Re: [Hipsec] Proposed new list for HIP_TRANSFORM

Paul Lambert <paul@marvell.com> Thu, 07 January 2010 03:08 UTC

Return-Path: <paul@marvell.com>
X-Original-To: hipsec@core3.amsl.com
Delivered-To: hipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 89CA13A6976 for <hipsec@core3.amsl.com>; Wed, 6 Jan 2010 19:08:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D0UC81Bk1bTC for <hipsec@core3.amsl.com>; Wed, 6 Jan 2010 19:08:37 -0800 (PST)
Received: from dakia2.marvell.com (dakia2.marvell.com [65.219.4.35]) by core3.amsl.com (Postfix) with ESMTP id 8D38A3A67AD for <hipsec@ietf.org>; Wed, 6 Jan 2010 19:08:37 -0800 (PST)
X-ASG-Debug-ID: 1262833715-37a301dd0000-ZNEVin
X-Barracuda-URL: http://10.68.76.222:80/cgi-bin/mark.cgi
Received: from maili.marvell.com (maili.marvell.com [10.68.76.51]) by dakia2.marvell.com (Spam & Virus Firewall) with ESMTP id B6226D3CE2; Wed, 6 Jan 2010 19:08:35 -0800 (PST)
Received: from maili.marvell.com (maili.marvell.com [10.68.76.51]) by dakia2.marvell.com with ESMTP id 9k6ABgfC8ylglBVr; Wed, 06 Jan 2010 19:08:35 -0800 (PST)
Received: from MSI-MTA.marvell.com (msi-mta.marvell.com [10.68.76.91]) by maili.marvell.com (Postfix) with ESMTP id A02F382A9F; Wed, 6 Jan 2010 19:08:35 -0800 (PST)
Received: from sc-owa02.marvell.com ([10.93.76.22]) by MSI-MTA.marvell.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 6 Jan 2010 19:08:35 -0800
Received: from SC-vEXCH2.marvell.com ([10.93.76.134]) by sc-owa02.marvell.com ([10.93.76.22]) with mapi; Wed, 6 Jan 2010 19:08:35 -0800
From: Paul Lambert <paul@marvell.com>
To: Robert Moskowitz <rgm@htt-consult.com>
Date: Wed, 06 Jan 2010 19:08:34 -0800
X-ASG-Orig-Subj: RE: [Hipsec] Proposed new list for HIP_TRANSFORM
Thread-Topic: [Hipsec] Proposed new list for HIP_TRANSFORM
Thread-Index: AcqPQE7wsz5ZaXQ8RhKJt+CVPT/x+gABCKvw
Message-ID: <7BAC95F5A7E67643AAFB2C31BEE662D013CA5A4AEC@SC-VEXCH2.marvell.com>
References: <4B440CA5.3010209@htt-consult.com> <4B44C35E.8090200@hiit.fi> <4B44CA15.2070905@htt-consult.com> <4B44D016.7050102@hiit.fi> <4B44D414.4080501@htt-consult.com> <4B450297.1070708@hiit.fi> <4B4505A8.4010009@htt-consult.com> <4B45061D.8000201@hiit.fi> <4B450F18.3020103@htt-consult.com> <7BAC95F5A7E67643AAFB2C31BEE662D013CA5A4AA5@SC-VEXCH2.marvell.com> <4B454568.3090304@htt-consult.com>
In-Reply-To: <4B454568.3090304@htt-consult.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginalArrivalTime: 07 Jan 2010 03:08:35.0494 (UTC) FILETIME=[B377DC60:01CA8F46]
X-Barracuda-Connect: maili.marvell.com[10.68.76.51]
X-Barracuda-Start-Time: 1262833715
X-Barracuda-Virus-Scanned: by dakia2.marvell.com at marvell.com
X-Barracuda-Spam-Score: -1002.00
X-Barracuda-Spam-Status: No, SCORE=-1002.00 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=1000.0
Cc: HIP <hipsec@ietf.org>
Subject: Re: [Hipsec] Proposed new list for HIP_TRANSFORM
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jan 2010 03:08:38 -0000

 
Paul A. Lambert | Marvell Semiconductor | +1 650-787-9141
 

> -----Original Message-----
> From: Robert Moskowitz [mailto:rgm@htt-consult.com]
> Sent: Wednesday, January 06, 2010 6:23 PM
> To: Paul Lambert
> Cc: miika.komu@hiit.fi; HIP
> Subject: Re: [Hipsec] Proposed new list for HIP_TRANSFORM
> 
> On 01/06/2010 08:37 PM, Paul Lambert wrote:
> >
> >
> >> -----Original Message-----
> >> From: hipsec-bounces@ietf.org [mailto:hipsec-bounces@ietf.org] On
> Behalf
> >> Of Robert Moskowitz
> >> Sent: Wednesday, January 06, 2010 2:31 PM
> >> To: miika.komu@hiit.fi
> >> Cc: HIP
> >> Subject: Re: [Hipsec] Proposed new list for HIP_TRANSFORM
> >>
> >> On 01/06/2010 04:52 PM, Miika Komu wrote:
> >>
> >>> Robert Moskowitz wrote:
> >>>
> >>> Hi,
> >>>
> >>>
> >>>> On 01/06/2010 04:37 PM, Miika Komu wrote:
> >>>>
> >>>>> Robert Moskowitz wrote:
> >>>>>
> >>>>> Hi,
> >>>>>
> >>>>>
> >>>>>> On 01/06/2010 01:01 PM, Miika Komu wrote:
> >>>>>>
> >>>>>>> Robert Moskowitz wrote:
> >>>>>>>
> >>>>>>> Hi,
> >>>>>>>
> >>>>>>>
> >>>>>>>> On 01/06/2010 12:07 PM, Miika Komu wrote:
> >>>>>>>>
> >>>>>>>>> Robert Moskowitz wrote:
> >>>>>>>>>
> >>>>>>>>> Hi,
> >>>>>>>>>
> >>>>>>>>>
> >>>>>>>>>> Proposed new list for HIP_TRANSFORM:
> >>>>>>>>>>
> >>>>>>>>>>           Suite ID                          Value
> >>>>>>>>>>
> >>>>>>>>>>           RESERVED                          0
> >>>>>>>>>>           AES-CBC with HMAC-SHA1            1     ([RFC3602],
> >>>>>>>>>> [RFC2404])
> >>>>>>>>>>           3DES-CBC with HMAC-SHA1           2     ([RFC2451],
> >>>>>>>>>> [RFC2404])
> >>>>>>>>>>           DEPRECATED                        3
> >>>>>>>>>>           BLOWFISH-CBC with HMAC-SHA1       4     ([RFC2451],
> >>>>>>>>>> [RFC2404])
> >>>>>>>>>>           NULL-ENCRYPT with HMAC-SHA1       5     ([RFC2410],
> >>>>>>>>>> [RFC2404])
> >>>>>>>>>>           DEPRECATED                        6
> >>>>>>>>>>           NULL-ENCRYPT with HMAC-SHA2       7     ([RFC2410],
> >>>>>>>>>> [RFC4868])
> >>>>>>>>>>           AES-CBC with HMAC-SHA2            8     ([RFC3602],
> >>>>>>>>>> [RFC4868])
> >>>>>>>>>>           AES-CCM-8                         9     [RFC4309]
> >>>>>>>>>>           AES-CCM-12                        10    [RFC4309]
> >>>>>>>>>>           AES-CCM-16                        11    [RFC4309]
> >>>>>>>>>>           AES-GCM with a 8 octet ICV        12    [RFC4106]
> >>>>>>>>>>           AES-GCM with a 12 octet ICV       13    [RFC4106]
> >>>>>>>>>>           AES-GCM with a 16 octet ICV       14    [RFC4106]
> >>>>>>>>>>
> >>>>>>>>> seems fine with me. Should the "natural" key size be reflected
> >>>>>>>>> in some of the algorithms descriptions?
> >>>>>>>>>
> >>>>>>>> I am not sure what you are alluding to here.  Key sizes for
> >>>>>>>> AES-based transforms start at 128 and go up.  If you are asking
> >>>>>>>> about those 8/12/16 sizes in CCM and GCM, that applies to the
> >>>>>>>> auth size.
> >>>>>>>>
> >>>>>>> do we have to negotiate AES key size?
> >>>>>>>
> >>>>>> OOPS.  Good catch.  We want to make sure we have Suite B support...
> >>>>>>
> >>>>>> Trying to dig around, how is it handled elsewhere, an ISAKMP
> >>>>>> keysize TLV for IKE and ESP?
> >>>>>>
> >>>>>> I have some thoughts for a simple way here...
> >>>>>>
> >>>>> either we fix the key size in the suite id or we negotiate it as
> >>>>> max(key-size-in-r1, key-size-in-i2).
> >>>>>
> >>>> So we either add a KEYSIZE parameter or change the HIP_TRANSFORM
> >>>> parameter to include a key size.  Any why the max of the two?  Rather
> >>>> the max in common.  Say R1 has 128, 192, 256 and I2 has 128 and 192.
> >>>> Thus the agreed keysize is 192, not 256.
> >>>>
> >>> it could be also "initiator chooses".
> >>>
> >> that makes the R1 key sizes being the offer, and I2 being the
> >> selection.  I don't have a problem with that.
> >>
> >> Now is there any changes to any of the transforms based on the keysize?
> >> I hope not!
> >>
> >
> > The encryption key size should be part of the transform name .....
> >
> 
> Can you please expand on this?  Why is it better to have a different
> transform for each allowed key size?

The set of selected parameters for a "cryptographic transformation" may include: encryption algorithm, encryption algorithm key size, integrity algorithm, integrity key size, ICV size, padding approach, and potentiall other parameters (e.g. M and L value in CCM).  The usage considerations for a transform vary considerably based on these choices.  For example the ICV length in GCM has subtle implications on rekey counters.  It's really much better to have less knobs on the configuration and more clearly define the few modes that will actually be used.  Otherwise, you get significant complexity in implementations attempt to test and validate the combinations.  

So each named cipher suite should fully define one transform including the key sizes.

> 
> > Also ... why so many algorithms?
> 
> So that someone with more knowledge about the various algorithms can
> pipe up and advise us!
> 
> Also depending on underlying MACsec, one algorithm might be perferred
> over another.  CCM is in 802.11, 15, and 16.  GCM is in 802.1AE for
> 802.3 usage.  A device with a particular MAC may perfer that algorithm.
> 
> >    Choices for similar algorithms are not necessary a good idea.  GCm is
> a little tricky and the max instantiations vary based on the ICV size ...
> >
> 
> So only devices that have it already for the MAC might be using it?  I
> would like to see only one CCM and one GCM, but I don't know what has
> actually been fielded for say 15.4 or .3ah.
> 
> I went for a more 'complete' list for starters.
> 

One version of GCM matching 802.1ae and one CCM matching IPsec (and .11) would be reasonable.  Dump 3DES and Blowfish.  Replace HMAC SHAx with CMAC.

Better to have just a few algorithms than to attempt and collect every known combination.  If successful ... interested parties can add more later.



Paul