Re: [cicm] comments on CICM

"David A. McGrew" <david.a.mcgrew@mindspring.com> Wed, 03 August 2011 22:02 UTC

Return-Path: <david.a.mcgrew@mindspring.com>
X-Original-To: cicm@ietfa.amsl.com
Delivered-To: cicm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7E4D21F8748 for <cicm@ietfa.amsl.com>; Wed, 3 Aug 2011 15:02:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.834
X-Spam-Level:
X-Spam-Status: No, score=-1.834 tagged_above=-999 required=5 tests=[AWL=0.765, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZF5snt1aIXTt for <cicm@ietfa.amsl.com>; Wed, 3 Aug 2011 15:02:49 -0700 (PDT)
Received: from elasmtp-spurfowl.atl.sa.earthlink.net (elasmtp-spurfowl.atl.sa.earthlink.net [209.86.89.66]) by ietfa.amsl.com (Postfix) with ESMTP id A194221F874A for <cicm@ietf.org>; Wed, 3 Aug 2011 15:02:49 -0700 (PDT)
Received: from [69.251.37.177] (helo=stealth-10-32-254-211.cisco.com) by elasmtp-spurfowl.atl.sa.earthlink.net with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.67) (envelope-from <david.a.mcgrew@mindspring.com>) id 1QojWm-0004iv-8f for cicm@ietf.org; Wed, 03 Aug 2011 18:03:00 -0400
Message-Id: <00352365-DFE3-4090-BE24-1FD0F55F8EC1@mindspring.com>
From: "David A. McGrew" <david.a.mcgrew@mindspring.com>
To: CICM Discussion List <cicm@ietf.org>
In-Reply-To: <E48B962F2B71EC4C97EF42A839D0F2DE05F3B8B86B@IMCMBX1.MITRE.ORG>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Wed, 03 Aug 2011 15:02:58 -0700
References: <99256CA4-47EB-444A-9D5C-29EEEF3C81D5@mindspring.com> <MLQM-20110803104111367-85835@mlite.mitre.org> <E48B962F2B71EC4C97EF42A839D0F2DE05F3B8B614@IMCMBX1.MITRE.ORG> <86150541B533894DAD5CB2DB3F4788520E2B00C8F2@CSFWMAIL1.cs.de.ittind.com> <E48B962F2B71EC4C97EF42A839D0F2DE05F3B8B86B@IMCMBX1.MITRE.ORG>
X-Mailer: Apple Mail (2.936)
X-ELNK-Trace: ad1f9a46c4c7bfd19649176a89d694c0f43c108795ac45076ba9369942794d92d915be484dfacb70350badd9bab72f9c350badd9bab72f9c350badd9bab72f9c
X-Originating-IP: 69.251.37.177
Subject: Re: [cicm] comments on CICM
X-BeenThere: cicm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: CICM Discussion List <cicm@ietf.org>
List-Id: CICM Discussion List <cicm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cicm>, <mailto:cicm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cicm>
List-Post: <mailto:cicm@ietf.org>
List-Help: <mailto:cicm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cicm>, <mailto:cicm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Aug 2011 22:02:50 -0000

Hi Jim,

http://tools.ietf.org/html/draft-peck-suiteb-dtls-srtp-00 requires AES- 
GCM, and is presumably intended for VoIP, though it does not  
specifically mention VoIP.

Suite B RFCs have shown a clear preference for GCM, though some other  
modes are allowed (as transitional in TLS, and within IKE but not ESP).

David

On Aug 3, 2011, at 2:05 PM, Cottrell Jr., James R. wrote:

> Hema,
>
> Thanks.
>
> Not all Suite B products will be IPsec.  I believe Harris has a  
> Suite B tactical radio.  For protection of voice traffic, I wouldn't  
> think that they used AES-GCM.
>
> Jim Cottrell
>
> -----Original Message-----
> From: cicm-bounces@ietf.org [mailto:cicm-bounces@ietf.org] On Behalf  
> Of Krishnamurthy, Hema - ES
> Sent: Wednesday, August 03, 2011 10:52 AM
> To: CICM Discussion List
> Subject: Re: [cicm] comments on CICM
>
> http://tools.ietf.org/html/rfc4869 lists AES-GCM as part of Suite B.
>
> -----Original Message-----
> From: cicm-bounces@ietf.org [mailto:cicm-bounces@ietf.org] On Behalf  
> Of Cottrell Jr., James R.
> Sent: Wednesday, August 03, 2011 7:49 AM
> To: CICM Discussion List
> Subject: Re: [cicm] comments on CICM
>
> David McGrew,
>
> In your email you stated " Considering that AES-GCM is required for  
> Suite B, and the Suite B RFCs
> all cite RFC 5116, the lack of AEAD support appears problematic"
>
> Can you please provide an authoritative document stating this  
> requirement?
>
> Thanks,
>
> Jim Cottrell
>
> -----Original Message-----
> From: cicm-bounces@ietf.org [mailto:cicm-bounces@ietf.org] On Behalf  
> Of Novikov, Lev
> Sent: Wednesday, August 03, 2011 10:03 AM
> To: CICM Discussion List (cicm@ietf.org)
> Subject: [cicm] FW: comments on CICM
>
> FYI: Below is an insightful email from David McGrew that does not
> appear to have made it to the mailing list nor was it held for
> moderation so the list never saw it.
>
> Lev
>
> -----Original Message-----
> From: David A. McGrew [mailto:david.a.mcgrew@mindspring.com]
> Sent: Wednesday, July 27, 2011 14:39
> To: cicm@ietf.org; Lanz, Dan; Novikov, Lev
> Subject: comments on CICM
>
> Hi Lev and Daniel,
>
> I skimmed the CICM documents and have several comments.
>
> It seems that the major goal for CICM is multi-vendor support.
> Worthwhile goal, but what crypto hardware vendors whose products
> support IETF standards are participating in this effort?
>
> RFC 5116 defines a standard interface to Authenticated Encryption with
> Associated Data (AEAD) algorithms, which is used by TLS 1.2, SSH,
> SRTP, IKE, and SMIME, and is backwards compatible with ESP.   The AEAD
> interface is simple (two defined messages, four inputs and one output
> each), and AEAD is widely regarded as the state of the art in security
> and efficiency (including both OCB and GCM, for instance).  It appears
> that CICM is not compatible with this interface, in which case it
> would be a real step backwards.  (If CICM does support AEAD, it is not
> clear to me how it does.  Am I missing something?)
>
> CICM is intended for use in a high assurance crypto module.
> Considering that AES-GCM is required for Suite B, and the Suite B RFCs
> all cite RFC 5116, the lack of AEAD support appears problematic.
>
> The use cases for which CICM is intended are those where
> "cryptographic transformation of data initiated in one security
> domain with the result made available in another security domain";
> three cases are given, two of which are HAIPE.  So clearly the CICM
> design has been driven by high assurance requirements that are highly
> security conscious and not publicly available.   My question here is:
> how will the CICM design make implementations of IETF security
> protocols better?   If CICM is tightly bound to non-public protocols,
> it will not have much relevance to the IETF.   On the other hand, if
> there is a document that shows how a high assurance design approach
> can be used in an IETF standard like TLS or IPsec, that could be
> valuable.   It could be a good contribution to the IETF to provide
> implementation criteria or design approaches that are applicable to
> internet standards.  I think there would be a good amount of interest
> in this sort of work, and in fact I would be very happy to see that
> sort of document show up in IRTF CFRG.
>
> An important nit: MD5 is used as an example on pg 24 of draft-lanz-
> cicm-02.  It has been deprecated by RFC 6151; I encourage that a
> different hash be used as an example.
>
> regards,
>
> David
>
> _______________________________________________
> cicm mailing list
> cicm@ietf.org
> https://www.ietf.org/mailman/listinfo/cicm
>
> _______________________________________________
> cicm mailing list
> cicm@ietf.org
> https://www.ietf.org/mailman/listinfo/cicm
>
> This e-mail and any files transmitted with it may be proprietary and  
> are intended solely for the use of the individual or entity to whom  
> they are addressed. If you have received this e-mail in error please  
> notify the sender.
> Please note that any views or opinions presented in this e-mail are  
> solely those of the author and do not necessarily represent those of  
> ITT Corporation. The recipient should check this e-mail and any  
> attachments for the presence of viruses. ITT accepts no liability  
> for any damage caused by any virus transmitted by this e-mail.
> _______________________________________________
> cicm mailing list
> cicm@ietf.org
> https://www.ietf.org/mailman/listinfo/cicm
> _______________________________________________
> cicm mailing list
> cicm@ietf.org
> https://www.ietf.org/mailman/listinfo/cicm