RFC Errata System | 1 Sep 14:30 2010

[Technical Errata Reported] RFC2631 (2506)


The following errata report has been submitted for RFC2631,
"Diffie-Hellman Key Agreement Method".

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=2631&eid=2506

--------------------------------------
Type: Technical
Reported by: Yves Legrandgerard <ylg <at> pps.jussieu.fr>

Section: 2.2.1.1

Original Text
-------------
6. For i = 0 to m' - 1

        U = U + (SHA1[SEED + i] XOR SHA1[(SEED + m' + i)) * 2^(160 * i)

   Note that for m=160, this reduces to the algorithm of [FIPS-186]

        U = SHA1[SEED] XOR SHA1[(SEED+1) mod 2^160 ].

Corrected Text
--------------
6. For i = 0 to m' - 1

        U = U + (SHA1[SEED + i] XOR SHA1[(SEED + m' + i) mod 2^(160 * (i + 1))])

(Continue reading)

Paul Hoffman | 17 Sep 02:30 2010

Fwd: NomCom 2010-2011: Call for More Nominations

Forwarded from the NomCom Chair

>---------- Forwarded message ----------
>From: NomCom Chair <nomcom-chair <at> ietf.org>
>Date: Thu, Sep 16, 2010 at 6:26 PM
>Subject: NomCom 2010-2011: Call for More Nominations
>To: IETF Announcement list <ietf-announce <at> ietf.org>
>
>
>
>
>Hi Folks,
>
>Nominations have slowed down dramatically, so this update is to enlist
>the community in an effort to pick up the pace.
>
>We are very far behind in nominations for all the open positions but in
>particular we need nominations for the IESG and IAOC open positions.
>There have been no nominations received (other than for the incumbents)
>in INT, RAI, and RTG, and only 1 for OPS.  Likewise, in IAOC there have
>been no nominations submitted other than the incumbent.
>
>The acceptance rates of those nominated has also been very slow. In
>order to initiate the open list of willing nominees we are in need of a
>reasonable number of acceptances, and due to the low number of nominees
>and acceptances have delayed the start date for publishing the first
>open list to September 20.  So if you have been nominated and are
>willing to serve, but have not yet confirmed this by email back to the
>NomCom, please do so as soon as possible.
>
(Continue reading)

Paul Hoffman | 17 Sep 02:35 2010

Fwd: RFC 6010 on Cryptographic Message Syntax (CMS) Content Constraints Extension

>X-Original-To: ietf-announce <at> core3.amsl.com
>Delivered-To: ietf-announce <at> core3.amsl.com
>X-Virus-Scanned: amavisd-new at amsl.com
>X-Spam-Flag: NO
>X-Spam-Score: -102.099
>X-Spam-Level:
>X-Spam-Status: No, score=-102.099 tagged_above=-999 required=5
>	tests=[AWL=-0.099, BAYES_00=-2.599, J_CHICKENPOX_93=0.6,
>	NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
>To: ietf-announce <at> ietf.org, rfc-dist <at> rfc-editor.org
>Subject: RFC 6010 on Cryptographic Message Syntax (CMS) Content Constraints
>	Extension
>From: rfc-editor <at> rfc-editor.org
>Date: Thu, 16 Sep 2010 16:08:30 -0700 (PDT)
>Cc: rfc-editor <at> rfc-editor.org
>X-BeenThere: ietf-announce <at> ietf.org
>X-Mailman-Version: 2.1.9
>List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
>List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>,
>	<mailto:ietf-announce-request <at> ietf.org?subject=unsubscribe>
>List-Archive: <http://www.ietf.org/mail-archive/web/ietf-announce>
>List-Post: <mailto:ietf-announce <at> ietf.org>
>List-Help: <mailto:ietf-announce-request <at> ietf.org?subject=help>
>List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>,
>	<mailto:ietf-announce-request <at> ietf.org?subject=subscribe>
>Sender: ietf-announce-bounces <at> ietf.org
>
>
>A new Request for Comments is now available in online RFC libraries.
>
(Continue reading)

rfc-editor | 23 Sep 17:30 2010

RFC 5990 on Use of the RSA-KEM Key Transport Algorithm in the Cryptographic Message Syntax (CMS)


A new Request for Comments is now available in online RFC libraries.

        
        RFC 5990

        Title:      Use of the RSA-KEM Key 
                    Transport Algorithm in the Cryptographic Message 
                    Syntax (CMS) 
        Author:     J. Randall, B. Kaliski,
                    J. Brainard, S. Turner
        Status:     Standards Track
        Stream:     IETF
        Date:       September 2010
        Mailbox:    jdrandall <at> comcast.net, 
                    kaliski_burt <at> emc.com, 
                    jbrainard <at> rsa.com,  turners <at> ieca.com
        Pages:      27
        Characters: 52579
        Updates/Obsoletes/SeeAlso:   None

        I-D Tag:    draft-ietf-smime-cms-rsa-kem-13.txt

        URL:        http://www.rfc-editor.org/rfc/rfc5990.txt

The RSA-KEM Key Transport Algorithm is a one-pass (store-and-forward)
mechanism for transporting keying data to a recipient using the recipient's
RSA public key.  ("KEM" stands for "key encapsulation mechanism".)  This 
document specifies the conventions for using the RSA-KEM Key Transport
Algorithm with the Cryptographic Message Syntax (CMS).  The ASN.1 syntax is
(Continue reading)

Paul Hoffman | 24 Sep 00:45 2010

Fwd: New Non-WG Mailing List: ietf-privacy -- Internet Privacy Discussion List

Of possible interest to some members of this WG:

>A new IETF non-working group email list has been created.
>
>List address: ietf-privacy <at> ietf.org
>Archive: http://www.ietf.org/mail-archive/web/ietf-privacy/
>To subscribe: https://www.ietf.org/mailman/listinfo/ietf-privacy
>
>Description: This mailing list has been set up to discuss issues related
>to privacy that cut across multiple groups and areas.  The initial goal of
>this discussion is to investigate privacy and related identity management
>terminology. A secondary goal is to explore the opportunity to develop
>"Privacy Consideration" guidelines similar to the "Guidelines for Writing
>RFC Text on Security considerations" [RFC3552] used in the security area.
>The anticipation is that input into this list will come from solicited
>conversation within multiple other lists.
>
>For additional information, please contact the list administrators.
_______________________________________________
smime mailing list
smime <at> ietf.org
https://www.ietf.org/mailman/listinfo/smime

RFC Errata System | 24 Sep 00:06 2010

[Technical Errata Reported] RFC5990 (2529)


The following errata report has been submitted for RFC5990,
"Use of the RSA-KEM Key Transport Algorithm in the Cryptographic Message Syntax (CMS)".

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=5990&eid=2529

--------------------------------------
Type: Technical
Reported by: Alfred Hoenes <ah <at> TR-Sys.de>

Section: 4, pg.9

Original Text
-------------
   Within the CMS, algorithms are identified by object identifiers
|  (OIDs).  With one exception, all of the OIDs used in this document
   were assigned in other IETF documents, in ISO/IEC standards
   documents, by the National Institute of Standards and Technology
   (NIST), and in Public-Key Cryptography Standards (PKCS) documents.
   The two exceptions are the ASN.1 module's identifier (see Appendix
|  B.3) and id-rsa-kem that are both assigned in this document.  The
|  module object identifiers are defined in an arc delegated by the
   former company RSA Data Security Inc. to the S/MIME Working Group.
   When the S/MIME Working Group closes, this arc and its registration
   procedures will be transferred to IANA.

Corrected Text
--------------
(Continue reading)

Sean Turner | 27 Sep 18:58 2010

test (ignore)


_______________________________________________
smime mailing list
smime <at> ietf.org
https://www.ietf.org/mailman/listinfo/smime

Sean Turner | 28 Sep 15:01 2010

test (ignore)


_______________________________________________
smime mailing list
smime <at> ietf.org
https://www.ietf.org/mailman/listinfo/smime


Gmane