Yaron Sheffer writes:
> OTOH your proposal would mean one more difference between "regular" 
> IPsec implementations and FC-specific ones. I don't think that would be 
> a good thing.

FC-specific ones are only using these non-truncated ones, and they are
using special ID payloads, separate protocol ID values, different
types of traffic selectors etc. They are reusing the basic IKEv2
protocol, and some of the payloads, but it is different protocol than
IKEv2. 

> > They are not defined for IP use at all. None of the IKEv2/ESP over IP
> > uses those values. Ah, found text from our IPsec/IKE Roadmap:
> >
> >                For HMAC-SHA-1 and HMAC-MD5, the IKEv2 IANA registry
> >     contains values for both the truncated version and the standard non-
> >     truncated version; thus, IKEv2 has the capability to negotiate either
> >     version of the algorithm.  However, only the truncated version is
> >     used for IKEv2 SAs and for IPsec SAs.  The non-truncated version is
> >     reserved for use by the Fibre Channel protocol [RFC4595].  For the
> >     other algorithms (AES-XCBC, HMAC-SHA-256/384/512, AES-CMAC, and HMAC-
> >     RIPEMD), only the truncated version can be used for both IKEv2 and
> >     IPsec-v3 SAs.
> >
> > which actually says we always use truncated version (so I was wrong
> > they are not forbidden anywhere, missed this text last time as it uses
> > SHA-1 spelling not SHA1, which I was searching for :-).
> >
> 
> This text is simply describing the existing situation. It is not at all 
> normative.

Which is why I also want to describe that existing situation in the
IANA registry. If you want to use those non-truncated versions in
IPsec, you can write draft describing that... 

> > That is true, and I do not consider that as a good thing. It is much
> > better to have one good way of doing things than two ways of doing
> > same thing, especially if those two ways are about the same.
> >
> 
> Yes, but people have good reasons to add algorithms, which is (part of 
> the reason) why we negotiate them in the protocol. Thus "Tiger", 
> "camellia" and the like, and I'm sure the FC folks had a good reason for 
> the untruncated algorithms, too.

They had some reason, but on the other hand IPsec people did not want
those untruncated algorithms, and have not specified them for IP use.
This is one of the problems when sharing registries causes problems.
Suddenly you might have options for protocols which did not request
them added to them, because someone else who shares the same registry
added them.
-- 
[email protected]
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to