[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: LAST CALL: IKE Crypto documents I-D's
It's good that we're getting there, but I still think we haven't addressed
the issue of AES and key sizes.
The algorithms draft refers only to AES-128. We should either add AES-256
or else rename the transforms to simply "ENCR_AES_CBC" and "ENCR_AES_CTR"
and use the keylength attribute to determine the specific "flavor" or AES.
IMO it doesn't make sense to use "ENCR_AES_128_CBC" with a 256-bit key.
-----Original Message-----
From: owner-ipsec@lists.tislabs.com
[mailto:owner-ipsec@lists.tislabs.com]On Behalf Of Theodore Ts'o
Sent: Wednesday, June 11, 2003 2:06 PM
To: ipsec@lists.tislabs.com
Cc: byfraser@cisco.com
Subject: LAST CALL: IKE Crypto documents I-D's
This is a working group last call for comments on the following drafts.
For progression to Proposed Standard:
draft-ietf-ipsec-ikev2-algorithms-02.txt
For progression to Informational:
draft-ietf-ipsec-ui-suites-00.txt
This last call with expire on June 23rd.
- Ted and Barbara