Re: [saag] Algorithms/modes requested by users/customers

Paul Hoffman <paul.hoffman@vpnc.org> Sun, 17 February 2008 17:48 UTC

Received: from fort-point-station.mit.edu (FORT-POINT-STATION.MIT.EDU [18.7.7.76]) by pch.mit.edu (8.13.6/8.12.8) with ESMTP id m1HHmsSK026239 for <saag@PCH.mit.edu>; Sun, 17 Feb 2008 12:48:54 -0500
Received: from mit.edu (W92-130-BARRACUDA-2.MIT.EDU [18.7.21.223]) by fort-point-station.mit.edu (8.13.6/8.9.2) with ESMTP id m1HHmimj023096 for <saag@mit.edu>; Sun, 17 Feb 2008 12:48:44 -0500 (EST)
Received: from balder-227.proper.com (Balder-227.Proper.COM [192.245.12.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mit.edu (Spam Firewall) with ESMTP id 793A4CD3DCC for <saag@mit.edu>; Sun, 17 Feb 2008 12:48:23 -0500 (EST)
Received: from [10.20.30.162] (dsl-63-249-108-169.cruzio.com [63.249.108.169]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id m1HHmIvk020317 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 17 Feb 2008 10:48:19 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06240804c3de211f0592@[10.20.30.162]>
In-Reply-To: <8329C86009B2F24493D76B486146769A9429B7A8@USEXCHANGE.corp.extremenetworks. com>
References: <8329C86009B2F24493D76B486146769A9429B7A8@USEXCHANGE.corp.extremenetworks. com>
Date: Sun, 17 Feb 2008 09:47:53 -0800
To: Randall Atkinson <rja@extremenetworks.com>, "saag@mit.edu" <saag@mit.edu>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-Spam-Score: 0.00
X-Spam-Flag: NO
X-Scanned-By: MIMEDefang 2.42
Subject: Re: [saag] Algorithms/modes requested by users/customers
X-BeenThere: saag@mit.edu
X-Mailman-Version: 2.1.6
Precedence: list
List-Id: IETF Security Area Advisory Group <saag.mit.edu>
List-Unsubscribe: <http://mailman.mit.edu/mailman/listinfo/saag>, <mailto:saag-request@mit.edu?subject=unsubscribe>
List-Archive: <http://mailman.mit.edu/pipermail/saag>
List-Post: <mailto:saag@mit.edu>
List-Help: <mailto:saag-request@mit.edu?subject=help>
List-Subscribe: <http://mailman.mit.edu/mailman/listinfo/saag>, <mailto:saag-request@mit.edu?subject=subscribe>
X-List-Received-Date: Sun, 17 Feb 2008 17:48:54 -0000

At 3:42 PM -0800 2/16/08, Randall Atkinson wrote:
>1) NIST FIPS-140 conforming algorithms/modes.
>and
>2) Suite-B conforming algorithms/modes.

This seems reasonable, and similar to what I hear from VPNC members. 
(Sadly, these same members ship new equipment defaulting to 
algorithms not in that list, but that's a different thread...)

>This seems to be driven externally by insurance firms that tell
>their customers to only use equipment whose cryptographic
>subsystems/modules have been (or are going to be) evaluated
>formally under FIPS-140.

That is unreasonable. The ratio of "number of systems that use 
crypto" to "number of systems that have been or are going to be 
evaluated formally under FIPS-140" is incredibly high. The FIPS 140 
evaluation process is horribly broken on a number of axes, and all 
the vendors in the field know it and complain privately about it.

If you had instead said "have been (or at least could be) evaluated", 
I would agree with you. Buyers want to know that, if pressed hard, 
they can say "well, it is like that other system over there that got 
certified", and to do that, the uncertified system has to at least 
support all the right crypto. There is a noticeable but 
non-quantifiable preference for systems with a FIPS 140 certificate, 
but (outside the USGovt, of course) nearly no hard demand.

>And I'll note that this are not really driven particularly by US firms.
>European, Asia/Pacific, and Latin American firms are making the
>exact same requests for FIPS-140 of their equipment vendors.

I have heard that as well from VPNC members. But note the use of the 
term "requests".

It would be a mistake for the IETF to look like we support the FIPS 
140 certification process, even though it makes good sense for us to 
use the algorithms in that process as the basis for a suggested 
cross-IETF algorithm suite.

--Paul Hoffman, Director
--VPN Consortium