Hi Tero,

some additional feedback:

Introduction:
In the paragraph 4 you point out the two achievements of the draft:
- A generalized authentication method for authentication with digital signatures
- A negotiation method for the hash function used as message digest within the 
signature
The motivation should be structured to reflect this distinction. In particular, 
the first and third paragraphs motivate
the authentication method, while the second one motivates the second one. As 
ECDSA groups, RSASSA-PSS and DSA with other
hash than SHA-1 all point to deficiencies of the old authentication method, I 
would use a list.
How about the following?


The current signature based authentication methods in the IKEv2 are per
   algorithm, i.e. there is one for RSA Digital signatures, one for DSS
   Digital Signatures (using SHA-1) and three for different ECDSA curves
   each tied to exactly one hash algorithm.  This design starts to be
   cumbersome when more signature algorithms, hash algorithms and elliptic
   curves are to be supported:
     * The RSA Digital Signatures format in the IKEv2 is specified to use
       RSASSA-PKCS1-v1_5 padding, but [RFC 4055] and [PKCS1] recommend the
       use of the newer RSASSA_PSS. This new padding method is specified by
       additional parameters and for each parameter set to be supported new
       authentication methods would be required.
     * With ECDSA and DSS there is no way to extract the hash algorithm from
       the signature, thus, for each new hash function to be supported with
       ECDSA or DSA new authentication methods would be needed. Support for
       new hash functions is particularly needed for DSS because the current
       restriction to SHA-1 limits its security, meaning there is no point
       of using long keys with it.
     * The tying of ECDSA authentication methods to particular elliptic curve
       groups requires definition of additional methods for each new group.
       By combination of new ECDSA groups with various hash functions the
       number of required authentication methods may grow unmanageable.
       Furthermore, the restriction of ECDSA authentication to a specific
       group is inconsistent with the approach taken with DSS.

   With the selection of SHA-3 [Ref_TBD], it is seen that it might be
   possible that in the future the signature methods are used with SHA-3
   also, not only SHA-2.  This means new mechanism for negotiating the
   hash algorithm for the signature algorithms is needed.




>   The new digital signature method needs to be flexible enough to
>   include all current signature methods (ECDSA, ECGDSA, RSASSA-PSS,
>   ElGamal, etc),
The term "current signature methods" is not precise. Currently used with IKE? 
Currently used in practice at all?
Currently specified in standards (which ones)?
Actually:
- the new authentication method is agnostic to the signature algorithm (like 
X.509 or CMS are) as far as an ASN.1
algorithm identifier exists. (This holds true only, if parameters of the 
algorithm can be included)
- The hash negotiation method supports only those hash algorithms for which 
code points have been defined.

Furthermore, I suggest not to list specific signature methods supported, as 
some of them (ECDSA) are common while others
are not. This may provoke discussion, in particular, as RSA with PKCS#1v1.5 as 
the most common one (by far) is not listed.

Best regards,
Johannes
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to