Comment on draft-ike-implementation regarding nonce size
"Andrew Krywaniuk" <andrew.krywaniuk@alcatel.com> Sat, 16 March 2002 08:31 UTC
Received: from lists.tislabs.com (portal.gw.tislabs.com [192.94.214.101]) by above.proper.com (8.11.6/8.11.3) with ESMTP id g2G8VW412596; Sat, 16 Mar 2002 00:31:32 -0800 (PST)
Received: by lists.tislabs.com (8.9.1/8.9.1) id CAA20969 Sat, 16 Mar 2002 02:57:10 -0500 (EST)
Reply-To: andrew.krywaniuk@alcatel.com
From: Andrew Krywaniuk <andrew.krywaniuk@alcatel.com>
To: ipsec@lists.tislabs.com
Subject: Comment on draft-ike-implementation regarding nonce size
Date: Sat, 16 Mar 2002 03:00:33 -0500
Message-ID: <000301c1ccc0$a78653b0$1e72788a@ca.alcatel.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2173.0
In-reply-to: <200203151743.g2FHhl200188@marajade.sandelman.ottawa.on.ca>
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Sender: owner-ipsec@lists.tislabs.com
Precedence: bulk
Nonce size is another characteristic that is neither negotiated nor announced but that the two ends must somehow be able to agree on. Our software accepts anything between 8 and 256, and defaults to 16. These numbers were chosen rather arbitrarily, but we have seen no interoperability failures here. I don't understand your assertion that the two sides need to agree on the nonce size. There is nothing in the protocol which says that the size of the Ni and Nr must match. On the other hand, I agree that IKEv1 does remain curiously silent on how big the nonce ought to be. Our code is notorious for stress-testing others with our 40 byte nonces. I have done my own investigation and I have come to the following conclusions: It does no good for the nonce too be bigger than the keymat you need to generate. If you need a 128 bit key for encryption and a 128 bit key for authentication, then a 32 byte nonce is the maximum -- 16 if you trust the peer's RNG. (If you don't trust your own RNG, then you can generate a large nonce and hash it down to 32 bytes.) Even this is overkill; if you trust your PRF, you can go as low as k*n^2, where n is the number of keys you want to generate from the DH key and k is your safety margin. Since a key size of > 256 is inconceivable at this point, there is no particular reason why IKE needs to support > 64 byte nonces. Andrew ------------------------------------------- There are no rules, only regulations. Luckily, history has shown that with time, hard work, and lots of love, anyone can be a technocrat.
- Re: Remove private-use values from IKEv2 Paul Hoffman / VPNC
- Remove private-use values from IKEv2 Paul Hoffman / VPNC
- Re: Remove private-use values from IKEv2 Dan Harkins
- Re: Remove private-use values from IKEv2 Jan Vilhuber
- RE: Remove private-use values from IKEv2 Andrew Krywaniuk
- Re: Remove private-use values from IKEv2 Dan Harkins
- Re: Remove private-use values from IKEv2 Paul Hoffman / VPNC
- Re: Remove private-use values from IKEv2 Jan Vilhuber
- Re: Remove private-use values from IKEv2 Dan Harkins
- Re: Remove private-use values from IKEv2 Michael Richardson
- Comment on draft-ike-implementation regarding non… Andrew Krywaniuk
- Re: Comment on draft-ike-implementation regarding… Henry Spencer
- Re: Comment on draft-ike-implementation regarding… Dan Harkins
- Re: Comment on draft-ike-implementation regarding… Henry Spencer