Re: [Hipsec] Thoughts on crypto agility
Miika Komu <miika.komu@hiit.fi> Tue, 11 August 2009 19:34 UTC
Return-Path: <miika.komu@hiit.fi>
X-Original-To: hipsec@core3.amsl.com
Delivered-To: hipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B19513A6CEA for <hipsec@core3.amsl.com>; Tue, 11 Aug 2009 12:34:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TmOVVIrV49pa for <hipsec@core3.amsl.com>; Tue, 11 Aug 2009 12:34:48 -0700 (PDT)
Received: from argo.otaverkko.fi (argo.otaverkko.fi [212.68.0.2]) by core3.amsl.com (Postfix) with ESMTP id DFBDE3A67A8 for <hipsec@ietf.org>; Tue, 11 Aug 2009 12:34:47 -0700 (PDT)
Received: from ip104.infrahip.net (80-186-82-16.elisa-mobile.fi [80.186.82.16]) by argo.otaverkko.fi (Postfix) with ESMTP id 7E96325ED12; Tue, 11 Aug 2009 22:33:16 +0300 (EEST)
Message-ID: <4A81C778.5020907@hiit.fi>
Date: Tue, 11 Aug 2009 22:33:12 +0300
From: Miika Komu <miika.komu@hiit.fi>
User-Agent: Thunderbird 2.0.0.22 (X11/20090608)
MIME-Version: 1.0
To: Robert Moskowitz <rgm@htt-consult.com>
References: <E4E75C73-3A73-4EC8-8A8E-2262B669EA8A@cs.rwth-aachen.de> <4A818FE7.1030705@htt-consult.com>
In-Reply-To: <4A818FE7.1030705@htt-consult.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: hipsec@ietf.org
Subject: Re: [Hipsec] Thoughts on crypto agility
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: miika.komu@hiit.fi
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Aug 2009 19:34:48 -0000
Robert Moskowitz wrote: >> Negotiation of Diffie-Hellman algorithm must be started already in the >> I1 message to avoid overly large R1 packets filled with different D-H >> parameters. This introduces the possibility for a man-in-the-middle >> attack where the attacker mounts a downgrade attack on the Initiator and >> Responder. The attacker can alter the I1 because it is unprotected. Thus, >> the attacker can cause the Responder to offer unnecessarily too weak >> algorithms or key lengths in R1 and. > > For some reason, I read that "and." and am looking for some more text... ...enforce the parties to use unnecessarily too weak crypto.
- [Hipsec] Thoughts on crypto agility Robert Moskowitz
- Re: [Hipsec] Thoughts on crypto agility Miika Komu