Re: [Curdle] draft-ietf-curdle-ssh-modp-dh-sha2 & draft-ietf-curdle-ssh-kex-sha2

Tero Kivinen <kivinen@iki.fi> Wed, 14 September 2016 05:26 UTC

Return-Path: <bounces-ietf-ssh-owner-secsh-tyoxbijeg7-archive=lists.ietf.org@NetBSD.org>
X-Original-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Delivered-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 949F312B1D9 for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>; Tue, 13 Sep 2016 22:26:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.708
X-Spam-Level:
X-Spam-Status: No, score=-5.708 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-1.508, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1Y5Nl5jzLDID for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>; Tue, 13 Sep 2016 22:26:29 -0700 (PDT)
Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 94C5912B1A3 for <secsh-tyoxbijeg7-archive@lists.ietf.org>; Tue, 13 Sep 2016 22:26:29 -0700 (PDT)
Received: by mail.netbsd.org (Postfix, from userid 605) id 5A46D85E11; Wed, 14 Sep 2016 05:26:28 +0000 (UTC)
Delivered-To: ietf-ssh@netbsd.org
Received: by mail.netbsd.org (Postfix, from userid 1347) id 142C084D04; Wed, 14 Sep 2016 05:26:28 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 0C54E85E6E for <ietf-ssh@NetBSD.org>; Tue, 13 Sep 2016 10:53:36 +0000 (UTC)
X-Virus-Scanned: amavisd-new at netbsd.org
Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.netbsd.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id UDg_UfTCejKB for <ietf-ssh@netbsd.org>; Tue, 13 Sep 2016 10:53:35 +0000 (UTC)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.netbsd.org (Postfix) with ESMTPS id 1C4FA85E60 for <ietf-ssh@NetBSD.org>; Tue, 13 Sep 2016 10:53:30 +0000 (UTC)
Received: from fireball.acr.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.15.2/8.15.2) with ESMTPS id u8DArJrI016860 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 13 Sep 2016 13:53:19 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.acr.fi (8.15.2/8.14.8/Submit) id u8DArIFN010739; Tue, 13 Sep 2016 13:53:18 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-ID: <22487.55966.466134.811445@fireball.acr.fi>
Date: Tue, 13 Sep 2016 13:53:18 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: "Mark D. Baushke" <mdb@juniper.net>
Cc: Curdle <curdle@ietf.org>, IETF SSH <ietf-ssh@NetBSD.org>
Subject: Re: [Curdle] draft-ietf-curdle-ssh-modp-dh-sha2 & draft-ietf-curdle-ssh-kex-sha2
In-Reply-To: <54981.1473704788@eng-mail01.juniper.net>
References: <41049.1473653352@eng-mail01.juniper.net> <22486.43242.802279.610275@fireball.acr.fi> <54981.1473704788@eng-mail01.juniper.net>
X-Mailer: VM 8.2.0b under 24.5.1 (x86_64--netbsd)
X-Edit-Time: 10 min
X-Total-Time: 9 min
Sender: ietf-ssh-owner@NetBSD.org
List-Id: ietf-ssh.NetBSD.org
Precedence: list

Mark D. Baushke writes:
> > Also, is there need to update other algorithms, i.e. encryption
> > algorithms, MAC algorithms, Public key names, comperssion algorithms
> > etc? Are the implementation requirements for them up to date (I do not
> > know, as I have no idea which of them are now mandatory to implement,
> > and which are not).
> 
> Good question. I am not sure if they are all being managed by the Curdle
> Group or not....

Curdle charter says:

CURDLE - CURves, Deprecating and a Little more Encryption

The CURDLE working group is chartered to add a small set of
cryptographic mechanisms to some IETF protocols, and to make
implementation requirements including deprecation of old algorithms
where there is IETF consensus to do so. ...
...
The protocols the WG intends to work on are Secure Shell (SSH), ...
...
The CURDLE working group will be handling changes to protocols and
registries some of which include what are now considered outdated
algorithm options, and may propose deprecation of such algorithms. ... 
...

so it seems to fit well to curdle charter, if we deprecate and collect
mandatory to implement ciphers to one document. 

> I am not sure that they all belong in one document or not. It seems
> like it might be better for each section to have its own document
> specifying the MUST/SHOULD/MAY/SHOULD NOT advise...

In IPsecME we did collect all IKEv2 related requirements to one
document, and all ESP/AH related requirements to another document. The
reason we have two documents is, because the requirements are
different. In IKEv2 it is ok to specify ENCR_AES_CBC as MUST, as it is
low speed link and performance is not primary goal. In ESP we also
make ENCR_AES_GCM_16 as MUST as it is needed for high performance
gateways.

I would suggest we collect all "Algorithm Implementation Requirements
and Usage Guidance for ssh" in one document here too.

In draft-ietf-ipsecme-rfc4307bis-12 for IKEv2 we even specified the
mandatory to implement authentication methods, and recommended key
lengths (see section 4.1.1). We also provide little bit of background
reasoning for the MUST/SHOULD/MUST NOT/SHOULD NOT algorithms.
-- 
kivinen@iki.fi