Re: [IPsec] revisiting 3DES and -graveyard

Benjamin Kaduk <kaduk@mit.edu> Tue, 21 April 2020 00:00 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 989E23A136A for <ipsec@ietfa.amsl.com>; Mon, 20 Apr 2020 17:00:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.001
X-Spam-Level:
X-Spam-Status: No, score=0.001 tagged_above=-999 required=5 tests=[SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id glhlLMLLijEK for <ipsec@ietfa.amsl.com>; Mon, 20 Apr 2020 17:00:44 -0700 (PDT)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8B4253A136C for <ipsec@ietf.org>; Mon, 20 Apr 2020 17:00:43 -0700 (PDT)
Received: from kduck.mit.edu ([24.16.140.251]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 03L00bIA015850 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 20 Apr 2020 20:00:41 -0400
Date: Mon, 20 Apr 2020 17:00:37 -0700
From: Benjamin Kaduk <kaduk@mit.edu>
To: Michael Richardson <mcr+ietf@sandelman.ca>
Cc: ipsec@ietf.org
Message-ID: <20200421000037.GC27494@kduck.mit.edu>
References: <20200415021321.GI88064@mit.edu> <12805.1586963029@localhost>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <12805.1586963029@localhost>
User-Agent: Mutt/1.12.1 (2019-06-15)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/A_9aK2UuZ77_lFzVcv-3dEKvMT8>
Subject: Re: [IPsec] revisiting 3DES and -graveyard
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Apr 2020 00:00:48 -0000

Thanks all for the responses; this helps me get a better picture of the
state of things and our future direction!

On Wed, Apr 15, 2020 at 11:03:49AM -0400, Michael Richardson wrote:
> 
> Benjamin Kaduk <kaduk@mit.edu> wrote:
>     > I see in
>     > https://datatracker.ietf.org/meeting/104/materials/minutes-104-ipsecme-00
>     > that we didn't want to get rid of 3DES at that time.  Do we have a sense
>     > for how quickly that will change, the scope of existing deployments,
>     > etc.?
> 
>     > In particular, would a general-purpose OS's implementation cause problems
>     > for its consumers if the next release dropped support?  (Noting that
>     > consumers could stay on an old OS release to match the old algorithms, at
>     > least for a while.)
> 
> 1) They all have AES128, and have had it for at least a decade.
> 
> 2) general-purpose OS implementations are (sadly) *not* being used by the majority
>    of "VPN" users, whether that's site-to-site or remote-access.
>    Except on iOS and Android, where OS-provided IKEv2/IPsec is winning,
>    and I'll bet they could drop 3DES tomorrow.
> 
> The last time I have seen 3DES configured was for site-to-site VPNs between
> different (medical!) enterprises because neither side could be sure what the
> other side had, and equipment was old.  They didn't dare change the configuration, or
> replace the hardware.  (Cargo culting...) This was maybe 6 years ago.

Funnily enough, we see a similar thing in the Kerberos world, with 3DES
cross-realm keys set up decades ago that everyone is afraid to touch :)
(It turns out that most of the time you don't actually need to get both
administrators in the same room to update things, and it can be done
asynchronously and asymmetrically, by one administrator at a time.)

-Ben