Response to "Solicitation of interest in ITU-T SG 17 initiative on business use of telecommunications/ICT security standards"
|From Contact||Pasi Eronen|
|Cc||Scott Bradner <email@example.com>
Georges Sebek <firstname.lastname@example.org>
Arkadiy Kremer <email@example.com>
Antonio Guimaraes <firstname.lastname@example.org>
Patrick Mwesigwa <email@example.com>
The Internet Engineering Task Force (IETF) Security Area would like to thank ITU-T Study Group 17 for the opportunity to comment on the new activity, "Business use of telecommunications/ICT security standards". The IETF has developed a number of security standards that could be included in this document based on the Study Group's proposed criteria. An initial list is provided below (in alphabetical order): * Cryptographic Message Syntax (CMS) * DNS Security (DNSSEC) * DomainKeys Identified Mail (DKIM) * Extensible Authentication Protocol (EAP) framework and authentication methods * Generic Security Service Application Program Interface (GSS-API) framework and mechanisms * HTTP authentication mechanisms and HTTP cookies * IPsec * Internet X.509 Public Key Infrastructure (PKIX) certificate profiles and protocols * Kerberos * Lightweight Directory Access Protocol (LDAP) * Remote Authentication Dial In User Service (RADIUS) and Diameter * S/MIME and OpenPGP * Secure Real-time Transport Protocol (SRTP) * Secure Shell (SSH) * Simple Authentication and Security Layer (SASL) framework and mechanisms * Transport Layer Security (TLS) The IETF Security Area does not have the resources to directly support this activity, but IETF protocol experts may be willing to assist in the development of summary sheets for specific protocols. We would invite Study Group 17 to contact the IETF Working Group responsible for the protocol for assistance if required.