Re: [cicm] comments on CICM

"Krishnamurthy, Hema - ES" <Hema.Krishnamurthy@itt.com> Wed, 03 August 2011 14:51 UTC

Return-Path: <prvs=18937e232=Hema.Krishnamurthy@itt.com>
X-Original-To: cicm@ietfa.amsl.com
Delivered-To: cicm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 280CB21F8B55 for <cicm@ietfa.amsl.com>; Wed, 3 Aug 2011 07:51:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FvZxiWgltCd2 for <cicm@ietfa.amsl.com>; Wed, 3 Aug 2011 07:51:58 -0700 (PDT)
Received: from cip-fwa-c1.itt.com (cip-fwa-c1.itt.com [151.190.252.21]) by ietfa.amsl.com (Postfix) with ESMTP id 53EBC21F8B50 for <cicm@ietf.org>; Wed, 3 Aug 2011 07:51:58 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AtYAAKxfOU4KHOwB/2dsb2JhbABCmAaQUYFAAQEBAQMBAQE3NBcEAgEIEQQBAR8JBycLFAkIAQEEEwiHaMEGhWNfBJgLi3A
X-IronPort-AV: E=Sophos;i="4.67,310,1309737600"; d="scan'208";a="120229812"
Received: from usfwa1excas1.itt.net ([10.28.236.1]) by cip-fwa-c1.itt.com with ESMTP/TLS/AES128-SHA; 03 Aug 2011 14:52:06 +0000
Received: from USFWA1EXCAS5.itt.net (10.28.236.33) by USFWA1EXCAS1.itt.net (10.28.236.1) with Microsoft SMTP Server (TLS) id 8.2.255.0; Wed, 3 Aug 2011 10:52:06 -0400
Received: from CSFWCAS1.cs.de.ittind.com (10.32.129.151) by USFWA1EXCAS5.itt.net (10.28.236.33) with Microsoft SMTP Server (TLS) id 8.2.176.0; Wed, 3 Aug 2011 10:52:05 -0400
Received: from CSFWMAIL1.cs.de.ittind.com ([10.32.129.153]) by CSFWCAS1.cs.de.ittind.com ([10.32.129.151]) with mapi; Wed, 3 Aug 2011 10:52:02 -0400
From: "Krishnamurthy, Hema - ES" <Hema.Krishnamurthy@itt.com>
To: CICM Discussion List <cicm@ietf.org>
Date: Wed, 03 Aug 2011 10:52:01 -0400
Thread-Topic: comments on CICM
Thread-Index: AcxMjG9q3Na+ogFKR3Slh/gLrxXr8wFWUHrAAAGlEzAAACTIsA==
Message-ID: <86150541B533894DAD5CB2DB3F4788520E2B00C8F2@CSFWMAIL1.cs.de.ittind.com>
References: <99256CA4-47EB-444A-9D5C-29EEEF3C81D5@mindspring.com> <MLQM-20110803104111367-85835@mlite.mitre.org> <E48B962F2B71EC4C97EF42A839D0F2DE05F3B8B614@IMCMBX1.MITRE.ORG>
In-Reply-To: <E48B962F2B71EC4C97EF42A839D0F2DE05F3B8B614@IMCMBX1.MITRE.ORG>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [cicm] comments on CICM
X-BeenThere: cicm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: CICM Discussion List <cicm@ietf.org>
List-Id: CICM Discussion List <cicm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cicm>, <mailto:cicm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cicm>
List-Post: <mailto:cicm@ietf.org>
List-Help: <mailto:cicm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cicm>, <mailto:cicm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Aug 2011 14:51:59 -0000

http://tools.ietf.org/html/rfc4869 lists AES-GCM as part of Suite B.

-----Original Message-----
From: cicm-bounces@ietf.org [mailto:cicm-bounces@ietf.org] On Behalf Of Cottrell Jr., James R.
Sent: Wednesday, August 03, 2011 7:49 AM
To: CICM Discussion List
Subject: Re: [cicm] comments on CICM

David McGrew,

In your email you stated " Considering that AES-GCM is required for Suite B, and the Suite B RFCs
all cite RFC 5116, the lack of AEAD support appears problematic"

Can you please provide an authoritative document stating this requirement?

Thanks,

Jim Cottrell

-----Original Message-----
From: cicm-bounces@ietf.org [mailto:cicm-bounces@ietf.org] On Behalf Of Novikov, Lev
Sent: Wednesday, August 03, 2011 10:03 AM
To: CICM Discussion List (cicm@ietf.org)
Subject: [cicm] FW: comments on CICM

FYI: Below is an insightful email from David McGrew that does not
appear to have made it to the mailing list nor was it held for
moderation so the list never saw it.

Lev

-----Original Message-----
From: David A. McGrew [mailto:david.a.mcgrew@mindspring.com]
Sent: Wednesday, July 27, 2011 14:39
To: cicm@ietf.org; Lanz, Dan; Novikov, Lev
Subject: comments on CICM

Hi Lev and Daniel,

I skimmed the CICM documents and have several comments.

It seems that the major goal for CICM is multi-vendor support.
Worthwhile goal, but what crypto hardware vendors whose products
support IETF standards are participating in this effort?

RFC 5116 defines a standard interface to Authenticated Encryption with
Associated Data (AEAD) algorithms, which is used by TLS 1.2, SSH,
SRTP, IKE, and SMIME, and is backwards compatible with ESP.   The AEAD
interface is simple (two defined messages, four inputs and one output
each), and AEAD is widely regarded as the state of the art in security
and efficiency (including both OCB and GCM, for instance).  It appears
that CICM is not compatible with this interface, in which case it
would be a real step backwards.  (If CICM does support AEAD, it is not
clear to me how it does.  Am I missing something?)

CICM is intended for use in a high assurance crypto module.
Considering that AES-GCM is required for Suite B, and the Suite B RFCs
all cite RFC 5116, the lack of AEAD support appears problematic.

The use cases for which CICM is intended are those where
"cryptographic transformation of data initiated in one security
domain with the result made available in another security domain";
three cases are given, two of which are HAIPE.  So clearly the CICM
design has been driven by high assurance requirements that are highly
security conscious and not publicly available.   My question here is:
how will the CICM design make implementations of IETF security
protocols better?   If CICM is tightly bound to non-public protocols,
it will not have much relevance to the IETF.   On the other hand, if
there is a document that shows how a high assurance design approach
can be used in an IETF standard like TLS or IPsec, that could be
valuable.   It could be a good contribution to the IETF to provide
implementation criteria or design approaches that are applicable to
internet standards.  I think there would be a good amount of interest
in this sort of work, and in fact I would be very happy to see that
sort of document show up in IRTF CFRG.

An important nit: MD5 is used as an example on pg 24 of draft-lanz-
cicm-02.  It has been deprecated by RFC 6151; I encourage that a
different hash be used as an example.

regards,

David

_______________________________________________
cicm mailing list
cicm@ietf.org
https://www.ietf.org/mailman/listinfo/cicm

_______________________________________________
cicm mailing list
cicm@ietf.org
https://www.ietf.org/mailman/listinfo/cicm

This e-mail and any files transmitted with it may be proprietary and are intended solely for the use of the individual or entity to whom they are addressed. If you have received this e-mail in error please notify the sender.
Please note that any views or opinions presented in this e-mail are solely those of the author and do not necessarily represent those of ITT Corporation. The recipient should check this e-mail and any attachments for the presence of viruses. ITT accepts no liability for any damage caused by any virus transmitted by this e-mail.