Hi,
Please find our new proposal with ESP using implicit IV [1]. We would like to
present and discuss it at the next IETF meeting.
We would be happy to have the WG opinion on which you think is the better way
to negotiate the implicit IV between two peers. The different options are
detailed in section 5 and copy paste here in the email:
"""
Negotiation of the use of implicit IV can be done in 3 different
ways:
o An IMPLICIT IV Transform Type. A proposal that contains this
transform type requires (if accepted) that IPsec use the implicit
IV and not include an explicit IV in the packets. To facilitate
backward compatibility with non-supporting implementations the
Initiator SHOULD add another proposal that does not include this
transform type as well as cryptographic suite the Initiator does
not support the implicit IV.
o An IMPLICIT IV Transform ID. This doubles the number of ENCR
transform IDs by creating an ENCR_AES_CCM_16_IIV for each
ENCR_AES_CCM_16.
o An IMPLICIT IV Transform Attribute, which would be associated to a
Transform Type ID, specifying the use of an implicit IV. marks a
particular ENCR transform as using implicit IVs. To facilitate
backward compatibility with non-supporting implementations the
Initiator SHOULD add another ENCR transform for each algorithm so
marked. In other words, for each ENCR_AES_CCM_16 with
keylength=256 and IIV=1, there will need to be an ENCR_AES_CCM_16
with keylength=256 and no IIV attribute.
"""
[1] https://datatracker.ietf.org/doc/draft-mglt-ipsecme-implicit-iv/
-----Original Message-----
From: [email protected] [mailto:[email protected]]
Sent: Thursday, June 09, 2016 12:12 PM
To: Tobias Guggemos; Yoav Nir; Daniel Migault
Subject: New Version Notification for draft-mglt-ipsecme-implicit-iv-00.txt
A new version of I-D, draft-mglt-ipsecme-implicit-iv-00.txt
has been successfully submitted by Daniel Migault and posted to the IETF
repository.
Name: draft-mglt-ipsecme-implicit-iv
Revision: 00
Title: Implicit IV for Counter-based Ciphers in IPsec
Document date: 2016-06-09
Group: Individual Submission
Pages: 7
URL:
https://www.ietf.org/internet-drafts/draft-mglt-ipsecme-implicit-iv-00.txt
Status: https://datatracker.ietf.org/doc/draft-mglt-ipsecme-implicit-iv/
Htmlized: https://tools.ietf.org/html/draft-mglt-ipsecme-implicit-iv-00
Abstract:
IPsec ESP sends an initialization vector (IV) or nonce in each
packet, adding 8 or 16 octets. Some algorithms such as AES-GCM, AES-
CCM, AES-CTR and ChaCha20-Poly1305 require a unique nonce but do not
require an unpredictable nonce. When using such algorithms the
packet counter value can be used to generate a nonce, saving 8 octets
per packet. This document describes how to do this.
Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.
The IETF Secretariat
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec