Skip to main content

Camellia Encryption for Kerberos 5
RFC 6803

Revision differences

Document history

Date Rev. By Action
2016-11-30
02 (System) Closed request for Last Call review by GENART with state 'Unknown'
2015-10-14
02 (System) Notify list changed from krb-wg-chairs@ietf.org, draft-ietf-krb-wg-camellia-cts@ietf.org to (None)
2012-11-20
02 (System) RFC published
2012-10-09
02 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2012-10-04
02 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2012-10-03
02 (System) IANA Action state changed to Waiting on Authors from In Progress
2012-10-03
02 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent
2012-10-03
02 (System) IANA Action state changed to In Progress
2012-10-03
02 Amy Vezza State changed to Approved-announcement sent from Approved-announcement to be sent::Point Raised - writeup needed
2012-10-03
02 Amy Vezza IESG has approved the document
2012-10-03
02 Amy Vezza Closed "Approve" ballot
2012-10-03
02 Amy Vezza Ballot approval text was generated
2012-10-03
02 Amy Vezza Ballot writeup was changed
2012-10-02
02 Stephen Farrell Ballot writeup was changed
2012-10-01
02 Greg Hudson New version available: draft-ietf-krb-wg-camellia-cts-02.txt
2012-09-28
01 Tero Kivinen Request for Last Call review by SECDIR Completed: Ready with Issues. Reviewer: Joseph Salowey.
2012-09-27
01 Cindy Morgan State changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation
2012-09-27
01 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo
2012-09-27
01 Sean Turner
[Ballot comment]
From the secdir review:

As noted by Russ: is it random-to-key or random2key in s3/4?

In s4, please reference section 6 for random-to-key …
[Ballot comment]
From the secdir review:

As noted by Russ: is it random-to-key or random2key in s3/4?

In s4, please reference section 6 for random-to-key and RFC 3961 for k-truncate as well

In s3, what's the format for the string-to-key.

Encryption and decryption description in section 6 seems a little incomplete.  In particular the setting of newstate seems to be missing in the encryption.  In the decryption perhaps you should define how newIV is determined.
2012-09-27
01 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Objection from No Record
2012-09-27
01 Adrian Farrel
[Ballot comment]
I've cleared my Discuss after reading email from Ken Raeburn as designated expert.

However, Ken made a number of comments (captured below) that …
[Ballot comment]
I've cleared my Discuss after reading email from Ken Raeburn as designated expert.

However, Ken made a number of comments (captured below) that you may want to consider for a revised version...

> It might help to explicitly call out RFC3962 as the reference
> to use for the CTS description in section 6 where "CBC-CTS mode"
> is mentioned, as a couple different approaches have been discussed
> for handling the case where the plain text is a multiple of the
> block size.  (Do you swap the last cipher text blocks for
> consistency with the non-multiple case regardless of how full the
> last block is, or is the "stealing" only a fix for handling non-
> multiple cases and normal CBC should be used otherwise?  We went
> with always swapping, as done in RFC 2040 as well.)  My vague
> recollection is that it wasn't always clear from the various
> descriptions of CTS that you could find on the net at the time
> which way it should go, but I haven't looked into the matter in a
> long time.  It's probably best to discourage the reader from going
> and looking up CTS definitions from other, vague sources and
> possibly drawing different conclusions; if we want them to do the
> same as we do for AES, just point them at the AES spec.  The only
> other link between CTS as used here and RFC 3962 is in the
> introduction where the AES encryption types are mentioned, which
> may not be a strong enough link.
>
> Just adding "[RFC3962]" after the first use of "CBC-CTS mode" there
> should be adequate.
>
> That's the only thing I'd bring up with my designated-expert hat on
> -- a minor issue of clarity and interoperability, and I could
> possibly be convinced that it's clear enough already.
>
> But as long as I'm going over the document, a couple of very minor
> editorial points:
>
> Section 6 is called "Kerberos Algorithm Protocol Parameters" and
> section 7 is called "Checksum Parameters", but both are for Kerberos,
> and the first is for an encryption algorithm specifically.  I'd
> suggest using something like "Encryption Algorithm Parameters"
> (dropping "protocol" too) and "Checksum Algorithm Parameters",
> perhaps with "Kerberos" on the front of both, or not...
>
> Appendix A has the "author" (singular) acknowledging people for
> reviews and feedback but no contributions of text, and in the
> Author's Address section, Greg is listed as "editor" and no other
> names are given.  Is Greg the only author, in which case he doesn't
> need to be describe as "editor"?  Should some people be acknowledged
> for text contributions too?
2012-09-27
01 Adrian Farrel Ballot comment text updated for Adrian Farrel
2012-09-27
01 Adrian Farrel
[Ballot comment]
I've cleared my Discuss after reading email from Ken Raeburn as designated expert.

However, Ken made a number of comments (capturedbelow)that you may …
[Ballot comment]
I've cleared my Discuss after reading email from Ken Raeburn as designated expert.

However, Ken made a number of comments (capturedbelow)that you may want to consider for a revised version...

> It might help to explicitly call out RFC3962 as the reference to use for the CTS
> description in section 6 where "CBC-CTS mode" is mentioned, as a couple
> different approaches have been discussed for handling the case where the plain
> text is a multiple of the block size.  (Do you swap the last cipher text blocks for
> consistency with the non-multiple case regardless of how full the last block is, or
> is the "stealing" only a fix for handling non-multiple cases and normal CBC should
> be used otherwise?  We went with always swapping, as done in RFC 2040 as
> well.)  My vague recollection is that it wasn't always clear from the various
> descriptions of CTS that you could find on the net at the time which way it should
> go, but I haven't looked into the matter in a long time.  It's probably best to
> discourage the reader from going and looking up CTS definitions from other,
> vague sources and possibly drawing different conclusions; if we want them to do
> the same as we do for AES, just point them at the AES spec.  The only other link
> between CTS as used here and RFC 3962 is in the introduction where the AES
> encryption types are mentioned, which may not be a strong enough link.
>
> Just adding "[RFC3962]" after the first use of "CBC-CTS mode" there should be
> adequate.
>
> That's the only thing I'd bring up with my designated-expert hat on -- a minor
> issue of clarity and interoperability, and I could possibly be convinced that it's
> clear enough already.
>
> But as long as I'm going over the document, a couple of very minor editorial
> points:
>
> Section 6 is called "Kerberos Algorithm Protocol Parameters" and section 7 is
> called "Checksum Parameters", but both are for Kerberos, and the first is for an
> encryption algorithm specifically.  I'd suggest using something like "Encryption
> Algorithm Parameters" (dropping "protocol" too) and "Checksum Algorithm
> Parameters", perhaps with "Kerberos" on the front of both, or not...
>
> Appendix A has the "author" (singular) acknowledging people for reviews and
> feedback but no contributions of text, and in the Author's Address section, Greg
> is listed as "editor" and no other names are given.  Is Greg the only author, in
> which case he doesn't need to be describe as "editor"?  Should some people be
> acknowledged for text contributions too?
2012-09-27
01 Adrian Farrel Ballot comment text updated for Adrian Farrel
2012-09-27
01 Adrian Farrel
[Ballot comment]
I've cleared my Discuss after reading email from Ken Raeburn as designated expert.

However, Ken made a number of comments (capturedbelow)that you may …
[Ballot comment]
I've cleared my Discuss after reading email from Ken Raeburn as designated expert.

However, Ken made a number of comments (capturedbelow)that you may want to consider for a revised version...

> It might help to explicitly call out RFC3962 as the reference to use for the CTS
> description in section 6 where "CBC-CTS mode" is mentioned, as a couple
> different approaches have been discussed for handling the case where the plain
> text is a multiple of the block size.  (Do you swap the last cipher text blocks for
> consistency with the non-multiple case regardless of how full the last block is, or
> is the "stealing" only a fix for handling non-multiple cases and normal CBC should
> be used otherwise?  We went with always swapping, as done in RFC 2040 as
> well.)  My vague recollection is that it wasn't always clear from the various
> descriptions of CTS that you could find on the net at the time which way it should
> go, but I haven't looked into the matter in a long time.  It's probably best to
> discourage the reader from going and looking up CTS definitions from other,
> vague sources and possibly drawing different conclusions; if we want them to do
> the same as we do for AES, just point them at the AES spec.  The only other link
> between CTS as used here and RFC 3962 is in the introduction where the AES
> encryption types are mentioned, which may not be a strong enough link.
>
> Just adding "[RFC3962]" after the first use of "CBC-CTS mode" there should be
> adequate.
>
> That's the only thing I'd bring up with my designated-expert hat on -- a minor
> issue of clarity and interoperability, and I could possibly be convinced that it's
> clear enough already.
>
> But as long as I'm going over the document, a couple of very minor editorial
> points:
>
> Section 6 is called "Kerberos Algorithm Protocol Parameters" and section 7 is
> called "Checksum Parameters", but both are for Kerberos, and the first is for an
> encryption algorithm specifically.  I'd suggest using something like "Encryption
> Algorithm Parameters" (dropping "protocol" too) and "Checksum Algorithm
> Parameters", perhaps with "Kerberos" on the front of both, or not...
>
> Appendix A has the "author" (singular) acknowledging people for reviews and
> feedback but no contributions of text, and in the Author's Address section, Greg
> is listed as "editor" and no other names are given.  Is Greg the only author, in
> which case he doesn't need to be describe as "editor"?  Should some people be
> acknowledged for text contributions too?
2012-09-27
01 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss
2012-09-27
01 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2012-09-26
01 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Record from No Objection
2012-09-26
01 Sean Turner [Ballot Position Update] New position, No Objection, has been recorded for Sean Turner
2012-09-26
01 Adrian Farrel
[Ballot discuss]
A small process-related Discuss that the responsible AD should be able
to resolve without action from the authors.

The IANA allocation policy for …
[Ballot discuss]
A small process-related Discuss that the responsible AD should be able
to resolve without action from the authors.

The IANA allocation policy for the two registries is "Standards Action
or Expert Review". Since this is an Informational RFC, can you confirm
that the expert review has been carried out? The shepherd write-up is
silent on the issue.
2012-09-26
01 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded for Adrian Farrel
2012-09-26
01 Stephen Farrell State changed to IESG Evaluation from Waiting for AD Go-Ahead
2012-09-26
01 (System) State changed to Waiting for AD Go-Ahead from In Last Call
2012-09-25
01 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded for Ronald Bonica
2012-09-25
01 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded for Robert Sparks
2012-09-25
01 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant
2012-09-25
01 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2012-09-24
01 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2012-09-24
01 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2012-09-23
01 Russ Housley
[Ballot comment]

  The Gen-ART Review by Joel Halpern on 13-Sept-2012 makes two
  suggestions to improve the document:

  1.  The document seems to …
[Ballot comment]

  The Gen-ART Review by Joel Halpern on 13-Sept-2012 makes two
  suggestions to improve the document:

  1.  The document seems to use "random2key" (in section 3) and
  "random-to-key" (in section 4) to represent the same thing,
  apparently meaning the "random-to-key" function of section 6.

  2.  Section 6 defines Ki in a different way than section 4.
  Section 4 apparently uses K0 and Ki to mean K(0) and K(i) for
  the iteration.  (And then in the next line uses K1, K2, ... Kn
  for these, without parens.) But section 6, Ki is for a specific
  value in the encrypt/decrypt functions.  The simple solution
  would seem to be to consistently use parenthesis in section 4.
2012-09-23
01 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley
2012-09-21
01 Stephen Farrell Placed on agenda for telechat - 2012-09-27
2012-09-21
01 Stephen Farrell Ballot has been issued
2012-09-21
01 Stephen Farrell [Ballot Position Update] New position, Yes, has been recorded for Stephen Farrell
2012-09-21
01 Stephen Farrell Created "Approve" ballot
2012-09-21
01 Stephen Farrell Ballot writeup was changed
2012-09-19
01 Pearl Liang
IANA has reviewed draft-ietf-krb-wg-camellia-cts-01 and has the following comments:

IANA understands that, upon approval of this document, there are two IANA
actions which must be …
IANA has reviewed draft-ietf-krb-wg-camellia-cts-01 and has the following comments:

IANA understands that, upon approval of this document, there are two IANA
actions which must be completed.

First, in the Encryption Type subregistry of the Kerberos Parameters registry
located at:

http://www.iana.org/assignments/kerberos-parameters/kerberos-parameters.xml

two new Encryption Types are to be registered as follows:

etype: [ TBD ]
encryption type: camellia128-cts-cmac
Reference: [ RFC-to-be ]

etype: [ TBD ]
encryption type: camellia256-cts-cmac
Reference: [ RFC-to-be ]

Second, in the Kerberos Checksum Type Numbers subregistry of the Kerberos
Parameters registry located at:

http://www.iana.org/assignments/kerberos-parameters/kerberos-parameters.xml

two new Kerberos Checksum Type Numbers are to be registered as follows:

sumtype value: [ TBD ]
Checksum type: cmac-camellia128
checksum size: 16
Reference: [ RFC-to-be ]

sumtype value: [ TBD ]
Checksum type: cmac-camellia128
checksum size: 16
Reference: [ RFC-to-be ]

IANA understands these to be the only actions required to be completed
upon approval of this document.

Note: The actions requested in this document will not be completed
until the document has been approved for publication as an RFC.
2012-09-14
01 Jean Mahoney Request for Last Call review by GENART is assigned to Joel Halpern
2012-09-14
01 Jean Mahoney Request for Last Call review by GENART is assigned to Joel Halpern
2012-09-14
01 Tero Kivinen Request for Last Call review by SECDIR is assigned to Joseph Salowey
2012-09-14
01 Tero Kivinen Request for Last Call review by SECDIR is assigned to Joseph Salowey
2012-09-12
01 Amy Vezza
The following Last Call announcement was sent out:<br><br>From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
CC: <ietf-krb-wg@lists.anl.gov>
Reply-To: ietf@ietf.org
Subject: …
The following Last Call announcement was sent out:<br><br>From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
CC: <ietf-krb-wg@lists.anl.gov>
Reply-To: ietf@ietf.org
Subject: Last Call: <draft-ietf-krb-wg-camellia-cts-01.txt> (Camellia Encryption for Kerberos 5) to Informational RFC


The IESG has received a request from the Kerberos WG (krb-wg) to consider
the following document:
- 'Camellia Encryption for Kerberos 5'
  <draft-ietf-krb-wg-camellia-cts-01.txt> as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2012-09-26. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This document specifies two encryption types and two corresponding
  checksum types for the Kerberos cryptosystem framework defined in RFC
  3961
.  The new types use the Camellia block cipher in CBC-mode with
  ciphertext stealing and the CMAC algorithm for integrity protection.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-krb-wg-camellia-cts/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-krb-wg-camellia-cts/ballot/


The following IPR Declarations may be related to this I-D:

  http://datatracker.ietf.org/ipr/1880/



2012-09-12
01 Amy Vezza State changed to In Last Call from Last Call Requested
2012-09-12
01 Stephen Farrell Last call was requested
2012-09-12
01 Stephen Farrell Ballot approval text was generated
2012-09-12
01 Stephen Farrell Ballot writeup was generated
2012-09-12
01 Stephen Farrell State changed to Last Call Requested from AD Evaluation
2012-09-12
01 Stephen Farrell Last call announcement was generated
2012-09-12
(System) Posted related IPR disclosure: Stephen Farrell's Statement about IPR related to draft-ietf-krb-wg-camellia-cts-01 belonging to Nippon Telegraph and Telephone Company and Mitsubishi Electric Corporation
2012-09-07
01 Stephen Farrell State changed to AD Evaluation from Publication Requested
2012-09-05
01 Amy Vezza Note added 'The Document Shepherd for this document is Jeffrey Hutzelman (jhutz@cmu.edu).'
2012-09-05
01 Amy Vezza
This is a request to the IESG to approve publication of "Camellia
Encryption for Kerberos 5", draft-ietf-krb-wg-camellia-cts-01.txt
as an Informational RFC.  This document is a …
This is a request to the IESG to approve publication of "Camellia
Encryption for Kerberos 5", draft-ietf-krb-wg-camellia-cts-01.txt
as an Informational RFC.  This document is a product of the Kerberos
working group.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

  We are requesting publication as an Informational RFC. 

  The authors have requested publication on the standards track; however,
  there is no consensus within the working group to do so at this time.
  There is a possibility that a consensus may emerge in the future to
  adopt one or both of the enctypes defined in this document as mandatory
  to implement for Kerberos; if that happens, we will likely request that
  the document be reclassified as a Proposed Standard.  However, no such
  consensus exists at this time.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  This document specifies two encryption types and two corresponding
  checksum types for the Kerberos cryptosystem framework defined in RFC
  3961
.  The new types use the Camellia block cipher in CBC-mode with
  ciphertext stealing and the CMAC algorithm for integrity protection.


Working Group Summary

  This document represents the consensus of the Kerberos Working Group.


Document Quality

  At least one major Kerberos implementor plans to include support for
  the encryption and checksum types described in this document.


Personnel

  The Document Shepherd for this document is Jeffrey Hutzelman.
  The responsible Area Director is Stephen Farrell.



(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  I have reviewed this document, and any issues raised have been
  resolved to my satisfaction.  I believe the document is now ready
  for IETF-wide review and publication as an RFC.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed? 

  This document is the result of an effort which involved
  both individuals with extensive experience with the Kerberos
  cryptographic framework and those who have been involved in
  specifying support for Camellia in other IETF protocols.
  It has been extensively reviewed and discussed within the
  working group, and all technical issues raised have been
  resolved.  I have no concerns about the level of review
  this document has received.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  I don't believe any particular external review is needed for this
  document.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  I have no particular concerns with this document.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  All authors have confirmed that any required IPR disclosures have
  been filed.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  I have no particular concerns about this document.  NTT
  and Mitsubishi Electric have filed a joint IPR statement
  #1304, related to use of Camellia in Kerberos.  Similar
  disclosures had been filed previously related to IPsec,
  TLS, S/MIME, and OpenPGP.  This issue has been discussed
  briefly within the working group, and there were no
  objections to proceeding with this work once the IPR
  disclosure was filed.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

  There is consensus within the working group to publish this document.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  There have been no expressions of discontent.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

  This document has been run through the idnits tool, and was reviewed
  manually for compliance with requirements not checked by the automatic
  tool.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  No formal review criteria apply to this document.

(13) Have all references within this document been identified as
either normative or informative?

  References have been split appropriately.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  There are no normative references to other documents that are not
  ready for advancement.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in the
Last Call procedure.

  This document contains a normative reference to RFC3713,
  and informational document which describes the Camellia
  cipher.  We don't see a problem with this, even if the
  document is published on the standards track, as this is
  consistent with current practice within the IETF relating
  to descriptions of cryptographic algorithms.

  This document also contains normative references to two
  NIST special publications.  While these are not IETF
  documents, we feel they are suitably stable to be used as
  normative references by a protocol specification.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  This document does not change the status of any existing RFCs.
  As noted in the abstract and introduction, this document does specify
  new encryption and checksum types to be used within the framework
  defined by RFC3961.  However, it does not make any changes to the
  framework itself, and so does not update RFC3961.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

  This document defines new Kerberos encryption and checksum
  types, which require assignment of numbers in IANA-managed
  namespaces.  The IANA considerations section correctly
  identifies the required registrations.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  This document creates no registries requiring Expert Review.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  No part of this document is written in a formal language
  requiring such verification.


2012-09-05
01 Stephen Farrell Intended Status changed to Informational
2012-09-05
01 Stephen Farrell IESG process started in state Publication Requested
2012-09-04
01 Jeffrey Hutzelman IETF state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2012-09-04
01 Jeffrey Hutzelman Annotation tag Doc Shepherd Follow-up Underway cleared.
2012-03-09
01 Jeffrey Hutzelman IETF state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead
2012-03-09
01 Jeffrey Hutzelman Annotation tag Doc Shepherd Follow-up Underway set.
2012-03-09
01 Jeffrey Hutzelman Changed protocol writeup
2012-03-09
01 Jeffrey Hutzelman IETF state changed to Waiting for WG Chair Go-Ahead from WG Document
2012-03-08
01 Jeffrey Hutzelman Publication request sent
2012-03-08
01 Jeffrey Hutzelman
No consensus to publish on standards track; proceeding as Informational.
This still needs verification of the test vectors, if we can get that in a …
No consensus to publish on standards track; proceeding as Informational.
This still needs verification of the test vectors, if we can get that in a timely manner.
2012-03-08
01 Jeffrey Hutzelman Restoring state before revised ID was submitted
2012-03-08
01 Greg Hudson New version available: draft-ietf-krb-wg-camellia-cts-01.txt
2011-12-16
00 Jeffrey Hutzelman WGLC passed with no comments.
Authors have requested publication on standards track; no replies to that.
2011-12-16
00 Jeffrey Hutzelman IETF state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2011-12-16
00 Jeffrey Hutzelman WGLC issued 10-Nov-2011, expired 1-Dec-2011
2011-12-16
00 Jeffrey Hutzelman IETF state changed to In WG Last Call from WG Document
2011-10-06
00 (System) New version available: draft-ietf-krb-wg-camellia-cts-00.txt