Additional Diffie-Hellman Tests for the Internet Key Exchange Protocol Version 2 (IKEv2)
Draft of message to be sent after approval:
From: The IESG <email@example.com> To: IETF-Announce <firstname.lastname@example.org> Cc: RFC Editor <email@example.com>, ipsecme mailing list <firstname.lastname@example.org>, ipsecme chair <email@example.com> Subject: Protocol Action: 'Additional Diffie-Hellman Tests for IKEv2' to Proposed Standard (draft-ietf-ipsecme-dh-checks-05.txt) The IESG has approved the following document: - 'Additional Diffie-Hellman Tests for IKEv2' (draft-ietf-ipsecme-dh-checks-05.txt) as Proposed Standard This document is the product of the IP Security Maintenance and Extensions Working Group. The IESG contact persons are Sean Turner and Stephen Farrell. A URL of this Internet Draft is: http://datatracker.ietf.org/doc/draft-ietf-ipsecme-dh-checks/
Technical Summary The document corrects a problem found well after RFC 5996 was published. Implementations that support elliptic curves and DSA, and also reuse private keys, are vulnerable to some attacks that can be prevented by some simple checking. This document specifies the circumstances where the attack might happen and how to prevent them. Working Group Summary The document was reviewed by enough active developers and cryptographically-inclined participants to be sufficient for Standards Track. There is definite consensus to publish. Document Quality This document is appropriate for Standards Track because, if the attack had been known and understood when RFC 5996 was written, it would certainly have been part of that document. Personnel Paul Hoffman is the shepherd. Sean Turner is the AD.