Re: [Curdle] Which curves are MUST and SHOULD ?

Ron Frederick <ronf@timeheart.net> Fri, 11 December 2020 03:37 UTC

Return-Path: <ronf@timeheart.net>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 86ACF3A141D for <curdle@ietfa.amsl.com>; Thu, 10 Dec 2020 19:37:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=timeheart.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UROjP1OkX6DM for <curdle@ietfa.amsl.com>; Thu, 10 Dec 2020 19:37:28 -0800 (PST)
Received: from mail-pj1-x1034.google.com (mail-pj1-x1034.google.com [IPv6:2607:f8b0:4864:20::1034]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B69553A141E for <curdle@ietf.org>; Thu, 10 Dec 2020 19:37:27 -0800 (PST)
Received: by mail-pj1-x1034.google.com with SMTP id iq13so1521309pjb.3 for <curdle@ietf.org>; Thu, 10 Dec 2020 19:37:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=timeheart.net; s=mail; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ZmxzN5dqFI89nO8EDNyYV0ylCbcvowu5hk/WGtl6Pwk=; b=gtU9sdySSoyCUO909IB104BLjrQaREsAajlTUtk5vanCN09W5g4Nbwg87bNZrVZaMa g0zyDjidAYSHxZ07xyPVKnSG0Tqv62YSXN8VAyPALynYFCey7dpPBxZ/+JHq/aDWWZqi loky7aJOne+K1ZwHoOEoZrgm1hAbVaGxZEBXs=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ZmxzN5dqFI89nO8EDNyYV0ylCbcvowu5hk/WGtl6Pwk=; b=sFoxrGNBwgdmWkj10D8MijlUWMX5MbSrSd6Zau++xrrsRBccLkWYFOXilq2Hjq4Okc sgyvk5vewFzLp4iUgTkKR+AOJ0baZVEd+ZSd/gdp7P4gYDIdEVZdc86R11ft2Ns/8MJV p4JwytkiV7dmBx8hvue8cp/JtCw3PXzyLDSIW+6BQf0qNyil/kHl5LWdJLWFe/aO10de DtvzE85iwI/++B5Ob228WzjrucYclZqqhdn1wUCNowEXWS3eWn+IxIqUCcYt/M4KKtLm WTP0sQ64PRsbrtD8lahynKMJ3s0k3koyuwyq+OSh32dPYyVPdmFYzaO8Zr7h+yf6U3AG SsGg==
X-Gm-Message-State: AOAM532sC+qPKZ7RV1EuY7GZosMO3HMSW7pcJHyfrJa02hwjczbEVZhr GVnS8bkd+CijSCQszTpudDnP4w==
X-Google-Smtp-Source: ABdhPJxw60qjkwWBTVkoHh2PyFrtgt7ngg/1koT6ctt+yCAj1xNloWW3tkUPOb+PqKNkyMi36nv0uQ==
X-Received: by 2002:a17:902:8508:b029:da:8f7e:f645 with SMTP id bj8-20020a1709028508b02900da8f7ef645mr9284995plb.30.1607657845619; Thu, 10 Dec 2020 19:37:25 -0800 (PST)
Received: from quad.timeheart.net ([74.93.13.193]) by smtp.gmail.com with ESMTPSA id k16sm7925172pfi.131.2020.12.10.19.37.24 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Thu, 10 Dec 2020 19:37:25 -0800 (PST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.14\))
From: Ron Frederick <ronf@timeheart.net>
In-Reply-To: <1607647129866.76532@cs.auckland.ac.nz>
Date: Thu, 10 Dec 2020 19:37:22 -0800
Cc: Curdle Mailing List <curdle@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <146F1397-6A33-45DF-A7A4-D98C8B810E0C@timeheart.net>
References: <2CCABC30-F757-4659-9FF3-5AADDD51EE30@akamai.com> <4b681efd49274f03c7e0521e127e031426632ad0.camel@redhat.com> <CADZyTkk--kCWqE7q0Xi5C40V92MuZBktDzQGt_vPSZPiBy7v9w@mail.gmail.com> <18479.1606885358@eng-mail01.juniper.net> <20201205194724.GB64351@kduck.mit.edu> <37691.1607621661@eng-mail01.juniper.net> <1607647129866.76532@cs.auckland.ac.nz>
To: "Mark D. Baushke" <mdb=40juniper.net@dmarc.ietf.org>, Peter Gutmann <pgut001@cs.auckland.ac.nz>, Rich Salz <rsalz@akamai.com>
X-Mailer: Apple Mail (2.3445.104.14)
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/8H3f8fYR1waJQsrXBG6pfK6z-S8>
Subject: Re: [Curdle] Which curves are MUST and SHOULD ?
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Dec 2020 03:37:31 -0000

On Dec 10, 2020, at 4:38 PM, Peter Gutmann <pgut001@cs.auckland.ac.nz> wrote:
> Mark D. Baushke <mdb=40juniper.net@dmarc.ietf.org> writes:
>> MAY diffie-hellman-group14-sha1
>> SHOULD NOT diffie-hellman-group-exchange-sha1
> 
> Just wondering why the hardcoded group is MAY but the negotiated, and probably
> more secure, group is SHOULD NOT?  Is it because lots of legacy stuff will
> only do the hardcoded group?


I imagine the reasoning behind most of these being SHOULD NOT is due to the use of SHA-1. As for making an exception for group14-sha1, I think the intent there was that it was one of the most commonly implemented algorithms due to it being one of two REQUIRED algorithms in RFC 4253. This proposal drops it from being REQUIRED, but still allows it for interoperability with older implementations that didn’t add support for anything stronger.

I agree that diffie-hellman-group-exchange-sha1 could in theory be more secure than diffie-hellman-group14-sha1, but I think it makes more sense to encourage implementations to support diffie-hellman-group-exchange-sha256. It’s nearly as widely implemented as the SHA-1 version of group exchange, and much stronger.

Mark Baushke wrote:
> I am NOT certain about the nistp384 and nistp521. They are not
> consistent between the ecdh-sha2-nistp* and gss-nistp* forms.
> They most likely are best at SHOULD for all four of them.

SHOULD for all of these works for me.

Regarding the nistp curves vs. curve25519, I also have a personal bias toward curve25519, but I worry about it being much less widely implemented than the nistp curves. I’m not sure we’ve seen wide enough implementation to justify move curve25519-sha256 to be a “MUST”. Even if we include the older naming of “curve25519-sha256@libssh.org”, it’s still only about half as widely implemented as the ECDH/ECDSA nistp algorithms.

Unfortunately, this still leaves us with a question about how we get at least one MUST in the algorithm list.
-- 
Ron Frederick
ronf@timeheart.net