Re: [IPsec] I-D Action: draft-fluhrer-qr-ikev2-02.txt
Tero Kivinen <kivinen@iki.fi> Tue, 09 August 2016 13:07 UTC
Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EEB4112D518 for <ipsec@ietfa.amsl.com>; Tue, 9 Aug 2016 06:07:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level:
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id juZ01RasA6vp for <ipsec@ietfa.amsl.com>; Tue, 9 Aug 2016 06:07:39 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99BEB12D59B for <ipsec@ietf.org>; Tue, 9 Aug 2016 06:07:37 -0700 (PDT)
Received: from fireball.acr.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.15.2/8.15.2) with ESMTPS id u79D7RAS014186 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 9 Aug 2016 16:07:27 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.acr.fi (8.15.2/8.14.8/Submit) id u79D7Ra4008821; Tue, 9 Aug 2016 16:07:27 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-ID: <22441.54671.248778.890727@fireball.acr.fi>
Date: Tue, 09 Aug 2016 16:07:27 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: "Scott Fluhrer (sfluhrer)" <sfluhrer@cisco.com>
In-Reply-To: <496a3c96a34741e48f8ec4d9d2e2a031@XCH-RTP-006.cisco.com>
References: <20160805034543.15860.28796.idtracker@ietfa.amsl.com> <bd8018f8-f507-5721-5cba-976dd5a013fb@gmail.com> <04fc3cc06274464ca4b94746e50a67bc@XCH-RTP-006.cisco.com> <ac88df20-a086-6bbe-b90c-3d7bd27eb40c@gmail.com> <84F0EC1D-02BC-4892-9FC0-29B5E47A6D7F@vpnc.org> <22440.34261.193865.786849@fireball.acr.fi> <496a3c96a34741e48f8ec4d9d2e2a031@XCH-RTP-006.cisco.com>
X-Mailer: VM 8.2.0b under 24.5.1 (x86_64--netbsd)
X-Edit-Time: 9 min
X-Total-Time: 9 min
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/Tz4xsjmEHH57jvdMS9pqSFnGbwc>
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [IPsec] I-D Action: draft-fluhrer-qr-ikev2-02.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Aug 2016 13:07:41 -0000
Scott Fluhrer (sfluhrer) writes: > > Btw, both PRF_AES128_XCBC and PRF_AES128_CMAC do use 128-bit keys > > always, they cannot use longer keys, so the text saying "even though they > > can use larger keys" is wrong, as those versions cannot use longer keys. > > Actually, if you look through the definitions of the transforms that > IANA points to, RFC4434 and RFC4615, the transform can take as input > a "key" longer than 128 bits. Yes, if you look inside the > definition of the transform, you see that they transform the > arbitrary-length "key" into a 128 bit one; people quite often don't > look into the innards of their crypto (nor should they have to). Yes, as PRF they can take arbitrary long keys, but the AES is always using 128-bit keys. So both of those are true in a way. For encryption algorithms you can use the key length attribute to specify key length for the AES, but for the PRF or INTEG you cannot, instead they use fixed length key for AES. The original version of the AES-XCBC-PRF-128 specified in the RFC3664 did require the exactly 128-bit key for the PRF use also, but this caused problems as in IKEv2 we want to use PRF on the nonces, and the shared secret, thus requiring them to be 128-bits caused problems. Because of this RFC4434 was done so that it allows arbitrary sized keying material but the PRF still has security of 128-bit... I.e. the prehashing done to feed the PRF key to the AES is just to allow any sized material, and using longer PRF key does not increase the security. So at least separate the "PRF key" and "AES key" in the text, so it is clear which text we are refering. -- kivinen@iki.fi
- Re: [IPsec] I-D Action: draft-fluhrer-qr-ikev2-02… Scott Fluhrer (sfluhrer)
- Re: [IPsec] I-D Action: draft-fluhrer-qr-ikev2-02… Valery Smyslov
- Re: [IPsec] I-D Action: draft-fluhrer-qr-ikev2-02… Paul Hoffman
- Re: [IPsec] I-D Action: draft-fluhrer-qr-ikev2-02… Tero Kivinen
- Re: [IPsec] I-D Action: draft-fluhrer-qr-ikev2-02… Scott Fluhrer (sfluhrer)
- [IPsec] 4307bis/7321bis key sizes, was Re: I-D Ac… Paul Wouters
- Re: [IPsec] I-D Action: draft-fluhrer-qr-ikev2-02… Tero Kivinen
- Re: [IPsec] I-D Action: draft-fluhrer-qr-ikev2-02… Paul Hoffman
- Re: [IPsec] Fwd: I-D Action: draft-fluhrer-qr-ike… Yaron Sheffer
- Re: [IPsec] Fwd: I-D Action: draft-fluhrer-qr-ike… Scott Fluhrer (sfluhrer)
- [IPsec] Fwd: I-D Action: draft-fluhrer-qr-ikev2-0… Yaron Sheffer
- [IPsec] I-D Action: draft-fluhrer-qr-ikev2-02.txt internet-drafts
- Re: [IPsec] 4307bis/7321bis key sizes Paul Wouters
- Re: [IPsec] 4307bis/7321bis key sizes Paul Hoffman
- Re: [IPsec] 4307bis/7321bis key sizes Derek Atkins
- Re: [IPsec] 4307bis/7321bis key sizes Paul Hoffman
- Re: [IPsec] 4307bis/7321bis key sizes Yoav Nir
- Re: [IPsec] 4307bis/7321bis key sizes Derek Atkins
- Re: [IPsec] 4307bis/7321bis key sizes Paul Hoffman
- Re: [IPsec] 4307bis/7321bis key sizes Derek Atkins
- Re: [IPsec] 4307bis/7321bis key sizes Paul Wouters
- Re: [IPsec] 4307bis/7321bis key sizes Michael Richardson
- Re: [IPsec] 4307bis/7321bis key sizes Scott Fluhrer (sfluhrer)
- Re: [IPsec] 4307bis/7321bis key sizes Michael Richardson