IPsecME IETF-92 Dallas draft minutes
[lots of technical projection issues]
WG status report
http://www.ietf.org/proceedings/92/slides/slides-92-ipsecme-0.pdf
- authnull going into IETF LC
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-null-auth/
PaulW: we have an implementation, please interop test: oe.libreswan.org
PaulW: we changed the word "audit" as someone told us that would require
them to deliver a stack of papers as audit. Otherwise only language
changes based on Kathleen's suggestions and questions.
- ddos-protection
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ddos-protection/
chairs: draft not yet ready for WGLC.
chairs: please keep discussion on the mailing list - not github
chairs: more review needed, lots of new text. some interaction of authnull and
ddos
chairs: lets set an example in this WG for ideas useful in other WGs
Tero: HIP also had some non-hashing method
Yoav presenting his slide deck
Some discussion about clients and how many bits to solve (while my laptop
crashed and burned)
Tero: dont have to limit IKE window size to 1 - you can just wait processing
these
Brian Wise: NO_ADDITIONL_SAS can be avoied by a new exchange? Tero: yes
Miquel: you send puzzles to everyone - you dont know who that is. Same policy
for phone and computer?
Tero: there is no way out of that.
channeled jabber: <did not hear Tero>
Tero adds: you can use different IKE window size for AUTH_NULL clients versus other
Yaron: why not use puzzles after IKE SA is established?
Tero: need to think/discuss about
Tero: client could send multiple answers even before puzzle solved - and hope
to get it before puzzle solved
Brian: <missed>
Yaron: complexity discussions. for cases when you dont like initiator response
just fail it. don't add complexity
The zero value. as initiator how do i decide what my peers are doing and
how can i get in front of the queue?
Tero: we have different initiators, the same puzzle level cannot fit all client
types
Yaron: desktops will have the upper hand to swamp the responder
Brian: I thought the zero was silly. do we have to do computation first?
Yaov: we have the key so it is one turn of the PRF and counting the number of zero bits
Brian: zero is like half the solution, there needs to be more description on
what happens on the responder side
Tero: Two parts of the document. one describe the protocol for
interop/implementors. second part (appendix?) on implementation
details, on why we use certain heuristics for something and how various devices should try and implement.
PaulH (no hats): Tero gave a very clear split suggestion - however with zero value the client side is that goes in between both.
I dont want to see an appendix here. Implementors really needs
to make a lot of guesses. belongs in main body of
the document.
Brian: I'm fine with tero's description.
Valery: Mic: If responder figures out that the initiator solved relatively easy puzzle, but it takes it quite a lot of time
Valery: Mic: The responder could figure out that the initiator is weak and give
it more priority
Valery: Mic: I agree with Tero that some kind of algorithm for responder must
be in the draft.
Yaron: determination. Scotts idea to make it more deterministic is worth while
- even if it does not fix all issues of phone vs laptop
Tero: as long as we keep the puzzle the way it is we have to set it to the
worst case. occasionally initiators get lucky and get
the easy puzzle.
PaulH: while not busy pre-calculate to determine if it is easy or hard puzzle
and remember
Brian:
Valery: Mic: I think that we cannot make puzzles deterministic givin the diversity of computational power of different clients
Valery: Mic: Look at puzzle as to lottery - some are more lucky
Tero: and botnets are usually desktops - the most powerful clients we have
- chacha20poly1305
http://www.ietf.org/proceedings/92/slides/slides-92-ipsecme-2.pdf
Yoav presenting
Yaron: does arm have aes acceleration?
Yoav: no. it has something called neon - not in phones but in tablets. has some
advantages
Steve Kent: the "civilian part" keep in mind several industry sectors make use
of FIPS approved algos for liability
purpose. If the motivation is performance, that is not a good argument anymore.
Russ Housley chatted with NIST people
and made optimized miplementation og P-256 so the performance of Curve25519 is
not different enough. Performance is not
a good reason.
Tero: you cannor use curve25519 .... same for blake.... ?
Tero: I hate the names A B and C. C for civilian is not a good name. Move UI
out and do UI in separate document
Yoav: I thought we'd have the answer of CRFG by now....
??? from NIST: We received documents and proposal claiming they have to
implement P-256 faster than Curve25519. Has not
been verified. It is just a claim.
PaulH: who will support with review or code: Tero,PaulW, Michael and Valery
- AES CCM http://www.ietf.org/proceedings/92/slides/slides-92-ipsecme-3.pdf
Daniel presenting
Tero: get rid of aes-cbc. all small devices use ccm anyway
Steve Kent: the process that generates the nonce or IV is within the boundary
of the [application?]
[ more talk about FIPS / certification ]
We looked at this in the past - we provided citations to Daniel
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec