]>
Commit | Line | Data |
---|---|---|
6d52cf21 RL |
1 | Standards related to OpenSSL |
2 | ============================ | |
3 | ||
4 | [Please, this is currently a draft. I made a first try at finding | |
5 | documents that describe parts of what OpenSSL implements. There are | |
6 | big gaps, and I've most certainly done something wrong. Please | |
7 | correct whatever is... Also, this note should be removed when this | |
8 | file is reaching a somewhat correct state. -- Richard Levitte] | |
9 | ||
10 | ||
11 | All pointers in here will be either URL's or blobs of text borrowed | |
12 | from miscellaneous indexes, like rfc-index.txt (index of RFCs), | |
13 | 1id-index.txt (index of Internet drafts) and the like. | |
14 | ||
15 | To find the latest possible RFCs, it's recommended to either browse | |
16 | ftp://ftp.isi.edu/in-notes/ or go to http://www.rfc-editor.org/ and | |
17 | use the search mechanism found there. | |
18 | To find the latest possible Internet drafts, it's recommended to | |
19 | browse ftp://ftp.isi.edu/internet-drafts/. | |
20 | To find the latest possible PKCS, it's recommended to browse | |
21 | http://www.rsasecurity.com/rsalabs/pkcs/. | |
22 | ||
23 | ||
24 | Implemented: | |
25 | ------------ | |
26 | ||
1d833a99 RL |
27 | These are documents that describe things that are implemented (in |
28 | whole or at least great parts) in OpenSSL. | |
6d52cf21 RL |
29 | |
30 | 1319 The MD2 Message-Digest Algorithm. B. Kaliski. April 1992. | |
31 | (Format: TXT=25661 bytes) (Status: INFORMATIONAL) | |
32 | ||
33 | 1320 The MD4 Message-Digest Algorithm. R. Rivest. April 1992. (Format: | |
34 | TXT=32407 bytes) (Status: INFORMATIONAL) | |
35 | ||
36 | 1321 The MD5 Message-Digest Algorithm. R. Rivest. April 1992. (Format: | |
37 | TXT=35222 bytes) (Status: INFORMATIONAL) | |
38 | ||
39 | 2246 The TLS Protocol Version 1.0. T. Dierks, C. Allen. January 1999. | |
40 | (Format: TXT=170401 bytes) (Status: PROPOSED STANDARD) | |
41 | ||
42 | 2268 A Description of the RC2(r) Encryption Algorithm. R. Rivest. | |
43 | January 1998. (Format: TXT=19048 bytes) (Status: INFORMATIONAL) | |
44 | ||
6d52cf21 RL |
45 | 2315 PKCS 7: Cryptographic Message Syntax Version 1.5. B. Kaliski. |
46 | March 1998. (Format: TXT=69679 bytes) (Status: INFORMATIONAL) | |
47 | ||
c4558f82 RL |
48 | PKCS#8: Private-Key Information Syntax Standard |
49 | ||
adbd4ed1 | 50 | PKCS#12: Personal Information Exchange Syntax Standard, version 1.0. |
6d52cf21 | 51 | |
1d833a99 RL |
52 | 2560 X.509 Internet Public Key Infrastructure Online Certificate |
53 | Status Protocol - OCSP. M. Myers, R. Ankney, A. Malpani, S. Galperin, | |
54 | C. Adams. June 1999. (Format: TXT=43243 bytes) (Status: PROPOSED | |
55 | STANDARD) | |
56 | ||
dcf19c17 RL |
57 | 2712 Addition of Kerberos Cipher Suites to Transport Layer Security |
58 | (TLS). A. Medvinsky, M. Hur. October 1999. (Format: TXT=13763 bytes) | |
59 | (Status: PROPOSED STANDARD) | |
60 | ||
61 | 2898 PKCS #5: Password-Based Cryptography Specification Version 2.0. | |
62 | B. Kaliski. September 2000. (Format: TXT=68692 bytes) (Status: | |
63 | INFORMATIONAL) | |
64 | ||
65 | 2986 PKCS #10: Certification Request Syntax Specification Version 1.7. | |
66 | M. Nystrom, B. Kaliski. November 2000. (Format: TXT=27794 bytes) | |
67 | (Obsoletes RFC2314) (Status: INFORMATIONAL) | |
68 | ||
69 | 3174 US Secure Hash Algorithm 1 (SHA1). D. Eastlake 3rd, P. Jones. | |
70 | September 2001. (Format: TXT=35525 bytes) (Status: INFORMATIONAL) | |
71 | ||
c7235be6 UM |
72 | 3161 Internet X.509 Public Key Infrastructure, Time-Stamp Protocol (TSP) |
73 | C. Adams, P. Cain, D. Pinkas, R. Zuccherato. August 2001 | |
74 | (Status: PROPOSED STANDARD) | |
75 | ||
dcf19c17 RL |
76 | 3268 Advanced Encryption Standard (AES) Ciphersuites for Transport |
77 | Layer Security (TLS). P. Chown. June 2002. (Format: TXT=13530 bytes) | |
78 | (Status: PROPOSED STANDARD) | |
79 | ||
80 | 3279 Algorithms and Identifiers for the Internet X.509 Public Key | |
81 | Infrastructure Certificate and Certificate Revocation List (CRL) | |
82 | Profile. L. Bassham, W. Polk, R. Housley. April 2002. (Format: | |
83 | TXT=53833 bytes) (Status: PROPOSED STANDARD) | |
84 | ||
85 | 3280 Internet X.509 Public Key Infrastructure Certificate and | |
86 | Certificate Revocation List (CRL) Profile. R. Housley, W. Polk, W. | |
87 | Ford, D. Solo. April 2002. (Format: TXT=295556 bytes) (Obsoletes | |
88 | RFC2459) (Status: PROPOSED STANDARD) | |
89 | ||
27a9bf17 RL |
90 | 3447 Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography |
91 | Specifications Version 2.1. J. Jonsson, B. Kaliski. February 2003. | |
92 | (Format: TXT=143173 bytes) (Obsoletes RFC2437) (Status: | |
93 | INFORMATIONAL) | |
94 | ||
8e4560c4 BM |
95 | 3713 A Description of the Camellia Encryption Algorithm. M. Matsui, |
96 | J. Nakajima, S. Moriai. April 2004. (Format: TXT=25031 bytes) | |
97 | (Status: INFORMATIONAL) | |
98 | ||
d9bfe4f9 RL |
99 | 3820 Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate |
100 | Profile. S. Tuecke, V. Welch, D. Engert, L. Pearlman, M. Thompson. | |
101 | June 2004. (Format: TXT=86374 bytes) (Status: PROPOSED STANDARD) | |
102 | ||
8e4560c4 BM |
103 | 4132 Addition of Camellia Cipher Suites to Transport Layer Security |
104 | (TLS). S. Moriai, A. Kato, M. Kanda. July 2005. (Format: TXT=13590 | |
105 | bytes) (Status: PROPOSED STANDARD) | |
6d52cf21 | 106 | |
96afc1cf BM |
107 | 4162 Addition of SEED Cipher Suites to Transport Layer Security (TLS). |
108 | H.J. Lee, J.H. Yoon, J.I. Lee. August 2005. (Format: TXT=10578 bytes) | |
109 | (Status: PROPOSED STANDARD) | |
110 | ||
111 | 4269 The SEED Encryption Algorithm. H.J. Lee, S.J. Lee, J.H. Yoon, | |
112 | D.H. Cheon, J.I. Lee. December 2005. (Format: TXT=34390 bytes) | |
113 | (Obsoletes RFC4009) (Status: INFORMATIONAL) | |
114 | ||
115 | ||
6d52cf21 RL |
116 | Related: |
117 | -------- | |
118 | ||
119 | These are documents that are close to OpenSSL, for example the | |
120 | STARTTLS documents. | |
121 | ||
adbd4ed1 RL |
122 | 1421 Privacy Enhancement for Internet Electronic Mail: Part I: Message |
123 | Encryption and Authentication Procedures. J. Linn. February 1993. | |
124 | (Format: TXT=103894 bytes) (Obsoletes RFC1113) (Status: PROPOSED | |
125 | STANDARD) | |
126 | ||
127 | 1422 Privacy Enhancement for Internet Electronic Mail: Part II: | |
128 | Certificate-Based Key Management. S. Kent. February 1993. (Format: | |
129 | TXT=86085 bytes) (Obsoletes RFC1114) (Status: PROPOSED STANDARD) | |
130 | ||
131 | 1423 Privacy Enhancement for Internet Electronic Mail: Part III: | |
132 | Algorithms, Modes, and Identifiers. D. Balenson. February 1993. | |
133 | (Format: TXT=33277 bytes) (Obsoletes RFC1115) (Status: PROPOSED | |
134 | STANDARD) | |
135 | ||
136 | 1424 Privacy Enhancement for Internet Electronic Mail: Part IV: Key | |
137 | Certification and Related Services. B. Kaliski. February 1993. | |
138 | (Format: TXT=17537 bytes) (Status: PROPOSED STANDARD) | |
139 | ||
b5beb13a RL |
140 | 2025 The Simple Public-Key GSS-API Mechanism (SPKM). C. Adams. October |
141 | 1996. (Format: TXT=101692 bytes) (Status: PROPOSED STANDARD) | |
142 | ||
dcf19c17 RL |
143 | 2510 Internet X.509 Public Key Infrastructure Certificate Management |
144 | Protocols. C. Adams, S. Farrell. March 1999. (Format: TXT=158178 | |
145 | bytes) (Status: PROPOSED STANDARD) | |
146 | ||
147 | 2511 Internet X.509 Certificate Request Message Format. M. Myers, C. | |
148 | Adams, D. Solo, D. Kemp. March 1999. (Format: TXT=48278 bytes) | |
149 | (Status: PROPOSED STANDARD) | |
150 | ||
151 | 2527 Internet X.509 Public Key Infrastructure Certificate Policy and | |
152 | Certification Practices Framework. S. Chokhani, W. Ford. March 1999. | |
153 | (Format: TXT=91860 bytes) (Status: INFORMATIONAL) | |
154 | ||
155 | 2538 Storing Certificates in the Domain Name System (DNS). D. Eastlake | |
156 | 3rd, O. Gudmundsson. March 1999. (Format: TXT=19857 bytes) (Status: | |
157 | PROPOSED STANDARD) | |
1d833a99 | 158 | |
dcf19c17 RL |
159 | 2539 Storage of Diffie-Hellman Keys in the Domain Name System (DNS). |
160 | D. Eastlake 3rd. March 1999. (Format: TXT=21049 bytes) (Status: | |
161 | PROPOSED STANDARD) | |
162 | ||
163 | 2559 Internet X.509 Public Key Infrastructure Operational Protocols - | |
164 | LDAPv2. S. Boeyen, T. Howes, P. Richard. April 1999. (Format: | |
165 | TXT=22889 bytes) (Updates RFC1778) (Status: PROPOSED STANDARD) | |
6d52cf21 RL |
166 | |
167 | 2585 Internet X.509 Public Key Infrastructure Operational Protocols: | |
168 | FTP and HTTP. R. Housley, P. Hoffman. May 1999. (Format: TXT=14813 | |
169 | bytes) (Status: PROPOSED STANDARD) | |
170 | ||
dcf19c17 RL |
171 | 2587 Internet X.509 Public Key Infrastructure LDAPv2 Schema. S. |
172 | Boeyen, T. Howes, P. Richard. June 1999. (Format: TXT=15102 bytes) | |
173 | (Status: PROPOSED STANDARD) | |
174 | ||
6d52cf21 RL |
175 | 2595 Using TLS with IMAP, POP3 and ACAP. C. Newman. June 1999. |
176 | (Format: TXT=32440 bytes) (Status: PROPOSED STANDARD) | |
177 | ||
dcf19c17 RL |
178 | 2631 Diffie-Hellman Key Agreement Method. E. Rescorla. June 1999. |
179 | (Format: TXT=25932 bytes) (Status: PROPOSED STANDARD) | |
180 | ||
181 | 2632 S/MIME Version 3 Certificate Handling. B. Ramsdell, Ed.. June | |
182 | 1999. (Format: TXT=27925 bytes) (Status: PROPOSED STANDARD) | |
183 | ||
184 | 2716 PPP EAP TLS Authentication Protocol. B. Aboba, D. Simon. October | |
185 | 1999. (Format: TXT=50108 bytes) (Status: EXPERIMENTAL) | |
186 | ||
187 | 2773 Encryption using KEA and SKIPJACK. R. Housley, P. Yee, W. Nace. | |
188 | February 2000. (Format: TXT=20008 bytes) (Updates RFC0959) (Status: | |
189 | EXPERIMENTAL) | |
190 | ||
191 | 2797 Certificate Management Messages over CMS. M. Myers, X. Liu, J. | |
192 | Schaad, J. Weinstein. April 2000. (Format: TXT=103357 bytes) (Status: | |
193 | PROPOSED STANDARD) | |
6d52cf21 RL |
194 | |
195 | 2817 Upgrading to TLS Within HTTP/1.1. R. Khare, S. Lawrence. May | |
196 | 2000. (Format: TXT=27598 bytes) (Updates RFC2616) (Status: PROPOSED | |
197 | STANDARD) | |
198 | ||
199 | 2818 HTTP Over TLS. E. Rescorla. May 2000. (Format: TXT=15170 bytes) | |
200 | (Status: INFORMATIONAL) | |
201 | ||
dcf19c17 RL |
202 | 2876 Use of the KEA and SKIPJACK Algorithms in CMS. J. Pawling. July |
203 | 2000. (Format: TXT=29265 bytes) (Status: INFORMATIONAL) | |
204 | ||
205 | 2984 Use of the CAST-128 Encryption Algorithm in CMS. C. Adams. | |
206 | October 2000. (Format: TXT=11591 bytes) (Status: PROPOSED STANDARD) | |
207 | ||
208 | 2985 PKCS #9: Selected Object Classes and Attribute Types Version 2.0. | |
209 | M. Nystrom, B. Kaliski. November 2000. (Format: TXT=70703 bytes) | |
210 | (Status: INFORMATIONAL) | |
211 | ||
212 | 3029 Internet X.509 Public Key Infrastructure Data Validation and | |
213 | Certification Server Protocols. C. Adams, P. Sylvester, M. Zolotarev, | |
214 | R. Zuccherato. February 2001. (Format: TXT=107347 bytes) (Status: | |
215 | EXPERIMENTAL) | |
216 | ||
217 | 3039 Internet X.509 Public Key Infrastructure Qualified Certificates | |
218 | Profile. S. Santesson, W. Polk, P. Barzin, M. Nystrom. January 2001. | |
219 | (Format: TXT=67619 bytes) (Status: PROPOSED STANDARD) | |
220 | ||
221 | 3058 Use of the IDEA Encryption Algorithm in CMS. S. Teiwes, P. | |
222 | Hartmann, D. Kuenzi. February 2001. (Format: TXT=17257 bytes) | |
223 | (Status: INFORMATIONAL) | |
224 | ||
225 | 3161 Internet X.509 Public Key Infrastructure Time-Stamp Protocol | |
226 | (TSP). C. Adams, P. Cain, D. Pinkas, R. Zuccherato. August 2001. | |
227 | (Format: TXT=54585 bytes) (Status: PROPOSED STANDARD) | |
228 | ||
229 | 3185 Reuse of CMS Content Encryption Keys. S. Farrell, S. Turner. | |
230 | October 2001. (Format: TXT=20404 bytes) (Status: PROPOSED STANDARD) | |
231 | ||
232 | 3207 SMTP Service Extension for Secure SMTP over Transport Layer | |
233 | Security. P. Hoffman. February 2002. (Format: TXT=18679 bytes) | |
234 | (Obsoletes RFC2487) (Status: PROPOSED STANDARD) | |
235 | ||
236 | 3217 Triple-DES and RC2 Key Wrapping. R. Housley. December 2001. | |
237 | (Format: TXT=19855 bytes) (Status: INFORMATIONAL) | |
238 | ||
239 | 3274 Compressed Data Content Type for Cryptographic Message Syntax | |
240 | (CMS). P. Gutmann. June 2002. (Format: TXT=11276 bytes) (Status: | |
241 | PROPOSED STANDARD) | |
242 | ||
243 | 3278 Use of Elliptic Curve Cryptography (ECC) Algorithms in | |
244 | Cryptographic Message Syntax (CMS). S. Blake-Wilson, D. Brown, P. | |
245 | Lambert. April 2002. (Format: TXT=33779 bytes) (Status: | |
246 | INFORMATIONAL) | |
247 | ||
248 | 3281 An Internet Attribute Certificate Profile for Authorization. S. | |
249 | Farrell, R. Housley. April 2002. (Format: TXT=90580 bytes) (Status: | |
250 | PROPOSED STANDARD) | |
251 | ||
252 | 3369 Cryptographic Message Syntax (CMS). R. Housley. August 2002. | |
253 | (Format: TXT=113975 bytes) (Obsoletes RFC2630, RFC3211) (Status: | |
254 | PROPOSED STANDARD) | |
255 | ||
256 | 3370 Cryptographic Message Syntax (CMS) Algorithms. R. Housley. August | |
257 | 2002. (Format: TXT=51001 bytes) (Obsoletes RFC2630, RFC3211) (Status: | |
258 | PROPOSED STANDARD) | |
259 | ||
260 | 3377 Lightweight Directory Access Protocol (v3): Technical | |
261 | Specification. J. Hodges, R. Morgan. September 2002. (Format: | |
262 | TXT=9981 bytes) (Updates RFC2251, RFC2252, RFC2253, RFC2254, RFC2255, | |
263 | RFC2256, RFC2829, RFC2830) (Status: PROPOSED STANDARD) | |
264 | ||
265 | 3394 Advanced Encryption Standard (AES) Key Wrap Algorithm. J. Schaad, | |
266 | R. Housley. September 2002. (Format: TXT=73072 bytes) (Status: | |
267 | INFORMATIONAL) | |
268 | ||
269 | 3436 Transport Layer Security over Stream Control Transmission | |
270 | Protocol. A. Jungmaier, E. Rescorla, M. Tuexen. December 2002. | |
271 | (Format: TXT=16333 bytes) (Status: PROPOSED STANDARD) | |
272 | ||
8e4560c4 BM |
273 | 3657 Use of the Camellia Encryption Algorithm in Cryptographic |
274 | Message Syntax (CMS). S. Moriai, A. Kato. January 2004. | |
275 | (Format: TXT=26282 bytes) (Status: PROPOSED STANDARD) | |
276 | ||
277 | "Securing FTP with TLS", 01/27/2000, <draft-murray-auth-ftp-ssl-05.txt> | |
6d52cf21 RL |
278 | |
279 | ||
280 | To be implemented: | |
281 | ------------------ | |
282 | ||
283 | These are documents that describe things that are planed to be | |
284 | implemented in the hopefully short future. | |
285 |