> On Feb 17, 2015, at 10:47 AM, Daniel Migault <[email protected]> wrote:
> 
> Hi Scott, 
> 
> Thank you for the feed back. I agree that compressing the ICV reduces 
> security related to authentication. Let's call this a "weak authentication".  
> 
> I am not saying it is a valid argument, but since IPsec enables NULL 
> authentication too, we considered that enabling "weak authentication" would 
> be possible with a clear warning in the security consideration. 

That is not a valid analogy.  NULL authentication specifically delivers no 
authentication at all.  The security properties of “no authentication” are 
reasonably obvious even to people not skilled in cryptography.

On the other hand, weak authentication can easily be mistaken for real 
authentication, in the same way that DES (or worse yet, DES-40) was in the past 
mistaken for real confidentiality.  If we build a system with weak security 
properties, we run the very real risk that it may end up being widely used “to 
save bandwidth”, when in fact it should be considered as a niche solution that 
is only valid for extremely unusual scenarios.  It’s not clear to me that a 
note in teh security considerations section will be sufficient.

        paul

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to