Re: [OSPF] OSPF WG Last Call for OSPFv2 HMAC-SHA Cryptographic Authentication - <draft-ietf-ospf-hmac-sha-04.txt>

"Bhatia, Manav (Manav)" <manav@alcatel-lucent.com> Mon, 18 May 2009 16:38 UTC

Return-Path: <manav@alcatel-lucent.com>
X-Original-To: ospf@core3.amsl.com
Delivered-To: ospf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 824ED3A6DAD for <ospf@core3.amsl.com>; Mon, 18 May 2009 09:38:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.072
X-Spam-Level:
X-Spam-Status: No, score=-6.072 tagged_above=-999 required=5 tests=[AWL=0.177, BAYES_00=-2.599, HELO_EQ_FR=0.35, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WM2qGQEvFCbi for <ospf@core3.amsl.com>; Mon, 18 May 2009 09:38:24 -0700 (PDT)
Received: from smail3.alcatel.fr (smail3.alcatel.fr [64.208.49.56]) by core3.amsl.com (Postfix) with ESMTP id 589E83A6C90 for <ospf@ietf.org>; Mon, 18 May 2009 09:38:24 -0700 (PDT)
Received: from FRMRSSXCHHUB03.dc-m.alcatel-lucent.com (FRMRSSXCHHUB03.dc-m.alcatel-lucent.com [135.120.45.63]) by smail3.alcatel.fr (8.13.8/8.13.8/ICT) with ESMTP id n4IGdvdL026851 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Mon, 18 May 2009 18:39:57 +0200
Received: from INBANSXCHHUB02.in.alcatel-lucent.com (135.250.12.35) by FRMRSSXCHHUB03.dc-m.alcatel-lucent.com (135.120.45.63) with Microsoft SMTP Server (TLS) id 8.1.340.0; Mon, 18 May 2009 18:39:57 +0200
Received: from INBANSXCHMBSA1.in.alcatel-lucent.com ([135.250.12.38]) by INBANSXCHHUB02.in.alcatel-lucent.com ([135.250.12.35]) with mapi; Mon, 18 May 2009 22:09:54 +0530
From: "Bhatia, Manav (Manav)" <manav@alcatel-lucent.com>
To: Acee Lindem <acee@redback.com>, "ospf@ietf.org" <ospf@ietf.org>
Date: Mon, 18 May 2009 22:09:54 +0530
Thread-Topic: [OSPF] OSPF WG Last Call for OSPFv2 HMAC-SHA Cryptographic Authentication - <draft-ietf-ospf-hmac-sha-04.txt>
Thread-Index: AcnXudAuVQGG+sNmRI+51pQbokNgwgAGdELw
Message-ID: <7C362EEF9C7896468B36C9B79200D83503607157B3@INBANSXCHMBSA1.in.alcatel-lucent.com>
References: <DABE244D-DBC3-43A9-8363-571942933EF3@redback.com> <930184.74533.qm@web27201.mail.ukl.yahoo.com> <BD66C8F7-2B62-4C42-A72F-EFF66D33909A@redback.com>
In-Reply-To: <BD66C8F7-2B62-4C42-A72F-EFF66D33909A@redback.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 155.132.188.83
Subject: Re: [OSPF] OSPF WG Last Call for OSPFv2 HMAC-SHA Cryptographic Authentication - <draft-ietf-ospf-hmac-sha-04.txt>
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ospf>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 May 2009 16:38:30 -0000

Hi John,

Thanks for the review! 

> > Good to see this work finally moving forward. I strongly support  
> > this once the following two issues are taken care of:
> >
> > (a) Draft cites HMAC-SHA-256, and not HMAC-SHA-1, as a MUST. Any  
> > specific reasons?
> 
> HMAC-SHA-1 is "So 1997"... The authors reached agreement on a  
> stronger common algorithm. Ran or one of the other authors may want  
> to comment on HMAC-SHA-1 vulnerabilities as there was a lengthy  
> discussion on which algorithm(s) to make a "MUST".
> 

The search space for SHA1 collisions is getting quite smaller. One can read more about it on http://eurocrypt2009rump.cr.yp.to/837a0a8086fa6ca714249409ddfae43d.pdf

Though this does not directly affect HMAC-SHA1, there have been other papers about attacks on SHA1 when used with the HMAC construct (http://eprint.iacr.org/2006/319.pdf). Please note that these attacks don't necessarily result in direct vulnerabilities in HMAC-SHA1 as used in the routing protocols for authentication purposes (RFC 4822, RFC 5310), because the colliding message may not necessarily be a syntactically correct protocol packet. However, we reasoned that if the WG wanted to mandate one particular authentication algorithm then it must be something stronger and more secure than HMAC-SHA1, and so HMAC-SHA-256 was chosen. 

Cheers, Manav

--
Manav Bhatia,
IP Division, Alcatel-Lucent,
Bangalore - India