summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc8758.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc8758.txt')
-rw-r--r--doc/rfc/rfc8758.txt196
1 files changed, 196 insertions, 0 deletions
diff --git a/doc/rfc/rfc8758.txt b/doc/rfc/rfc8758.txt
new file mode 100644
index 0000000..312280c
--- /dev/null
+++ b/doc/rfc/rfc8758.txt
@@ -0,0 +1,196 @@
+
+
+
+
+Internet Engineering Task Force (IETF) L. Velvindron
+Request for Comments: 8758 cyberstorm.mu
+BCP: 227 April 2020
+Updates: 4253
+Category: Best Current Practice
+ISSN: 2070-1721
+
+
+ Deprecating RC4 in Secure Shell (SSH)
+
+Abstract
+
+ This document deprecates RC4 in Secure Shell (SSH). Therefore, this
+ document formally moves RFC 4345 to Historic status.
+
+Status of This Memo
+
+ This memo documents an Internet Best Current Practice.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Further information on
+ BCPs is available in Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc8758.
+
+Copyright Notice
+
+ Copyright (c) 2020 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction
+ 1.1. Requirements Language
+ 2. Updates to RFC 4253
+ 3. IANA Considerations
+ 4. Security Considerations
+ 5. References
+ 5.1. Normative References
+ 5.2. Informative References
+ Acknowledgements
+ Author's Address
+
+1. Introduction
+
+ The usage of RC4 suites (also designated as "arcfour") for SSH is
+ specified in [RFC4253] and [RFC4345]. [RFC4253] specifies the
+ allocation of the "arcfour" cipher for SSH. [RFC4345] specifies and
+ allocates the "arcfour128" and "arcfour256" ciphers for SSH. RC4
+ encryption has known weaknesses [RFC7465] [RFC8429]; therefore, this
+ document starts the deprecation process for their use in Secure Shell
+ (SSH) [RFC4253]. Accordingly, [RFC4253] is updated to note the
+ deprecation of the RC4 ciphers, and [RFC4345] is moved to Historic
+ status, as all ciphers it specifies MUST NOT be used.
+
+1.1. Requirements Language
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
+ "OPTIONAL" in this document are to be interpreted as described in
+ BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
+ capitals, as shown here.
+
+2. Updates to RFC 4253
+
+ [RFC4253] is updated to prohibit arcfour's use in SSH. [RFC4253],
+ Section 6.3 allocates the "arcfour" cipher by defining a list of
+ defined ciphers in which the "arcfour" cipher appears as optional, as
+ shown in Table 1.
+
+ +---------+----------+----------------------------------------------+
+ | arcfour | OPTIONAL | the ARCFOUR stream cipher |
+ | | | with a 128-bit key |
+ +---------+----------+----------------------------------------------+
+
+ Table 1
+
+ This document updates the status of the "arcfour" ciphers in the list
+ found in [RFC4253], Section 6.3 by moving it from OPTIONAL to MUST
+ NOT.
+
+ +---------+----------+----------------------------------------------+
+ | arcfour | MUST NOT | the ARCFOUR stream cipher |
+ | | | with a 128-bit key |
+ +---------+----------+----------------------------------------------+
+
+ Table 2
+
+ [RFC4253] defines the "arcfour" ciphers with the following text:
+
+ | The "arcfour" cipher is the Arcfour stream cipher with 128-bit
+ | keys. The Arcfour cipher is believed to be compatible with the
+ | RC4 cipher [SCHNEIER]. Arcfour (and RC4) has problems with weak
+ | keys, and should be used with caution.
+
+ This document updates [RFC4253], Section 6.3 by replacing the text
+ above with the following text:
+
+ | The "arcfour" cipher is the Arcfour stream cipher with 128-bit
+ | keys. The Arcfour cipher is compatible with the RC4 cipher
+ | [SCHNEIER]. Arcfour (and RC4) has known weaknesses [RFC7465]
+ | [RFC8429] and MUST NOT be used.
+
+3. IANA Considerations
+
+ The IANA has updated the "Encryption Algorithm Names" subregistry in
+ the "Secure Shell (SSH) Protocol Parameters" registry [IANA]. The
+ registration procedure is IETF review, which is achieved by this
+ document. The registry has been updated as follows:
+
+ +---------------------------+-----------+----------+
+ | Encryption Algorithm Name | Reference | Note |
+ +===========================+===========+==========+
+ | arcfour | RFC 8758 | HISTORIC |
+ +---------------------------+-----------+----------+
+ | arcfour128 | RFC 8758 | HISTORIC |
+ +---------------------------+-----------+----------+
+ | arcfour256 | RFC 8758 | HISTORIC |
+ +---------------------------+-----------+----------+
+
+ Table 3
+
+4. Security Considerations
+
+ This document only prohibits the use of RC4 in SSH; it introduces no
+ new security considerations.
+
+5. References
+
+5.1. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119,
+ DOI 10.17487/RFC2119, March 1997,
+ <https://www.rfc-editor.org/info/rfc2119>.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
+ May 2017, <https://www.rfc-editor.org/info/rfc8174>.
+
+5.2. Informative References
+
+ [IANA] "Secure Shell (SSH) Protocol Parameters",
+ <https://www.iana.org/assignments/ssh-parameters>.
+
+ [RFC4253] Ylonen, T. and C. Lonvick, Ed., "The Secure Shell (SSH)
+ Transport Layer Protocol", RFC 4253, DOI 10.17487/RFC4253,
+ January 2006, <https://www.rfc-editor.org/info/rfc4253>.
+
+ [RFC4345] Harris, B., "Improved Arcfour Modes for the Secure Shell
+ (SSH) Transport Layer Protocol", RFC 4345,
+ DOI 10.17487/RFC4345, January 2006,
+ <https://www.rfc-editor.org/info/rfc4345>.
+
+ [RFC7465] Popov, A., "Prohibiting RC4 Cipher Suites", RFC 7465,
+ DOI 10.17487/RFC7465, February 2015,
+ <https://www.rfc-editor.org/info/rfc7465>.
+
+ [RFC8429] Kaduk, B. and M. Short, "Deprecate Triple-DES (3DES) and
+ RC4 in Kerberos", BCP 218, RFC 8429, DOI 10.17487/RFC8429,
+ October 2018, <https://www.rfc-editor.org/info/rfc8429>.
+
+ [SCHNEIER] Schneier, B., "Applied Cryptography Second Edition:
+ Protocols, Algorithms, and Source in Code in C", John
+ Wiley and Sons New York, NY, 1996.
+
+Acknowledgements
+
+ The author would like to thank Eric Rescorla, Daniel Migault, and
+ Rich Salz.
+
+Author's Address
+
+ Loganaden Velvindron
+ cyberstorm.mu
+ Mauritius
+
+ Email: logan@cyberstorm.mu