[tcpm] Re: Feedback on draft-ietf-tcpm-tcp-ao-algs-00

Eric Biggers <ebiggers@google.com> Tue, 28 April 2026 18:07 UTC

Return-Path: <ebiggers@google.com>
X-Original-To: tcpm@mail2.ietf.org
Delivered-To: tcpm@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 71CB7E4F818E for <tcpm@mail2.ietf.org>; Tue, 28 Apr 2026 11:07:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1777399645; bh=gkPf6glw0MeR8Ginx96TBmVnpoX+O+sUUdwRpv19lI0=; h=Date:From:To:Cc:Subject:References:In-Reply-To; b=MbBYo7uMBjTLApVg3B9Wi7EDpuA2rehfvpGzjnLZClYbTHlXlIZ5nDZLDAsQyzQdB 38GDMT5eVjf4H1wkJUL0K6qIBW8hVbpbdav2YijeF24M9rD9/R4x2oZRbx74N89/dS /FVo2AKy8FxrVYEoFOtfA3Z5GgYKXdQ9EPsj/XhA=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -17.601
X-Spam-Level:
X-Spam-Status: No, score=-17.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xu8D-e_sZDWR for <tcpm@mail2.ietf.org>; Tue, 28 Apr 2026 11:07:25 -0700 (PDT)
Received: from mail-pg1-x52f.google.com (mail-pg1-x52f.google.com [IPv6:2607:f8b0:4864:20::52f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 2C2FDE4F8189 for <tcpm@ietf.org>; Tue, 28 Apr 2026 11:07:25 -0700 (PDT)
Received: by mail-pg1-x52f.google.com with SMTP id 41be03b00d2f7-c76d797b180so7954212a12.2 for <tcpm@ietf.org>; Tue, 28 Apr 2026 11:07:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20251104; t=1777399644; x=1778004444; darn=ietf.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=VO9PvWz47TRGHkUW0T9+0Go5fiKUDa70eW6UBorjWf8=; b=qPHF5xG6lONR7YRu/1PdR76IJZymCSUeaKRJi9S7Y6lRki+734QJJ6GdajweXgOFGw EB+FtFZLWMwJaZ017iZAZGnJc2M2N9P55MnSC5SoEwVRA9JX99PP25x+drJO7R4n5NWa NcCUdGUxAwVmG8jpTy6uKYnwpSWyvRTi88qVTHju8SlYDB5ZHmYEig7oVxIHvGDwr8YB hI9r574jl6HBwG4J1ofrVvYF5TrpItgc4doYc6eivtfmmeTi6JiUMjVoxZaOgjy25Ioo +qdlJgGKJNFlkuahMhdeP7I0+ZoQNRlp9PDhN1K7ploPbR1t5DbFAPvg/EAzgORoX0kF IcNA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777399644; x=1778004444; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-gg:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=VO9PvWz47TRGHkUW0T9+0Go5fiKUDa70eW6UBorjWf8=; b=ZfKksgOSY45btVIlLEZnRrMNVhfTHkx5flEJkWioP9aAWDXTJ2Xu4p/XQx15H5Cs3t WyVmHnJURTCBOINvJNxXwHkwxmw92mhaD26hucEzwilAGY3NDRps8VRtxuiu8swK6hvo 0PPvBTQAr+cp18K1RqNUkC3Cw0iZ7Aq6ZrmQqR+2qSwMq+RTUWkB66/VmZjH/UGQCRq9 wge/3JBMFnAfBkAT9s+5qEuYl/l5mrgqqn5/ka9mxN/D4oPUcusqSNgA5569+EnRPNsm zHMsqFzBQ1WMD6ZRK2XhGCdlVO8SqqX2ZpMYU3Q6PGoPhfinwI/cCXXV5h24gPhHhAK5 UR+w==
X-Forwarded-Encrypted: i=1; AFNElJ+J4VqtasO/kIOA3OxN6J3vmkrfyUFhsgupvnJbA9Mcg5n3g4SeHIy/BQpTYcbTliNB/Ygg@ietf.org
X-Gm-Message-State: AOJu0Yz03onL7Kyq1WywjGQNgYhRNJC2L2d7Ms6JokhCvOwFyxJYgpX6 38jugiYOWhk28xH99UCsn+xg0Pgyl5M2vBcC3bi5A9LjeOQ8PMy8/6Qkvm/rc1hzTA==
X-Gm-Gg: AeBDietnvDoHjhxInpmMbVHUcnq9LqGMRj2G3yxrftkFZ4SDhOcOBVvmCLg7ArW7ztX htPBKmu0PaO2f9rAsLp97Uxgw4UQFtAETdRFt0aoBoPqXjZQtjgXGAF5mQGOKH12ytbVkl3dlmK 6HHRWL+aTo+b3io4dYpQrZK5cPyCSGXnQUoB4iT5n1mGItFvqUMCwL4mO2HuD4KnPmjtX3qiyru Wj3KYYX6GbgkS3y3eOz5//BAjdWUup+lyYXmrQjoH7zOQb3RZG/tQ8RDXVt4L7ZSIQ1lUxP0q3X nkZlP9PlU1SHNOOhmqUSDbpL0aanEuxPLV3qTZ5Uxjc0Q3flxyNrn6re5GGqJJ7/LtNzPbLbCul Q2Jb3brRrMiVzM3VF7wXIVpnAw3vo7TQ8MXOfmGeO9ugG94IAKTPueprcaiuBpdAa+6NctTTFen eRIw8hmI0hPAfzsWgN1MTH8oSHPXS0F6kfvl5FCtjCm9kerqj8mnGXg5Vu+WbH1Olz5OB7yQpTD dhyVmWi+KE=
X-Received: by 2002:a05:6a20:938e:b0:398:8026:4811 with SMTP id adf61e73a8af0-3a39c217edbmr4770559637.35.1777399643428; Tue, 28 Apr 2026 11:07:23 -0700 (PDT)
Received: from google.com (252.169.16.34.bc.googleusercontent.com. [34.16.169.252]) by smtp.gmail.com with ESMTPSA id 41be03b00d2f7-c7fc6015691sm2947875a12.18.2026.04.28.11.07.22 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 28 Apr 2026 11:07:22 -0700 (PDT)
Date: Tue, 28 Apr 2026 18:07:19 +0000
From: Eric Biggers <ebiggers@google.com>
To: Tony Li <tony.li@tony.li>
Message-ID: <20260428180719.GA77935@google.com>
References: <20260428065832.GB3813922@google.com> <DM4PR84MB231066C41AAFD689B58D21FFF4372@DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM> <20260428171608.GA42950@google.com> <DM4PR84MB23107B9C52B76D0859820A63F4372@DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM> <4E8F4CA7-3504-4C5F-BDD6-AEE119869C2A@tony.li>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <4E8F4CA7-3504-4C5F-BDD6-AEE119869C2A@tony.li>
Message-ID-Hash: 6DVOAT3YZKFKYVBM6VARDLIMWQMZD6CM
X-Message-ID-Hash: 6DVOAT3YZKFKYVBM6VARDLIMWQMZD6CM
X-MailFrom: ebiggers@google.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tcpm.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Bonica Ron <ronald.bonica@hpe.com>, "tcpm@ietf.org" <tcpm@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [tcpm] Re: Feedback on draft-ietf-tcpm-tcp-ao-algs-00
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/iO4vV1FNeJGJITqAKlrA8UkLDf8>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Owner: <mailto:tcpm-owner@ietf.org>
List-Post: <mailto:tcpm@ietf.org>
List-Subscribe: <mailto:tcpm-join@ietf.org>
List-Unsubscribe: <mailto:tcpm-leave@ietf.org>

On Tue, Apr 28, 2026 at 10:55:46AM -0700, Tony Li wrote:
> 
> I prefer having at least two.  

There are already two algorithms standardized for TCP-AO:
AES-128-CMAC-96 and HMAC-SHA1-96.  See RFC 5926.

Adding HMAC-SHA256-128 would make three algorithms total.

Perhaps HMAC-SHA1-96 doesn't count, since SHA-1 is obsolete.  (Though,
HMAC-SHA1 is stronger than plain SHA-1.)  But that would still leave
two: AES-128-CMAC-96 and HMAC-SHA256-128.

- Eric