Committed to connecting the world

  •  
ITU GSR 2024

ITU-T work programme

Home : ITU-T Home : ITU-T Work Programme : X.1240     
  ITU-T A.5 justification information for referenced document IETF RFC 4686 (2006) in draft X.1240
1. Clear description of the referenced document:
Name: IETF RFC 4686 (2006)
Title: Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)
2. Status of approval:
The referred RFCs were approved by IESG (Internet Engineering Steering Group).
3. Justification for the specific reference:
Draft Rec. X.gcs refers to abstract part of IETF RFC 4686 (September 2006).
4. Current information, if any, about IPR issues:
Information on IPR issues regarding RFCs is available at: https://datatracker.ietf.org/ipr/search/. Specifically: https://datatracker.ietf.org/ipr/search/?option=rfc_search&rfc_search=4686
5. Other useful information describing the "Quality" of the document:
The status of all the referred RFCs is "Proposed Standard".
6. The degree of stability or maturity of the document:
The status of all the referred RFCs is "Proposed Standard".
7. Relationship with other existing or emerging documents:
References within the referenced RFCs are listed under item (8).
8. Any explicit references within that referenced document should also be listed:
[Bernstein04] Bernstein, D., "Cache Timing Attacks on AES", April 2004./
[Boneh03] Boneh, D. and D. Brumley, "Remote Timing Attacks are Practical", Proc. 12th USENIX Security Symposium, 2003./
[DKIM-BASE] Allman, E., "DomainKeys Identified Mail (DKIM) Signatures", Work in Progress, August 2006./
[DKIM-SSP] Allman, E., "DKIM Sender Signing Practices", Work in Progress, August 2006./
[Kocher96] Kocher, P., "Timing Attacks on Implementations of Diffie- Hellman, RSA, and other Cryptosystems", Advances in Cryptology, pages 104-113, 1996./
[Kocher99] Kocher, P., Joffe, J., and B. Yun, "Differential Power Analysis: Leaking Secrets", Crypto '99, pages 388-397, 1999./
[RFC1939] Myers, J. and M. Rose, "Post Office Protocol - Version 3", STD 53, RFC 1939, May 1996./
[RFC2821] Klensin, J., "Simple Mail Transfer Protocol", RFC 2821, April 2001./
[RFC2822] Resnick, P., "Internet Message Format", RFC 2822, April 2001./
[RFC3501] Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1", RFC 3501, March 2003./
[RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, "DNS Security Introduction and Requirements", RFC 4033, March 2005./
[US-CERT-DNS] US-CERT, "The Continuing Denial of Service Threat Posed by DNS Recursion"./
[UTR36] Davis, M. and M. Suignard, "Unicode Technical Report #36: Unicode Security Considerations", UTR 36, July 2005./
9. Qualification of ISOC/IETF:
9.1-9.6     Decisions of ITU Council to admit ISOC to participate in the work of the Sector (June 1995 and June 1996).
9.7     The Internet Engineering Steering Group (IESG) is responsible for ongoing maintenance of the RFCs when the need arises. Comments on RFCs and corresponding changes are accommodated through the existing standardization process.
9.8     Each revision of a given RFC has a different RFC number, so no confusion is possible. All RFCs always remain available on-line. An index of RFCs and their status may be found in the IETF archives at http://www.rfc-editor.org/rfc.html.
10. Other (for any supplementary information):
None
Note: This form is based on Recommendation ITU-T A.5