[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: LAST CALL: IKE Crypto documents I-D's



It's good that we're getting there, but I still think we haven't addressed
the issue of AES and key sizes.

The algorithms draft refers only to AES-128.  We should either add AES-256
or else rename the transforms to simply "ENCR_AES_CBC" and "ENCR_AES_CTR"
and use the keylength attribute to determine the specific "flavor" or AES.

IMO it doesn't make sense to use "ENCR_AES_128_CBC" with a 256-bit key.

-----Original Message-----
From: owner-ipsec@lists.tislabs.com
[mailto:owner-ipsec@lists.tislabs.com]On Behalf Of Theodore Ts'o
Sent: Wednesday, June 11, 2003 2:06 PM
To: ipsec@lists.tislabs.com
Cc: byfraser@cisco.com
Subject: LAST CALL: IKE Crypto documents I-D's



This is a working group last call for comments on the following drafts.

For progression to Proposed Standard:

	draft-ietf-ipsec-ikev2-algorithms-02.txt

For progression to Informational:

	draft-ietf-ipsec-ui-suites-00.txt

This last call with expire on June 23rd.

					- Ted and Barbara