Re: [Tcpcrypt] Initial questions

Sandy Harris <sandyinchina@gmail.com> Tue, 24 June 2014 20:22 UTC

Return-Path: <sandyinchina@gmail.com>
X-Original-To: tcpcrypt@ietfa.amsl.com
Delivered-To: tcpcrypt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C2151B27E4 for <tcpcrypt@ietfa.amsl.com>; Tue, 24 Jun 2014 13:22:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.101
X-Spam-Level:
X-Spam-Status: No, score=-0.101 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7mu5fe47iLvs for <tcpcrypt@ietfa.amsl.com>; Tue, 24 Jun 2014 13:22:06 -0700 (PDT)
Received: from mail-ve0-x22b.google.com (mail-ve0-x22b.google.com [IPv6:2607:f8b0:400c:c01::22b]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5AB671B27E6 for <tcpcrypt@ietf.org>; Tue, 24 Jun 2014 13:22:05 -0700 (PDT)
Received: by mail-ve0-f171.google.com with SMTP id jz11so953850veb.30 for <tcpcrypt@ietf.org>; Tue, 24 Jun 2014 13:22:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=oguXCRmovyxN98+REfdclqHc3Qd59TBmuyTbNF+mXPI=; b=uuFQTFlviOaCz2U3VAjRBxUWFCDGusWAK1RCq4ON9aU72ybEsG6rrdQ5wdIBA9jPgN a7qWLbnssiq23lHltvk5UamKBiIHIVJ/6FZ5RQ7pf7AvK7AZJECvX7noQC8pJVQW/bhm 2bJtLNDjmhF6lI+15IBJ56aAMtYM+ssrvyTsuHjDEG8MeCNcafrlhEtd3mMgkYUqXl8H Qc6G6XZLnM92IJx6IvO6ecoFzlzyHLpdqpyTaTA2cbIz0HIuB3BAri7wkaasVF8ZNXRj 65cXl92bSz09TwkK6mdge7JDWUlrNuzwiH5hwrn0AItSP2jkPT8YdCOg0A2WGR0tYj/v s+SQ==
MIME-Version: 1.0
X-Received: by 10.58.116.4 with SMTP id js4mr2593462veb.38.1403641324468; Tue, 24 Jun 2014 13:22:04 -0700 (PDT)
Received: by 10.58.226.165 with HTTP; Tue, 24 Jun 2014 13:22:04 -0700 (PDT)
In-Reply-To: <53A98F00.4000702@bbn.com>
References: <CACXcFmmQCgTu6-QLJZdH8Q+ZST97ugoTaUWCUV0S6AWsjvCGfg@mail.gmail.com> <53A98F00.4000702@bbn.com>
Date: Tue, 24 Jun 2014 16:22:04 -0400
Message-ID: <CACXcFmkdK1VquTbi1bSxyfV9L1dDYvETMYoZV=nrumeJ7w6PoA@mail.gmail.com>
From: Sandy Harris <sandyinchina@gmail.com>
To: tcpcrypt@ietf.org
Content-Type: text/plain; charset="ISO-8859-1"
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpcrypt/1Gu8sF0qyPyRV5hffYJkGXYgZ0g
Subject: Re: [Tcpcrypt] Initial questions
X-BeenThere: tcpcrypt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion list for adding encryption to TCP." <tcpcrypt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpcrypt/>
List-Post: <mailto:tcpcrypt@ietf.org>
List-Help: <mailto:tcpcrypt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Jun 2014 20:22:08 -0000

On Tue, Jun 24, 2014 at 10:45 AM, Stephen Kent <kent@bbn.com> wrote:

>> Probably today we should go much further. No MD5 or SHA1 since there
>> are known problems. No 3DES since newer ciphers are far faster. No
>> reliance on the whole X.509 cert infrastructure SLL/TLS uses; that
>> also has known problems. I'm not sure what else.
>
> To which X.509 cert infrastructure problems are you referring? Do you
> mean the Web PKI or PKI in general? IPsec, for example, does not make
> use of the Web PKI. Just curious.

I said SSL/TLS, implying the web. I think there are more general problems
in PKI -- see some of Peter Gutmann's comments, for example -- but
those are not relevant here.

>> The draft charter also has:
>>
>> - The protocol must provide cryptographic algorithm agility.
>>
>> OK, but there is a balance to be struck. IPsec & TLS both have
>> problems from arguably excessive complexity and in general complexity
>> is the enemy of security. It makes all of design, implementation,
>> testing & auditing much harder. TCPcrypt has a rather narrow niche to
>> fill; that can be done with a fairly simple protocol. We really must
>> strive to keep it simple.
>
> I'm not sure what your position is re alg agility, based on the paragraph
> above.

I wrote "OK, but ..".

> I can say that failure to accommodate alg agility will almost certainly
> cause the IESG to reject this as a standard, based on precedents
> for some time.

OK, we need some agility, both because it is a good safety measure
and because IESG will likely insist.

BUT the fewer choices there are, the simpler the protocol can be.
That has costs in "design, implementation, testing & auditing" &
extra options may mean a risk of downgrade attacks.

IPsec has a lot of arguably unnecessary complexity -- pre-shared
keys or public keys, main mode or aggressive mode, with or
without PFS, actual encryption or do the whole negotiation and
then use null encryption, ... Such things should be flatly rejected
here; just choose one secure option.

As for cipher suites, we need at least two to test the agility and
the negotiation part of the protocol. On the other hand, having
fewer makes it simpler. I conclude we should have exactly two
MUST implement algorithms per choice.

>> Here's a first cut at what we might support:
>>
>> Block ciphers: MUST do AES. SHOULD do the other three AES finalists
>> with open licenses: Mars, Twofish & Serpent. MAY do compatible ciphers
>> which are national standards: Aria for Korea, Camellia for Japan,
>> maybe others. Nothing else.
>
> why would one make the other AES finalists SHOULD? They didn't make the cut.

They are easy to add, patent-free and with open source software
readily available, and they have had lots of analysis. Maybe make
one a MUST (I'd pick Serpent) and the others MAY.

>> Key size? I'd mandate 128 bits everywhere to keep it simple.
>
> recall that AES has 256-bit keys as an option as a counter to possible
> quantum computing attacks. Why rule out that option?

The protocol can be simpler if it does not negotiate key size. Make it
256 everywhere, perhaps, but don't complicate the protocol.

If quantum attacks become feasible, my understanding is that
more-or-less everything we are likely to use would become
vulnerable: DH, RSA, ... We'd need a new version no matter
what symmetric ciphers were in play.

Anyway, this is an opportunistic encryption protocol which blocks
easy wholesale monitoring. Its essential goals do not include
resistance to more sophisticated attacks, whether MITM or
quantum.