| rfc9395xml2.original.xml | rfc9395.xml | |||
|---|---|---|---|---|
| <?xml version="1.0" encoding="US-ASCII"?> | <?xml version="1.0" encoding="UTF-8"?> | |||
| <!DOCTYPE rfc SYSTEM "rfc2629.dtd" [ | ||||
| <!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | <!DOCTYPE rfc [ | |||
| .2119.xml"> | <!ENTITY nbsp " "> | |||
| <!ENTITY RFC2407 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | <!ENTITY zwsp "​"> | |||
| .2407.xml"> | <!ENTITY nbhy "‑"> | |||
| <!ENTITY RFC2408 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | <!ENTITY wj "⁠"> | |||
| .2408.xml"> | ||||
| <!ENTITY RFC2409 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
| .2409.xml"> | ||||
| <!ENTITY RFC4303 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
| .4303.xml"> | ||||
| <!ENTITY RFC4306 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
| .4306.xml"> | ||||
| <!ENTITY RFC6407 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
| .6407.xml"> | ||||
| <!ENTITY RFC7296 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
| .7296.xml"> | ||||
| <!ENTITY RFC8174 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
| .8174.xml"> | ||||
| <!ENTITY RFC8221 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
| .8221.xml"> | ||||
| <!ENTITY RFC8247 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
| .8247.xml"> | ||||
| <!ENTITY RFC8784 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
| .8784.xml"> | ||||
| ]> | ]> | |||
| <?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?> | ||||
| <?rfc strict="yes" ?> | ||||
| <?rfc toc="yes"?> | ||||
| <?rfc tocdepth="4"?> | ||||
| <?rfc symrefs="yes"?> | ||||
| <?rfc sortrefs="yes" ?> | ||||
| <?rfc compact="yes" ?> | ||||
| <?rfc subcompact="no" ?> | ||||
| <rfc ipr="trust200902" | ||||
| updates="8221,8247" | ||||
| obsoletes="" | ||||
| category="std" | ||||
| docName="draft-ietf-ipsecme-ikev1-algo-to-historic-09"> | ||||
| <front> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" updates="8221, | |||
| <title abbrev="Deprecation of IKEv1 and some algorithms">Deprecation of IKEv | 8247" obsoletes="" docName="draft-ietf-ipsecme-ikev1-algo-to-historic-09" number | |||
| 1 and obsoleted algorithms</title> | ="9395" | |||
| submissionType="IETF" category="std" consensus="true" xml:lang="en" tocInclude=" | ||||
| true" | ||||
| tocDepth="4" symRefs="true" sortRefs="true" version="3"> | ||||
| <author initials='P.' surname="Wouters" fullname='Paul Wouters' role="editor"> | <front> | |||
| <organization>Aiven</organization> | <title abbrev="IKEv1 Deprecation">Deprecation of the Internet Key Exchange V | |||
| <address> | ersion 1 (IKEv1) Protocol and Obsoleted Algorithms</title> | |||
| <email>paul.wouters@aiven.io</email> | <seriesInfo name="RFC" value="9395"/> | |||
| </address> | <author initials="P." surname="Wouters" fullname="Paul Wouters" role="editor | |||
| "> | ||||
| <organization>Aiven</organization> | ||||
| <address> | ||||
| <email>paul.wouters@aiven.io</email> | ||||
| </address> | ||||
| </author> | </author> | |||
| <date/> | <date year="2023" month="April"/> | |||
| <area>General</area> | <area>sec</area> | |||
| <workgroup>Network</workgroup> | <workgroup>ipsecme</workgroup> | |||
| <keyword>IKEv1</keyword> | <keyword>IKEv1</keyword> | |||
| <keyword>IKEv2</keyword> | <keyword>IKEv2</keyword> | |||
| <keyword>IPsec</keyword> | <keyword>IPsec</keyword> | |||
| <keyword>IKE</keyword> | <keyword>IKE</keyword> | |||
| <abstract> | <abstract> | |||
| <t> | <t> | |||
| Internet Key Exchange version 1 (IKEv1) has been deprecated and its | Internet Key Exchange Version 1 (IKEv1) has been deprecated, and RFCs | |||
| specification in RFC2407, RFC2408 and RFC2409 have been moved to | 2407, 2408, and 2409 have been moved to Historic status. This document | |||
| Historic status. This document updates RFC 8221 and RFC 8247 to reflect | updates RFCs 8221 and 8247 to reflect the usage guidelines of old | |||
| the usage guidelines of old algorithms that are associated with | algorithms that are associated with IKEv1 and are not specified or | |||
| IKEv1, and are not specified or commonly implemented for IKEv2. This | commonly implemented for IKEv2. This document further updates the IANA reg | |||
| document further updates the IANA IKEv2 Transform Type registries | istries | |||
| to add a Status column where deprecation status can be listed. | for IKEv2 "Transform Type Values" by adding a "Status" column where the de | |||
| precation | ||||
| status can be listed. | ||||
| </t> | </t> | |||
| </abstract> | </abstract> | |||
| </front> | </front> | |||
| <middle> | <middle> | |||
| <section title="Introduction"> | <section numbered="true" toc="default"> | |||
| <name>Introduction</name> | ||||
| <t> | <t> | |||
| IKEv1 has been moved to Historic status. | IKEv1 has been moved to Historic status. IKEv1 <xref target="RFC2409" | |||
| IKEv1 <xref target="RFC2409"/> and its related documents for ISAKMP | format="default"/> and its related documents for the Internet Security | |||
| <xref target="RFC2408"/> and IPsec DOI <xref target="RFC2407"/> | Association and Key Management Protocol (ISAKMP) <xref target="RFC2408" | |||
| were obsoleted by IKEv2 <xref target="RFC4306"/> in December | format="default"/> and IPsec DOI <xref target="RFC2407" | |||
| 2005. The latest version of IKEv2 at the time of writing was | format="default"/> were obsoleted by IKEv2 <xref target="RFC4306" | |||
| published in 2014 in <xref target="RFC7296"/>. The Internet Key | format="default"/> in December 2005. The latest version of IKEv2 at the | |||
| Exchange (IKE) version 2 has replaced version 1 over 15 years ago. | time of writing was published in 2014 <xref target="RFC7296" | |||
| IKEv2 has now seen wide deployment and provides a full replacement | format="default"/>. Since IKEv2 replaced IKEv1 over 15 years ago, IKEv2 | |||
| for all IKEv1 functionality. No new modifications or new algorithms have | has now seen wide deployment, and it provides a full replacement for all | |||
| been accepted for IKEv1 for at least a decade. IKEv2 addresses | IKEv1 functionality. No new modifications or new algorithms have been | |||
| various issues present in IKEv1, such as IKEv1 being vulnerable | accepted for IKEv1 for at least a decade. IKEv2 addresses various issues | |||
| to amplification attacks. | present in IKEv1, such as IKEv1 being vulnerable to amplification | |||
| attacks. | ||||
| </t> | </t> | |||
| <t> | <t> | |||
| Algorithm implementation requirements and usage guidelines | Algorithm implementation requirements and usage guidelines | |||
| for IKEv2 <xref target="RFC8247"/> and ESP/AH <xref target="RFC8221"/> | for IKEv2 <xref target="RFC8247" format="default"/> and Encapsulating Sec urity Payload (ESP) and Authentication Header (AH) <xref target="RFC8221" format ="default"/> | |||
| gives guidance to implementors but limits that guidance to avoid | gives guidance to implementors but limits that guidance to avoid | |||
| broken or weak algorithms. These two RFCs do not deprecate algorithms tha t | broken or weak algorithms. These two RFCs do not deprecate algorithms tha t | |||
| have aged and are not in use, but leave these algorithms in | have aged and are not in use. Instead, they leave these algorithms in | |||
| a state of "MAY be used" by not mentioning them. This document deprecates | a state of "<bcp14>MAY</bcp14> be used" by not mentioning them. This docu | |||
| ment deprecates | ||||
| those unmentioned algorithms that are no longer advised but for which | those unmentioned algorithms that are no longer advised but for which | |||
| there are no known attacks resulting in their earlier deprecation. | there are no known attacks resulting in their earlier deprecation. | |||
| </t> | </t> | |||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | ||||
| <section title="Requirements Language"> | <name>Requirements Language</name> | |||
| <t> | ||||
| The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQU | ||||
| IRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL | ||||
| NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14> | ||||
| RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | ||||
| "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to | ||||
| be interpreted as | ||||
| described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> | ||||
| when, and only when, they appear in all capitals, as shown here. | ||||
| </t> | ||||
| </section> | ||||
| <section anchor="ikev1_historic" numbered="true" toc="default"> | ||||
| <name>RFCs 2407, 2408, and 2409 Are Historic</name> | ||||
| <t> | <t> | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | As IKEv1 is deprecated, systems running IKEv1 should be upgraded and | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", | ||||
| and "OPTIONAL" in this document are to be interpreted as described in | ||||
| BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only | ||||
| when, they appear in all capitals, as shown here. | ||||
| </t> | ||||
| </section> | ||||
| <section title="RFC2407, RFC2408 and RFC2409 are Historic" anchor="ikev1_hist | ||||
| oric"> | ||||
| <t> | ||||
| IKEv1 is deprecated. Systems running IKEv1 should be upgraded and | ||||
| reconfigured to run IKEv2. Systems that support IKEv1 but not | reconfigured to run IKEv2. Systems that support IKEv1 but not | |||
| IKEv2 are most likely also unsuitable candidates for continued | IKEv2 are most likely also unsuitable candidates for continued | |||
| operation: | operation for the following reasons: | |||
| <list style="symbols"> | </t> | |||
| <t> | <ul spacing="normal"> | |||
| IKEv1 development ceased over a decade ago and no new work will | <li> | |||
| IKEv1 development ceased over a decade ago, and no new work will | ||||
| happen. This poses the risk of unmaintained code in an otherwise | happen. This poses the risk of unmaintained code in an otherwise | |||
| supported product which can result in security vulnerabilities. | supported product, which can result in security vulnerabilities. | |||
| </t> | </li> | |||
| <t> | <li> | |||
| A number of IKEv1 systems have reached their End of Life and | A number of IKEv1 systems have reached their End of Life and, | |||
| therefor will never be patched by the vendor if a vulnerability | therefore, will never be patched by the vendor if a vulnerability | |||
| is found. | is found. | |||
| </t> | </li> | |||
| <t> | <li> | |||
| There are vendors that still provide updates for their equipment | There are vendors that still provide updates for their equipment | |||
| that supports IKEv1 and IKEv2, but have "frozen" their IKEv1 | that supports IKEv1 and IKEv2 but have "frozen" their IKEv1 | |||
| implementation. Such users might not be aware that they are | implementation. Such users might not be aware that they are | |||
| running unmaintained code with its associated security risks. | running unmaintained code with its associated security risks. | |||
| </t> | </li> | |||
| <t> | <li> | |||
| IKEv1 systems can be abused for packet amplification attacks, as | IKEv1 systems can be abused for packet amplification attacks, as | |||
| documented in the Security Bulletin <xref target="CVE-2016-5361"/>. | documented in the Security Bulletin <xref target="CVE-2016-5361" format="de | |||
| </t> | fault"/>. | |||
| <t> | </li> | |||
| <li> | ||||
| Great strides have been made in cryptography since IKEv1 development | Great strides have been made in cryptography since IKEv1 development | |||
| ceased. While some modern cryptographic algorithms were added to | ceased. While some modern cryptographic algorithms were added to | |||
| IKEv1, interoperability concerns mean that the defacto algorithms | IKEv1, interoperability concerns mean that the defacto algorithms | |||
| negotiated by IKEv1 will consist of dated or deprecated algorithms | negotiated by IKEv1 will consist of dated or deprecated algorithms, | |||
| like AES-CBC, SHA1, and Diffie-Hellman groups 1 or 2. IKEv2 provides | like AES-CBC, SHA1, and Diffie-Hellman groups 1 or 2. IKEv2 provides | |||
| state-of-the-art suite of cryptographic algorithms that IKEv1 lacks. | a state-of-the-art suite of cryptographic algorithms that IKEv1 lacks. | |||
| </t> | </li> | |||
| </ul> | ||||
| </list> | <t> | |||
| IKEv2 is a more secure protocol than IKEv1. For example, IKEv2 offers more | IKEv2 is a more secure protocol than IKEv1. For example, IKEv2 offers more | |||
| modern cryptographic primitives, proper defense against denial of service | modern cryptographic primitives, proper defense against denial-of-service | |||
| attacks, improved authentication via EAP methods, PAKE support and is | attacks, improved authentication via Extensible Authentication Protocol (EA | |||
| actively worked on with respect to defending against quantum computer attac | P) methods, and password-authenticated key exchange (PAKE) support. Also, IKEv2 | |||
| ks. | is | |||
| </t> | actively worked on with respect to defending against quantum-computer attac | |||
| <t> | ks. | |||
| </t> | ||||
| <t> | ||||
| IKEv1-only systems should be upgraded or replaced by systems supporting | IKEv1-only systems should be upgraded or replaced by systems supporting | |||
| IKEv2. IKEv2 implementations SHOULD NOT directly import IKEv1 configuration s | IKEv2. IKEv2 implementations <bcp14>SHOULD NOT</bcp14> directly import IKEv 1 configurations | |||
| without updating the cryptographic algorithms used. | without updating the cryptographic algorithms used. | |||
| </t> | </t> | |||
| </section> | </section> | |||
| <section anchor="feature_eq" numbered="true" toc="default"> | ||||
| <section title="IKEv1 feature equivalents for IKEv2" anchor="feature_eq"> | <name>IKEv1 Feature Equivalents for IKEv2</name> | |||
| <t> | <t> | |||
| A few notable IKEv1 features are not present in the IKEv2 core specificati on | A few notable IKEv1 features are not present in the IKEv2 core specificati on | |||
| <xref target="RFC7296"/> but are available for IKEv2 via an additional spe | <xref target="RFC7296" format="default"/> but are available for IKEv2 via | |||
| cification: | an additional specification. | |||
| </t> | </t> | |||
| <section anchor="ikev2_postq" numbered="true" toc="default"> | ||||
| <section title="IKEv2 postquantum support" anchor="ikev2_postq"> | <name>IKEv2 Post-Quantum Support</name> | |||
| <t> | <t> | |||
| IKEv1 and its way of using Preshared Keys (PSKs) protects against | IKEv1 and its way of using Preshared Keys (PSKs) protects against | |||
| quantum computer based attacks. IKEv2 updated its use of PSK to improve | quantum-computer-based attacks. IKEv2 updated its use of PSKs to improve | |||
| the error reporting, but at the expense of post-quantum security. If | the error reporting but at the expense of post-quantum security. If | |||
| post-quantum security is required, these systems should be migrated | post-quantum security is required, these systems should be migrated | |||
| to use IKEv2 Postquantum Preshared Keys (PPK) <xref target="RFC8784"/> | to use IKEv2 Post-quantum Preshared Keys (PPKs) <xref target="RFC8784" fo | |||
| </t> | rmat="default"/>. | |||
| </section> | </t> | |||
| </section> | ||||
| <section title="IKEv2 Labeled IPsec support" anchor="ikev2_labeled"> | <section anchor="ikev2_labeled" numbered="true" toc="default"> | |||
| <t> | <name>IKEv2 Labeled IPsec Support</name> | |||
| <t> | ||||
| Some IKEv1 implementations support Labeled IPsec, a method | Some IKEv1 implementations support Labeled IPsec, a method | |||
| to negotiate an additional Security Context selector to the | to negotiate an additional Security Context selector to the | |||
| SPD, but this method was never standardized in IKEv1. Those IKEv1 | Security Policy Database (SPD), but this method was never standardized in IKEv1. Those IKEv1 | |||
| systems that require Labeled IPsec should migrate to an | systems that require Labeled IPsec should migrate to an | |||
| IKEv2 system supporting Labeled IPsec as specified in | IKEv2 system supporting Labeled IPsec as specified in | |||
| <xref target="draft-ietf-ipsecme-labeled-ipsec"/>. | <xref target="I-D.ietf-ipsecme-labeled-ipsec" format="default"/>. | |||
| </t> | </t> | |||
| </section> | </section> | |||
| <section anchor="ikev2_groupsa" numbered="true" toc="default"> | ||||
| <section title="IKEv2 Group SA / Multicast support" anchor="ikev2_groupsa"> | <name>IKEv2 Group SA and Multicast Support</name> | |||
| <t> | <t> | |||
| The Group Domain of Interpretation (GDOI, <xref target="RFC6407"/>) proto | The Group Domain of Interpretation (GDOI) protocol <xref target="RFC6407" | |||
| col, | format="default"/>, | |||
| based on IKEv1 defines the support for Multicast Group SAs. For IKEv2, th | which is based on IKEv1, defines the support for Multicast Group SAs. For | |||
| is | IKEv2, this | |||
| work is currently in progress via <xref target="draft-ietf-ipsecme-g-ikev | work is currently in progress via <xref target="I-D.ietf-ipsecme-g-ikev2" | |||
| 2"/> | format="default"/>. | |||
| </t> | </t> | |||
| </section> | </section> | |||
| </section> | </section> | |||
| <section anchor="deprecating_algos" numbered="true" toc="default"> | ||||
| <section title="Deprecating obsolete algorithms" anchor="deprecating_algos"> | <name>Deprecating Obsolete Algorithms</name> | |||
| <t>This document deprecates the following algorithms: | <t>This document deprecates the following algorithms: | |||
| <list style="symbols"> | </t> | |||
| <t> Encryption Algorithms: RC5, IDEA, CAST, Blowfish, and the unspecified | <ul spacing="normal"> | |||
| 3IDEA, | <li> Encryption Algorithms: RC5, IDEA, CAST, Blowfish, and the unspecifi | |||
| ENCR_DES_IV64 and ENCR_DES_IV32</t> | ed 3IDEA, | |||
| <t> PRF Algorithms: the unspecified PRF_HMAC_TIGER</t> | ENCR_DES_IV64, and ENCR_DES_IV32</li> | |||
| <t> Integrity Algorithms: HMAC-MD5-128</t> | <li> PRF Algorithms: the unspecified PRF_HMAC_TIGER</li> | |||
| <t> Diffie-Hellman groups: none</t> | <li> Integrity Algorithms: HMAC-MD5-128</li> | |||
| </list> | <li> Diffie-Hellman groups: none</li> | |||
| </t> | </ul> | |||
| </section> | </section> | |||
| <section anchor="Security" title="Security Considerations"> | <section anchor="Security" numbered="true" toc="default"> | |||
| <t>There are only security benefits by deprecating IKEv1 for IKEv2. | <name>Security Considerations</name> | |||
| </t> | <t>There are only security benefits if IKEv1 is deprecated and IKEv2 is us | |||
| <t> | ed. | |||
| </t> | ||||
| <t> | ||||
| The deprecated algorithms have long been in disuse and are no longer | The deprecated algorithms have long been in disuse and are no longer | |||
| actively deployed or researched. It presents an unknown security | actively deployed or researched; this presents an unknown security | |||
| risk that is best avoided. Additionally, these algorithms not being | risk that is best avoided. Additionally, these algorithms not being | |||
| supported in implementations simplifies those implementations and | supported in implementations simplifies those implementations and | |||
| reduces the accidental use of these deprecated algorithms through | reduces the accidental use of deprecated algorithms through | |||
| misconfiguration or downgrade attacks. | misconfiguration or downgrade attacks. | |||
| </t> | </t> | |||
| </section> | </section> | |||
| <section anchor="IANA" numbered="true" toc="default"> | ||||
| <section anchor="IANA" title="IANA Considerations"> | <name>IANA Considerations</name> | |||
| <t>This document instructs IANA to insert the following line at the top | <t>IANA has added the following line at the top | |||
| of the Notes | of the Notes section of the "Internet Key Exchange (IKE) Attributes" | |||
| section of the 'Internet Key Exchange (IKE) Attributes' registry and the | and '"Magic Numbers" for ISAKMP Protocol' registries: "All | |||
| '"Magic Numbers" for ISAKMP Protocol' registry: All registries listed be | registries listed below have been closed. See RFC 9395." In addition, this | |||
| low have | document has been added to the "Reference" column in these two registries, and | |||
| been closed, see RFCxxxx. | their registration procedures have been changed to "Registry closed". | |||
| [Note to RFC Editor: change RFCxxx to this document's RFC number] | </t> | |||
| </t> | <t>IANA has added a "Status" column to the following IKEv2 "Transform Type | |||
| Values" registries: | ||||
| <t>This document further instructs IANA to add an additional Status colu | </t> | |||
| mn to | <ul empty="true" spacing="compact"> | |||
| the IKEv2 Transform Type registries and mark the following entries as DE | <li>Transform Type 1 - Encryption Algorithm Transform IDs</li> | |||
| PRECATED: | <li>Transform Type 2 - Pseudorandom Function Transform IDs</li> | |||
| <figure align="center" anchor="iana_requests_type1"> | <li>Transform Type 3 - Integrity Algorithm Transform IDs</li> | |||
| <artwork align="left"><![CDATA[ | <li>Transform Type 4 - Key Exchange Method Transform IDs</li> | |||
| </ul> | ||||
| Transform Type 1 - Encryption Algorithm IDs | <t> | |||
| Also, the following entries have been marked as DEPRECATED: | ||||
| Number Name Status | </t> | |||
| ------ --------------- ------ | ||||
| 1 ENCR_DES_IV64 DEPRECATED [this document] | ||||
| 2 ENCR_DES DEPRECATED [RFC8247] | ||||
| 4 ENCR_RC5 DEPRECATED [this document] | ||||
| 5 ENCR_IDEA DEPRECATED [this document] | ||||
| 6 ENCR_CAST DEPRECATED [this document] | ||||
| 7 ENCR_BLOWFISH DEPRECATED [this document] | ||||
| 8 ENCR_3IDEA DEPRECATED [this document] | ||||
| 9 ENCR_DES_IV32 DEPRECATED [this document] | ||||
| ]]></artwork> | ||||
| </figure> | ||||
| <figure align="center" anchor="iana_requests_type2"> | ||||
| <artwork align="left"><![CDATA[ | ||||
| Transform Type 2 - Pseudorandom Function Transform IDs | ||||
| Number Name Status | ||||
| ------ ------------ ---------- | ||||
| 1 PRF_HMAC_MD5 DEPRECATED [RFC8247] | ||||
| 3 PRF_HMAC_TIGER DEPRECATED [this document] | ||||
| ]]></artwork> | ||||
| </figure> | ||||
| <figure align="center" anchor="iana_requests_typ3"> | ||||
| <artwork align="left"><![CDATA[ | ||||
| Transform Type 3 - Integrity Algorithm Transform IDs | <table anchor="iana_requests_type1" align="center"> | |||
| <name>Transform Type 1 - Encryption Algorithm Transform IDs</name> | ||||
| <thead> | ||||
| <tr> | ||||
| <th>Number</th> | ||||
| <th>Name</th> | ||||
| <th>Status</th> | ||||
| </tr> | ||||
| </thead> | ||||
| <tbody> | ||||
| <tr> | ||||
| <td>1</td> | ||||
| <td>ENCR_DES_IV64</td> | ||||
| <td>DEPRECATED (RFC 9395)</td> | ||||
| </tr> | ||||
| <tr> | ||||
| <td>2</td> | ||||
| <td>ENCR_DES</td> | ||||
| <td>DEPRECATED <xref target="RFC8247" format="default"/></td> | ||||
| </tr> | ||||
| <tr> | ||||
| <td>4</td> | ||||
| <td>ENCR_RC5</td> | ||||
| <td>DEPRECATED (RFC 9395)</td> | ||||
| </tr> | ||||
| <tr> | ||||
| <td>5</td> | ||||
| <td>ENCR_IDEA</td> | ||||
| <td>DEPRECATED (RFC 9395)</td> | ||||
| </tr> | ||||
| <tr> | ||||
| <td>6</td> | ||||
| <td>ENCR_CAST</td> | ||||
| <td>DEPRECATED (RFC 9395)</td> | ||||
| </tr> | ||||
| <tr> | ||||
| <td>7</td> | ||||
| <td>ENCR_BLOWFISH</td> | ||||
| <td>DEPRECATED (RFC 9395)</td> | ||||
| </tr> | ||||
| <tr> | ||||
| <td>8</td> | ||||
| <td>ENCR_3IDEA</td> | ||||
| <td>DEPRECATED (RFC 9395)</td> | ||||
| </tr> | ||||
| <tr> | ||||
| <td>9</td> | ||||
| <td>ENCR_DES_IV32</td> | ||||
| <td>DEPRECATED (RFC 9395)</td> | ||||
| </tr> | ||||
| </tbody> | ||||
| </table> | ||||
| Number Name Status | <table anchor="iana_requests_type2" align="center"> | |||
| ------ ----------------- ---------- | <name>Transform Type 2 - Pseudorandom Function Transform IDs</name> | |||
| 1 AUTH_HMAC_MD5_96 DEPRECATED [RFC8247] | <thead> | |||
| 3 AUTH_DES_MAC DEPRECATED [RFC8247] | <tr> | |||
| 4 AUTH_KPDK_MD5 DEPRECATED [RFC8247] | <th>Number</th> | |||
| 6 AUTH_HMAC_MD5_128 DEPRECATED [this document] | <th>Name</th> | |||
| 7 AUTH_HMAC_SHA1_160 DEPRECATED [this document] | <th>Status</th> | |||
| ]]></artwork> | </tr> | |||
| </figure> | </thead> | |||
| <figure align="center" anchor="iana_requests_type4"> | <tbody> | |||
| <artwork align="left"><![CDATA[ | <tr> | |||
| <td>1</td> | ||||
| <td>PRF_HMAC_MD5</td> | ||||
| <td>DEPRECATED <xref target="RFC8247" format="default"/></td> | ||||
| </tr> | ||||
| <tr> | ||||
| <td>3</td> | ||||
| <td>PRF_HMAC_TIGER</td> | ||||
| <td>DEPRECATED (RFC 9395)</td> | ||||
| </tr> | ||||
| </tbody> | ||||
| </table> | ||||
| Transform Type 4 - Diffie Hellman Group Transform IDs | <table anchor="iana_requests_typ3" align="center"> | |||
| <name>Transform Type 3 - Integrity Algorithm Transform IDs</name> | ||||
| <thead> | ||||
| <tr> | ||||
| <th>Number</th> | ||||
| <th>Name</th> | ||||
| <th>Status</th> | ||||
| </tr> | ||||
| </thead> | ||||
| <tbody> | ||||
| <tr> | ||||
| <td>1</td> | ||||
| <td>AUTH_HMAC_MD5_96</td> | ||||
| <td>DEPRECATED <xref target="RFC8247" format="default"/></td> | ||||
| </tr> | ||||
| <tr> | ||||
| <td>3</td> | ||||
| <td>AUTH_DES_MAC</td> | ||||
| <td>DEPRECATED <xref target="RFC8247" format="default"/></td> | ||||
| </tr> | ||||
| <tr> | ||||
| <td>4</td> | ||||
| <td>AUTH_KPDK_MD5</td> | ||||
| <td>DEPRECATED <xref target="RFC8247" format="default"/></td> | ||||
| </tr> | ||||
| <tr> | ||||
| <td>6</td> | ||||
| <td>AUTH_HMAC_MD5_128</td> | ||||
| <td>DEPRECATED (RFC 9395)</td> | ||||
| </tr> | ||||
| <tr> | ||||
| <td>7</td> | ||||
| <td>AUTH_HMAC_SHA1_160</td> | ||||
| <td>DEPRECATED (RFC 9395)</td> | ||||
| </tr> | ||||
| </tbody> | ||||
| </table> | ||||
| Number Name Status | <table anchor="iana_requests_type4" align="center"> | |||
| ------ ---------------------------- ---------- | <name>Transform Type 4 - Key Exchange Method Transform IDs</name> | |||
| 1 768-bit MODP Group DEPRECATED [RFC8247] | <thead> | |||
| 22 1024-bit MODP Group with | <tr> | |||
| 160-bit Prime Order Subgroup DEPRECATED [RFC8247] | <th>Number</th> | |||
| ]]></artwork> | <th>Name</th> | |||
| </figure> | <th>Status</th> | |||
| </tr> | ||||
| </thead> | ||||
| <tbody> | ||||
| <tr> | ||||
| <td>1</td> | ||||
| <td>768-bit MODP Group</td> | ||||
| <td>DEPRECATED <xref target="RFC8247" format="default"/></td> | ||||
| </tr> | ||||
| <tr> | ||||
| <td>22</td> | ||||
| <td>1024-bit MODP Group with 160-bit Prime Order Subgroup</td> | ||||
| <td>DEPRECATED <xref target="RFC8247" format="default"/></td> | ||||
| </tr> | ||||
| </tbody> | ||||
| </table> | ||||
| <t> | ||||
| All entries not mentioned here should receive no value in the new Status field. | All entries not mentioned here should receive no value in the new Status field. | |||
| </t> | </t> | |||
| </section> | </section> | |||
| </middle> | </middle> | |||
| <back> | <back> | |||
| <references title="Normative References"> | <displayreference target="I-D.ietf-ipsecme-labeled-ipsec" to="LABELED-IPSEC"/> | |||
| &RFC2119; | <displayreference target="I-D.ietf-ipsecme-g-ikev2" to="G-IKEV2"/> | |||
| &RFC8174; | ||||
| &RFC8247; | <references> | |||
| </references> | <name>References</name> | |||
| <references title="Informative References"> | <references> | |||
| &RFC2407; | <name>Normative References</name> | |||
| &RFC2408; | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2 | |||
| &RFC2409; | 119.xml"/> | |||
| &RFC6407; | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8 | |||
| &RFC4306; | 174.xml"/> | |||
| &RFC7296; | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8 | |||
| &RFC8221; | 247.xml"/> | |||
| &RFC8784; | </references> | |||
| <reference anchor='draft-ietf-ipsecme-labeled-ipsec'> | <references> | |||
| <front> | <name>Informative References</name> | |||
| <title>Labeled IPsec Traffic Selector support for IKEv2</title> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2 | |||
| <author initials='P.' surname="Wouters" fullname='Paul Wouters'> | 407.xml"/> | |||
| </author> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2 | |||
| <author fullname="Sahana Prasad" initials="S." surname="Prasad"> | 408.xml"/> | |||
| </author> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2 | |||
| <date month='October' day='25' year='2021' /> | 409.xml"/> | |||
| <abstract> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6 | |||
| <t> | 407.xml"/> | |||
| This document defines a new Traffic Selector (TS) Type for | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4 | |||
| Internet Key Exchange version 2 to add support for negotiating | 306.xml"/> | |||
| Mandatory Access Control (MAC) security labels as a traffic selector | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7 | |||
| of the Security Policy Database (SPD). Security Labels for IPsec | 296.xml"/> | |||
| are also known as "Labeled IPsec". The new TS type is TS_SECLABEL, | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8 | |||
| which consists of a variable length opaque field specifying the | 221.xml"/> | |||
| security label. This document updates the IKEv2 TS negotiation | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8 | |||
| specified in RFC 7296 Section 2.9. | 784.xml"/> | |||
| </t> | ||||
| </abstract> | <!-- [I-D.ietf-ipsecme-labeled-ipsec] IESG state Publication Requested as of 4/2 | |||
| </front> | 1/23 --> | |||
| <seriesInfo name='Internet-Draft' value='draft-ietf-ipsecme-labeled-ipsec' | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D | |||
| /> | .ietf-ipsecme-labeled-ipsec.xml"/> | |||
| <format type='TXT' | ||||
| target='https://tools.ietf.org/id/draft-ietf-ipsecme-labeled-ipsec-0 | ||||
| 6.txt' /> | ||||
| </reference> | ||||
| <reference anchor='draft-ietf-ipsecme-g-ikev2'> | ||||
| <front> | ||||
| <title>Group Key Management using IKEv2</title> | ||||
| <author initials='V.' surname="Smyslov" fullname='Valery Smyslov'> | ||||
| <organization>ELVIS-PLUS</organization> | ||||
| </author> | ||||
| <author fullname="Brian Weis" initials="B." surname="Weis"> | ||||
| <organization>Independent</organization> | ||||
| </author> | ||||
| <date month='January' day='11' year='2021' /> | ||||
| <abstract> | ||||
| <t> | ||||
| This document presents an extension to the Internet Key Exchange | ||||
| version 2 (IKEv2) protocol for the purpose of a group key management. | ||||
| The protocol is in conformance with the Multicast Security (MSEC) key | ||||
| management architecture, which contains two components: member | ||||
| registration and group rekeying. Both components require a Group | ||||
| Controller/Key Server to download IPsec group security associations | ||||
| to authorized members of a group. The group members then exchange IP | ||||
| multicast or other group traffic as IPsec packets. This document | ||||
| obsoletes RFC 6407. | ||||
| </t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name='Internet-Draft' value='draft-ietf-ipsecme-g-ikev2' /> | ||||
| <format type='TXT' | ||||
| target='https://www.ietf.org/archive/id/draft-ietf-ipsecme-g-ikev2-0 | ||||
| 3.txt' /> | ||||
| </reference> | ||||
| <reference anchor="CVE-2016-5361" target="https://nvd.nist.gov/vuln/detail/CV | ||||
| E-2016-5361"> | ||||
| <front> | ||||
| <title>National Vulnerability Database - CVE-2016-5361</title> | ||||
| <author> | ||||
| <organization>National Institute of Science and Technology (NIST)</o | ||||
| rganization> | ||||
| </author> | ||||
| <date day="16" month="June" year="2016"/> | ||||
| </front> | ||||
| </reference> | ||||
| <!-- [I-D.ietf-ipsecme-g-ikev2] IESG state I-D Exists as of 4/21/23 --> | ||||
| <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D | ||||
| .draft-ietf-ipsecme-g-ikev2.xml"/> | ||||
| <reference anchor="CVE-2016-5361" target="https://nvd.nist.gov/vuln/deta | ||||
| il/CVE-2016-5361"> | ||||
| <front> | ||||
| <title>CVE-2016-5361 Detail</title> | ||||
| <author> | ||||
| <organization>NIST National Vulnerability Database</organization> | ||||
| </author> | ||||
| <date day="16" month="June" year="2016"/> | ||||
| </front> | ||||
| </reference> | ||||
| </references> | ||||
| </references> | </references> | |||
| </back> | </back> | |||
| </rfc> | </rfc> | |||
| End of changes. 42 change blocks. | ||||
| 321 lines changed or deleted | 369 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||