[IPsec] Comments to the draft-katagi-ipsecme-clefia-01.txt
Tero Kivinen <kivinen@iki.fi> Sun, 04 November 2012 02:13 UTC
Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 579C821F8558 for <ipsec@ietfa.amsl.com>; Sat, 3 Nov 2012 19:13:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r866-MZg9skB for <ipsec@ietfa.amsl.com>; Sat, 3 Nov 2012 19:13:35 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.kivinen.iki.fi [IPv6:2001:1bc8:100d::2]) by ietfa.amsl.com (Postfix) with ESMTP id 8D4BD21F853E for <ipsec@ietf.org>; Sat, 3 Nov 2012 19:13:31 -0700 (PDT)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.14.5/8.14.5) with ESMTP id qA42DR8e013060 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 4 Nov 2012 04:13:27 +0200 (EET)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.14.5/8.12.11) id qA42DPTJ008131; Sun, 4 Nov 2012 04:13:25 +0200 (EET)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-ID: <20629.53061.77451.107237@fireball.kivinen.iki.fi>
Date: Sun, 04 Nov 2012 04:13:25 +0200
From: Tero Kivinen <kivinen@iki.fi>
To: Masanobu.Katagi@jp.sony.com, ipsec@ietf.org
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 13 min
X-Total-Time: 20 min
Subject: [IPsec] Comments to the draft-katagi-ipsecme-clefia-01.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 04 Nov 2012 02:13:36 -0000
This document defines clefia ciphers for IKEv1 and IKEv2. I see no point of adding anything to the already obsoleted IKEv1 protocol, so I think it is better to remove all references to IKEv1 from this document (i.e section 3) and IKEv1 parts from section 1 and section 6. We need to be consistent here and reject all additions to IKEv1. Also some of the IKEv1 registries (IPSEC ESP Transform Identifiers) are "Standards Track RFC" required registries, meaning this document would have to be standard track document. The document is currently listed as being informational. In the section 2.4 this document adds CLEFIA-CMAC-PRF-128, in similar way than AES-CMAC-PRF-128 was added. I thought we had already discussion in the ipsec-list about whether any CMAC-PRF for IKEv2 KDF use is safe, but I cannot find it now. I think some cryptographers were saying that CMAC is not good enough for using as KDF (which is where IKEv2 PRF is used for) as its output is not random enough or something. We should really look in to this issue, and see whether we need to deprecate the other CMAC PRFs too. -- kivinen@iki.fi
- [IPsec] Comments to the draft-katagi-ipsecme-clef… Tero Kivinen