IP Security Working Group News
The IETF IP Security Working Group News
WG meetings held in Montreal:
Tuesday, June 25 at 1530 (opposite dhc, rolc)
Wednesday, June 26 at 1530 (opposite agentx, dhc)
Minutes of the WG Meetings
Official Archival Directory
December '95 meeting
July '95 meeting
July SKIP BOF '95
The Los Angeles meeting has concluded; minutes are presumably in the
directory.
The Montreal meeting has concluded; minutes are presumably in the
directory.
The San Jose meeting has concluded; minutes are presumably in the
directory.
Specifications
A draft related to IPSEC:
ICMP error messages.
In addition, there are drafts for key exchange protocols:
Related drafts include:
IPSEC Transforms:
The ESP Stream Transform, by G. Caronni, M. Waldvogel
HMAC-MD5: IP Authentication with Replay Prevention, by M. Oehler
and Rob Glenn.
HMAC-SHA: IP Authentication with Replay Prevention, by S. Chang
and Rob Glenn.
Keyed-MD5
for Message Authentication by H. Krawczyk
A combined integrity and encryption transform for ESP, using MD5 and DES by W. Simpson
Combined DES and MD5 transform for ESP by J. Hughes
Combined 3DES-CBC, HMAC and Replay Prevention Security Transform,
by N. Doraswamy
Internet Security Transform Enhancements by W. Simpson
RFC 1949 Scalable Multicast Key Distribution by A. Ballardie
Authenticated Firewall Traversal with IPsec by M. Richardson
IP Encapsulation within IP by C. Perkins
Internet Public Key Infrastructure
DSS Certificate Encodings
Secure DNS
DNS Security Extensions
DNS Secure Dynamic Updates
DNS Security As Map
The Public Key Login Protocol, D. Kemp
A One-Time Password System by N. Haller and C. Metz
Group Key Management Protocol (GKMP) Architecture, H. Harney, C. Muckenhirn
RFC 1948 Defending Against Sequence Number Attacks by S. Bellovin
Related documents by working group members include:
Some IPSEC weaknesses by Steve Bellovin (smb@research.att.com)
The SKEME key exchange protocol by Kraczyk et al.
A technical paper about the strength of keyed hash functions by Bellare et al.
Slides from the University of Arizona
presentation at the Dallas IPSEC WG meeting on key exchange
performance parameters are available in postscript.
RC5 encryption
RC5 encryption (informational RFC)
RC5 as ESP transform (informational RFC)
Explanatory paper
Implementations (source code):
ISAKMP
NRL's ESP/AH (a gzip'd tar file)
Photuris and ESP/AH in the xkernel environment (a large compressed tar file)
SKIP with ESP/AH.
SKIP in Europe.
Combined mail list archives
The
mailing list archives for ipsec, ipsec-dev, and dnssec are archived:
Mar 19 through May 26, 1996,
Jan 10 through Mar 19, 1996,
Oct 23 to Jan 10, 1996,
1995 through October 23,
with cross-references and subject-threaded links. Unless otherwise
stated, the mailing list expresses the personal opinions of the
contributors, not those of their employers.
No maintenance is being done below this point; the developer's
mailing list became inactive sometime in 1995
Developer's mail index
The developer's mailing list archive index.
Unless otherwise stated, the developer's mailing list expresses the
personal opinions of the contributors, not those of their employers.
Guide to developer's profiles:
Metzger, Piermont Info Sys,
Wagner and Bellovin, ATT,
Glen, NIST,
Frommer, RADGUARD,
Touch, ISI,
Fox, Morningstar,
Orman, University of Arizona,
Technical issues:
- SA manual interchange format, Bellovin.
- Support for multiple ESP modes/packet question,
- re-question,
clarification of question,
Housley answer re re-encryption,
Metzger answer,
clarification of question re utility not mechanism,
Metzger answer,
question per-connection vs. per-host keying,
Metzger answer,
utility of user selection question,
Metzger requests clarification,
- Location of authentication header in IPv4, question, Metzger answer.
- Diffie-Hellman times
- IPv4 header processing,
- invariant fields, spec change suggested limit auth to pshdr,partial concurrence, partial concurrence, commentary, concurrence.
- ignore options,
ratify question,
name specific options,
name specific options,
several answers,
etc.
-
header length and frag concerns, slow links (1,
2,
3,
re draft rfc on compression,
fragmentation comment,
time estimates).
- out-of-order fragments (1,
2,
3,
4,
5,
6)
- which fields can routers alter: 1,
2,
3,
4
- A Spoofing Attack?
- Photuris Q&A, and more