rfc9395xml2.original.xml | rfc9395.xml | |||
---|---|---|---|---|
<?xml version="1.0" encoding="US-ASCII"?> | <?xml version='1.0' encoding='utf-8'?> | |||
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [ | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" conse | |||
nsus="true" docName="draft-ietf-ipsecme-ikev1-algo-to-historic-09" indexInclude= | ||||
<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | "true" ipr="trust200902" number="9395" prepTime="2023-04-24T15:26:03" scripts="C | |||
.2119.xml"> | ommon,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="4" t | |||
<!ENTITY RFC2407 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ocInclude="true" updates="8221,8247" xml:lang="en"> | |||
.2407.xml"> | <link href="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev1-algo-to- | |||
<!ENTITY RFC2408 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | historic-09" rel="prev"/> | |||
.2408.xml"> | <link href="https://dx.doi.org/10.17487/rfc9395" rel="alternate"/> | |||
<!ENTITY RFC2409 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | <link href="urn:issn:2070-1721" rel="alternate"/> | |||
.2409.xml"> | ||||
<!ENTITY RFC4303 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
.4303.xml"> | ||||
<!ENTITY RFC4306 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
.4306.xml"> | ||||
<!ENTITY RFC6407 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
.6407.xml"> | ||||
<!ENTITY RFC7296 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
.7296.xml"> | ||||
<!ENTITY RFC8174 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
.8174.xml"> | ||||
<!ENTITY RFC8221 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
.8221.xml"> | ||||
<!ENTITY RFC8247 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
.8247.xml"> | ||||
<!ENTITY RFC8784 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC | ||||
.8784.xml"> | ||||
]> | ||||
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?> | ||||
<?rfc strict="yes" ?> | ||||
<?rfc toc="yes"?> | ||||
<?rfc tocdepth="4"?> | ||||
<?rfc symrefs="yes"?> | ||||
<?rfc sortrefs="yes" ?> | ||||
<?rfc compact="yes" ?> | ||||
<?rfc subcompact="no" ?> | ||||
<rfc ipr="trust200902" | ||||
updates="8221,8247" | ||||
obsoletes="" | ||||
category="std" | ||||
docName="draft-ietf-ipsecme-ikev1-algo-to-historic-09"> | ||||
<front> | <front> | |||
<title abbrev="Deprecation of IKEv1 and some algorithms">Deprecation of IKEv | <title abbrev="IKEv1 Deprecation">Deprecation of the Internet Key Exchange V | |||
1 and obsoleted algorithms</title> | ersion 1 (IKEv1) Protocol and Obsoleted Algorithms</title> | |||
<seriesInfo name="RFC" value="9395" stream="IETF"/> | ||||
<author initials='P.' surname="Wouters" fullname='Paul Wouters' role="editor"> | <author initials="P." surname="Wouters" fullname="Paul Wouters" role="editor | |||
<organization>Aiven</organization> | "> | |||
<address> | <organization showOnFrontPage="true">Aiven</organization> | |||
<email>paul.wouters@aiven.io</email> | <address> | |||
</address> | <email>paul.wouters@aiven.io</email> | |||
</address> | ||||
</author> | </author> | |||
<date/> | <date month="04" year="2023"/> | |||
<area>General</area> | <area>sec</area> | |||
<workgroup>Network</workgroup> | <workgroup>ipsecme</workgroup> | |||
<keyword>IKEv1</keyword> | <keyword>IKEv1</keyword> | |||
<keyword>IKEv2</keyword> | <keyword>IKEv2</keyword> | |||
<keyword>IPsec</keyword> | <keyword>IPsec</keyword> | |||
<keyword>IKE</keyword> | <keyword>IKE</keyword> | |||
<abstract pn="section-abstract"> | ||||
<abstract> | <t indent="0" pn="section-abstract-1"> | |||
<t> | Internet Key Exchange Version 1 (IKEv1) has been deprecated, and RFCs | |||
Internet Key Exchange version 1 (IKEv1) has been deprecated and its | 2407, 2408, and 2409 have been moved to Historic status. This document | |||
specification in RFC2407, RFC2408 and RFC2409 have been moved to | updates RFCs 8221 and 8247 to reflect the usage guidelines of old | |||
Historic status. This document updates RFC 8221 and RFC 8247 to reflect | algorithms that are associated with IKEv1 and are not specified or | |||
the usage guidelines of old algorithms that are associated with | commonly implemented for IKEv2. This document further updates the IANA reg | |||
IKEv1, and are not specified or commonly implemented for IKEv2. This | istries | |||
document further updates the IANA IKEv2 Transform Type registries | for IKEv2 "Transform Type Values" by adding a "Status" column where the de | |||
to add a Status column where deprecation status can be listed. | precation | |||
status can be listed. | ||||
</t> | </t> | |||
</abstract> | </abstract> | |||
<boilerplate> | ||||
<section anchor="status-of-memo" numbered="false" removeInRFC="false" toc= | ||||
"exclude" pn="section-boilerplate.1"> | ||||
<name slugifiedName="name-status-of-this-memo">Status of This Memo</name | ||||
> | ||||
<t indent="0" pn="section-boilerplate.1-1"> | ||||
This is an Internet Standards Track document. | ||||
</t> | ||||
<t indent="0" pn="section-boilerplate.1-2"> | ||||
This document is a product of the Internet Engineering Task Force | ||||
(IETF). It represents the consensus of the IETF community. It has | ||||
received public review and has been approved for publication by | ||||
the Internet Engineering Steering Group (IESG). Further | ||||
information on Internet Standards is available in Section 2 of | ||||
RFC 7841. | ||||
</t> | ||||
<t indent="0" pn="section-boilerplate.1-3"> | ||||
Information about the current status of this document, any | ||||
errata, and how to provide feedback on it may be obtained at | ||||
<eref target="https://www.rfc-editor.org/info/rfc9395" brackets="non | ||||
e"/>. | ||||
</t> | ||||
</section> | ||||
<section anchor="copyright" numbered="false" removeInRFC="false" toc="excl | ||||
ude" pn="section-boilerplate.2"> | ||||
<name slugifiedName="name-copyright-notice">Copyright Notice</name> | ||||
<t indent="0" pn="section-boilerplate.2-1"> | ||||
Copyright (c) 2023 IETF Trust and the persons identified as the | ||||
document authors. All rights reserved. | ||||
</t> | ||||
<t indent="0" pn="section-boilerplate.2-2"> | ||||
This document is subject to BCP 78 and the IETF Trust's Legal | ||||
Provisions Relating to IETF Documents | ||||
(<eref target="https://trustee.ietf.org/license-info" brackets="none | ||||
"/>) in effect on the date of | ||||
publication of this document. Please review these documents | ||||
carefully, as they describe your rights and restrictions with | ||||
respect to this document. Code Components extracted from this | ||||
document must include Revised BSD License text as described in | ||||
Section 4.e of the Trust Legal Provisions and are provided without | ||||
warranty as described in the Revised BSD License. | ||||
</t> | ||||
</section> | ||||
</boilerplate> | ||||
<toc> | ||||
<section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" p | ||||
n="section-toc.1"> | ||||
<name slugifiedName="name-table-of-contents">Table of Contents</name> | ||||
<ul bare="true" empty="true" indent="2" spacing="compact" pn="section-to | ||||
c.1-1"> | ||||
<li pn="section-toc.1-1.1"> | ||||
<t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref der | ||||
ivedContent="1" format="counter" sectionFormat="of" target="section-1"/>. <xref | ||||
derivedContent="" format="title" sectionFormat="of" target="name-introduction"> | ||||
Introduction</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.2"> | ||||
<t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref der | ||||
ivedContent="2" format="counter" sectionFormat="of" target="section-2"/>. <xref | ||||
derivedContent="" format="title" sectionFormat="of" target="name-requirements-l | ||||
anguage">Requirements Language</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.3"> | ||||
<t indent="0" keepWithNext="true" pn="section-toc.1-1.3.1"><xref der | ||||
ivedContent="3" format="counter" sectionFormat="of" target="section-3"/>. <xref | ||||
derivedContent="" format="title" sectionFormat="of" target="name-rfcs-2407-2408 | ||||
-and-2409-are">RFCs 2407, 2408, and 2409 Are Historic</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.4"> | ||||
<t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" form | ||||
at="counter" sectionFormat="of" target="section-4"/>. <xref derivedContent="" f | ||||
ormat="title" sectionFormat="of" target="name-ikev1-feature-equivalents-f">IKEv1 | ||||
Feature Equivalents for IKEv2</xref></t> | ||||
<ul bare="true" empty="true" indent="2" spacing="compact" pn="sectio | ||||
n-toc.1-1.4.2"> | ||||
<li pn="section-toc.1-1.4.2.1"> | ||||
<t indent="0" pn="section-toc.1-1.4.2.1.1"><xref derivedContent= | ||||
"4.1" format="counter" sectionFormat="of" target="section-4.1"/>. <xref derived | ||||
Content="" format="title" sectionFormat="of" target="name-ikev2-post-quantum-sup | ||||
port">IKEv2 Post-Quantum Support</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.4.2.2"> | ||||
<t indent="0" pn="section-toc.1-1.4.2.2.1"><xref derivedContent= | ||||
"4.2" format="counter" sectionFormat="of" target="section-4.2"/>. <xref derived | ||||
Content="" format="title" sectionFormat="of" target="name-ikev2-labeled-ipsec-su | ||||
pport">IKEv2 Labeled IPsec Support</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.4.2.3"> | ||||
<t indent="0" pn="section-toc.1-1.4.2.3.1"><xref derivedContent= | ||||
"4.3" format="counter" sectionFormat="of" target="section-4.3"/>. <xref derived | ||||
Content="" format="title" sectionFormat="of" target="name-ikev2-group-sa-and-mul | ||||
ticas">IKEv2 Group SA and Multicast Support</xref></t> | ||||
</li> | ||||
</ul> | ||||
</li> | ||||
<li pn="section-toc.1-1.5"> | ||||
<t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" form | ||||
at="counter" sectionFormat="of" target="section-5"/>. <xref derivedContent="" f | ||||
ormat="title" sectionFormat="of" target="name-deprecating-obsolete-algori">Depre | ||||
cating Obsolete Algorithms</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.6"> | ||||
<t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" form | ||||
at="counter" sectionFormat="of" target="section-6"/>. <xref derivedContent="" f | ||||
ormat="title" sectionFormat="of" target="name-security-considerations">Security | ||||
Considerations</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.7"> | ||||
<t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" form | ||||
at="counter" sectionFormat="of" target="section-7"/>. <xref derivedContent="" f | ||||
ormat="title" sectionFormat="of" target="name-iana-considerations">IANA Consider | ||||
ations</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.8"> | ||||
<t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" form | ||||
at="counter" sectionFormat="of" target="section-8"/>. <xref derivedContent="" f | ||||
ormat="title" sectionFormat="of" target="name-references">References</xref></t> | ||||
<ul bare="true" empty="true" indent="2" spacing="compact" pn="sectio | ||||
n-toc.1-1.8.2"> | ||||
<li pn="section-toc.1-1.8.2.1"> | ||||
<t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent= | ||||
"8.1" format="counter" sectionFormat="of" target="section-8.1"/>. <xref derived | ||||
Content="" format="title" sectionFormat="of" target="name-normative-references"> | ||||
Normative References</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.8.2.2"> | ||||
<t indent="0" pn="section-toc.1-1.8.2.2.1"><xref derivedContent= | ||||
"8.2" format="counter" sectionFormat="of" target="section-8.2"/>. <xref derived | ||||
Content="" format="title" sectionFormat="of" target="name-informative-references | ||||
">Informative References</xref></t> | ||||
</li> | ||||
</ul> | ||||
</li> | ||||
<li pn="section-toc.1-1.9"> | ||||
<t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="" forma | ||||
t="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" | ||||
format="title" sectionFormat="of" target="name-authors-address">Author's Addres | ||||
s</xref></t> | ||||
</li> | ||||
</ul> | ||||
</section> | ||||
</toc> | ||||
</front> | </front> | |||
<middle> | <middle> | |||
<section title="Introduction"> | <section numbered="true" toc="include" removeInRFC="false" pn="section-1"> | |||
<t> | <name slugifiedName="name-introduction">Introduction</name> | |||
IKEv1 has been moved to Historic status. | <t indent="0" pn="section-1-1"> | |||
IKEv1 <xref target="RFC2409"/> and its related documents for ISAKMP | IKEv1 has been moved to Historic status. IKEv1 <xref target="RFC2409" form | |||
<xref target="RFC2408"/> and IPsec DOI <xref target="RFC2407"/> | at="default" sectionFormat="of" derivedContent="RFC2409"/> and its related docum | |||
were obsoleted by IKEv2 <xref target="RFC4306"/> in December | ents for the Internet Security | |||
2005. The latest version of IKEv2 at the time of writing was | Association and Key Management Protocol (ISAKMP) <xref target="RFC2408" fo | |||
published in 2014 in <xref target="RFC7296"/>. The Internet Key | rmat="default" sectionFormat="of" derivedContent="RFC2408"/> and IPsec DOI <xref | |||
Exchange (IKE) version 2 has replaced version 1 over 15 years ago. | target="RFC2407" format="default" sectionFormat="of" derivedContent="RFC2407"/> | |||
IKEv2 has now seen wide deployment and provides a full replacement | were obsoleted by IKEv2 <xref target="RFC4306" format="default" sectionFormat=" | |||
for all IKEv1 functionality. No new modifications or new algorithms have | of" derivedContent="RFC4306"/> in December 2005. The latest version of IKEv2 at | |||
been accepted for IKEv1 for at least a decade. IKEv2 addresses | the | |||
various issues present in IKEv1, such as IKEv1 being vulnerable | time of writing was published in 2014 <xref target="RFC7296" format="defau | |||
to amplification attacks. | lt" sectionFormat="of" derivedContent="RFC7296"/>. Since IKEv2 replaced IKEv1 o | |||
ver 15 years ago, IKEv2 | ||||
has now seen wide deployment, and it provides a full replacement for all | ||||
IKEv1 functionality. No new modifications or new algorithms have been | ||||
accepted for IKEv1 for at least a decade. IKEv2 addresses various issues | ||||
present in IKEv1, such as IKEv1 being vulnerable to amplification | ||||
attacks. | ||||
</t> | </t> | |||
<t> | <t indent="0" pn="section-1-2"> | |||
Algorithm implementation requirements and usage guidelines | Algorithm implementation requirements and usage guidelines | |||
for IKEv2 <xref target="RFC8247"/> and ESP/AH <xref target="RFC8221"/> | for IKEv2 <xref target="RFC8247" format="default" sectionFormat="of" deri vedContent="RFC8247"/> and Encapsulating Security Payload (ESP) and Authenticati on Header (AH) <xref target="RFC8221" format="default" sectionFormat="of" derive dContent="RFC8221"/> | |||
gives guidance to implementors but limits that guidance to avoid | gives guidance to implementors but limits that guidance to avoid | |||
broken or weak algorithms. These two RFCs do not deprecate algorithms tha t | broken or weak algorithms. These two RFCs do not deprecate algorithms tha t | |||
have aged and are not in use, but leave these algorithms in | have aged and are not in use. Instead, they leave these algorithms in | |||
a state of "MAY be used" by not mentioning them. This document deprecates | a state of "<bcp14>MAY</bcp14> be used" by not mentioning them. This docu | |||
ment deprecates | ||||
those unmentioned algorithms that are no longer advised but for which | those unmentioned algorithms that are no longer advised but for which | |||
there are no known attacks resulting in their earlier deprecation. | there are no known attacks resulting in their earlier deprecation. | |||
</t> | </t> | |||
</section> | </section> | |||
<section numbered="true" toc="include" removeInRFC="false" pn="section-2"> | ||||
<section title="Requirements Language"> | <name slugifiedName="name-requirements-language">Requirements Language</na | |||
<t> | me> | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | <t indent="0" pn="section-2-1"> | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", | The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQU | |||
and "OPTIONAL" in this document are to be interpreted as described in | IRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOUL | |||
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only | D</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>N | |||
when, they appear in all capitals, as shown here. | OT RECOMMENDED</bcp14>", | |||
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to | ||||
be interpreted as | ||||
described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="o | ||||
f" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFor | ||||
mat="of" derivedContent="RFC8174"/> | ||||
when, and only when, they appear in all capitals, as shown here. | ||||
</t> | </t> | |||
</section> | </section> | |||
<section anchor="ikev1_historic" numbered="true" toc="include" removeInRFC=" | ||||
<section title="RFC2407, RFC2408 and RFC2409 are Historic" anchor="ikev1_hist | false" pn="section-3"> | |||
oric"> | <name slugifiedName="name-rfcs-2407-2408-and-2409-are">RFCs 2407, 2408, an | |||
<t> | d 2409 Are Historic</name> | |||
IKEv1 is deprecated. Systems running IKEv1 should be upgraded and | <t indent="0" pn="section-3-1"> | |||
As IKEv1 is deprecated, systems running IKEv1 should be upgraded and | ||||
reconfigured to run IKEv2. Systems that support IKEv1 but not | reconfigured to run IKEv2. Systems that support IKEv1 but not | |||
IKEv2 are most likely also unsuitable candidates for continued | IKEv2 are most likely also unsuitable candidates for continued | |||
operation: | operation for the following reasons: | |||
<list style="symbols"> | </t> | |||
<t> | <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-3-2 | |||
IKEv1 development ceased over a decade ago and no new work will | "> | |||
<li pn="section-3-2.1"> | ||||
IKEv1 development ceased over a decade ago, and no new work will | ||||
happen. This poses the risk of unmaintained code in an otherwise | happen. This poses the risk of unmaintained code in an otherwise | |||
supported product which can result in security vulnerabilities. | supported product, which can result in security vulnerabilities. | |||
</t> | </li> | |||
<t> | <li pn="section-3-2.2"> | |||
A number of IKEv1 systems have reached their End of Life and | A number of IKEv1 systems have reached their End of Life and, | |||
therefor will never be patched by the vendor if a vulnerability | therefore, will never be patched by the vendor if a vulnerability | |||
is found. | is found. | |||
</t> | </li> | |||
<t> | <li pn="section-3-2.3"> | |||
There are vendors that still provide updates for their equipment | There are vendors that still provide updates for their equipment | |||
that supports IKEv1 and IKEv2, but have "frozen" their IKEv1 | that supports IKEv1 and IKEv2 but have "frozen" their IKEv1 | |||
implementation. Such users might not be aware that they are | implementation. Such users might not be aware that they are | |||
running unmaintained code with its associated security risks. | running unmaintained code with its associated security risks. | |||
</t> | </li> | |||
<t> | <li pn="section-3-2.4"> | |||
IKEv1 systems can be abused for packet amplification attacks, as | IKEv1 systems can be abused for packet amplification attacks, as | |||
documented in the Security Bulletin <xref target="CVE-2016-5361"/>. | documented in the Security Bulletin <xref target="CVE-2016-5361" format="de | |||
</t> | fault" sectionFormat="of" derivedContent="CVE-2016-5361"/>. | |||
<t> | </li> | |||
<li pn="section-3-2.5"> | ||||
Great strides have been made in cryptography since IKEv1 development | Great strides have been made in cryptography since IKEv1 development | |||
ceased. While some modern cryptographic algorithms were added to | ceased. While some modern cryptographic algorithms were added to | |||
IKEv1, interoperability concerns mean that the defacto algorithms | IKEv1, interoperability concerns mean that the defacto algorithms | |||
negotiated by IKEv1 will consist of dated or deprecated algorithms | negotiated by IKEv1 will consist of dated or deprecated algorithms, | |||
like AES-CBC, SHA1, and Diffie-Hellman groups 1 or 2. IKEv2 provides | like AES-CBC, SHA1, and Diffie-Hellman groups 1 or 2. IKEv2 provides | |||
state-of-the-art suite of cryptographic algorithms that IKEv1 lacks. | a state-of-the-art suite of cryptographic algorithms that IKEv1 lacks. | |||
</t> | </li> | |||
</ul> | ||||
</list> | <t indent="0" pn="section-3-3"> | |||
IKEv2 is a more secure protocol than IKEv1. For example, IKEv2 offers more | IKEv2 is a more secure protocol than IKEv1. For example, IKEv2 offers more | |||
modern cryptographic primitives, proper defense against denial of service | modern cryptographic primitives, proper defense against denial-of-service | |||
attacks, improved authentication via EAP methods, PAKE support and is | attacks, improved authentication via Extensible Authentication Protocol (EA | |||
actively worked on with respect to defending against quantum computer attac | P) methods, and password-authenticated key exchange (PAKE) support. Also, IKEv2 | |||
ks. | is | |||
</t> | actively worked on with respect to defending against quantum-computer attac | |||
<t> | ks. | |||
</t> | ||||
<t indent="0" pn="section-3-4"> | ||||
IKEv1-only systems should be upgraded or replaced by systems supporting | IKEv1-only systems should be upgraded or replaced by systems supporting | |||
IKEv2. IKEv2 implementations SHOULD NOT directly import IKEv1 configuration s | IKEv2. IKEv2 implementations <bcp14>SHOULD NOT</bcp14> directly import IKEv 1 configurations | |||
without updating the cryptographic algorithms used. | without updating the cryptographic algorithms used. | |||
</t> | </t> | |||
</section> | </section> | |||
<section anchor="feature_eq" numbered="true" toc="include" removeInRFC="fals | ||||
<section title="IKEv1 feature equivalents for IKEv2" anchor="feature_eq"> | e" pn="section-4"> | |||
<t> | <name slugifiedName="name-ikev1-feature-equivalents-f">IKEv1 Feature Equiv | |||
alents for IKEv2</name> | ||||
<t indent="0" pn="section-4-1"> | ||||
A few notable IKEv1 features are not present in the IKEv2 core specificati on | A few notable IKEv1 features are not present in the IKEv2 core specificati on | |||
<xref target="RFC7296"/> but are available for IKEv2 via an additional spe | <xref target="RFC7296" format="default" sectionFormat="of" derivedContent= | |||
cification: | "RFC7296"/> but are available for IKEv2 via an additional specification. | |||
</t> | </t> | |||
<section anchor="ikev2_postq" numbered="true" toc="include" removeInRFC="f | ||||
<section title="IKEv2 postquantum support" anchor="ikev2_postq"> | alse" pn="section-4.1"> | |||
<t> | <name slugifiedName="name-ikev2-post-quantum-support">IKEv2 Post-Quantum | |||
Support</name> | ||||
<t indent="0" pn="section-4.1-1"> | ||||
IKEv1 and its way of using Preshared Keys (PSKs) protects against | IKEv1 and its way of using Preshared Keys (PSKs) protects against | |||
quantum computer based attacks. IKEv2 updated its use of PSK to improve | quantum-computer-based attacks. IKEv2 updated its use of PSKs to improve | |||
the error reporting, but at the expense of post-quantum security. If | the error reporting but at the expense of post-quantum security. If | |||
post-quantum security is required, these systems should be migrated | post-quantum security is required, these systems should be migrated | |||
to use IKEv2 Postquantum Preshared Keys (PPK) <xref target="RFC8784"/> | to use IKEv2 Post-quantum Preshared Keys (PPKs) <xref target="RFC8784" fo | |||
</t> | rmat="default" sectionFormat="of" derivedContent="RFC8784"/>. | |||
</section> | </t> | |||
</section> | ||||
<section title="IKEv2 Labeled IPsec support" anchor="ikev2_labeled"> | <section anchor="ikev2_labeled" numbered="true" toc="include" removeInRFC= | |||
<t> | "false" pn="section-4.2"> | |||
<name slugifiedName="name-ikev2-labeled-ipsec-support">IKEv2 Labeled IPs | ||||
ec Support</name> | ||||
<t indent="0" pn="section-4.2-1"> | ||||
Some IKEv1 implementations support Labeled IPsec, a method | Some IKEv1 implementations support Labeled IPsec, a method | |||
to negotiate an additional Security Context selector to the | to negotiate an additional Security Context selector to the | |||
SPD, but this method was never standardized in IKEv1. Those IKEv1 | Security Policy Database (SPD), but this method was never standardized in IKEv1. Those IKEv1 | |||
systems that require Labeled IPsec should migrate to an | systems that require Labeled IPsec should migrate to an | |||
IKEv2 system supporting Labeled IPsec as specified in | IKEv2 system supporting Labeled IPsec as specified in | |||
<xref target="draft-ietf-ipsecme-labeled-ipsec"/>. | <xref target="I-D.ietf-ipsecme-labeled-ipsec" format="default" sectionFor | |||
</t> | mat="of" derivedContent="LABELED-IPSEC"/>. | |||
</section> | </t> | |||
</section> | ||||
<section title="IKEv2 Group SA / Multicast support" anchor="ikev2_groupsa"> | <section anchor="ikev2_groupsa" numbered="true" toc="include" removeInRFC= | |||
<t> | "false" pn="section-4.3"> | |||
The Group Domain of Interpretation (GDOI, <xref target="RFC6407"/>) proto | <name slugifiedName="name-ikev2-group-sa-and-multicas">IKEv2 Group SA an | |||
col, | d Multicast Support</name> | |||
based on IKEv1 defines the support for Multicast Group SAs. For IKEv2, th | <t indent="0" pn="section-4.3-1"> | |||
is | The Group Domain of Interpretation (GDOI) protocol <xref target="RFC6407" | |||
work is currently in progress via <xref target="draft-ietf-ipsecme-g-ikev | format="default" sectionFormat="of" derivedContent="RFC6407"/>, | |||
2"/> | which is based on IKEv1, defines the support for Multicast Group SAs. For | |||
</t> | IKEv2, this | |||
</section> | work is currently in progress via <xref target="I-D.ietf-ipsecme-g-ikev2" | |||
</section> | format="default" sectionFormat="of" derivedContent="G-IKEV2"/>. | |||
</t> | ||||
<section title="Deprecating obsolete algorithms" anchor="deprecating_algos"> | </section> | |||
<t>This document deprecates the following algorithms: | </section> | |||
<list style="symbols"> | <section anchor="deprecating_algos" numbered="true" toc="include" removeInRF | |||
<t> Encryption Algorithms: RC5, IDEA, CAST, Blowfish, and the unspecified | C="false" pn="section-5"> | |||
3IDEA, | <name slugifiedName="name-deprecating-obsolete-algori">Deprecating Obsolet | |||
ENCR_DES_IV64 and ENCR_DES_IV32</t> | e Algorithms</name> | |||
<t> PRF Algorithms: the unspecified PRF_HMAC_TIGER</t> | <t indent="0" pn="section-5-1">This document deprecates the following algo | |||
<t> Integrity Algorithms: HMAC-MD5-128</t> | rithms: | |||
<t> Diffie-Hellman groups: none</t> | </t> | |||
</list> | <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-5-2 | |||
</t> | "> | |||
</section> | <li pn="section-5-2.1"> Encryption Algorithms: RC5, IDEA, CAST, Blowfish | |||
<section anchor="Security" title="Security Considerations"> | , and the unspecified 3IDEA, | |||
<t>There are only security benefits by deprecating IKEv1 for IKEv2. | ENCR_DES_IV64, and ENCR_DES_IV32</li> | |||
</t> | <li pn="section-5-2.2"> PRF Algorithms: the unspecified PRF_HMAC_TIGER</ | |||
<t> | li> | |||
<li pn="section-5-2.3"> Integrity Algorithms: HMAC-MD5-128</li> | ||||
<li pn="section-5-2.4"> Diffie-Hellman groups: none</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="Security" numbered="true" toc="include" removeInRFC="false" | ||||
pn="section-6"> | ||||
<name slugifiedName="name-security-considerations">Security Considerations | ||||
</name> | ||||
<t indent="0" pn="section-6-1">There are only security benefits if IKEv1 i | ||||
s deprecated and IKEv2 is used. | ||||
</t> | ||||
<t indent="0" pn="section-6-2"> | ||||
The deprecated algorithms have long been in disuse and are no longer | The deprecated algorithms have long been in disuse and are no longer | |||
actively deployed or researched. It presents an unknown security | actively deployed or researched; this presents an unknown security | |||
risk that is best avoided. Additionally, these algorithms not being | risk that is best avoided. Additionally, these algorithms not being | |||
supported in implementations simplifies those implementations and | supported in implementations simplifies those implementations and | |||
reduces the accidental use of these deprecated algorithms through | reduces the accidental use of deprecated algorithms through | |||
misconfiguration or downgrade attacks. | misconfiguration or downgrade attacks. | |||
</t> | </t> | |||
</section> | </section> | |||
<section anchor="IANA" numbered="true" toc="include" removeInRFC="false" pn= | ||||
<section anchor="IANA" title="IANA Considerations"> | "section-7"> | |||
<t>This document instructs IANA to insert the following line at the top | <name slugifiedName="name-iana-considerations">IANA Considerations</name> | |||
of the Notes | <t indent="0" pn="section-7-1">IANA has added the following line at the to | |||
section of the 'Internet Key Exchange (IKE) Attributes' registry and the | p | |||
'"Magic Numbers" for ISAKMP Protocol' registry: All registries listed be | of the Notes section of the "Internet Key Exchange (IKE) Attributes" | |||
low have | and '"Magic Numbers" for ISAKMP Protocol' registries: "All | |||
been closed, see RFCxxxx. | registries listed below have been closed. See RFC 9395." In addition, this | |||
[Note to RFC Editor: change RFCxxx to this document's RFC number] | document has been added to the "Reference" column in these two registries, and | |||
</t> | their registration procedures have been changed to "Registry closed". | |||
</t> | ||||
<t>This document further instructs IANA to add an additional Status colu | <t indent="0" pn="section-7-2">IANA has added a "Status" column to the fol | |||
mn to | lowing IKEv2 "Transform Type Values" registries: | |||
the IKEv2 Transform Type registries and mark the following entries as DE | </t> | |||
PRECATED: | <ul empty="true" spacing="compact" bare="false" indent="3" pn="section-7-3 | |||
<figure align="center" anchor="iana_requests_type1"> | "> | |||
<artwork align="left"><![CDATA[ | <li pn="section-7-3.1">Transform Type 1 - Encryption Algorithm Transform | |||
IDs</li> | ||||
Transform Type 1 - Encryption Algorithm IDs | <li pn="section-7-3.2">Transform Type 2 - Pseudorandom Function Transfor | |||
m IDs</li> | ||||
Number Name Status | <li pn="section-7-3.3">Transform Type 3 - Integrity Algorithm Transform | |||
------ --------------- ------ | IDs</li> | |||
1 ENCR_DES_IV64 DEPRECATED [this document] | <li pn="section-7-3.4">Transform Type 4 - Key Exchange Method Transform | |||
2 ENCR_DES DEPRECATED [RFC8247] | IDs</li> | |||
4 ENCR_RC5 DEPRECATED [this document] | </ul> | |||
5 ENCR_IDEA DEPRECATED [this document] | <t indent="0" pn="section-7-4"> | |||
6 ENCR_CAST DEPRECATED [this document] | Also, the following entries have been marked as DEPRECATED: | |||
7 ENCR_BLOWFISH DEPRECATED [this document] | </t> | |||
8 ENCR_3IDEA DEPRECATED [this document] | <table anchor="iana_requests_type1" align="center" pn="table-1"> | |||
9 ENCR_DES_IV32 DEPRECATED [this document] | <name slugifiedName="name-transform-type-1-encryption">Transform Type 1 | |||
]]></artwork> | - Encryption Algorithm Transform IDs</name> | |||
</figure> | <thead> | |||
<figure align="center" anchor="iana_requests_type2"> | <tr> | |||
<artwork align="left"><![CDATA[ | <th align="left" colspan="1" rowspan="1">Number</th> | |||
<th align="left" colspan="1" rowspan="1">Name</th> | ||||
Transform Type 2 - Pseudorandom Function Transform IDs | <th align="left" colspan="1" rowspan="1">Status</th> | |||
</tr> | ||||
Number Name Status | </thead> | |||
------ ------------ ---------- | <tbody> | |||
1 PRF_HMAC_MD5 DEPRECATED [RFC8247] | <tr> | |||
3 PRF_HMAC_TIGER DEPRECATED [this document] | <td align="left" colspan="1" rowspan="1">1</td> | |||
]]></artwork> | <td align="left" colspan="1" rowspan="1">ENCR_DES_IV64</td> | |||
</figure> | <td align="left" colspan="1" rowspan="1">DEPRECATED (RFC 9395)</td> | |||
<figure align="center" anchor="iana_requests_typ3"> | </tr> | |||
<artwork align="left"><![CDATA[ | <tr> | |||
<td align="left" colspan="1" rowspan="1">2</td> | ||||
Transform Type 3 - Integrity Algorithm Transform IDs | <td align="left" colspan="1" rowspan="1">ENCR_DES</td> | |||
<td align="left" colspan="1" rowspan="1">DEPRECATED <xref target="RF | ||||
Number Name Status | C8247" format="default" sectionFormat="of" derivedContent="RFC8247"/></td> | |||
------ ----------------- ---------- | </tr> | |||
1 AUTH_HMAC_MD5_96 DEPRECATED [RFC8247] | <tr> | |||
3 AUTH_DES_MAC DEPRECATED [RFC8247] | <td align="left" colspan="1" rowspan="1">4</td> | |||
4 AUTH_KPDK_MD5 DEPRECATED [RFC8247] | <td align="left" colspan="1" rowspan="1">ENCR_RC5</td> | |||
6 AUTH_HMAC_MD5_128 DEPRECATED [this document] | <td align="left" colspan="1" rowspan="1">DEPRECATED (RFC 9395)</td> | |||
7 AUTH_HMAC_SHA1_160 DEPRECATED [this document] | </tr> | |||
]]></artwork> | <tr> | |||
</figure> | <td align="left" colspan="1" rowspan="1">5</td> | |||
<figure align="center" anchor="iana_requests_type4"> | <td align="left" colspan="1" rowspan="1">ENCR_IDEA</td> | |||
<artwork align="left"><![CDATA[ | <td align="left" colspan="1" rowspan="1">DEPRECATED (RFC 9395)</td> | |||
</tr> | ||||
Transform Type 4 - Diffie Hellman Group Transform IDs | <tr> | |||
<td align="left" colspan="1" rowspan="1">6</td> | ||||
Number Name Status | <td align="left" colspan="1" rowspan="1">ENCR_CAST</td> | |||
------ ---------------------------- ---------- | <td align="left" colspan="1" rowspan="1">DEPRECATED (RFC 9395)</td> | |||
1 768-bit MODP Group DEPRECATED [RFC8247] | </tr> | |||
22 1024-bit MODP Group with | <tr> | |||
160-bit Prime Order Subgroup DEPRECATED [RFC8247] | <td align="left" colspan="1" rowspan="1">7</td> | |||
]]></artwork> | <td align="left" colspan="1" rowspan="1">ENCR_BLOWFISH</td> | |||
</figure> | <td align="left" colspan="1" rowspan="1">DEPRECATED (RFC 9395)</td> | |||
</tr> | ||||
<tr> | ||||
<td align="left" colspan="1" rowspan="1">8</td> | ||||
<td align="left" colspan="1" rowspan="1">ENCR_3IDEA</td> | ||||
<td align="left" colspan="1" rowspan="1">DEPRECATED (RFC 9395)</td> | ||||
</tr> | ||||
<tr> | ||||
<td align="left" colspan="1" rowspan="1">9</td> | ||||
<td align="left" colspan="1" rowspan="1">ENCR_DES_IV32</td> | ||||
<td align="left" colspan="1" rowspan="1">DEPRECATED (RFC 9395)</td> | ||||
</tr> | ||||
</tbody> | ||||
</table> | ||||
<table anchor="iana_requests_type2" align="center" pn="table-2"> | ||||
<name slugifiedName="name-transform-type-2-pseudorand">Transform Type 2 | ||||
- Pseudorandom Function Transform IDs</name> | ||||
<thead> | ||||
<tr> | ||||
<th align="left" colspan="1" rowspan="1">Number</th> | ||||
<th align="left" colspan="1" rowspan="1">Name</th> | ||||
<th align="left" colspan="1" rowspan="1">Status</th> | ||||
</tr> | ||||
</thead> | ||||
<tbody> | ||||
<tr> | ||||
<td align="left" colspan="1" rowspan="1">1</td> | ||||
<td align="left" colspan="1" rowspan="1">PRF_HMAC_MD5</td> | ||||
<td align="left" colspan="1" rowspan="1">DEPRECATED <xref target="RF | ||||
C8247" format="default" sectionFormat="of" derivedContent="RFC8247"/></td> | ||||
</tr> | ||||
<tr> | ||||
<td align="left" colspan="1" rowspan="1">3</td> | ||||
<td align="left" colspan="1" rowspan="1">PRF_HMAC_TIGER</td> | ||||
<td align="left" colspan="1" rowspan="1">DEPRECATED (RFC 9395)</td> | ||||
</tr> | ||||
</tbody> | ||||
</table> | ||||
<table anchor="iana_requests_typ3" align="center" pn="table-3"> | ||||
<name slugifiedName="name-transform-type-3-integrity-">Transform Type 3 | ||||
- Integrity Algorithm Transform IDs</name> | ||||
<thead> | ||||
<tr> | ||||
<th align="left" colspan="1" rowspan="1">Number</th> | ||||
<th align="left" colspan="1" rowspan="1">Name</th> | ||||
<th align="left" colspan="1" rowspan="1">Status</th> | ||||
</tr> | ||||
</thead> | ||||
<tbody> | ||||
<tr> | ||||
<td align="left" colspan="1" rowspan="1">1</td> | ||||
<td align="left" colspan="1" rowspan="1">AUTH_HMAC_MD5_96</td> | ||||
<td align="left" colspan="1" rowspan="1">DEPRECATED <xref target="RF | ||||
C8247" format="default" sectionFormat="of" derivedContent="RFC8247"/></td> | ||||
</tr> | ||||
<tr> | ||||
<td align="left" colspan="1" rowspan="1">3</td> | ||||
<td align="left" colspan="1" rowspan="1">AUTH_DES_MAC</td> | ||||
<td align="left" colspan="1" rowspan="1">DEPRECATED <xref target="RF | ||||
C8247" format="default" sectionFormat="of" derivedContent="RFC8247"/></td> | ||||
</tr> | ||||
<tr> | ||||
<td align="left" colspan="1" rowspan="1">4</td> | ||||
<td align="left" colspan="1" rowspan="1">AUTH_KPDK_MD5</td> | ||||
<td align="left" colspan="1" rowspan="1">DEPRECATED <xref target="RF | ||||
C8247" format="default" sectionFormat="of" derivedContent="RFC8247"/></td> | ||||
</tr> | ||||
<tr> | ||||
<td align="left" colspan="1" rowspan="1">6</td> | ||||
<td align="left" colspan="1" rowspan="1">AUTH_HMAC_MD5_128</td> | ||||
<td align="left" colspan="1" rowspan="1">DEPRECATED (RFC 9395)</td> | ||||
</tr> | ||||
<tr> | ||||
<td align="left" colspan="1" rowspan="1">7</td> | ||||
<td align="left" colspan="1" rowspan="1">AUTH_HMAC_SHA1_160</td> | ||||
<td align="left" colspan="1" rowspan="1">DEPRECATED (RFC 9395)</td> | ||||
</tr> | ||||
</tbody> | ||||
</table> | ||||
<table anchor="iana_requests_type4" align="center" pn="table-4"> | ||||
<name slugifiedName="name-transform-type-4-key-exchan">Transform Type 4 | ||||
- Key Exchange Method Transform IDs</name> | ||||
<thead> | ||||
<tr> | ||||
<th align="left" colspan="1" rowspan="1">Number</th> | ||||
<th align="left" colspan="1" rowspan="1">Name</th> | ||||
<th align="left" colspan="1" rowspan="1">Status</th> | ||||
</tr> | ||||
</thead> | ||||
<tbody> | ||||
<tr> | ||||
<td align="left" colspan="1" rowspan="1">1</td> | ||||
<td align="left" colspan="1" rowspan="1">768-bit MODP Group</td> | ||||
<td align="left" colspan="1" rowspan="1">DEPRECATED <xref target="RF | ||||
C8247" format="default" sectionFormat="of" derivedContent="RFC8247"/></td> | ||||
</tr> | ||||
<tr> | ||||
<td align="left" colspan="1" rowspan="1">22</td> | ||||
<td align="left" colspan="1" rowspan="1">1024-bit MODP Group with 16 | ||||
0-bit Prime Order Subgroup</td> | ||||
<td align="left" colspan="1" rowspan="1">DEPRECATED <xref target="RF | ||||
C8247" format="default" sectionFormat="of" derivedContent="RFC8247"/></td> | ||||
</tr> | ||||
</tbody> | ||||
</table> | ||||
<t indent="0" pn="section-7-9"> | ||||
All entries not mentioned here should receive no value in the new Status field. | All entries not mentioned here should receive no value in the new Status field. | |||
</t> | </t> | |||
</section> | </section> | |||
</middle> | </middle> | |||
<back> | <back> | |||
<displayreference target="I-D.ietf-ipsecme-labeled-ipsec" to="LABELED-IPSEC" | ||||
/> | ||||
<displayreference target="I-D.ietf-ipsecme-g-ikev2" to="G-IKEV2"/> | ||||
<references pn="section-8"> | ||||
<name slugifiedName="name-references">References</name> | ||||
<references pn="section-8.1"> | ||||
<name slugifiedName="name-normative-references">Normative References</na | ||||
me> | ||||
<reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2 | ||||
119" quoteTitle="true" derivedAnchor="RFC2119"> | ||||
<front> | ||||
<title>Key words for use in RFCs to Indicate Requirement Levels</tit | ||||
le> | ||||
<author fullname="S. Bradner" initials="S." surname="Bradner"/> | ||||
<date month="March" year="1997"/> | ||||
<abstract> | ||||
<t indent="0">In many standards track documents several words are | ||||
used to signify the requirements in the specification. These words are often ca | ||||
pitalized. This document defines these words as they should be interpreted in I | ||||
ETF documents. This document specifies an Internet Best Current Practices for t | ||||
he Internet Community, and requests discussion and suggestions for improvements. | ||||
</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="BCP" value="14"/> | ||||
<seriesInfo name="RFC" value="2119"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC2119"/> | ||||
</reference> | ||||
<reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8 | ||||
174" quoteTitle="true" derivedAnchor="RFC8174"> | ||||
<front> | ||||
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</ti | ||||
tle> | ||||
<author fullname="B. Leiba" initials="B." surname="Leiba"/> | ||||
<date month="May" year="2017"/> | ||||
<abstract> | ||||
<t indent="0">RFC 2119 specifies common key words that may be used | ||||
in protocol specifications. This document aims to reduce the ambiguity by clar | ||||
ifying that only UPPERCASE usage of the key words have the defined special meani | ||||
ngs.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="BCP" value="14"/> | ||||
<seriesInfo name="RFC" value="8174"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8174"/> | ||||
</reference> | ||||
<reference anchor="RFC8247" target="https://www.rfc-editor.org/info/rfc8 | ||||
247" quoteTitle="true" derivedAnchor="RFC8247"> | ||||
<front> | ||||
<title>Algorithm Implementation Requirements and Usage Guidance for | ||||
the Internet Key Exchange Protocol Version 2 (IKEv2)</title> | ||||
<author fullname="Y. Nir" initials="Y." surname="Nir"/> | ||||
<author fullname="T. Kivinen" initials="T." surname="Kivinen"/> | ||||
<author fullname="P. Wouters" initials="P." surname="Wouters"/> | ||||
<author fullname="D. Migault" initials="D." surname="Migault"/> | ||||
<date month="September" year="2017"/> | ||||
<abstract> | ||||
<t indent="0">The IPsec series of protocols makes use of various c | ||||
ryptographic algorithms in order to provide security services. The Internet Key | ||||
Exchange (IKE) protocol is used to negotiate the IPsec Security Association (IP | ||||
sec SA) parameters, such as which algorithms should be used. To ensure interope | ||||
rability between different implementations, it is necessary to specify a set of | ||||
algorithm implementation requirements and usage guidance to ensure that there is | ||||
at least one algorithm that all implementations support. This document updates | ||||
RFC 7296 and obsoletes RFC 4307 in defining the current algorithm implementatio | ||||
n requirements and usage guidance for IKEv2, and does minor cleaning up of the I | ||||
KEv2 IANA registry. This document does not update the algorithms used for packe | ||||
t encryption using IPsec Encapsulating Security Payload (ESP).</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8247"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8247"/> | ||||
</reference> | ||||
</references> | ||||
<references pn="section-8.2"> | ||||
<name slugifiedName="name-informative-references">Informative References | ||||
</name> | ||||
<reference anchor="CVE-2016-5361" target="https://nvd.nist.gov/vuln/deta | ||||
il/CVE-2016-5361" quoteTitle="true" derivedAnchor="CVE-2016-5361"> | ||||
<front> | ||||
<title>CVE-2016-5361 Detail</title> | ||||
<author> | ||||
<organization showOnFrontPage="true">NIST National Vulnerability D | ||||
atabase</organization> | ||||
</author> | ||||
<date day="16" month="June" year="2016"/> | ||||
</front> | ||||
</reference> | ||||
<reference anchor="I-D.ietf-ipsecme-g-ikev2" target="https://datatracker | ||||
.ietf.org/doc/html/draft-ietf-ipsecme-g-ikev2-09" quoteTitle="true" derivedAncho | ||||
r="G-IKEV2"> | ||||
<front> | ||||
<title>Group Key Management using IKEv2</title> | ||||
<author initials="V." surname="Smyslov" fullname="Valery Smyslov"> | ||||
<organization showOnFrontPage="true">ELVIS-PLUS</organization> | ||||
</author> | ||||
<author initials="B." surname="Weis" fullname="Brian Weis"> | ||||
<organization showOnFrontPage="true">Independent</organization> | ||||
</author> | ||||
<date month="April" day="19" year="2023"/> | ||||
<abstract> | ||||
<t indent="0"> This document presents an extension to the Intern | ||||
et Key Exchange | ||||
version 2 (IKEv2) protocol for the purpose of a group key management. | ||||
The protocol is in conformance with the Multicast Security (MSEC) key | ||||
management architecture, which contains two components: member | ||||
registration and group rekeying. Both components require a Group | ||||
Controller/Key Server to download IPsec group security associations | ||||
to authorized members of a group. The group members then exchange IP | ||||
multicast or other group traffic as IPsec packets. | ||||
<references title="Normative References"> | This document obsoletes RFC 6407. This documents also updates RFC | |||
&RFC2119; | 7296 by renaming a transform type 5 from "Extended Sequence Numbers | |||
&RFC8174; | (ESN)" to the "Replay Protection (RP)" and by renaming IKEv2 | |||
&RFC8247; | authentication method 0 from "Reserved" to "NONE". | |||
</references> | ||||
<references title="Informative References"> | ||||
&RFC2407; | ||||
&RFC2408; | ||||
&RFC2409; | ||||
&RFC6407; | ||||
&RFC4306; | ||||
&RFC7296; | ||||
&RFC8221; | ||||
&RFC8784; | ||||
<reference anchor='draft-ietf-ipsecme-labeled-ipsec'> | ||||
<front> | ||||
<title>Labeled IPsec Traffic Selector support for IKEv2</title> | ||||
<author initials='P.' surname="Wouters" fullname='Paul Wouters'> | ||||
</author> | ||||
<author fullname="Sahana Prasad" initials="S." surname="Prasad"> | ||||
</author> | ||||
<date month='October' day='25' year='2021' /> | ||||
<abstract> | ||||
<t> | ||||
This document defines a new Traffic Selector (TS) Type for | ||||
Internet Key Exchange version 2 to add support for negotiating | ||||
Mandatory Access Control (MAC) security labels as a traffic selector | ||||
of the Security Policy Database (SPD). Security Labels for IPsec | ||||
are also known as "Labeled IPsec". The new TS type is TS_SECLABEL, | ||||
which consists of a variable length opaque field specifying the | ||||
security label. This document updates the IKEv2 TS negotiation | ||||
specified in RFC 7296 Section 2.9. | ||||
</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name='Internet-Draft' value='draft-ietf-ipsecme-labeled-ipsec' | ||||
/> | ||||
<format type='TXT' | ||||
target='https://tools.ietf.org/id/draft-ietf-ipsecme-labeled-ipsec-0 | ||||
6.txt' /> | ||||
</reference> | ||||
<reference anchor='draft-ietf-ipsecme-g-ikev2'> | ||||
<front> | ||||
<title>Group Key Management using IKEv2</title> | ||||
<author initials='V.' surname="Smyslov" fullname='Valery Smyslov'> | ||||
<organization>ELVIS-PLUS</organization> | ||||
</author> | ||||
<author fullname="Brian Weis" initials="B." surname="Weis"> | ||||
<organization>Independent</organization> | ||||
</author> | ||||
<date month='January' day='11' year='2021' /> | ||||
<abstract> | ||||
<t> | ||||
This document presents an extension to the Internet Key Exchange | ||||
version 2 (IKEv2) protocol for the purpose of a group key management. | ||||
The protocol is in conformance with the Multicast Security (MSEC) key | ||||
management architecture, which contains two components: member | ||||
registration and group rekeying. Both components require a Group | ||||
Controller/Key Server to download IPsec group security associations | ||||
to authorized members of a group. The group members then exchange IP | ||||
multicast or other group traffic as IPsec packets. This document | ||||
obsoletes RFC 6407. | ||||
</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name='Internet-Draft' value='draft-ietf-ipsecme-g-ikev2' /> | ||||
<format type='TXT' | ||||
target='https://www.ietf.org/archive/id/draft-ietf-ipsecme-g-ikev2-0 | ||||
3.txt' /> | ||||
</reference> | ||||
<reference anchor="CVE-2016-5361" target="https://nvd.nist.gov/vuln/detail/CV | ||||
E-2016-5361"> | ||||
<front> | ||||
<title>National Vulnerability Database - CVE-2016-5361</title> | ||||
<author> | ||||
<organization>National Institute of Science and Technology (NIST)</o | ||||
rganization> | ||||
</author> | ||||
<date day="16" month="June" year="2016"/> | ||||
</front> | ||||
</reference> | ||||
</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-g-ikev2-09 | ||||
"/> | ||||
<refcontent>Work in Progress</refcontent> | ||||
</reference> | ||||
<reference anchor="I-D.ietf-ipsecme-labeled-ipsec" target="https://datat | ||||
racker.ietf.org/doc/html/draft-ietf-ipsecme-labeled-ipsec-11" quoteTitle="true" | ||||
derivedAnchor="LABELED-IPSEC"> | ||||
<front> | ||||
<title>Labeled IPsec Traffic Selector support for IKEv2</title> | ||||
<author initials="P." surname="Wouters" fullname="Paul Wouters"> | ||||
<organization showOnFrontPage="true">Aiven</organization> | ||||
</author> | ||||
<author initials="S." surname="Prasad" fullname="Sahana Prasad"> | ||||
<organization showOnFrontPage="true">Red Hat</organization> | ||||
</author> | ||||
<date month="April" day="10" year="2023"/> | ||||
<abstract> | ||||
<t indent="0"> This document defines a new Traffic Selector (TS) | ||||
Type for Internet | ||||
Key Exchange version 2 to add support for negotiating Mandatory | ||||
Access Control (MAC) security labels as a traffic selector of the | ||||
Security Policy Database (SPD). Security Labels for IPsec are also | ||||
known as "Labeled IPsec". The new TS type is TS_SECLABEL, which | ||||
consists of a variable length opaque field specifying the security | ||||
label. | ||||
</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-labeled-ip | ||||
sec-11"/> | ||||
<refcontent>Work in Progress</refcontent> | ||||
</reference> | ||||
<reference anchor="RFC2407" target="https://www.rfc-editor.org/info/rfc2 | ||||
407" quoteTitle="true" derivedAnchor="RFC2407"> | ||||
<front> | ||||
<title>The Internet IP Security Domain of Interpretation for ISAKMP< | ||||
/title> | ||||
<author fullname="D. Piper" initials="D." surname="Piper"/> | ||||
<date month="November" year="1998"/> | ||||
<abstract> | ||||
<t indent="0">This document defines the Internet IP Security DOI ( | ||||
IPSEC DOI), which instantiates ISAKMP for use with IP when IP uses ISAKMP to neg | ||||
otiate security associations. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="2407"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC2407"/> | ||||
</reference> | ||||
<reference anchor="RFC2408" target="https://www.rfc-editor.org/info/rfc2 | ||||
408" quoteTitle="true" derivedAnchor="RFC2408"> | ||||
<front> | ||||
<title>Internet Security Association and Key Management Protocol (IS | ||||
AKMP)</title> | ||||
<author fullname="D. Maughan" initials="D." surname="Maughan"/> | ||||
<author fullname="M. Schertler" initials="M." surname="Schertler"/> | ||||
<author fullname="M. Schneider" initials="M." surname="Schneider"/> | ||||
<author fullname="J. Turner" initials="J." surname="Turner"/> | ||||
<date month="November" year="1998"/> | ||||
<abstract> | ||||
<t indent="0">This memo describes a protocol utilizing security co | ||||
ncepts necessary for establishing Security Associations (SA) and cryptographic k | ||||
eys in an Internet environment. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="2408"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC2408"/> | ||||
</reference> | ||||
<reference anchor="RFC2409" target="https://www.rfc-editor.org/info/rfc2 | ||||
409" quoteTitle="true" derivedAnchor="RFC2409"> | ||||
<front> | ||||
<title>The Internet Key Exchange (IKE)</title> | ||||
<author fullname="D. Harkins" initials="D." surname="Harkins"/> | ||||
<author fullname="D. Carrel" initials="D." surname="Carrel"/> | ||||
<date month="November" year="1998"/> | ||||
<abstract> | ||||
<t indent="0">This memo describes a hybrid protocol. The purpose | ||||
is to negotiate, and provide authenticated keying material for, security associa | ||||
tions in a protected manner. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="2409"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC2409"/> | ||||
</reference> | ||||
<reference anchor="RFC4306" target="https://www.rfc-editor.org/info/rfc4 | ||||
306" quoteTitle="true" derivedAnchor="RFC4306"> | ||||
<front> | ||||
<title>Internet Key Exchange (IKEv2) Protocol</title> | ||||
<author fullname="C. Kaufman" initials="C." role="editor" surname="K | ||||
aufman"/> | ||||
<date month="December" year="2005"/> | ||||
<abstract> | ||||
<t indent="0">This document describes version 2 of the Internet Ke | ||||
y Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutua | ||||
l authentication and establishing and maintaining security associations (SAs).</ | ||||
t> | ||||
<t indent="0">This version of the IKE specification combines the c | ||||
ontents of what were previously separate documents, including Internet Security | ||||
Association and Key Management Protocol (ISAKMP, RFC 2408), IKE (RFC 2409), the | ||||
Internet Domain of Interpretation (DOI, RFC 2407), Network Address Translation ( | ||||
NAT) Traversal, Legacy authentication, and remote address acquisition.</t> | ||||
<t indent="0">Version 2 of IKE does not interoperate with version | ||||
1, but it has enough of the header format in common that both versions can unamb | ||||
iguously run over the same UDP port. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4306"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4306"/> | ||||
</reference> | ||||
<reference anchor="RFC6407" target="https://www.rfc-editor.org/info/rfc6 | ||||
407" quoteTitle="true" derivedAnchor="RFC6407"> | ||||
<front> | ||||
<title>The Group Domain of Interpretation</title> | ||||
<author fullname="B. Weis" initials="B." surname="Weis"/> | ||||
<author fullname="S. Rowles" initials="S." surname="Rowles"/> | ||||
<author fullname="T. Hardjono" initials="T." surname="Hardjono"/> | ||||
<date month="October" year="2011"/> | ||||
<abstract> | ||||
<t indent="0">This document describes the Group Domain of Interpre | ||||
tation (GDOI) protocol specified in RFC 3547. The GDOI provides group key manag | ||||
ement to support secure group communications according to the architecture speci | ||||
fied in RFC 4046. The GDOI manages group security associations, which are used | ||||
by IPsec and potentially other data security protocols. This document replaces | ||||
RFC 3547. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6407"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6407"/> | ||||
</reference> | ||||
<reference anchor="RFC7296" target="https://www.rfc-editor.org/info/rfc7 | ||||
296" quoteTitle="true" derivedAnchor="RFC7296"> | ||||
<front> | ||||
<title>Internet Key Exchange Protocol Version 2 (IKEv2)</title> | ||||
<author fullname="C. Kaufman" initials="C." surname="Kaufman"/> | ||||
<author fullname="P. Hoffman" initials="P." surname="Hoffman"/> | ||||
<author fullname="Y. Nir" initials="Y." surname="Nir"/> | ||||
<author fullname="P. Eronen" initials="P." surname="Eronen"/> | ||||
<author fullname="T. Kivinen" initials="T." surname="Kivinen"/> | ||||
<date month="October" year="2014"/> | ||||
<abstract> | ||||
<t indent="0">This document describes version 2 of the Internet Ke | ||||
y Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutu | ||||
al authentication and establishing and maintaining Security Associations (SAs). | ||||
This document obsoletes RFC 5996, and includes all of the errata for it. It ad | ||||
vances IKEv2 to be an Internet Standard.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="STD" value="79"/> | ||||
<seriesInfo name="RFC" value="7296"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7296"/> | ||||
</reference> | ||||
<reference anchor="RFC8221" target="https://www.rfc-editor.org/info/rfc8 | ||||
221" quoteTitle="true" derivedAnchor="RFC8221"> | ||||
<front> | ||||
<title>Cryptographic Algorithm Implementation Requirements and Usage | ||||
Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH | ||||
)</title> | ||||
<author fullname="P. Wouters" initials="P." surname="Wouters"/> | ||||
<author fullname="D. Migault" initials="D." surname="Migault"/> | ||||
<author fullname="J. Mattsson" initials="J." surname="Mattsson"/> | ||||
<author fullname="Y. Nir" initials="Y." surname="Nir"/> | ||||
<author fullname="T. Kivinen" initials="T." surname="Kivinen"/> | ||||
<date month="October" year="2017"/> | ||||
<abstract> | ||||
<t indent="0">This document replaces RFC 7321, "Cryptographic Algo | ||||
rithm Implementation Requirements and Usage Guidance for Encapsulating Security | ||||
Payload (ESP) and Authentication Header (AH)". The goal of this document is to | ||||
enable ESP and AH to benefit from cryptography that is up to date while making I | ||||
Psec interoperable.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8221"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8221"/> | ||||
</reference> | ||||
<reference anchor="RFC8784" target="https://www.rfc-editor.org/info/rfc8 | ||||
784" quoteTitle="true" derivedAnchor="RFC8784"> | ||||
<front> | ||||
<title>Mixing Preshared Keys in the Internet Key Exchange Protocol V | ||||
ersion 2 (IKEv2) for Post-quantum Security</title> | ||||
<author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/> | ||||
<author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/ | ||||
> | ||||
<author fullname="D. McGrew" initials="D." surname="McGrew"/> | ||||
<author fullname="V. Smyslov" initials="V." surname="Smyslov"/> | ||||
<date month="June" year="2020"/> | ||||
<abstract> | ||||
<t indent="0">The possibility of quantum computers poses a serious | ||||
challenge to cryptographic algorithms deployed widely today. The Internet Key | ||||
Exchange Protocol Version 2 (IKEv2) is one example of a cryptosystem that could | ||||
be broken; someone storing VPN communications today could decrypt them at a late | ||||
r time when a quantum computer is available. It is anticipated that IKEv2 will | ||||
be extended to support quantum-secure key exchange algorithms; however, that is | ||||
not likely to happen in the near term. To address this problem before then, thi | ||||
s document describes an extension of IKEv2 to allow it to be resistant to a quan | ||||
tum computer by using preshared keys.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8784"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8784"/> | ||||
</reference> | ||||
</references> | ||||
</references> | </references> | |||
<section anchor="authors-addresses" numbered="false" removeInRFC="false" toc | ||||
="include" pn="section-appendix.a"> | ||||
<name slugifiedName="name-authors-address">Author's Address</name> | ||||
<author initials="P." surname="Wouters" fullname="Paul Wouters" role="edit | ||||
or"> | ||||
<organization showOnFrontPage="true">Aiven</organization> | ||||
<address> | ||||
<email>paul.wouters@aiven.io</email> | ||||
</address> | ||||
</author> | ||||
</section> | ||||
</back> | </back> | |||
</rfc> | </rfc> | |||
End of changes. 37 change blocks. | ||||
332 lines changed or deleted | 833 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |