blob: fabfd96bfc6ff2cc086fb3efd2cf57c3c6ba5bfb [file] [log] [blame]
romanc1d2b092023-02-02 08:58:27 +01001module iana-ssh-encryption-algs {
2 yang-version 1.1;
3 namespace "urn:ietf:params:xml:ns:yang:iana-ssh-encryption-algs";
4 prefix sshea;
5
6 organization
7 "Internet Assigned Numbers Authority (IANA)";
8
9 contact
10 "Postal: ICANN
11 12025 Waterfront Drive, Suite 300
12 Los Angeles, CA 90094-2536
13 United States of America
14 Tel: +1 310 301 5800
15 Email: iana@iana.org";
16
17 description
18 "This module defines identities for the encryption algorithms
19 defined in the 'Encryption Algorithm Names' sub-registry of the
20 'Secure Shell (SSH) Protocol Parameters' registry maintained
21 by IANA.
22
23 Copyright (c) 2022 IETF Trust and the persons identified as
24 authors of the code. All rights reserved.
25
26 Redistribution and use in source and binary forms, with
27 or without modification, is permitted pursuant to, and
28 subject to the license terms contained in, the Revised
29 BSD License set forth in Section 4.c of the IETF Trust's
30 Legal Provisions Relating to IETF Documents
31 (https://trustee.ietf.org/license-info).
32
33 The initial version of this YANG module is part of RFC EEEE
34 (https://www.rfc-editor.org/info/rfcEEEE); see the RFC
35 itself for full legal notices.";
36
37 revision 2022-06-16 {
38 description
39 "Updated to reflect contents of the encryption algorithms
40 registry on June 16, 2022.";
41 }
42
43 revision 2021-06-01 {
44 description
45 "Initial version";
46 reference
47 "RFC EEEE: YANG Groupings for SSH Clients and SSH Servers";
48 }
49
50 // Typedefs
51
52 typedef encryption-algorithm-ref {
53 type identityref {
54 base "encryption-alg-base";
55 }
56 description
57 "A reference to a SSH encryption algorithm identifier.";
58 }
59
60 // Identities
61
62 identity encryption-alg-base {
63 description
64 "Base identity used to identify encryption algorithms.";
65 }
66
67 identity triple-des-cbc { // YANG IDs cannot begin with a number
68 base encryption-alg-base;
69 description
70 "3DES-CBC";
71 reference
72 "RFC 4253:
73 The Secure Shell (SSH) Transport Layer Protocol";
74 }
75
76 identity blowfish-cbc {
77 base encryption-alg-base;
78 description
79 "BLOWFISH-CBC";
80 reference
81 "RFC 4253:
82 The Secure Shell (SSH) Transport Layer Protocol";
83 }
84
85 identity twofish256-cbc {
86 base encryption-alg-base;
87 description
88 "TWOFISH256-CBC";
89 reference
90 "RFC 4253:
91 The Secure Shell (SSH) Transport Layer Protocol";
92 }
93
94 identity twofish-cbc {
95 base encryption-alg-base;
96 description
97 "TWOFISH-CBC";
98 reference
99 "RFC 4253:
100 The Secure Shell (SSH) Transport Layer Protocol";
101 }
102
103 identity twofish192-cbc {
104 base encryption-alg-base;
105 description
106 "TWOFISH192-CBC";
107 reference
108 "RFC 4253:
109 The Secure Shell (SSH) Transport Layer Protocol";
110 }
111
112 identity twofish128-cbc {
113 base encryption-alg-base;
114 description
115 "TWOFISH128-CBC";
116 reference
117 "RFC 4253:
118 The Secure Shell (SSH) Transport Layer Protocol";
119 }
120
121 identity aes256-cbc {
122 base encryption-alg-base;
123 description
124 "AES256-CBC";
125 reference
126 "RFC 4253:
127 The Secure Shell (SSH) Transport Layer Protocol";
128 }
129
130 identity aes192-cbc {
131 base encryption-alg-base;
132 description
133 "AES192-CBC";
134 reference
135 "RFC 4253:
136 The Secure Shell (SSH) Transport Layer Protocol";
137 }
138
139 identity aes128-cbc {
140 base encryption-alg-base;
141 description
142 "AES128-CBC";
143 reference
144 "RFC 4253:
145 The Secure Shell (SSH) Transport Layer Protocol";
146 }
147
148 identity serpent256-cbc {
149 base encryption-alg-base;
150 description
151 "SERPENT256-CBC";
152 reference
153 "RFC 4253:
154 The Secure Shell (SSH) Transport Layer Protocol";
155 }
156
157 identity serpent192-cbc {
158 base encryption-alg-base;
159 description
160 "SERPENT192-CBC";
161 reference
162 "RFC 4253:
163 The Secure Shell (SSH) Transport Layer Protocol";
164 }
165
166 identity serpent128-cbc {
167 base encryption-alg-base;
168 description
169 "SERPENT128-CBC";
170 reference
171 "RFC 4253:
172 The Secure Shell (SSH) Transport Layer Protocol";
173 }
174
175 identity arcfour {
176 base encryption-alg-base;
177 status obsolete;
178 description
179 "ARCFOUR";
180 reference
181 "RFC 8758:
182 Deprecating RC4 in Secure Shell (SSH)";
183 }
184
185 identity idea-cbc {
186 base encryption-alg-base;
187 description
188 "IDEA-CBC";
189 reference
190 "RFC 4253:
191 The Secure Shell (SSH) Transport Layer Protocol";
192 }
193
194 identity cast128-cbc {
195 base encryption-alg-base;
196 description
197 "CAST128-CBC";
198 reference
199 "RFC 4253:
200 The Secure Shell (SSH) Transport Layer Protocol";
201 }
202
203 identity none {
204 base encryption-alg-base;
205 description
206 "NONE";
207 reference
208 "RFC 4253:
209 The Secure Shell (SSH) Transport Layer Protocol";
210 }
211 identity des-cbc {
212 base encryption-alg-base;
213 status obsolete;
214 description
215 "DES-CBC";
216 reference
217 "FIPS 46-3:
218 Data Encryption Standard (DES)";
219 }
220
221 identity arcfour128 {
222 base encryption-alg-base;
223 status obsolete;
224 description
225 "ARCFOUR128";
226 reference
227 "RFC 8758:
228 Deprecating RC4 in Secure Shell (SSH)";
229 }
230
231 identity arcfour256 {
232 base encryption-alg-base;
233 status obsolete;
234 description
235 "ARCFOUR256";
236 reference
237 "RFC 8758:
238 Deprecating RC4 in Secure Shell (SSH)";
239 }
240
241 identity aes128-ctr {
242 base encryption-alg-base;
243 description
244 "AES128-CTR";
245 reference
246 "RFC 4344:
247 The Secure Shell (SSH) Transport Layer Encryption Modes";
248 }
249
250 identity aes192-ctr {
251 base encryption-alg-base;
252 description
253 "AES192-CTR";
254 reference
255 "RFC 4344:
256 The Secure Shell (SSH) Transport Layer Encryption Modes";
257 }
258
259 identity aes256-ctr {
260 base encryption-alg-base;
261 description
262 "AES256-CTR";
263 reference
264 "RFC 4344:
265 The Secure Shell (SSH) Transport Layer Encryption Modes";
266 }
267
268 identity triple-des-ctr { // YANG IDs cannot begin with a number
269 base encryption-alg-base;
270 description
271 "3DES-CTR";
272 reference
273 "RFC 4344:
274 The Secure Shell (SSH) Transport Layer Encryption Modes";
275 }
276
277 identity blowfish-ctr {
278 base encryption-alg-base;
279 description
280 "BLOWFISH-CTR";
281 reference
282 "RFC 4344:
283 The Secure Shell (SSH) Transport Layer Encryption Modes";
284 }
285
286 identity twofish128-ctr {
287 base encryption-alg-base;
288 description
289 "TWOFISH128-CTR";
290 reference
291 "RFC 4344:
292 The Secure Shell (SSH) Transport Layer Encryption Modes";
293 }
294
295 identity twofish192-ctr {
296 base encryption-alg-base;
297 description
298 "TWOFISH192-CTR";
299 reference
300 "RFC 4344:
301 The Secure Shell (SSH) Transport Layer Encryption Modes";
302 }
303
304 identity twofish256-ctr {
305 base encryption-alg-base;
306 description
307 "TWOFISH256-CTR";
308 reference
309 "RFC 4344:
310 The Secure Shell (SSH) Transport Layer Encryption Modes";
311 }
312
313 identity serpent128-ctr {
314 base encryption-alg-base;
315 description
316 "SERPENT128-CTR";
317 reference
318 "RFC 4344:
319 The Secure Shell (SSH) Transport Layer Encryption Modes";
320 }
321
322 identity serpent192-ctr {
323 base encryption-alg-base;
324 description
325 "SERPENT192-CTR";
326 reference
327 "RFC 4344:
328 The Secure Shell (SSH) Transport Layer Encryption Modes";
329 }
330
331 identity serpent256-ctr {
332 base encryption-alg-base;
333 description
334 "SERPENT256-CTR";
335 reference
336 "RFC 4344:
337 The Secure Shell (SSH) Transport Layer Encryption Modes";
338 }
339
340 identity idea-ctr {
341 base encryption-alg-base;
342 description
343 "IDEA-CTR";
344 reference
345 "RFC 4344:
346 The Secure Shell (SSH) Transport Layer Encryption Modes";
347 }
348
349 identity cast128-ctr {
350 base encryption-alg-base;
351 description
352 "CAST128-CTR";
353 reference
354 "RFC 4344:
355 The Secure Shell (SSH) Transport Layer Encryption Modes";
356 }
357
358 identity aead-aes-128-gcm {
359 base encryption-alg-base;
360 description
361 "AEAD_AES_128_GCM";
362 reference
363 "RFC 5647:
364 AES Galois Counter Mode for the
365 Secure Shell Transport Layer Protocol";
366 }
367
368 identity aead-aes-256-gcm {
369 base encryption-alg-base;
370 description
371 "AEAD_AES_256_GCM";
372 reference
373 "RFC 5647:
374 AES Galois Counter Mode for the
375 Secure Shell Transport Layer Protocol";
376 }
377
378 // Protocol-accessible Nodes
379
380 container supported-algorithms {
381 config false;
382 description
383 "A container for a list of encryption algorithms
384 supported by the server.";
385 leaf-list supported-algorithm {
386 type encryption-algorithm-ref;
387 description
388 "A encryption algorithm supported by the server.";
389 }
390 }
391
392}