Re: [IPsec] revisiting 3DES and -graveyard
Paul Wouters <paul@nohats.ca> Wed, 15 April 2020 03:22 UTC
Return-Path: <paul@nohats.ca>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2585A3A161E for <ipsec@ietfa.amsl.com>; Tue, 14 Apr 2020 20:22:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CICWRFTBbU4P for <ipsec@ietfa.amsl.com>; Tue, 14 Apr 2020 20:21:58 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [193.110.157.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 248143A161B for <ipsec@ietf.org>; Tue, 14 Apr 2020 20:21:58 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 49271w1C4gz1kK; Wed, 15 Apr 2020 05:21:56 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1586920916; bh=g+E9JcuTtiSMQRTDhOR5xYAHmO2iPnV31Jq5l6BASn4=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=Byqb9SMsb8K9kUivgELZKOXo2vSWrwYIyRbQR5wR8ZQH82aPsI7ULFzbephIg3LQT ade5/LDTPdr5VkS5kXqQxGGrlmgnuhKY41XZeWAavTxjFj5EL/9EPg5EFpR/audBXM NnQ15uiCbhNZ7Ld5SGCtNkWVPog0cBJW73pQm+Tc=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id OOyyrDPQyxDL; Wed, 15 Apr 2020 05:21:54 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Wed, 15 Apr 2020 05:21:54 +0200 (CEST)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id 9D8366020D42; Tue, 14 Apr 2020 23:13:05 -0400 (EDT)
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 99E4E66B7C; Tue, 14 Apr 2020 23:13:05 -0400 (EDT)
Date: Tue, 14 Apr 2020 23:13:05 -0400
From: Paul Wouters <paul@nohats.ca>
To: Benjamin Kaduk <kaduk@mit.edu>
cc: ipsec@ietf.org
In-Reply-To: <20200415021321.GI88064@mit.edu>
Message-ID: <alpine.LRH.2.21.2004142258530.9343@bofh.nohats.ca>
References: <20200415021321.GI88064@mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/kjr8FXQglbTKjCtFk1T3c3iWncM>
Subject: Re: [IPsec] revisiting 3DES and -graveyard
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Apr 2020 03:22:00 -0000
On Tue, 14 Apr 2020, Benjamin Kaduk wrote: > I see in > https://datatracker.ietf.org/meeting/104/materials/minutes-104-ipsecme-00 > that we didn't want to get rid of 3DES at that time. Do we have a sense > for how quickly that will change, the scope of existing deployments, etc.? 3DES is already defined as SHOULD NOT. The next step in evolation would be a MUST NOT. So I think we are on the right path. The SHOULD NOT recommendation is from 2.5 years ago. Unfortunately, VPN deployments are slow to change, and I fear that a lot of IKEv1 gear is still out there running on 1990's configuration with 3DES, MD5/SHA1 and DH2/5. But I think those deployments will die out over time as hardware is replaced, and configurations are (very very slowly) upgraded. Anything with IKEv2 already does not really use 3DES anywhere. > In particular, would a general-purpose OS's implementation cause problems > for its consumers if the next release dropped support? (Noting that > consumers could stay on an old OS release to match the old algorithms, at > least for a while.) General-purpose OS's are a bit more modern than hardware VPN boxes. These all already do IKEv2 and even for IKEv1 would default to AES/AES-GCM. They would not need 3DES unless it is talking to a 1990's device. Note that in Fedora and RHEL, we already have a systemwide crypto policy that also applies to IKE/IPsec, and its DEFAULT policy is: (see /usr/share/crypto-policies/DEFAULT/libreswan.txt) ikev2=insist pfs=yes ike=aes_gcm256-sha2_512+sha2_256-dh19+dh20+dh21+dh14+dh15+dh16+dh18,chacha20_poly1305-sha2_512+sha2_256-dh19+dh20+dh21+dh14+dh15+dh16+dh18,aes256-sha2_512+sha2_256-dh19+dh20+dh21+dh14+dh15+dh16+dh18,aes_gcm128-sha2_512+sha2_256-dh19+dh20+dh21+dh14+dh15+dh16+dh18,aes128-sha2_256-dh19+dh20+dh21+dh14+dh15+dh16+dh18 esp=aes_gcm256,chacha20_poly1305,aes256-sha2_512+sha1+sha2_256,aes_gcm128,aes128-sha1+sha2_256 So no 3DES. I don't know how often people are overriding this on a per-configuration basis, but we (redhat) have definitely not had any complains of people who wanted to use 3des. I just noticed even our LEGACY systemwide crypto policy does not allow 3DES. I'm checking with our crypto people to see if that is by design or a bug. I think it is by design because even our LEGACY policy insists on ikev2 :) So in short, general purpose OSes have no problem, but might need to talk to 1990s old gear. I do think the next document update should change 3DES to MUST NOT. But I would like the graveyard draft to go out first pointing a bit further to the death of IKEv1. Perhaps a document update for October would be good? That would have given 3DES three years to go from SHOULD NOT to MUST NOT. Paul
- [IPsec] revisiting 3DES and -graveyard Benjamin Kaduk
- Re: [IPsec] revisiting 3DES and -graveyard Paul Wouters
- [IPsec] revisiting 3DES and -graveyard Tero Kivinen
- Re: [IPsec] revisiting 3DES and -graveyard Michael Richardson
- Re: [IPsec] revisiting 3DES and -graveyard Robert Moskowitz
- Re: [IPsec] revisiting 3DES and -graveyard Benjamin Kaduk
- Re: [IPsec] revisiting 3DES and -graveyard Michael Richardson
- Re: [IPsec] revisiting 3DES and -graveyard Dan Brown
- Re: [IPsec] revisiting 3DES and -graveyard Paul Wouters