Internet Assigned Numbers Authority
Internet Key Exchange (IKE) Attributes
Last Updated
2024-12-06
Note
All registries listed below have been closed. See [RFC9395].
Note
Attribute Assigned Numbers
Attributes negotiated during phase one use the following definitions.
Phase two attributes are defined in the applicable DOI specification
(for example, IPsec attributes are defined in the IPsec DOI), with the
exception of a group description when Quick Mode includes an ephemeral
Diffie-Hellman exchange. Attribute types can be either Basic (B) or
Variable-length (V). Encoding of these attributes is defined in the
base ISAKMP specification as Type/Value (Basic) and Type/Length/Value
(Variable).
Attributes described as basic MUST NOT be encoded as variable.
Variable length attributes MAY be encoded as basic attributes if their
value can fit into two octets. If this is the case, an attribute
offered as variable (or basic) by the initiator of this protocol MAY
be returned to the initiator as a basic (or variable).
Available Formats
[IMG]
XML [IMG]
HTML [IMG]
Plain text
Registries included below
??Attribute Classes
??Encryption Algorithm Class Values (Value 1)
??Hash Algorithm (Value 2)
??IPSEC Authentication Methods (Value 3)
??Group Description (Value 4)
??Group Type (Value 5)
??Life Type (Value 11)
??PRF (Value 13)
??Exchange Type
??Additional Exchanges Defined-- XCHG values
??ISAKMP Domain of Interpretation (DOI)
??Next Payload Types
??Notify Message Types
??Notify Messages - Error Types (1-8191)
??Notify Messages - Status Types (16384-24575)
Attribute Classes
Registration Procedure(s)
Registry closed
Reference
[RFC2409][RFC9395]
Available Formats
[IMG]
CSV
Value Class Type Reference
1 Encryption Algorithm B [RFC2409]
2 Hash Algorithm B [RFC2409]
3 Authentication Method B [RFC2409]
4 Group Description B [RFC2409]
5 Group Type B [RFC2409]
6 Group Prime/Irreducible Polynomial V [RFC2409]
7 Group Generator One V [RFC2409]
8 Group Generator Two V [RFC2409]
9 Group Curve A V [RFC2409]
10 Group Curve B V [RFC2409]
11 Life Type B [RFC2409]
12 Life Duration V [RFC2409]
13 PRF B [RFC2409]
14 Key Length B [RFC2409]
15 Field Size B [RFC2409]
16 Group Order V [RFC2409]
17-16383 Unassigned
16384-32767 Reserved for private use
Encryption Algorithm Class Values (Value 1)
Registration Procedure(s)
Registry closed
Reference
[RFC2409][RFC9395]
Available Formats
[IMG]
CSV
Value Ecryption Algorithm Reference
0 Reserved
1 DES-CBC [RFC2405]
2 IDEA-CBC [RFC2409]
3 Blowfish-CBC [RFC2409]
4 RC5-R16-B64-CBC [RFC2409]
5 3DES-CBC [RFC2409]
6 CAST-CBC [RFC2409]
7 AES-CBC [RFC3602]
8 CAMELLIA-CBC [RFC4312]
9-65000 Unassigned
65001-65535 Reserved for private use
Hash Algorithm (Value 2)
Registration Procedure(s)
Registry closed
Reference
[RFC2409][RFC9395]
Available Formats
[IMG]
CSV
Value Hash Algorithm Reference
0 Reserved
1 MD5 [RFC1321]
2 SHA [NIST, FIPS PUB 180-1: Secure Hash Standard, April 1995.]
3 Tiger [Anderson, R., and Biham, E., "Fast Software Encryption", Springer LNCS v. 1039, 1996.]
4 SHA2-256 [RFC4868]
5 SHA2-384 [RFC4868]
6 SHA2-512 [RFC4868]
7-65000 Unassigned
65001-65535 Reserved for private use
IPSEC Authentication Methods (Value 3)
Registration Procedure(s)
Registry closed
Reference
[RFC2409][RFC9395]
Available Formats
[IMG]
CSV
Value Method Reference
0 Reserved
1 pre-shared key [RFC2409]
2 DSS signatures [RFC2409]
3 RSA signatures [RFC2409]
4 Encryption with RSA [RFC2409]
5 Revised encryption with RSA [RFC2409]
6 Reserved (was Encryption with El-Gamal)
7 Reserved (was Revised encryption with El-Gamal)
8 Reserved (was ECDSA signatures)
9 ECDSA with SHA-256 on the P-256 curve [RFC4754]
10 ECDSA with SHA-384 on the P-384 curve [RFC4754]
11 ECDSA with SHA-512 on the P-521 curve [RFC4754]
12-65000 Unassigned
65001-65535 Reserved for private use
Group Description (Value 4)
Registration Procedure(s)
Registry closed
Reference
[RFC2409][RFC9395]
Note
These values were reserved as per draft-ipsec-ike-ecc-groups
which never made it to the RFC. These values might be used by some
implementations as currently registered in the registry, but new
implementations should not use them.
Available Formats
[IMG]
CSV
Value Group Description Reference Note
0 Reserved
1 default 768-bit MODP group [RFC2409] Section 6.1
2 alternate 1024-bit MODP group [RFC2409] Section 6.2
3 EC2N group on GP[2^155] [RFC2409] Section 6.3
4 EC2N group on GP[2^185] [RFC2409] Section 6.4
5 1536-bit MODP group [RFC3526] Section 2
6 EC2N group over GF[2^163](see Note) [draft-ietf-ipsec-ike-ecc-groups-10] Section 2.1
7 EC2N group over GF[2^163](see Note) [draft-ietf-ipsec-ike-ecc-groups-10] Section 2.2
8 EC2N group over GF[2^283](see Note) [draft-ietf-ipsec-ike-ecc-groups-10] Section 2.3
9 EC2N group over GF[2^283](see Note) [draft-ietf-ipsec-ike-ecc-groups-10] Section 2.4
10 EC2N group over GF[2^409](see Note) [draft-ietf-ipsec-ike-ecc-groups-10] Section 2.5
11 EC2N group over GF[2^409](see Note) [draft-ietf-ipsec-ike-ecc-groups-10] Section 2.6
12 EC2N group over GF[2^571](see Note) [draft-ietf-ipsec-ike-ecc-groups-10] Section 2.7
13 EC2N group over GF[2^571](see Note) [draft-ietf-ipsec-ike-ecc-groups-10] Section 2.8
14 2048-bit MODP group [RFC3526] Section 3
15 3072-bit MODP group [RFC3526] Section 4
16 4096-bit MODP group [RFC3526] Section 5
17 6144-bit MODP group [RFC3526] Section 6
18 8192-bit MODP group [RFC3526] Section 7
19 256-bit random ECP group [RFC5903]
20 384-bit random ECP group [RFC5903]
21 521-bit random ECP group [RFC5903]
22 1024-bit MODP Group with 160-bit Prime Order Subgroup [RFC5114]
23 2048-bit MODP Group with 224-bit Prime Order Subgroup [RFC5114]
24 2048-bit MODP Group with 256-bit Prime Order Subgroup [RFC5114]
25 192-bit Random ECP Group [RFC5114]
26 224-bit Random ECP Group [RFC5114]
27 224-bit Brainpool ECP group [RFC6932] Section 2.1. Not for RFC 2409.
28 256-bit Brainpool ECP group [RFC6932] Section 2.2. Not for RFC 2409.
29 384-bit Brainpool ECP group [RFC6932] Section 2.3. Not for RFC 2409.
30 512-bit Brainpool ECP group [RFC6932] Section 2.4. Not for RFC 2409.
31-32767 Unassigned
32768-65535 Reserved for private use
Group Type (Value 5)
Registration Procedure(s)
Registry closed
Reference
[RFC2409][RFC9395]
Available Formats
[IMG]
CSV
Value Group Type Reference
0 Reserved
1 MODP (modular exponentiation group) [RFC2409]
2 ECP (elliptic curve group over GF[P]) [RFC2409]
3 EC2N (elliptic curve group over GF[2^N]) [RFC2409]
4-65000 Unassigned
65001-65535 Reserved for private use
Life Type (Value 11)
Registration Procedure(s)
Registry closed
Reference
[RFC2409][RFC9395]
Note
For a given "Life Type" the value of the "Life Duration" attribute defines
the actual length of the SA life -- either a number of seconds, or a number
of kbytes protected.
Available Formats
[IMG]
CSV
Value Life Type Reference
0 Reserved
1 seconds [RFC2409]
2 kilobytes [RFC2409]
3-65000 Unassigned
65001-65535 Reserved for private use
PRF (Value 13)
Registration Procedure(s)
Registry closed
Reference
[RFC2409][RFC9395]
Value Description Reference
No registrations at this time.
Exchange Type
Registration Procedure(s)
Registry closed
Reference
[RFC2408][RFC9395]
Note
DOI Specific use is the Additional Exchanges Defined registry
Available Formats
[IMG]
CSV
Value Exchange Type Reference
0 NONE [RFC2408]
1 Base [RFC2408]
2 Identity Protection [RFC2408]
3 Authentication Only [RFC2408]
4 Aggressive [RFC2408]
5 Informational [RFC2408]
6-31 ISAKMP Future Use
32-239 DOI Specific Use
240-255 Private Use
Additional Exchanges Defined-- XCHG values
Registration Procedure(s)
Registry closed
Reference
[RFC2409][RFC9395]
Available Formats
[IMG]
CSV
Value Phase Reference
32 Quick Mode [RFC2409]
33 New Group Mode [RFC2409]
ISAKMP Domain of Interpretation (DOI)
Registration Procedure(s)
Registry closed
Reference
[RFC2408][RFC9395]
Note
The Domain of Interpretation is a 32-bit value which identifies the
context in which the Security Association payload is to be evaluated.
Requests for assignments of new domain of interpretation identifiers
must be accompanied by a public specification, such as an Internet RFC.
Available Formats
[IMG]
CSV
Value DOI Reference
0 ISAKMP [RFC2408]
1 IPSEC [RFC2407]
2 GDOI [RFC3547]
Next Payload Types
Registration Procedure(s)
Registry closed
Reference
[RFC2408][RFC9395]
Note
The Next Payload type is an 8-bit value that indicates the type of the
next payload in the message.
Available Formats
[IMG]
CSV
Value Next Payload Type Reference
0 NONE [RFC2408]
1 Security Association (SA) [RFC2408]
2 Proposal (P) [RFC2408]
3 Transform (T) [RFC2408]
4 Key Exchange (KE) [RFC2408]
5 Identification (ID) [RFC2408]
6 Certificate (CERT) [RFC2408]
7 Certificate Request (CR) [RFC2408]
8 Hash (HASH) [RFC2408]
9 Signature (SIG) [RFC2408]
10 Nonce (NONCE) [RFC2408]
11 Notification (N) [RFC2408]
12 Delete (D) [RFC2408]
13 Vendor ID (VID) [RFC2408]
14 Reserved, not to be used [Dukes]
15 SA KEK Payload (SAK) [RFC3547][RFC6407]
16 SA TEK Payload (SAT) [RFC3547][RFC6407]
17 Key Download (KD) [RFC3547]
18 Sequence Number (SEQ) [RFC3547]
19 Proof of Possession (POP) [RFC3547]
20 NAT Discovery (NAT-D) [RFC3947]
21 NAT Original Address (NAT-OA) [RFC3947]
22 Group Associated Policy (GAP) [RFC6407]
23-127 Unassigned
128-255 Reserved for private use
Notify Message Types
Reference
[RFC2408][RFC9395]
Available Formats
[IMG]
CSV
Range Registration Procedures Note
1 - 8191 Registry closed Error types
8192 - 16383 Registry closed Doi-Specific Error types
16384 - 24575 Registry closed Status types RESERVED
24576 - 32767 Registry closed DOI-specific Status codes
32768 - 40959 Registry closed Private Use
40960 - 65535 Registry closed RESERVED
Notify Messages - Error Types (1-8191)
Registration Procedure(s)
Registry closed
Reference
[RFC2408][RFC9395]
Available Formats
[IMG]
CSV
Value Nofity Messages - Error Types Reference
1 INVALID-PAYLOAD-TYPE [RFC2408]
2 DOI-NOT-SUPPORTED [RFC2408]
3 SITUATION-NOT-SUPPORTED [RFC2408]
4 INVALID-COOKIE [RFC2408]
5 INVALID-MAJOR-VERSION [RFC2408]
6 INVALID-MINOR-VERSION [RFC2408]
7 INVALID-EXCHANGE-TYPE [RFC2408]
8 INVALID-FLAGS [RFC2408]
9 INVALID-MESSAGE-ID [RFC2408]
10 INVALID-PROTOCOL-ID [RFC2408]
11 INVALID-SPI [RFC2408]
12 INVALID-TRANSFORM-ID [RFC2408]
13 ATTRIBUTES-NOT-SUPPORTED [RFC2408]
14 NO-PROPOSAL-CHOSEN [RFC2408]
15 BAD-PROPOSAL-SYNTAX [RFC2408]
16 PAYLOAD-MALFORMED [RFC2408]
17 INVALID-KEY-INFORMATION [RFC2408]
18 INVALID-ID-INFORMATION [RFC2408]
19 INVALID-CERT-ENCODING [RFC2408]
20 INVALID-CERTIFICATE [RFC2408]
21 CERT-TYPE-UNSUPPORTED [RFC2408]
22 INVALID-CERT-AUTHORITY [RFC2408]
23 INVALID-HASH-INFORMATION [RFC2408]
24 AUTHENTICATION-FAILED [RFC2408]
25 INVALID-SIGNATURE [RFC2408]
26 ADDRESS-NOTIFICATION [RFC2408]
27 NOTIFY-SA-LIFETIME [RFC2408]
28 CERTIFICATE-UNAVAILABLE [RFC2408]
29 UNSUPPORTED-EXCHANGE-TYPE [RFC2408]
30 UNEQUAL-PAYLOAD-LENGTHS [RFC2408]
31-8191 RESERVED (Future Use)
Notify Messages - Status Types (16384-24575)
Registration Procedure(s)
Registry closed
Reference
[RFC2408][RFC9395]
Available Formats
[IMG]
CSV
Value Nofity Messages - Status Types Reference
16384 CONNECTED [RFC2408]
16385-24575 RESERVED (Future Use)
Licensing Terms
Presently we were in a very dark road, and at a point where it dropped suddenly between steep sides we halted in black shadow. A gleam of pale sand, a whisper of deep flowing waters, and a farther glimmer of more sands beyond them challenged our advance. We had come to a "grapevine ferry." The scow was on the other side, the water too shoal for the horses to swim, and the bottom, most likely, quicksand. Out of the blackness of the opposite shore came a soft, high-pitched, quavering, long-drawn, smothered moan of woe, the call of that snivelling little sinner the screech-owl. Ferry murmured to me to answer it and I sent the same faint horror-stricken tremolo back. Again it came to us, from not farther than one might toss his cap, and I followed Ferry down to the water's edge. The grapevine guy swayed at our side, we heard the scow slide from the sands, and in a few moments, moved by two videttes, it touched our shore. Soon we were across, the two videttes riding with us, and beyond a sharp rise, in an old opening made by the swoop of a hurricane, we entered the silent unlighted bivouac of Ferry's scouts. Ferry got down and sat on the earth talking with Quinn, while the sergeants quietly roused the sleepers to horse. Plotinus is driven by this perplexity to reconsider the whole theory of Matter.477 He takes Aristotle¡¯s doctrine as the groundwork of his investigation. According to this, all existence is divided into Matter and Form. What we know of things¡ªin other words, the sum of their differential characteristics¡ªis their Form. Take away this, and the unknowable residuum is their Matter. Again, Matter is the vague indeterminate something out of which particular Forms are developed. The two are related as Possibility to Actuality, as the more generic to the more specific substance through every grade of classification and composition. Thus there are two Matters, the one sensible and the other intelligible. The former constitutes the common substratum of bodies, the other the common element of ideas.478 The general distinction between Matter and Form was originally suggested to Aristotle by Plato¡¯s remarks on the same subject; but he differs325 from his master in two important particulars. Plato, in his Timaeus, seems to identify Matter with space.479 So far, it is a much more positive conception than the ?λη of the Metaphysics. On the other hand, he constantly opposes it to reality as something non-existent; and he at least implies that it is opposed to absolute good as a principle of absolute evil.480 Thus while the Aristotelian world is formed by the development of Power into Actuality, the Platonic world is composed by the union of Being and not-Being, of the Same and the Different, of the One and the Many, of the Limit and the Unlimited, of Good and Evil, in varying proportions with each other. The Lawton woman had heard of an officer's family at Grant, which was in need of a cook, and had gone there. [See larger version] On the 8th of July an extraordinary Privy Council was summoned. All the members, of whatever party, were desired to attend, and many were the speculations as to the object of their meeting. The general notion was that it involved the continuing or the ending of the war. It turned out to be for the announcement of the king's intended marriage. The lady selected was Charlotte, the second sister of the Duke of Mecklenburg-Strelitz. Apart from the narrowness of her education, the young princess had a considerable amount of amiability, good sense, and domestic taste. These she shared with her intended husband, and whilst they made the royal couple always retiring, at the same time they caused them to give, during their lives, a moral air to their court. On the 8th of September Charlotte arrived at St. James's, and that afternoon the marriage took place, the ceremony being performed by the Archbishop of Canterbury. On the 22nd the coronation took place with the greatest splendour. Mother and girls were inconsolable, for each had something that they were sure "Si would like," and would "do him good," but they knew Josiah Klegg, Sr., well enough to understand what was the condition when he had once made up his mind. CHAPTER V. THE YOUNG RECRUITS Si proceeded to deftly construct a litter out of the two guns, with some sticks that he cut with a knife, and bound with pawpaw strips. His voice had sunk very low, almost to sweetness. A soft flurry of pink went over her face, and her eyelids drooped. Then suddenly she braced herself, pulled herself taut, grew combative again, though her voice shook. HoME²Ô¾®Ïè̫ʲôÐÇ×ù
ENTER NUMBET 0016khizeu.com.cn
hbiyes.org.cn
www.goqrnz.com.cn
fzzuro.com.cn
www.utogwb.com.cn
www.wheatrip.com.cn
www.rwjws.com.cn
qb8news.com.cn
www.ulmjzj.com.cn
xawtst.com.cn