[IPsec] Comments to the draft-katagi-ipsecme-clefia-01.txt

Tero Kivinen <kivinen@iki.fi> Sun, 04 November 2012 02:13 UTC

Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 579C821F8558 for <ipsec@ietfa.amsl.com>; Sat, 3 Nov 2012 19:13:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r866-MZg9skB for <ipsec@ietfa.amsl.com>; Sat, 3 Nov 2012 19:13:35 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.kivinen.iki.fi [IPv6:2001:1bc8:100d::2]) by ietfa.amsl.com (Postfix) with ESMTP id 8D4BD21F853E for <ipsec@ietf.org>; Sat, 3 Nov 2012 19:13:31 -0700 (PDT)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.14.5/8.14.5) with ESMTP id qA42DR8e013060 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 4 Nov 2012 04:13:27 +0200 (EET)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.14.5/8.12.11) id qA42DPTJ008131; Sun, 4 Nov 2012 04:13:25 +0200 (EET)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-ID: <20629.53061.77451.107237@fireball.kivinen.iki.fi>
Date: Sun, 04 Nov 2012 04:13:25 +0200
From: Tero Kivinen <kivinen@iki.fi>
To: Masanobu.Katagi@jp.sony.com, ipsec@ietf.org
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 13 min
X-Total-Time: 20 min
Subject: [IPsec] Comments to the draft-katagi-ipsecme-clefia-01.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 04 Nov 2012 02:13:36 -0000

This document defines clefia ciphers for IKEv1 and IKEv2. I see no
point of adding anything to the already obsoleted IKEv1 protocol, so I
think it is better to remove all references to IKEv1 from this
document (i.e section 3) and IKEv1 parts from section 1 and section 6.

We need to be consistent here and reject all additions to IKEv1.

Also some of the IKEv1 registries (IPSEC ESP Transform Identifiers)
are "Standards Track RFC" required registries, meaning this document
would have to be standard track document. The document is currently
listed as being informational.

In the section 2.4 this document adds CLEFIA-CMAC-PRF-128, in similar
way than AES-CMAC-PRF-128 was added. I thought we had already
discussion in the ipsec-list about whether any CMAC-PRF for IKEv2 KDF
use is safe, but I cannot find it now. I think some cryptographers
were saying that CMAC is not good enough for using as KDF (which is
where IKEv2 PRF is used for) as its output is not random enough or
something.

We should really look in to this issue, and see whether we need to
deprecate the other CMAC PRFs too.
-- 
kivinen@iki.fi