Re: [IPsec] revisiting 3DES and -graveyard

Paul Wouters <paul@nohats.ca> Wed, 15 April 2020 03:22 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2585A3A161E for <ipsec@ietfa.amsl.com>; Tue, 14 Apr 2020 20:22:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CICWRFTBbU4P for <ipsec@ietfa.amsl.com>; Tue, 14 Apr 2020 20:21:58 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [193.110.157.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 248143A161B for <ipsec@ietf.org>; Tue, 14 Apr 2020 20:21:58 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 49271w1C4gz1kK; Wed, 15 Apr 2020 05:21:56 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1586920916; bh=g+E9JcuTtiSMQRTDhOR5xYAHmO2iPnV31Jq5l6BASn4=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=Byqb9SMsb8K9kUivgELZKOXo2vSWrwYIyRbQR5wR8ZQH82aPsI7ULFzbephIg3LQT ade5/LDTPdr5VkS5kXqQxGGrlmgnuhKY41XZeWAavTxjFj5EL/9EPg5EFpR/audBXM NnQ15uiCbhNZ7Ld5SGCtNkWVPog0cBJW73pQm+Tc=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id OOyyrDPQyxDL; Wed, 15 Apr 2020 05:21:54 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Wed, 15 Apr 2020 05:21:54 +0200 (CEST)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id 9D8366020D42; Tue, 14 Apr 2020 23:13:05 -0400 (EDT)
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 99E4E66B7C; Tue, 14 Apr 2020 23:13:05 -0400 (EDT)
Date: Tue, 14 Apr 2020 23:13:05 -0400
From: Paul Wouters <paul@nohats.ca>
To: Benjamin Kaduk <kaduk@mit.edu>
cc: ipsec@ietf.org
In-Reply-To: <20200415021321.GI88064@mit.edu>
Message-ID: <alpine.LRH.2.21.2004142258530.9343@bofh.nohats.ca>
References: <20200415021321.GI88064@mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/kjr8FXQglbTKjCtFk1T3c3iWncM>
Subject: Re: [IPsec] revisiting 3DES and -graveyard
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Apr 2020 03:22:00 -0000

On Tue, 14 Apr 2020, Benjamin Kaduk wrote:

> I see in
> https://datatracker.ietf.org/meeting/104/materials/minutes-104-ipsecme-00
> that we didn't want to get rid of 3DES at that time.  Do we have a sense
> for how quickly that will change, the scope of existing deployments, etc.?

3DES is already defined as SHOULD NOT. The next step in evolation would
be a MUST NOT. So I think we are on the right path. The SHOULD NOT
recommendation is from 2.5 years ago. Unfortunately, VPN deployments
are slow to change, and I fear that a lot of IKEv1 gear is still out
there running on 1990's configuration with 3DES, MD5/SHA1 and DH2/5.
But I think those deployments will die out over time as hardware is
replaced, and configurations are (very very slowly) upgraded.

Anything with IKEv2 already does not really use 3DES anywhere.

> In particular, would a general-purpose OS's implementation cause problems
> for its consumers if the next release dropped support?  (Noting that
> consumers could stay on an old OS release to match the old algorithms, at
> least for a while.)

General-purpose OS's are a bit more modern than hardware VPN boxes.
These all already do IKEv2 and even for IKEv1 would default to AES/AES-GCM.
They would not need 3DES unless it is talking to a 1990's device.

Note that in Fedora and RHEL, we already have a systemwide crypto policy
that also applies to IKE/IPsec, and its DEFAULT policy is:
(see /usr/share/crypto-policies/DEFAULT/libreswan.txt)

 	ikev2=insist
 	pfs=yes
 	ike=aes_gcm256-sha2_512+sha2_256-dh19+dh20+dh21+dh14+dh15+dh16+dh18,chacha20_poly1305-sha2_512+sha2_256-dh19+dh20+dh21+dh14+dh15+dh16+dh18,aes256-sha2_512+sha2_256-dh19+dh20+dh21+dh14+dh15+dh16+dh18,aes_gcm128-sha2_512+sha2_256-dh19+dh20+dh21+dh14+dh15+dh16+dh18,aes128-sha2_256-dh19+dh20+dh21+dh14+dh15+dh16+dh18
 	esp=aes_gcm256,chacha20_poly1305,aes256-sha2_512+sha1+sha2_256,aes_gcm128,aes128-sha1+sha2_256

So no 3DES. I don't know how often people are overriding this on a
per-configuration basis, but we (redhat) have definitely not had
any complains of people who wanted to use 3des.

I just noticed even our LEGACY systemwide crypto policy does not allow 3DES.
I'm checking with our crypto people to see if that is by design or a bug.
I think it is by design because even our LEGACY policy insists on ikev2 :)

So in short, general purpose OSes have no problem, but might need to
talk to 1990s old gear.

I do think the next document update should change 3DES to MUST NOT. But
I would like the graveyard draft to go out first pointing a bit further
to the death of IKEv1. Perhaps a document update for October would be
good? That would have given 3DES three years to go from SHOULD NOT to
MUST NOT.

Paul