summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc8423.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc8423.txt')
-rw-r--r--doc/rfc/rfc8423.txt451
1 files changed, 451 insertions, 0 deletions
diff --git a/doc/rfc/rfc8423.txt b/doc/rfc/rfc8423.txt
new file mode 100644
index 0000000..c54d3ac
--- /dev/null
+++ b/doc/rfc/rfc8423.txt
@@ -0,0 +1,451 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) R. Housley
+Request for Comments: 8423 Vigil Security
+Category: Informational L. Zieglar
+ISSN: 2070-1721 National Security Agency
+ July 2018
+
+
+ Reclassification of Suite B Documents to Historic Status
+
+Abstract
+
+ This document reclassifies the RFCs related to the United States
+ National Security Agency (NSA) Suite B cryptographic algorithms as
+ Historic, and it discusses the reasons for doing so. This document
+ moves seven Informational RFCs to Historic status: RFCs 5759, 6239,
+ 6318, 6379, 6380, 6403, and 6460. In addition, it moves three
+ obsolete Informational RFCs to Historic status: RFCs 4869, 5008, and
+ 5430.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are candidates for any level of Internet
+ Standard; see Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc8423.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Housley & Zieglar Informational [Page 1]
+
+RFC 8423 Suite B to Historic July 2018
+
+
+Copyright Notice
+
+ Copyright (c) 2018 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
+ 2. Rationale . . . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 3. The RFCs Related to Suite B . . . . . . . . . . . . . . . . . 3
+ 4. Documents That Reference the Suite-B-Related RFCs . . . . . . 3
+ 4.1. Documents That Reference RFC 4869 . . . . . . . . . . . . 4
+ 4.2. Documents That Reference RFC 5759 . . . . . . . . . . . . 4
+ 4.3. Documents That Reference RFC 6379 . . . . . . . . . . . . 4
+ 4.4. Documents That Reference RFC 6403 . . . . . . . . . . . . 4
+ 4.5. Documents That Reference RFC 6460 . . . . . . . . . . . . 5
+ 5. Impact of Reclassifying the Suite-B-Related RFCs to Historic 5
+ 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
+ 7. Security Considerations . . . . . . . . . . . . . . . . . . . 5
+ 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 6
+ 8.1. Normative References . . . . . . . . . . . . . . . . . . 6
+ 8.2. Informative References . . . . . . . . . . . . . . . . . 7
+ Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 8
+
+1. Introduction
+
+ Several RFCs profile security protocols for use with the National
+ Security Agency (NSA) Suite B Cryptography. Suite B is no longer
+ supported by NSA, and the web pages that specify the cryptographic
+ algorithms are no longer available.
+
+ In July 2015, NSA published the Committee for National Security
+ Systems Advisory Memorandum 02-15 as the first step in replacing
+ Suite B with NSA's Commercial National Security Algorithm (CNSA)
+ Suite. Information about the CNSA Suite can be found in [CNSA].
+
+
+
+
+
+
+Housley & Zieglar Informational [Page 2]
+
+RFC 8423 Suite B to Historic July 2018
+
+
+2. Rationale
+
+ As indicated in [CNSA], NSA is transitioning from Suite B to the CNSA
+ Suite. As a result, the profiles of the security protocols for the
+ Suite B algorithms are now only of historic interest.
+
+3. The RFCs Related to Suite B
+
+ Between 2007 and 2012, several Suite-B-related RFCs were published to
+ profile security protocols for use with the Suite B algorithms. They
+ are:
+
+ o [RFC4869], "Suite B Cryptographic Suites for IPsec" (Obsoleted by
+ RFC 6379)
+
+ o [RFC5008], "Suite B in Secure/Multipurpose Internet Mail
+ Extensions (S/MIME)" (Obsoleted by RFC 6318)
+
+ o [RFC5430], "Suite B Profile for Transport Layer Security (TLS)"
+ (Obsoleted by RFC 6460)
+
+ o [RFC5759], "Suite B Certificate and Certificate Revocation List
+ (CRL) Profile"
+
+ o [RFC6239], "Suite B Cryptographic Suites for Secure Shell (SSH)"
+
+ o [RFC6318], "Suite B in Secure/Multipurpose Internet Mail
+ Extensions (S/MIME)"
+
+ o [RFC6379], "Suite B Cryptographic Suites for IPsec"
+
+ o [RFC6380], "Suite B Profile for Internet Protocol Security
+ (IPsec)"
+
+ o [RFC6403], "Suite B Profile of Certificate Management over CMS"
+
+ o [RFC6460], "Suite B Profile for Transport Layer Security (TLS)"
+
+4. Documents That Reference the Suite-B-Related RFCs
+
+ These RFCs reference each other several times. These cross-
+ references are not examined further in this document.
+
+ Other RFCs make reference to these Suite-B-related RFCs; these
+ references are discussed in the following subsections.
+
+
+
+
+
+
+Housley & Zieglar Informational [Page 3]
+
+RFC 8423 Suite B to Historic July 2018
+
+
+4.1. Documents That Reference RFC 4869
+
+ One other RFC makes reference to RFC 4869 [RFC4869].
+
+ RFC 6071, "IP Security (IPsec) and Internet Key Exchange (IKE)
+ Document Roadmap" [RFC6071], points out that RFC 4869 adds four pre-
+ defined suites based upon Suite B specifications. They are:
+
+ o IKE/ESP suite "Suite-B-GCM-128"
+
+ o IKE/ESP suite "Suite-B-GCM-256"
+
+ o IKE/AH suite "Suite-B-GMAC-128"
+
+ o IKE/AH suite "Suite-B-GMAC-256"
+
+ In each case, these suite definitions make use of algorithms that are
+ defined in other RFCs. No interoperability or security concerns are
+ raised if implementations continue to make use of these suite names.
+
+4.2. Documents That Reference RFC 5759
+
+ One other RFC makes reference to RFC 5759 [RFC5759].
+
+ RFC 6187, "X.509v3 Certificates for Secure Shell Authentication"
+ [RFC6187], points out that RFC 5759 provides additional guidance for
+ Elliptic Curve Digital Signature Algorithm (ECDSA) keys when used
+ with Suite B.
+
+4.3. Documents That Reference RFC 6379
+
+ One other RFC makes reference to RFC 6379 [RFC6379].
+
+ RFC 7321, "Cryptographic Algorithm Implementation Requirements and
+ Usage Guidance for Encapsulating Security Payload (ESP) and
+ Authentication Header (AH)" [RFC7321], points out that the AES-GCM
+ algorithm is used by Suite B, and it has emerged as the preferred
+ authenticated encryption method in IPsec. RFC 7321 has since been
+ obsoleted by RFC 8221.
+
+4.4. Documents That Reference RFC 6403
+
+ Two other RFCs make reference to RFC 6403 [RFC6403].
+
+ RFC 6402, "Certificate Management over CMS (CMC) Updates" [RFC6402],
+ says that development of the profile for Suite B was the activity
+ that demonstrated the need for these updates.
+
+
+
+
+Housley & Zieglar Informational [Page 4]
+
+RFC 8423 Suite B to Historic July 2018
+
+
+ RFC 7030, "Enrollment over Secure Transport" [RFC7030], points out
+ that the scenarios in Appendix of RFC 6403 are very similar to three
+ of the scenarios described.
+
+4.5. Documents That Reference RFC 6460
+
+ Three other RFCs make reference to RFC 6460 [RFC6460].
+
+ RFC 6605, "Elliptic Curve Digital Signature Algorithm (DSA) for
+ DNSSEC" [RFC6605], states that material was copied liberally from RFC
+ 6460. The Standards Track status of RFC 6605 is not affected by RFC
+ 6460 moving to Historic status.
+
+ RFC 7525, "Recommendations for Secure Use of Transport Layer Security
+ (TLS) and Datagram Transport Layer Security (DTLS)" [RFC7525],
+ observes that the Suite B profile of TLS 1.2 uses different
+ ciphersuites.
+
+ RFC 8253, "PCEPS: Usage of TLS to Provide a Secure Transport for the
+ Path Computation Element Communication Protocol (PCEP)" [RFC8253],
+ points to RFC 6460 for the TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
+ and TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ciphersuites. Both of
+ these ciphersuites are defined in [RFC5289], which would have been a
+ better reference. The Standards Track status of RFC 8253 is not
+ affected by RFC 6460 moving to Historic status.
+
+5. Impact of Reclassifying the Suite-B-Related RFCs to Historic
+
+ No interoperability or security concerns are raised by reclassifying
+ the Suite-B-related RFCs to Historic status. As described in
+ Section 4, none of the RFCs being moved to Historic status is the
+ sole specification of a cryptographic algorithm or an identifier for
+ a cryptographic algorithm.
+
+6. IANA Considerations
+
+ This document has no IANA actions.
+
+7. Security Considerations
+
+ No interoperability or security concerns are raised by reclassifying
+ the Suite-B-related RFCs to Historic status.
+
+ NSA is transitioning away from some of the cryptographic algorithms
+ and key sizes that were employed in the Suite B profiles.
+
+
+
+
+
+
+Housley & Zieglar Informational [Page 5]
+
+RFC 8423 Suite B to Historic July 2018
+
+
+8. References
+
+8.1. Normative References
+
+ [RFC4869] Law, L. and J. Solinas, "Suite B Cryptographic Suites for
+ IPsec", RFC 4869, DOI 10.17487/RFC4869, May 2007,
+ <https://www.rfc-editor.org/info/rfc4869>.
+
+ [RFC5008] Housley, R. and J. Solinas, "Suite B in Secure/
+ Multipurpose Internet Mail Extensions (S/MIME)", RFC 5008,
+ DOI 10.17487/RFC5008, September 2007,
+ <https://www.rfc-editor.org/info/rfc5008>.
+
+ [RFC5430] Salter, M., Rescorla, E., and R. Housley, "Suite B Profile
+ for Transport Layer Security (TLS)", RFC 5430,
+ DOI 10.17487/RFC5430, March 2009,
+ <https://www.rfc-editor.org/info/rfc5430>.
+
+ [RFC5759] Solinas, J. and L. Zieglar, "Suite B Certificate and
+ Certificate Revocation List (CRL) Profile", RFC 5759,
+ DOI 10.17487/RFC5759, January 2010,
+ <https://www.rfc-editor.org/info/rfc5759>.
+
+ [RFC6239] Igoe, K., "Suite B Cryptographic Suites for Secure Shell
+ (SSH)", RFC 6239, DOI 10.17487/RFC6239, May 2011,
+ <https://www.rfc-editor.org/info/rfc6239>.
+
+ [RFC6318] Housley, R. and J. Solinas, "Suite B in Secure/
+ Multipurpose Internet Mail Extensions (S/MIME)", RFC 6318,
+ DOI 10.17487/RFC6318, June 2011,
+ <https://www.rfc-editor.org/info/rfc6318>.
+
+ [RFC6379] Law, L. and J. Solinas, "Suite B Cryptographic Suites for
+ IPsec", RFC 6379, DOI 10.17487/RFC6379, October 2011,
+ <https://www.rfc-editor.org/info/rfc6379>.
+
+ [RFC6380] Burgin, K. and M. Peck, "Suite B Profile for Internet
+ Protocol Security (IPsec)", RFC 6380,
+ DOI 10.17487/RFC6380, October 2011,
+ <https://www.rfc-editor.org/info/rfc6380>.
+
+ [RFC6403] Zieglar, L., Turner, S., and M. Peck, "Suite B Profile of
+ Certificate Management over CMS", RFC 6403,
+ DOI 10.17487/RFC6403, November 2011,
+ <https://www.rfc-editor.org/info/rfc6403>.
+
+
+
+
+
+
+Housley & Zieglar Informational [Page 6]
+
+RFC 8423 Suite B to Historic July 2018
+
+
+ [RFC6460] Salter, M. and R. Housley, "Suite B Profile for Transport
+ Layer Security (TLS)", RFC 6460, DOI 10.17487/RFC6460,
+ January 2012, <https://www.rfc-editor.org/info/rfc6460>.
+
+8.2. Informative References
+
+ [CNSA] National Security Agency, "Commercial National Security
+ Algorithm Suite", August 2015,
+ <https://www.iad.gov/iad/programs/iad-initiatives/
+ cnsa-suite.cfm>.
+
+ [RFC5289] Rescorla, E., "TLS Elliptic Curve Cipher Suites with SHA-
+ 256/384 and AES Galois Counter Mode (GCM)", RFC 5289,
+ DOI 10.17487/RFC5289, August 2008,
+ <https://www.rfc-editor.org/info/rfc5289>.
+
+ [RFC6071] Frankel, S. and S. Krishnan, "IP Security (IPsec) and
+ Internet Key Exchange (IKE) Document Roadmap", RFC 6071,
+ DOI 10.17487/RFC6071, February 2011,
+ <https://www.rfc-editor.org/info/rfc6071>.
+
+ [RFC6187] Igoe, K. and D. Stebila, "X.509v3 Certificates for Secure
+ Shell Authentication", RFC 6187, DOI 10.17487/RFC6187,
+ March 2011, <https://www.rfc-editor.org/info/rfc6187>.
+
+ [RFC6402] Schaad, J., "Certificate Management over CMS (CMC)
+ Updates", RFC 6402, DOI 10.17487/RFC6402, November 2011,
+ <https://www.rfc-editor.org/info/rfc6402>.
+
+ [RFC6605] Hoffman, P. and W. Wijngaards, "Elliptic Curve Digital
+ Signature Algorithm (DSA) for DNSSEC", RFC 6605,
+ DOI 10.17487/RFC6605, April 2012,
+ <https://www.rfc-editor.org/info/rfc6605>.
+
+ [RFC7030] Pritikin, M., Ed., Yee, P., Ed., and D. Harkins, Ed.,
+ "Enrollment over Secure Transport", RFC 7030,
+ DOI 10.17487/RFC7030, October 2013,
+ <https://www.rfc-editor.org/info/rfc7030>.
+
+ [RFC7321] McGrew, D. and P. Hoffman, "Cryptographic Algorithm
+ Implementation Requirements and Usage Guidance for
+ Encapsulating Security Payload (ESP) and Authentication
+ Header (AH)", RFC 7321, DOI 10.17487/RFC7321, August 2014,
+ <https://www.rfc-editor.org/info/rfc7321>.
+
+
+
+
+
+
+
+Housley & Zieglar Informational [Page 7]
+
+RFC 8423 Suite B to Historic July 2018
+
+
+ [RFC7525] Sheffer, Y., Holz, R., and P. Saint-Andre,
+ "Recommendations for Secure Use of Transport Layer
+ Security (TLS) and Datagram Transport Layer Security
+ (DTLS)", BCP 195, RFC 7525, DOI 10.17487/RFC7525, May
+ 2015, <https://www.rfc-editor.org/info/rfc7525>.
+
+ [RFC8253] Lopez, D., Gonzalez de Dios, O., Wu, Q., and D. Dhody,
+ "PCEPS: Usage of TLS to Provide a Secure Transport for the
+ Path Computation Element Communication Protocol (PCEP)",
+ RFC 8253, DOI 10.17487/RFC8253, October 2017,
+ <https://www.rfc-editor.org/info/rfc8253>.
+
+Authors' Addresses
+
+ Russ Housley
+ Vigil Security, LLC
+ 918 Spring Knoll Drive
+ Herndon, VA 20170
+ United States of America
+
+ Email: housley@vigilsec.com
+
+
+ Lydia Zieglar
+ National Security Agency
+ 9800 Savage Road
+ Ft. George G. Meade, MD 20755-6940
+ United States of America
+
+ Email: llziegl@nsa.gov
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Housley & Zieglar Informational [Page 8]
+