2
0

standards.txt 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285
  1. Standards related to OpenSSL
  2. ============================
  3. [Please, this is currently a draft. I made a first try at finding
  4. documents that describe parts of what OpenSSL implements. There are
  5. big gaps, and I've most certainly done something wrong. Please
  6. correct whatever is... Also, this note should be removed when this
  7. file is reaching a somewhat correct state. -- Richard Levitte]
  8. All pointers in here will be either URL's or blobs of text borrowed
  9. from miscellaneous indexes, like rfc-index.txt (index of RFCs),
  10. 1id-index.txt (index of Internet drafts) and the like.
  11. To find the latest possible RFCs, it's recommended to either browse
  12. ftp://ftp.isi.edu/in-notes/ or go to http://www.rfc-editor.org/ and
  13. use the search mechanism found there.
  14. To find the latest possible Internet drafts, it's recommended to
  15. browse ftp://ftp.isi.edu/internet-drafts/.
  16. To find the latest possible PKCS, it's recommended to browse
  17. http://www.rsasecurity.com/rsalabs/pkcs/.
  18. Implemented:
  19. ------------
  20. These are documents that describe things that are implemented (in
  21. whole or at least great parts) in OpenSSL.
  22. 1319 The MD2 Message-Digest Algorithm. B. Kaliski. April 1992.
  23. (Format: TXT=25661 bytes) (Status: INFORMATIONAL)
  24. 1320 The MD4 Message-Digest Algorithm. R. Rivest. April 1992. (Format:
  25. TXT=32407 bytes) (Status: INFORMATIONAL)
  26. 1321 The MD5 Message-Digest Algorithm. R. Rivest. April 1992. (Format:
  27. TXT=35222 bytes) (Status: INFORMATIONAL)
  28. 2246 The TLS Protocol Version 1.0. T. Dierks, C. Allen. January 1999.
  29. (Format: TXT=170401 bytes) (Status: PROPOSED STANDARD)
  30. 2268 A Description of the RC2(r) Encryption Algorithm. R. Rivest.
  31. January 1998. (Format: TXT=19048 bytes) (Status: INFORMATIONAL)
  32. 2315 PKCS 7: Cryptographic Message Syntax Version 1.5. B. Kaliski.
  33. March 1998. (Format: TXT=69679 bytes) (Status: INFORMATIONAL)
  34. PKCS#8: Private-Key Information Syntax Standard
  35. PKCS#12: Personal Information Exchange Syntax Standard, version 1.0.
  36. 2560 X.509 Internet Public Key Infrastructure Online Certificate
  37. Status Protocol - OCSP. M. Myers, R. Ankney, A. Malpani, S. Galperin,
  38. C. Adams. June 1999. (Format: TXT=43243 bytes) (Status: PROPOSED
  39. STANDARD)
  40. 2712 Addition of Kerberos Cipher Suites to Transport Layer Security
  41. (TLS). A. Medvinsky, M. Hur. October 1999. (Format: TXT=13763 bytes)
  42. (Status: PROPOSED STANDARD)
  43. 2898 PKCS #5: Password-Based Cryptography Specification Version 2.0.
  44. B. Kaliski. September 2000. (Format: TXT=68692 bytes) (Status:
  45. INFORMATIONAL)
  46. 2986 PKCS #10: Certification Request Syntax Specification Version 1.7.
  47. M. Nystrom, B. Kaliski. November 2000. (Format: TXT=27794 bytes)
  48. (Obsoletes RFC2314) (Status: INFORMATIONAL)
  49. 3174 US Secure Hash Algorithm 1 (SHA1). D. Eastlake 3rd, P. Jones.
  50. September 2001. (Format: TXT=35525 bytes) (Status: INFORMATIONAL)
  51. 3161 Internet X.509 Public Key Infrastructure, Time-Stamp Protocol (TSP)
  52. C. Adams, P. Cain, D. Pinkas, R. Zuccherato. August 2001
  53. (Status: PROPOSED STANDARD)
  54. 3268 Advanced Encryption Standard (AES) Ciphersuites for Transport
  55. Layer Security (TLS). P. Chown. June 2002. (Format: TXT=13530 bytes)
  56. (Status: PROPOSED STANDARD)
  57. 3279 Algorithms and Identifiers for the Internet X.509 Public Key
  58. Infrastructure Certificate and Certificate Revocation List (CRL)
  59. Profile. L. Bassham, W. Polk, R. Housley. April 2002. (Format:
  60. TXT=53833 bytes) (Status: PROPOSED STANDARD)
  61. 3280 Internet X.509 Public Key Infrastructure Certificate and
  62. Certificate Revocation List (CRL) Profile. R. Housley, W. Polk, W.
  63. Ford, D. Solo. April 2002. (Format: TXT=295556 bytes) (Obsoletes
  64. RFC2459) (Status: PROPOSED STANDARD)
  65. 3447 Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography
  66. Specifications Version 2.1. J. Jonsson, B. Kaliski. February 2003.
  67. (Format: TXT=143173 bytes) (Obsoletes RFC2437) (Status:
  68. INFORMATIONAL)
  69. 3713 A Description of the Camellia Encryption Algorithm. M. Matsui,
  70. J. Nakajima, S. Moriai. April 2004. (Format: TXT=25031 bytes)
  71. (Status: INFORMATIONAL)
  72. 3820 Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate
  73. Profile. S. Tuecke, V. Welch, D. Engert, L. Pearlman, M. Thompson.
  74. June 2004. (Format: TXT=86374 bytes) (Status: PROPOSED STANDARD)
  75. 4132 Addition of Camellia Cipher Suites to Transport Layer Security
  76. (TLS). S. Moriai, A. Kato, M. Kanda. July 2005. (Format: TXT=13590
  77. bytes) (Status: PROPOSED STANDARD)
  78. 4162 Addition of SEED Cipher Suites to Transport Layer Security (TLS).
  79. H.J. Lee, J.H. Yoon, J.I. Lee. August 2005. (Format: TXT=10578 bytes)
  80. (Status: PROPOSED STANDARD)
  81. 4269 The SEED Encryption Algorithm. H.J. Lee, S.J. Lee, J.H. Yoon,
  82. D.H. Cheon, J.I. Lee. December 2005. (Format: TXT=34390 bytes)
  83. (Obsoletes RFC4009) (Status: INFORMATIONAL)
  84. Related:
  85. --------
  86. These are documents that are close to OpenSSL, for example the
  87. STARTTLS documents.
  88. 1421 Privacy Enhancement for Internet Electronic Mail: Part I: Message
  89. Encryption and Authentication Procedures. J. Linn. February 1993.
  90. (Format: TXT=103894 bytes) (Obsoletes RFC1113) (Status: PROPOSED
  91. STANDARD)
  92. 1422 Privacy Enhancement for Internet Electronic Mail: Part II:
  93. Certificate-Based Key Management. S. Kent. February 1993. (Format:
  94. TXT=86085 bytes) (Obsoletes RFC1114) (Status: PROPOSED STANDARD)
  95. 1423 Privacy Enhancement for Internet Electronic Mail: Part III:
  96. Algorithms, Modes, and Identifiers. D. Balenson. February 1993.
  97. (Format: TXT=33277 bytes) (Obsoletes RFC1115) (Status: PROPOSED
  98. STANDARD)
  99. 1424 Privacy Enhancement for Internet Electronic Mail: Part IV: Key
  100. Certification and Related Services. B. Kaliski. February 1993.
  101. (Format: TXT=17537 bytes) (Status: PROPOSED STANDARD)
  102. 2025 The Simple Public-Key GSS-API Mechanism (SPKM). C. Adams. October
  103. 1996. (Format: TXT=101692 bytes) (Status: PROPOSED STANDARD)
  104. 2510 Internet X.509 Public Key Infrastructure Certificate Management
  105. Protocols. C. Adams, S. Farrell. March 1999. (Format: TXT=158178
  106. bytes) (Status: PROPOSED STANDARD)
  107. 2511 Internet X.509 Certificate Request Message Format. M. Myers, C.
  108. Adams, D. Solo, D. Kemp. March 1999. (Format: TXT=48278 bytes)
  109. (Status: PROPOSED STANDARD)
  110. 2527 Internet X.509 Public Key Infrastructure Certificate Policy and
  111. Certification Practices Framework. S. Chokhani, W. Ford. March 1999.
  112. (Format: TXT=91860 bytes) (Status: INFORMATIONAL)
  113. 2538 Storing Certificates in the Domain Name System (DNS). D. Eastlake
  114. 3rd, O. Gudmundsson. March 1999. (Format: TXT=19857 bytes) (Status:
  115. PROPOSED STANDARD)
  116. 2539 Storage of Diffie-Hellman Keys in the Domain Name System (DNS).
  117. D. Eastlake 3rd. March 1999. (Format: TXT=21049 bytes) (Status:
  118. PROPOSED STANDARD)
  119. 2559 Internet X.509 Public Key Infrastructure Operational Protocols -
  120. LDAPv2. S. Boeyen, T. Howes, P. Richard. April 1999. (Format:
  121. TXT=22889 bytes) (Updates RFC1778) (Status: PROPOSED STANDARD)
  122. 2585 Internet X.509 Public Key Infrastructure Operational Protocols:
  123. FTP and HTTP. R. Housley, P. Hoffman. May 1999. (Format: TXT=14813
  124. bytes) (Status: PROPOSED STANDARD)
  125. 2587 Internet X.509 Public Key Infrastructure LDAPv2 Schema. S.
  126. Boeyen, T. Howes, P. Richard. June 1999. (Format: TXT=15102 bytes)
  127. (Status: PROPOSED STANDARD)
  128. 2595 Using TLS with IMAP, POP3 and ACAP. C. Newman. June 1999.
  129. (Format: TXT=32440 bytes) (Status: PROPOSED STANDARD)
  130. 2631 Diffie-Hellman Key Agreement Method. E. Rescorla. June 1999.
  131. (Format: TXT=25932 bytes) (Status: PROPOSED STANDARD)
  132. 2632 S/MIME Version 3 Certificate Handling. B. Ramsdell, Ed.. June
  133. 1999. (Format: TXT=27925 bytes) (Status: PROPOSED STANDARD)
  134. 2716 PPP EAP TLS Authentication Protocol. B. Aboba, D. Simon. October
  135. 1999. (Format: TXT=50108 bytes) (Status: EXPERIMENTAL)
  136. 2773 Encryption using KEA and SKIPJACK. R. Housley, P. Yee, W. Nace.
  137. February 2000. (Format: TXT=20008 bytes) (Updates RFC0959) (Status:
  138. EXPERIMENTAL)
  139. 2797 Certificate Management Messages over CMS. M. Myers, X. Liu, J.
  140. Schaad, J. Weinstein. April 2000. (Format: TXT=103357 bytes) (Status:
  141. PROPOSED STANDARD)
  142. 2817 Upgrading to TLS Within HTTP/1.1. R. Khare, S. Lawrence. May
  143. 2000. (Format: TXT=27598 bytes) (Updates RFC2616) (Status: PROPOSED
  144. STANDARD)
  145. 2818 HTTP Over TLS. E. Rescorla. May 2000. (Format: TXT=15170 bytes)
  146. (Status: INFORMATIONAL)
  147. 2876 Use of the KEA and SKIPJACK Algorithms in CMS. J. Pawling. July
  148. 2000. (Format: TXT=29265 bytes) (Status: INFORMATIONAL)
  149. 2984 Use of the CAST-128 Encryption Algorithm in CMS. C. Adams.
  150. October 2000. (Format: TXT=11591 bytes) (Status: PROPOSED STANDARD)
  151. 2985 PKCS #9: Selected Object Classes and Attribute Types Version 2.0.
  152. M. Nystrom, B. Kaliski. November 2000. (Format: TXT=70703 bytes)
  153. (Status: INFORMATIONAL)
  154. 3029 Internet X.509 Public Key Infrastructure Data Validation and
  155. Certification Server Protocols. C. Adams, P. Sylvester, M. Zolotarev,
  156. R. Zuccherato. February 2001. (Format: TXT=107347 bytes) (Status:
  157. EXPERIMENTAL)
  158. 3039 Internet X.509 Public Key Infrastructure Qualified Certificates
  159. Profile. S. Santesson, W. Polk, P. Barzin, M. Nystrom. January 2001.
  160. (Format: TXT=67619 bytes) (Status: PROPOSED STANDARD)
  161. 3058 Use of the IDEA Encryption Algorithm in CMS. S. Teiwes, P.
  162. Hartmann, D. Kuenzi. February 2001. (Format: TXT=17257 bytes)
  163. (Status: INFORMATIONAL)
  164. 3161 Internet X.509 Public Key Infrastructure Time-Stamp Protocol
  165. (TSP). C. Adams, P. Cain, D. Pinkas, R. Zuccherato. August 2001.
  166. (Format: TXT=54585 bytes) (Status: PROPOSED STANDARD)
  167. 3185 Reuse of CMS Content Encryption Keys. S. Farrell, S. Turner.
  168. October 2001. (Format: TXT=20404 bytes) (Status: PROPOSED STANDARD)
  169. 3207 SMTP Service Extension for Secure SMTP over Transport Layer
  170. Security. P. Hoffman. February 2002. (Format: TXT=18679 bytes)
  171. (Obsoletes RFC2487) (Status: PROPOSED STANDARD)
  172. 3217 Triple-DES and RC2 Key Wrapping. R. Housley. December 2001.
  173. (Format: TXT=19855 bytes) (Status: INFORMATIONAL)
  174. 3274 Compressed Data Content Type for Cryptographic Message Syntax
  175. (CMS). P. Gutmann. June 2002. (Format: TXT=11276 bytes) (Status:
  176. PROPOSED STANDARD)
  177. 3278 Use of Elliptic Curve Cryptography (ECC) Algorithms in
  178. Cryptographic Message Syntax (CMS). S. Blake-Wilson, D. Brown, P.
  179. Lambert. April 2002. (Format: TXT=33779 bytes) (Status:
  180. INFORMATIONAL)
  181. 3281 An Internet Attribute Certificate Profile for Authorization. S.
  182. Farrell, R. Housley. April 2002. (Format: TXT=90580 bytes) (Status:
  183. PROPOSED STANDARD)
  184. 3369 Cryptographic Message Syntax (CMS). R. Housley. August 2002.
  185. (Format: TXT=113975 bytes) (Obsoletes RFC2630, RFC3211) (Status:
  186. PROPOSED STANDARD)
  187. 3370 Cryptographic Message Syntax (CMS) Algorithms. R. Housley. August
  188. 2002. (Format: TXT=51001 bytes) (Obsoletes RFC2630, RFC3211) (Status:
  189. PROPOSED STANDARD)
  190. 3377 Lightweight Directory Access Protocol (v3): Technical
  191. Specification. J. Hodges, R. Morgan. September 2002. (Format:
  192. TXT=9981 bytes) (Updates RFC2251, RFC2252, RFC2253, RFC2254, RFC2255,
  193. RFC2256, RFC2829, RFC2830) (Status: PROPOSED STANDARD)
  194. 3394 Advanced Encryption Standard (AES) Key Wrap Algorithm. J. Schaad,
  195. R. Housley. September 2002. (Format: TXT=73072 bytes) (Status:
  196. INFORMATIONAL)
  197. 3436 Transport Layer Security over Stream Control Transmission
  198. Protocol. A. Jungmaier, E. Rescorla, M. Tuexen. December 2002.
  199. (Format: TXT=16333 bytes) (Status: PROPOSED STANDARD)
  200. 3657 Use of the Camellia Encryption Algorithm in Cryptographic
  201. Message Syntax (CMS). S. Moriai, A. Kato. January 2004.
  202. (Format: TXT=26282 bytes) (Status: PROPOSED STANDARD)
  203. "Securing FTP with TLS", 01/27/2000, <draft-murray-auth-ftp-ssl-05.txt>
  204. To be implemented:
  205. ------------------
  206. These are documents that describe things that are planed to be
  207. implemented in the hopefully short future.