[Curdle] draft-ietf-curdle-ssh-kex-sha2 and diffie-hellman-group1-sha1 (1024-bit DH)

Tero Kivinen <kivinen@iki.fi> Mon, 17 July 2017 10:06 UTC

Return-Path: <kivinen@iki.fi>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2739912F28A for <curdle@ietfa.amsl.com>; Mon, 17 Jul 2017 03:06:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.12
X-Spam-Level:
X-Spam-Status: No, score=-1.12 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Mq-Z4X2KqTEJ for <curdle@ietfa.amsl.com>; Mon, 17 Jul 2017 03:06:20 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36A4412EB99 for <curdle@ietf.org>; Mon, 17 Jul 2017 03:06:20 -0700 (PDT)
Received: from fireball.acr.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.15.2/8.15.2) with ESMTPS id v6HA6FdM018518 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for <curdle@ietf.org>; Mon, 17 Jul 2017 13:06:15 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.acr.fi (8.15.2/8.14.8/Submit) id v6HA6F5t008612; Mon, 17 Jul 2017 13:06:15 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-ID: <22892.35863.542104.942153@fireball.acr.fi>
Date: Mon, 17 Jul 2017 13:06:15 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: curdle@ietf.org
X-Mailer: VM 8.2.0b under 25.1.1 (x86_64--netbsd)
X-Edit-Time: 7 min
X-Total-Time: 8 min
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/kvurEm0Pn3onDD1gMnLeBqhMjLA>
Subject: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and diffie-hellman-group1-sha1 (1024-bit DH)
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jul 2017 10:06:22 -0000

I think it is bad idea to go from MUST to implement algorithm to MUST
NOT implement in one step. Especially as this will make all current
ssh implementations non-conforming as they do still implement
diffie-hellman-group1-sha1 even when it might be disabled by default.

We are defining here a MUST implement and MUST not implement, not MUST
use and MUST NOT use recommendations.

In IPsec we moved from MUST to SHOULD NOT just because that reason,
i.e., we didn't want to make all implementations non-conforming, and
forbid backwards compatibility with old implementations which might
only support previous MUST implement algorithm.

Also I guess there is quite a lot of ssh implementations in routers
and other devices which might not get updates very quickly, and they
might only support diffie-hellman-group1-sha1, and with this change,
new implementations cannot talk to them, as new implementations MUST
NOT implement diffie-hellman-group1-sha1.

I would suggest changing it to SHOULD NOT and say that in future it
might be changed to MUST NOT.
-- 
kivinen@iki.fi