[IPsec] Comments on draft-ietf-ipsecme-roadmap-03

Tero Kivinen <kivinen@iki.fi> Wed, 16 September 2009 13:59 UTC

Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B32DB28C0F9 for <ipsec@core3.amsl.com>; Wed, 16 Sep 2009 06:59:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.577
X-Spam-Level:
X-Spam-Status: No, score=-2.577 tagged_above=-999 required=5 tests=[AWL=0.022, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zd7+DpRpgbYz for <ipsec@core3.amsl.com>; Wed, 16 Sep 2009 06:59:57 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) by core3.amsl.com (Postfix) with ESMTP id 5BFF328C0E4 for <ipsec@ietf.org>; Wed, 16 Sep 2009 06:59:56 -0700 (PDT)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.14.3/8.13.8) with ESMTP id n8GE0YUV011933 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 16 Sep 2009 17:00:34 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.14.3/8.12.11) id n8GE0Y1I015475; Wed, 16 Sep 2009 17:00:34 +0300 (EEST)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-ID: <19120.61314.149411.212452@fireball.kivinen.iki.fi>
Date: Wed, 16 Sep 2009 17:00:34 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Yaron Sheffer <yaronf@checkpoint.com>
In-Reply-To: <7F9A6D26EB51614FBF9F81C0DA4CFEC80158E120B618@il-ex01.ad.checkpoint.com>
References: <7F9A6D26EB51614FBF9F81C0DA4CFEC80158E120B618@il-ex01.ad.checkpoint.com>
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 30 min
X-Total-Time: 34 min
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: [IPsec] Comments on draft-ietf-ipsecme-roadmap-03
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Sep 2009 13:59:58 -0000

Yaron Sheffer writes:
> - I would have liked to see ESP BEET mode referenced, since it's more widely
> implemented than other docs that we do mention. But as far as I know it is
> not on track to becoming an RFC.

I agree on that, and I think it might also be good to mention other
very widely implemented (expired) drafts which will never come out as
RFCs, namely IKEv1 configuration mode (draft-dukes-ike-mode-cfg-02)
and IKEv1 xauth (draft-beaulieu-ike-xauth-02).

> - 4.1.1: if RFC 2409 is N/A for IPsec-v3, how come RFC 4304 defines the use
> of ESN in IKEv1? But you can't expect a Roadmap document to resolve all
> issues.

As RFC4303 says ESP does not have version number, thus version is only
known by the signaling methods or out of band configuration. Use of
IKEv2 automatically implies ESP-v3. If IKEv1 is used then that would
imply ESP-v2, but RFC4304 explictly defines method of negotiating
ESP-v3 feature in IKEv1, thus if that feature is used, then ESP-v3 is
also assumed.

That is at least my interpretation of the situation...

Of course everybody should stop using already obsoleted IKEv1
protocol :-)

> - 7.5: I would describe the history differently (I was there...). IPSRA
> attempted to tack user authentication onto IKEv1 with no change to IKE. This
> indeed proved cumbersome, and the result was the brand new IKEv2, which in
> fact adopted some of the IPSRA ideas, primarily the use of EAP.

Agree... 

> - Table 1: There is nothing that limits the Heuristics draft to ipsec-v3. In
> facts legacy devices are a major reason for publishing these heuristics.

True, altough in IPsec-v2 things are bit easier, as there is no
combined mode ciphers i.e. no GMAC, thus no need to detect IV. The
draft does not limit itself to either version.

BTW, the latest draft is draft-ietf-ipsecme-esp-null-heuristics-01.txt
not draft-kivinen-ipsecme-esp-null-heuristics.

Other comments:

--

It would be much easier to read the document if each document would be
easier to detect from each other. Now when moving from one document to
next is indicated by even more indented bulletpoint text than the
actual text it does not provide good visual feedback to search
documents. It might be better to change all document headers to
sections (and perhaps exclude them from toc (i.e. add toc="exclude" to
them if using xml to rfc)).

--

In section 5.2 covering RFC3686 document says:

	 ... AES-CTR is a stream cipher with a 32-bit random nonce
   (1/SA) and a 64-bit IV, both of which are sent in the packet along
   with the encrypted data.  

The description of the random noise and 64-bit IV is correct, but only
the 64-bit IV is sent along the packet. The nonce is provided by the
IKE with the keying material.

There is also draft-ietf-ipsecme-aes-ctr-ikev2-02 to define how that
is used in IKEv2 (and as IKEv2 and ESP-v3 share same iana registry
there is already number for it).

--

For RFC5529 I do not think we need separate RFC to use Camellia-CBC in
IKEv2. It is just normal CBC mode algorithm and the generic rules in
RFC4306 covers it. As it also already has IANA number I do not see any
reason why it cannot be used in IKEv2 too.

For the Camellia-CTR the situation is different as generic RFC4306
text only covers CBC mode ciphers, not counter mode ciphers. Perhaps
the draft-ietf-ipsecme-aes-ctr-ikev2-02 should be expanded to include
more of the counter mode ciphers (i.e. provide generic rules how
counter mode ciphers are used in IKEv2)?

For the Camellia-CCM there is the RFC5282 which describes how combined
mode ciphers are used in the IKEv2. I think that document along with
RFC5529 should be enough to specify how Camellia-CCM is used in IKEv2.
-- 
kivinen@iki.fi