roman | c1d2b09 | 2023-02-02 08:58:27 +0100 | [diff] [blame] | 1 | module iana-ssh-encryption-algs { |
| 2 | yang-version 1.1; |
| 3 | namespace "urn:ietf:params:xml:ns:yang:iana-ssh-encryption-algs"; |
| 4 | prefix sshea; |
| 5 | |
| 6 | organization |
| 7 | "Internet Assigned Numbers Authority (IANA)"; |
| 8 | |
| 9 | contact |
| 10 | "Postal: ICANN |
| 11 | 12025 Waterfront Drive, Suite 300 |
| 12 | Los Angeles, CA 90094-2536 |
| 13 | United States of America |
| 14 | Tel: +1 310 301 5800 |
| 15 | Email: iana@iana.org"; |
| 16 | |
| 17 | description |
| 18 | "This module defines identities for the encryption algorithms |
| 19 | defined in the 'Encryption Algorithm Names' sub-registry of the |
| 20 | 'Secure Shell (SSH) Protocol Parameters' registry maintained |
| 21 | by IANA. |
| 22 | |
| 23 | Copyright (c) 2022 IETF Trust and the persons identified as |
| 24 | authors of the code. All rights reserved. |
| 25 | |
| 26 | Redistribution and use in source and binary forms, with |
| 27 | or without modification, is permitted pursuant to, and |
| 28 | subject to the license terms contained in, the Revised |
| 29 | BSD License set forth in Section 4.c of the IETF Trust's |
| 30 | Legal Provisions Relating to IETF Documents |
| 31 | (https://trustee.ietf.org/license-info). |
| 32 | |
| 33 | The initial version of this YANG module is part of RFC EEEE |
| 34 | (https://www.rfc-editor.org/info/rfcEEEE); see the RFC |
| 35 | itself for full legal notices."; |
| 36 | |
| 37 | revision 2022-06-16 { |
| 38 | description |
roman | 7fdc84d | 2023-06-06 13:14:53 +0200 | [diff] [blame] | 39 | "Reflects contents of the encryption algorithms registry |
| 40 | on June 16, 2022."; |
roman | c1d2b09 | 2023-02-02 08:58:27 +0100 | [diff] [blame] | 41 | reference |
| 42 | "RFC EEEE: YANG Groupings for SSH Clients and SSH Servers"; |
| 43 | } |
| 44 | |
| 45 | // Typedefs |
| 46 | |
| 47 | typedef encryption-algorithm-ref { |
| 48 | type identityref { |
| 49 | base "encryption-alg-base"; |
| 50 | } |
| 51 | description |
| 52 | "A reference to a SSH encryption algorithm identifier."; |
| 53 | } |
| 54 | |
| 55 | // Identities |
| 56 | |
| 57 | identity encryption-alg-base { |
| 58 | description |
| 59 | "Base identity used to identify encryption algorithms."; |
| 60 | } |
| 61 | |
| 62 | identity triple-des-cbc { // YANG IDs cannot begin with a number |
| 63 | base encryption-alg-base; |
| 64 | description |
| 65 | "3DES-CBC"; |
| 66 | reference |
| 67 | "RFC 4253: |
| 68 | The Secure Shell (SSH) Transport Layer Protocol"; |
| 69 | } |
| 70 | |
| 71 | identity blowfish-cbc { |
| 72 | base encryption-alg-base; |
| 73 | description |
| 74 | "BLOWFISH-CBC"; |
| 75 | reference |
| 76 | "RFC 4253: |
| 77 | The Secure Shell (SSH) Transport Layer Protocol"; |
| 78 | } |
| 79 | |
| 80 | identity twofish256-cbc { |
| 81 | base encryption-alg-base; |
| 82 | description |
| 83 | "TWOFISH256-CBC"; |
| 84 | reference |
| 85 | "RFC 4253: |
| 86 | The Secure Shell (SSH) Transport Layer Protocol"; |
| 87 | } |
| 88 | |
| 89 | identity twofish-cbc { |
| 90 | base encryption-alg-base; |
| 91 | description |
| 92 | "TWOFISH-CBC"; |
| 93 | reference |
| 94 | "RFC 4253: |
| 95 | The Secure Shell (SSH) Transport Layer Protocol"; |
| 96 | } |
| 97 | |
| 98 | identity twofish192-cbc { |
| 99 | base encryption-alg-base; |
| 100 | description |
| 101 | "TWOFISH192-CBC"; |
| 102 | reference |
| 103 | "RFC 4253: |
| 104 | The Secure Shell (SSH) Transport Layer Protocol"; |
| 105 | } |
roman | c1d2b09 | 2023-02-02 08:58:27 +0100 | [diff] [blame] | 106 | identity twofish128-cbc { |
| 107 | base encryption-alg-base; |
| 108 | description |
| 109 | "TWOFISH128-CBC"; |
| 110 | reference |
| 111 | "RFC 4253: |
| 112 | The Secure Shell (SSH) Transport Layer Protocol"; |
| 113 | } |
| 114 | |
| 115 | identity aes256-cbc { |
| 116 | base encryption-alg-base; |
| 117 | description |
| 118 | "AES256-CBC"; |
| 119 | reference |
| 120 | "RFC 4253: |
| 121 | The Secure Shell (SSH) Transport Layer Protocol"; |
| 122 | } |
| 123 | |
| 124 | identity aes192-cbc { |
| 125 | base encryption-alg-base; |
| 126 | description |
| 127 | "AES192-CBC"; |
| 128 | reference |
| 129 | "RFC 4253: |
| 130 | The Secure Shell (SSH) Transport Layer Protocol"; |
| 131 | } |
| 132 | |
| 133 | identity aes128-cbc { |
| 134 | base encryption-alg-base; |
roman | 7fdc84d | 2023-06-06 13:14:53 +0200 | [diff] [blame] | 135 | status deprecated; |
roman | c1d2b09 | 2023-02-02 08:58:27 +0100 | [diff] [blame] | 136 | description |
| 137 | "AES128-CBC"; |
| 138 | reference |
| 139 | "RFC 4253: |
| 140 | The Secure Shell (SSH) Transport Layer Protocol"; |
| 141 | } |
| 142 | |
| 143 | identity serpent256-cbc { |
| 144 | base encryption-alg-base; |
| 145 | description |
| 146 | "SERPENT256-CBC"; |
| 147 | reference |
| 148 | "RFC 4253: |
| 149 | The Secure Shell (SSH) Transport Layer Protocol"; |
| 150 | } |
| 151 | |
| 152 | identity serpent192-cbc { |
| 153 | base encryption-alg-base; |
| 154 | description |
| 155 | "SERPENT192-CBC"; |
| 156 | reference |
| 157 | "RFC 4253: |
| 158 | The Secure Shell (SSH) Transport Layer Protocol"; |
| 159 | } |
| 160 | |
| 161 | identity serpent128-cbc { |
| 162 | base encryption-alg-base; |
| 163 | description |
| 164 | "SERPENT128-CBC"; |
| 165 | reference |
| 166 | "RFC 4253: |
| 167 | The Secure Shell (SSH) Transport Layer Protocol"; |
| 168 | } |
| 169 | |
| 170 | identity arcfour { |
| 171 | base encryption-alg-base; |
| 172 | status obsolete; |
| 173 | description |
| 174 | "ARCFOUR"; |
| 175 | reference |
| 176 | "RFC 8758: |
| 177 | Deprecating RC4 in Secure Shell (SSH)"; |
| 178 | } |
| 179 | |
| 180 | identity idea-cbc { |
| 181 | base encryption-alg-base; |
| 182 | description |
| 183 | "IDEA-CBC"; |
| 184 | reference |
| 185 | "RFC 4253: |
| 186 | The Secure Shell (SSH) Transport Layer Protocol"; |
| 187 | } |
| 188 | |
| 189 | identity cast128-cbc { |
| 190 | base encryption-alg-base; |
| 191 | description |
| 192 | "CAST128-CBC"; |
| 193 | reference |
| 194 | "RFC 4253: |
| 195 | The Secure Shell (SSH) Transport Layer Protocol"; |
| 196 | } |
| 197 | |
| 198 | identity none { |
| 199 | base encryption-alg-base; |
| 200 | description |
| 201 | "NONE"; |
| 202 | reference |
| 203 | "RFC 4253: |
| 204 | The Secure Shell (SSH) Transport Layer Protocol"; |
| 205 | } |
roman | 7fdc84d | 2023-06-06 13:14:53 +0200 | [diff] [blame] | 206 | |
roman | c1d2b09 | 2023-02-02 08:58:27 +0100 | [diff] [blame] | 207 | identity des-cbc { |
| 208 | base encryption-alg-base; |
| 209 | status obsolete; |
| 210 | description |
| 211 | "DES-CBC"; |
| 212 | reference |
| 213 | "FIPS 46-3: |
| 214 | Data Encryption Standard (DES)"; |
| 215 | } |
| 216 | |
| 217 | identity arcfour128 { |
| 218 | base encryption-alg-base; |
| 219 | status obsolete; |
| 220 | description |
| 221 | "ARCFOUR128"; |
| 222 | reference |
| 223 | "RFC 8758: |
| 224 | Deprecating RC4 in Secure Shell (SSH)"; |
| 225 | } |
| 226 | |
| 227 | identity arcfour256 { |
| 228 | base encryption-alg-base; |
| 229 | status obsolete; |
| 230 | description |
| 231 | "ARCFOUR256"; |
| 232 | reference |
| 233 | "RFC 8758: |
| 234 | Deprecating RC4 in Secure Shell (SSH)"; |
| 235 | } |
| 236 | |
| 237 | identity aes128-ctr { |
| 238 | base encryption-alg-base; |
roman | 7fdc84d | 2023-06-06 13:14:53 +0200 | [diff] [blame] | 239 | status deprecated; |
roman | c1d2b09 | 2023-02-02 08:58:27 +0100 | [diff] [blame] | 240 | description |
| 241 | "AES128-CTR"; |
| 242 | reference |
| 243 | "RFC 4344: |
| 244 | The Secure Shell (SSH) Transport Layer Encryption Modes"; |
| 245 | } |
| 246 | |
| 247 | identity aes192-ctr { |
| 248 | base encryption-alg-base; |
| 249 | description |
| 250 | "AES192-CTR"; |
| 251 | reference |
| 252 | "RFC 4344: |
| 253 | The Secure Shell (SSH) Transport Layer Encryption Modes"; |
| 254 | } |
| 255 | |
| 256 | identity aes256-ctr { |
| 257 | base encryption-alg-base; |
| 258 | description |
| 259 | "AES256-CTR"; |
| 260 | reference |
| 261 | "RFC 4344: |
| 262 | The Secure Shell (SSH) Transport Layer Encryption Modes"; |
| 263 | } |
| 264 | |
| 265 | identity triple-des-ctr { // YANG IDs cannot begin with a number |
| 266 | base encryption-alg-base; |
| 267 | description |
| 268 | "3DES-CTR"; |
| 269 | reference |
| 270 | "RFC 4344: |
| 271 | The Secure Shell (SSH) Transport Layer Encryption Modes"; |
| 272 | } |
| 273 | |
| 274 | identity blowfish-ctr { |
| 275 | base encryption-alg-base; |
| 276 | description |
| 277 | "BLOWFISH-CTR"; |
| 278 | reference |
| 279 | "RFC 4344: |
| 280 | The Secure Shell (SSH) Transport Layer Encryption Modes"; |
| 281 | } |
| 282 | |
| 283 | identity twofish128-ctr { |
| 284 | base encryption-alg-base; |
| 285 | description |
| 286 | "TWOFISH128-CTR"; |
| 287 | reference |
| 288 | "RFC 4344: |
| 289 | The Secure Shell (SSH) Transport Layer Encryption Modes"; |
| 290 | } |
| 291 | |
| 292 | identity twofish192-ctr { |
| 293 | base encryption-alg-base; |
| 294 | description |
| 295 | "TWOFISH192-CTR"; |
| 296 | reference |
| 297 | "RFC 4344: |
| 298 | The Secure Shell (SSH) Transport Layer Encryption Modes"; |
| 299 | } |
| 300 | |
| 301 | identity twofish256-ctr { |
| 302 | base encryption-alg-base; |
| 303 | description |
| 304 | "TWOFISH256-CTR"; |
| 305 | reference |
| 306 | "RFC 4344: |
| 307 | The Secure Shell (SSH) Transport Layer Encryption Modes"; |
| 308 | } |
| 309 | |
| 310 | identity serpent128-ctr { |
| 311 | base encryption-alg-base; |
| 312 | description |
| 313 | "SERPENT128-CTR"; |
| 314 | reference |
| 315 | "RFC 4344: |
| 316 | The Secure Shell (SSH) Transport Layer Encryption Modes"; |
| 317 | } |
| 318 | |
| 319 | identity serpent192-ctr { |
| 320 | base encryption-alg-base; |
| 321 | description |
| 322 | "SERPENT192-CTR"; |
| 323 | reference |
| 324 | "RFC 4344: |
| 325 | The Secure Shell (SSH) Transport Layer Encryption Modes"; |
| 326 | } |
| 327 | |
| 328 | identity serpent256-ctr { |
| 329 | base encryption-alg-base; |
| 330 | description |
| 331 | "SERPENT256-CTR"; |
| 332 | reference |
| 333 | "RFC 4344: |
| 334 | The Secure Shell (SSH) Transport Layer Encryption Modes"; |
| 335 | } |
| 336 | |
| 337 | identity idea-ctr { |
| 338 | base encryption-alg-base; |
| 339 | description |
| 340 | "IDEA-CTR"; |
| 341 | reference |
| 342 | "RFC 4344: |
| 343 | The Secure Shell (SSH) Transport Layer Encryption Modes"; |
| 344 | } |
| 345 | |
| 346 | identity cast128-ctr { |
| 347 | base encryption-alg-base; |
| 348 | description |
| 349 | "CAST128-CTR"; |
| 350 | reference |
| 351 | "RFC 4344: |
| 352 | The Secure Shell (SSH) Transport Layer Encryption Modes"; |
| 353 | } |
| 354 | |
| 355 | identity aead-aes-128-gcm { |
| 356 | base encryption-alg-base; |
| 357 | description |
| 358 | "AEAD_AES_128_GCM"; |
| 359 | reference |
| 360 | "RFC 5647: |
| 361 | AES Galois Counter Mode for the |
| 362 | Secure Shell Transport Layer Protocol"; |
| 363 | } |
| 364 | |
| 365 | identity aead-aes-256-gcm { |
| 366 | base encryption-alg-base; |
| 367 | description |
| 368 | "AEAD_AES_256_GCM"; |
| 369 | reference |
| 370 | "RFC 5647: |
| 371 | AES Galois Counter Mode for the |
| 372 | Secure Shell Transport Layer Protocol"; |
| 373 | } |
| 374 | |
| 375 | // Protocol-accessible Nodes |
| 376 | |
| 377 | container supported-algorithms { |
| 378 | config false; |
| 379 | description |
| 380 | "A container for a list of encryption algorithms |
| 381 | supported by the server."; |
| 382 | leaf-list supported-algorithm { |
| 383 | type encryption-algorithm-ref; |
| 384 | description |
| 385 | "A encryption algorithm supported by the server."; |
| 386 | } |
| 387 | } |
| 388 | |
| 389 | } |