Committed to connecting the world

  •  
ITU GSR 2024

ITU-T work programme

Home : ITU-T Home : ITU-T Work Programme : H.248.1 v3 Amd.2     
  ITU-T A.5 justification information for referenced document IETF RFC 2401 (1998) in draft H.248.1 v3 Amd.2
1. Clear description of the referenced document:
Name: IETF RFC 2401 (1998)
Title: Security Architecture for the Internet Protocol, November, 1998
2. Status of approval:
Approved standards track document.
3. Justification for the specific reference:
ITU-T H.248.1 defines the use of IPSEC for secure transport of H.248.1 messages over IP. IETF RFC 2401 is one in a suite of RFCs defining IPSEC.
4. Current information, if any, about IPR issues:
Information on IPR issues regarding RFCs is available at: https://datatracker.ietf.org/ipr/search/. Specifically: https://datatracker.ietf.org/ipr/search/?option=rfc_search&rfc_search=2401
5. Other useful information describing the "Quality" of the document:
RFC 2401 has been in existence since 1998. It obsoletes RFC 1825 which has been in existence since August, 1995. These documents have been reviewed extensively in IETF.
6. The degree of stability or maturity of the document:
RFC is a standards-track document and is currently in the "Proposed Standard" state. Current standards status of this document can be found at ftp://ftp.isi.edu/in-notes/std/std1.txt
7. Relationship with other existing or emerging documents:
RFC 2401 defines the IP Security Protocol (IPsec) and is expected to be widely used.
8. Any explicit references within that referenced document should also be listed:
[1] Bell, D.E. & LaPadula, L.J., "Secure Computer Systems: Mathematical Foundations and Model", Technical Report M74-244, The MITRE Corporation, Bedford, MA, May 1973./
/
[2] Bradner, S., "Key words for use in RFCs to Indicate Requirement Level", BCP 14, RFC 2119, March 1997./
/
[3] US National Computer Security Center, "Department of Defense Trusted Computer System Evaluation Criteria", DoD 5200.28-STD, US Department of Defense, Ft. Meade, MD., Dec 1985./
/
[4] US National Computer Security Center, "Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria", NCSC-TG-005, Version 1, US Department of Defense, Ft. Meade, MD., 31 July 1987./
/
[5] Haller, N., and R. Atkinson, "On Internet Authentication" RFC 1704, October 1994./
/
[6] Harkins, D., and D. Carrel, "The Internet Key Exchange (IKE)", RFC 2409, November 1998./
/
[7] Harney, H., and C. Muckenhirn, "Group Key Management Protocol (GKMP) Architecture", RFC 2094, July 1997./
/
[8] ISO/IEC JTC1/SC6, Network Layer Security Protocol, ISO-IEC DIS 11577, International Standards Organisation, Geneva, Switzerland, 29 November 1992./
/
[9] John Ioannidis and Matt Blaze, "Architecture and Implementation of Network-layer Security Under Unix", Proceedings of USENIX Security Symposium, Santa Clara, CA, October 1993./
/
[10] John Ioannidis, Matt Blaze, & Phil Karn, "swIPe: Network-Layer Security for IP", presentation at the Spring 1993 IETF Meeting, Columbus, Ohio/
/
[11] Kent, S., and R. Atkinson, "IP Authentication Header", RFC 2402, November 1998./
/
[12] Kent, S., and R. Atkinson, "IP Encapsulating Security Payload (ESP)", RFC 2406, November 1998./
/
[13] Kent, S., "US DoD Security Options for the Internet Protocol", RFC 1108, November 1991./
/
[14] Maughan, D., Schertler, M., Schneider, M., and J. Turner, "Internet Security Association and Key Management Protocol (ISAKMP)", RFC 2408, November 1998./
/
[15] Orman, H., "The OAKLEY Key Determination Protocol", RFC 2412, November 1998./
/
[16] Piper, D., "The Internet IP Security Domain of Interpretation for ISAKMP", RFC 2407, November 1998./
/
[17] Bruce Schneier, Applied Cryptography, Section 8.6, John Wiley & Sons, New York, NY, 1994./
/
[18] SDNS Secure Data Network System, Security Protocol 3, SP3, Document SDN.301, Revision 1.5, 15 May 1989, published in NIST Publication NIST-IR-90-4250, February 1990./
/
[19] Shacham, A., Monsour, R., Pereira, R., and M. Thomas, "IP Payload Compression Protocol (IPComp)", RFC 2393, August 1998./
/
[21] Thayer, R., Doraswamy, N., and R. Glenn, "IP Security Document Roadmap", RFC 2411, November 1998./
/
[22] V.L. Voydock & S.T. Kent, "Security Mechanisms in High-level Networks", ACM Computing Surveys, Vol. 15, No. 2, June 1983.
9. Qualification of ISOC/IETF:
9.1-9.6     Decisions of ITU Council to admit ISOC to participate in the work of the Sector (June 1995 and June 1996).
9.7     The Internet Engineering Steering Group (IESG) is responsible for ongoing maintenance of the RFCs when the need arises. Comments on RFCs and corresponding changes are accommodated through the existing standardization process.
9.8     Each revision of a given RFC has a different RFC number, so no confusion is possible. All RFCs always remain available on-line. An index of RFCs and their status may be found in the IETF archives at http://www.rfc-editor.org/rfc.html.
10. Other (for any supplementary information):
References should always be made to RFC numbers (and not by other designations such as STD, BCP, etc.). References not to be made to documents referred to as "Internet Drafts" or RFCs categorized as "Historic". Normative references should not be made to RFCs that are not standards, for example, "Informational" and "Experimental" RFCs.
Note: This form is based on Recommendation ITU-T A.5