Re: [Curdle] draft-ietf-curdle-ssh-modp-dh-sha2 & draft-ietf-curdle-ssh-kex-sha2

"denis bider \(Bitvise\)" <ietf-ssh3@denisbider.com> Wed, 14 September 2016 05:27 UTC

Return-Path: <bounces-ietf-ssh-owner-secsh-tyoxbijeg7-archive=lists.ietf.org@NetBSD.org>
X-Original-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Delivered-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D93812B1D9 for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>; Tue, 13 Sep 2016 22:27:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.807
X-Spam-Level:
X-Spam-Status: No, score=-5.807 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-1.508, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=denisbider.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DLBRBzOV2JPz for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>; Tue, 13 Sep 2016 22:27:16 -0700 (PDT)
Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8AC4412B1A3 for <secsh-tyoxbijeg7-archive@lists.ietf.org>; Tue, 13 Sep 2016 22:27:16 -0700 (PDT)
Received: by mail.netbsd.org (Postfix, from userid 605) id 4C76285E99; Wed, 14 Sep 2016 05:27:11 +0000 (UTC)
Delivered-To: ietf-ssh@netbsd.org
Received: by mail.netbsd.org (Postfix, from userid 1347) id F091684D04; Wed, 14 Sep 2016 05:27:10 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id A4B5F85E11 for <ietf-ssh@NetBSD.org>; Wed, 14 Sep 2016 02:20:04 +0000 (UTC)
X-Virus-Scanned: amavisd-new at netbsd.org
Authentication-Results: mail.netbsd.org (amavisd-new); dkim=pass (2048-bit key) header.d=denisbider.com
Received: from mail.netbsd.org ([IPv6:::1]) by localhost (mail.netbsd.org [IPv6:::1]) (amavisd-new, port 10025) with ESMTP id DokjUC226Tqj for <ietf-ssh@netbsd.org>; Wed, 14 Sep 2016 02:20:04 +0000 (UTC)
Received: from skroderider.denisbider.com (skroderider.denisbider.com [50.18.172.175]) (using TLSv1.1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.netbsd.org (Postfix) with ESMTPS id D698D84D04 for <ietf-ssh@NetBSD.org>; Wed, 14 Sep 2016 02:20:03 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=denisbider.com; s=mail; h=from:subject:date:message-id:to:cc:mime-version:content-type:in-reply-to: references; bh=tTzv29gzExYQE9PaK6j/T1KWARWEVWC/S7FMs8IVE44=; b=MUP/L797a7iFLDJtw264rtEZM2DHweLP32Fik25EDtCNeBLBp09eKYaNgiv5Lv6WhAlHr47mcO45s B81xchQPS7/kGrACH89locbyTJEX7tcqSMS6OSgK4JhqZETiRjuFcesXE1udNe5iNVwYwiNLXi50Md KSUZgeRMiv20XHZ1wlDw2COTn1RvFHGBiIUQXJ3RaDQEr10kWGYZYO5C64vruCd7u5WrmaZsAcAx4y /s9nggM5SaSAvjPZ36OAHhERAQZVcOgqtwmB8to6LOGbTFk2LWwBkHYz6lmgk3Gdy28eee4F8ROP7f HJ0517O0ipchcbIcZbNp4lJFybyKIOw==
X-Footer: ZGVuaXNiaWRlci5jb20=
Received: from localhost ([127.0.0.1]) by skroderider.denisbider.com (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256 bits)); Wed, 14 Sep 2016 03:19:50 +0100
Message-ID: <22FEB0196536431E86029DD43534D1B3@Khan>
From: "denis bider (Bitvise)" <ietf-ssh3@denisbider.com>
To: Damien Miller <djm@mindrot.org>, "Mark D. Baushke" <mdb@juniper.net>
Cc: Curdle <curdle@ietf.org>, IETF SSH <ietf-ssh@NetBSD.org>, Max Horn <postbox@quendi.de>
References: <41049.1473653352@eng-mail01.juniper.net> <alpine.BSO.2.20.1609140340320.58455@natsu.mindrot.org> <38090.1473794513@eng-mail01.juniper.net>
In-Reply-To: <38090.1473794513@eng-mail01.juniper.net>
Subject: Re: [Curdle] draft-ietf-curdle-ssh-modp-dh-sha2 & draft-ietf-curdle-ssh-kex-sha2
Date: Tue, 13 Sep 2016 20:18:49 -0600
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01E9_01D20DFC.0A0E6180"
X-Priority: 3
X-MSMail-Priority: Normal
Importance: Normal
X-Mailer: Microsoft Windows Live Mail 16.4.3528.331
X-MimeOLE: Produced By Microsoft MimeOLE V16.4.3528.331
Sender: ietf-ssh-owner@NetBSD.org
List-Id: ietf-ssh.NetBSD.org
Precedence: list

According to this page (great work by Max Horn):

http://ssh-comparison.quendi.de/comparison/kex.html

ecmqv-sha2 is listed with zero known implementations.

Note that this might be inaccurate – ext-info-s is also listed as having no implementations, whereas it has at least ours (Bitvise SSH Server 7.xx). But this is a new development (first released a few months ago), whereas RFC 5656 dates back to 2009. It might be safe to say that any implementations of ecmqv-sha2 are indeed very secretive.

denis


From: Mark D. Baushke 
Sent: Tuesday, September 13, 2016 13:21
To: Damien Miller 
Cc: Curdle ; IETF SSH 
Subject: Re: [Curdle] draft-ietf-curdle-ssh-modp-dh-sha2 & draft-ietf-curdle-ssh-kex-sha2

Damien writes:

> Has anyone ever implemented this? AFAIK the motivation for this was
> MQV being included in NSA Suite B at the time, but it was subsequently
> dropped. IMO if nobody is using it then it should be recommended
> against. I.e. SHOULD NOT

Hmmm... ecmqv-sha2 is mentioned in defined in RFC 5656 and mentioned in
RFC 6187. I see a JIRA request to add it to MINA SSHD, but I am unaware of
any implementations of it. 

I have no problems moving ecmqv-sha2 to SHOULD NOT if no one has
implemented it. However, I guess I should ask that of the ietf-ssh list
first.

> > gss-group14-sha1-*                    RFC4462       SHOULD
> > gss-group14-sha256-*                  new-modp      SHOULD
> 
> IMO these two should be MAY. Most implementations don't support
> GSSAPI key exchange at all.

Perhaps I need a paragraph like this one:

     If GSS-API methods are available, then the RFC4462 REQUIRED
     gss-group14-sha1-* method SHOULD be retained for compatibility
     with older Secure Shell implementations and the
     gss-groups14-sha256-* method SHOULD be added as for "sha1".

-- Mark

_______________________________________________
Curdle mailing list
Curdle@ietf.org
https://www.ietf.org/mailman/listinfo/curdle