Hi Rod,

Two quick comments:

- I am fine with the Experimental/ISE route.

- I support the SKEYSEED idea. It makes sense as a single point of integration into the protocol, so that if we ever specify a different way of generating key material, it would not need to be re-specified for QKD. Of course generation of key material depends on PRF algorithms that might get weaker over time, but since we're going to use the key material for symmetric algorithms anyway, I think this is appropriate - the strength of PRF can be correlated to key length of symmetric encryption/MAC algorithms.

Thanks,
        Yaron

On 11/14/2014 02:13 AM, Rodney Van Meter wrote:
ipsecme-ers,

We have managed to catch a number of people in the halls to discuss
our IPsec with QKD I-D.  Haven't managed to catch Yaron yet.

This mail is long.  First, an admin summary of where we are, then a
technical & writing action item list, and at the bottom a short FYI on
the state of QKD, for the curious.

Here's where I think we are:

* We need this published, so that there is a formal stake in the
   ground as the growing number of commercial QKD implementations get
   around to adding a properly engineered IPsec to their supported
   functionality; existing QKD implementations interface with
   IP-relevant equipment in an ad hoc manner.  (As one person said, "It
   may be snake oil, but you're entitled to have interoperable snake
   oil.")
* There is no need for Standards Track at the moment; our goal is
   Experimental RFC as a target for other implementations to aspire to.
   Therefore, we don't think it's necessary to formally adopt this as a
   WG item.  Taking this through the Independent Stream Editor seems to
   be the right approach.  We have consulted with Kathleen Moriarty,
   Sean Turner, Paul Hoffman, Nevill Brownlee and a couple of others
   about this, and they are on board with it.
* Even if it's not a WG item, with your permission keeping the
   discussion public here on the ipsec mailing list seems to be helpful
   and appropriate.
* Several people (Paul Koning, Greg Troxel, Tony Putman, Tero Kivinen)
   have offered comments on the -01 version.  (Sheila Frankel, Alan
   Mink, Sean Turner offered comments on the -00 version that led to
   -01.)  We will address those in turn; a summary is below.  Some of
   these asked for clarification in the writing, some straightforward
   changes in packet formats (potentially affecting IANA
   considerations), a few for significant changes to the semantics.
* This will result in a -02 version sometime in the next few weeks as
   we sort through and address the comments.  Our existing open-source
   implementation corresponds to the -00 draft, but some of these
   changes are significant enough that we don't want to accept or
   reject until we have had a chance to at least assess their
   implementability.
* Following the -02, if people on this list are happy, there will
   certainly be a -03 with wordsmithing.  Somewhere around -03, we will
   probably send to the ISE.  My understanding is that he will tap
   someone to conduct an additional review, and the better we have
   listened to the folks here the smoother that is likely to go.
* Somewhere toward the end of this process, will have to get IANA to
   assign appropriate IDs.

Comments on the above welcome, if we have missed steps or
misinterpreted anything.

Current action item list, coalescing a couple of prior emails.  Had a
long F2F session w/ Tero yesterday, some highlights listed here,
awaiting full written comments.  This list isn't fully orthogonal or
prioritized, but obviously some of the suggestions are mutually
inconsistent.  Conflicts will have to be resolved.

Technical questions:

* Zeroth suggestion is to broaden to any out of band (OOB) key
   generation approach (diplomatic pouch being our canonical example).
   I'm inclined to keep it as focused as possible, but it may well be
   that by the time we have made the changes proposed, that we are 90%
   of the way there.
* Biggest suggestion is to use the QKD material as SKEYSEED, rather
   than directly as the bulk encryption keys.  We are going to have to
   think about this, I'm not sure how it will affect what we are trying
   to accomplish.  As long as we avoid the D-H we have accomplished the
   primary goal, but does using the prf dilute any of the guarantees we
   get from the QKD itself?  e.g., are there vulnerabilities in the prf
   or known limitations in its lifetime (as with the factoring/discrete
   logarithm problem of D-H)?  I'm not sure.  Would it actually add
   anything to take this approach?  I'm not sure.  My first inclination
   is to _not_ adopt this suggestion.
* Second biggest suggestion (made by more than one person) is to stick
   with existing Key Exchange Payload, and just assign a value for the
   D-H Group Num field to indicate QKD.
* Third, fallback is a policy decision, not needed on the wire,
   perhaps.  Just having the right settings in the IKE config should
   do.
* Is there a DoS attack at the IKE negotiation level that can result
   in us discarding valuable and not yet actually used key material?
* Should the nonce be reinstated, and would that allow use to safely
   reuse some key material?
* Can PAK-DH be eliminated?
* Should we specify anything about the amount of material matching a
   KeyID, and what to do we leftover material?
* What happens when you have more than one Fallback Payload?  Does the
   prioritization of these need to be documented?
* Could a Notify Payload be used instead of a Fallback?
* Critical bit is no help against downgrade attack.
* Using the keys as material for prf, as in mail, would allow reuse of
   security proofs.
* Can combine device ID, key ID into one undifferentiated field, then
   add annex saying what our implementation does.
* Proposed Payload format is too long and too complex, simpler is
   preferred.

Editing TODO:

* Fix IANA-related language
* Clarify non-use of prf, order in which keys are extracted from KeyID
   SK_d is the first n bits of QKD material,
   SK_ai is the next n bits of QKD material, then
   SK_ar, SK_ei, SK_er, SK_pi, SK_pr
   are taken in order from the QKD-generated material.
   (assuming above change is not adopted)

Source matching the -00 draft is available at
http://aqua.sfc.wide.ad.jp/research/ipsecwithqkd.html
This will be updated around the time we submit -02.

Status of QKD:
* Several commercial implementations exist, integration into classical
   networks is still work in progress in the various testbeds, largely
   being done by (ahem) experimental physicists rather than experienced
   Internet people.
* ETSI was pushing to standardize various physical elements, effort
   stalled at the moment.
* Metro area networks continue to grow; exist in Japan, Spain, China,
South Africa, other places.
* China announced Beijing-Shanghai network for 2016
http://www.scmp.com/news/china/article/1631479/china-launch-hack-proof-quantum-communication-network-2016
* Battelle doing Columbus-Washington link
http://www.battelle.org/our-work/national-security/tactical-systems/quantum-key-distribution
* LANL trying for testbed for securing infrastructure
* Another very large investment (tens of millions) underway in Europe
* Quantum repeaters are in experimental development, don't fully exist
   yet but would overcome distance limitations (and enable non-QKD
   applications of quantum states)
* Satellite-based QKD also in development, experiment using the
   International Space Station has been proposed, don't think it has been
   scheduled yet.

If you read this far, thanks.  Comments welcome!  I'm flying out
tonight, but am available in the session right after ipsecme.
Otherwise, find us (Shota & me) online.

—Rod



Rodney Van Meter
associate professor, Faculty of Environment and Information Studies,
Keio University, Japan
[email protected] <mailto:[email protected]>
personal: http://web.sfc.keio.ac.jp/~rdv/
AQUA Group: http://aqua.sfc.wide.ad.jp/
Murai Lab: http://www.sfc.wide.ad.jp/IRL/
GIGA: http://ic.sfc.keio.ac.jp/
Quantum Networking:
http://www.wiley.com/WileyCDA/WileyTitle/productCd-1848215371.html
http://discourse.quantumnetworks.org/





_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec


_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to