References from draft-ietf-curdle-ssh-kex-sha2
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Document | Title | Status | Type | Downref |
---|---|---|---|---|
BCP 14 |
Key words for use in RFCs to Indicate Requirement Levels References Referenced by |
Best Current Practice | normatively references | |
RFC 2119 |
Key words for use in RFCs to Indicate Requirement Levels References Referenced by |
Best Current Practice | normatively references | |
RFC 3526 |
More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE) References Referenced by |
Proposed Standard | normatively references | |
RFC 4250 |
The Secure Shell (SSH) Protocol Assigned Numbers References Referenced by |
Proposed Standard | normatively references | |
RFC 4251 |
The Secure Shell (SSH) Protocol Architecture References Referenced by |
Proposed Standard | informatively references | |
RFC 4253 |
The Secure Shell (SSH) Transport Layer Protocol References Referenced by |
Proposed Standard | normatively references | |
RFC 4419 |
Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol References Referenced by |
Proposed Standard | informatively references | |
RFC 4432 |
RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol References Referenced by |
Proposed Standard | informatively references | |
RFC 4462 |
Generic Security Service Application Program Interface (GSS-API) Authentication and Key Exchange for the Secure Shell (SSH) Protocol References Referenced by |
Proposed Standard | informatively references | |
RFC 5656 |
Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer References Referenced by |
Proposed Standard | informatively references | |
RFC 6194 |
Security Considerations for the SHA-0 and SHA-1 Message-Digest Algorithms References Referenced by |
Informational | informatively references | |
RFC 6234 |
US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) References Referenced by |
Informational | informatively references | |
RFC 8031 |
Curve25519 and Curve448 for the Internet Key Exchange Protocol Version 2 (IKEv2) Key Agreement References Referenced by |
Proposed Standard | normatively references | |
RFC 8174 |
Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words References Referenced by |
Best Current Practice | normatively references | |
RFC 8268 |
More Modular Exponentiation (MODP) Diffie-Hellman (DH) Key Exchange (KEX) Groups for Secure Shell (SSH) References Referenced by |
Proposed Standard | normatively references | |
RFC 8270 |
Increase the Secure Shell Minimum Recommended Diffie-Hellman Modulus Size to 2048 Bits References Referenced by |
Proposed Standard | normatively references | |
RFC 8308 |
Extension Negotiation in the Secure Shell (SSH) Protocol References Referenced by |
Proposed Standard | normatively references | |
RFC 8731 |
Secure Shell (SSH) Key Exchange Method Using Curve25519 and Curve448 References Referenced by |
Proposed Standard | informatively references | |
RFC 8732 |
Generic Security Service Application Program Interface (GSS-API) Key Exchange with SHA-2 References Referenced by |
Proposed Standard | informatively references |