different implementations of IPSec and IKE may provide
> different algorithms. However the IETF desires that all implementations
> should have some way to interoperate. This requires that some set of
> algorithms be specified as "mandatory to implement."

To something like:

The Internet Key Exchange protocol provides for the negotiation of
cryptographic algorithms between both end points of a cryptographic
association. Different implementations of IPSec and IKE may provide
different algorithms. However the IETF desires that all
implementations should have some way to interoperate. In particular,
this requires that IKE define a set of mandatory-to-implement
algorithms, since IKE itself uses such algorithms as part of its own
negotiations. This requires that some set of algorithms be specified
as "mandatory to implement" for IKE.


> Exchange (IKE [RFC2409] and IKEv2 [IKEv2]) provide a mechanism to
> negotiate which algorithms should be used in any even association.

what does "in any even association" mean?

> is necessary to specify a set of mandatory to implement algorithms to

mandatory-to-implement (multiple places)

> available. This document defines the current set of mandatory to
> implement algorithms for use of IKEv2 as well as specifying algorithms
> that should be implemented because they made be promoted to mandatory
> at some future time.

what does it mean "for use of"? to allow IKEv2 itself to negotiate
phase II? Suggested reword:

This document defines the current set of algorithms that are mandatory
to implement as part of IKEv2, as well as algorithms that should be
implemented because they may be promoted to mandatory at some future
time.


> There are several MODP groups that are defined for use in IKEv2. They

expand/define MODP?
2004-04-05
06 Thomas Narten
[Ballot comment]
The scope of this document could be a bit clearer, i.e, that the
transforms are about IKE, and not IPsec.

Rewording suggestion. Change: …
[Ballot comment]
The scope of this document could be a bit clearer, i.e, that the
transforms are about IKE, and not IPsec.

Rewording suggestion. Change:

> The Internet Key Exchange protocol provides for the negotiation of
> cryptographic algorithms between both end points of a cryptographic
> association. Different implementations of IPSec and IKE may provide
> different algorithms. However the IETF desires that all implementations
> should have some way to interoperate. This requires that some set of
> algorithms be specified as "mandatory to implement."

To something like:

The Internet Key Exchange protocol provides for the negotiation of
cryptographic algorithms between both end points of a cryptographic
association. Different implementations of IPSec and IKE may provide
different algorithms. However the IETF desires that all
implementations should have some way to interoperate. In particular,
this requires that IKE define a set of mandatory-to-implement
algorithms, since IKE itself uses such algorithms as part of its own
negotiations. This requires that some set of algorithms be specified
as "mandatory to implement" for IKE.


> Exchange (IKE [RFC2409] and IKEv2 [IKEv2]) provide a mechanism to
> negotiate which algorithms should be used in any even association.

what does "in any even association" mean?

> is necessary to specify a set of mandatory to implement algorithms to

mandatory-to-implement (multiple places)

> available. This document defines the current set of mandatory to
> implement algorithms for use of IKEv2 as well as specifying algorithms
> that should be implemented because they made be promoted to mandatory
> at some future time.

what does it mean "for use of"? to allow IKEv2 itself to negotiate
phase II? Suggested reword:

This document defines the current set of algorithms that are mandatory
to implement as part of IKEv2, as well as algorithms that should be
implemented because they may be promoted to mandatory at some future
time.


> There are several MODP groups that are defined for use in IKEv2. They

expand/define MODP?
2004-04-05
06 Thomas Narten
[Ballot discuss]
In:    - draft-ietf-ipsec-ui-suites-04.txt
      Cryptographic Suites for IPsec (Proposed Standard)

> A. IANA Considerations
>
> IANA will create a …
[Ballot discuss]
In:    - draft-ietf-ipsec-ui-suites-04.txt
      Cryptographic Suites for IPsec (Proposed Standard)

> A. IANA Considerations
>
> IANA will create a registry of strings used to identify cryptographic
> suites for IPsec. The entries in the registry will consist of a string
> and the RFC that defines the string.
>
> The initial values for the new registry are:
>
> Identifier    Defined in
> VPN-A        RFC [this document]
> VPN-B        RFC [this document]

IANA considerations needs to be clearer. Something like the following
would be more clear:

IANA is asked to create and maintain a registry entitled "IPsec
Cryptographic Suites". The registry consists of a string [XXX: does it
have any syntax or can it be literally anything??] and an RFC number defining
the associated transforms. New entries can be added to the registry
only through RFC publication [XXX: is there any review required? Can
anyone publishing any RFC ask to be listed?]

The initial values for the new registry are:

Identifier    Defined in
VPN-A        RFC [this document]
VPN-B        RFC [this document]
2004-04-05
06 Thomas Narten
[Ballot discuss]
> A. IANA Considerations
>
> IANA will create a registry of strings used to identify cryptographic
> suites for IPsec. The entries …
[Ballot discuss]
> A. IANA Considerations
>
> IANA will create a registry of strings used to identify cryptographic
> suites for IPsec. The entries in the registry will consist of a string
> and the RFC that defines the string.
>
> The initial values for the new registry are:
>
> Identifier    Defined in
> VPN-A        RFC [this document]
> VPN-B        RFC [this document]

IANA considerations needs to be clearer. Something like the following
would be more clear:

IANA is asked to create and maintain a registry entitled "IPsec
Cryptographic Suites". The registry consists of a string [XXX: does it
have any syntax or can it be literally anything??] and an RFC number defining
the associated transforms. New entries can be added to the registry
only through RFC publication [XXX: is there any review required? Can
anyone publishing any RFC ask to be listed?]

The initial values for the new registry are:

Identifier    Defined in
VPN-A        RFC [this document]
VPN-B        RFC [this document]
2004-04-05
06 Thomas Narten [Ballot Position Update] New position, Discuss, has been recorded for Thomas Narten by Thomas Narten
2004-04-02
06 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2004-04-02
06 Amy Vezza [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Amy Vezza
2004-04-02
06 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner
2004-04-02
06 Allison Mankin [Ballot Position Update] New position, No Objection, has been recorded for Allison Mankin by Allison Mankin
2004-04-02
06 Bert Wijnen [Ballot Position Update] New position, No Objection, has been recorded for Bert Wijnen by Bert Wijnen
2004-04-02
06 Jon Peterson [Ballot Position Update] Position for Jon Peterson has been changed to Yes from Undefined by Jon Peterson
2004-04-02
06 Jon Peterson [Ballot Position Update] New position, Undefined, has been recorded for Jon Peterson by Jon Peterson
2004-04-01
06 David Kessens [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens
2004-04-01
06 Alex Zinin [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin
2004-04-01
06 Harald Alvestrand
[Ballot comment]
draft-ietf-ipsec-ui-suites was reviewed by John Loughney, Gen-ART.
He pointed out that this document does NOT define an IANA registry for suite names, and …
[Ballot comment]
draft-ietf-ipsec-ui-suites was reviewed by John Loughney, Gen-ART.
He pointed out that this document does NOT define an IANA registry for suite names, and that it's extremely unclear how (or if) suite names should be "registered" in the future.
Given the amount of "reservation" of the strings "VPN-A" and "VPN-B" the document tries to do, that's odd.
Complete review entered as a document comment.
2004-04-01
06 Harald Alvestrand [Ballot Position Update] New position, No Objection, has been recorded for Harald Alvestrand by Harald Alvestrand
2004-03-29
06 Ted Hardie [Ballot Position Update] Position for Ted Hardie has been changed to No Objection from Undefined by Ted Hardie
2004-03-29
06 Ted Hardie [Ballot Position Update] New position, Undefined, has been recorded for Ted Hardie by Ted Hardie
2004-03-25
06 Steven Bellovin [Ballot Position Update] New position, Yes, has been recorded for Steve Bellovin by Steve Bellovin
2004-03-25
06 Scott Hollenbeck [Ballot comment]
I would suggest expanding the UI acronym on first use in draft-ietf-ipsec-ui-suites.
2004-03-25
06 (System) Ballot has been issued
2004-03-25
06 Scott Hollenbeck [Ballot Position Update] New position, No Objection, has been recorded for Scott Hollenbeck by Scott Hollenbeck
2004-03-25
06 Scott Hollenbeck Created "Approve" ballot
2004-03-23
06 Russ Housley State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Russ Housley
2004-03-23
06 Russ Housley Telechat date was changed to 2004-04-02 from  by Russ Housley
2004-03-23
06 Russ Housley Merged with draft-ietf-ipsec-ikev2-algorithms by Russ Housley
2004-03-23
06 Russ Housley Merged with draft-ietf-ipsec-ikev2-algorithms by Russ Housley
2004-03-23
06 Russ Housley Merged with draft-ietf-ipsec-ikev2-algorithms by Russ Housley
2004-03-22
06 Russ Housley State Changes to Waiting for AD Go-Ahead from In Last Call by Russ Housley
2004-02-27
06 Amy Vezza Last call sent
2004-02-27
06 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2004-02-27
06 Russ Housley State Changes to Last Call Requested from AD Evaluation by Russ Housley
2004-02-27
06 Russ Housley Last Call was requested by Russ Housley
2004-02-27
06 (System) Ballot writeup text was added
2004-02-27
06 (System) Last call text was added
2004-02-27
06 (System) Ballot approval text was added
2003-12-17
06 Russ Housley State Changes to AD Evaluation from Publication Requested by Russ Housley
2003-10-13
06 Russ Housley Draft Added by Russ Housley
2003-08-20
04 (System) New version available: draft-ietf-ipsec-ui-suites-04.txt
2003-07-31
03 (System) New version available: draft-ietf-ipsec-ui-suites-03.txt
2003-07-29
02 (System) New version available: draft-ietf-ipsec-ui-suites-02.txt
2003-06-13
01 (System) New version available: draft-ietf-ipsec-ui-suites-01.txt
2003-05-29
00 (System) New version available: draft-ietf-ipsec-ui-suites-00.txt