On Fri, 9 Dec 2016, Kathleen Moriarty wrote:

Hello,
Thanks for your work on draft-ietf-ipsecme-rfc4307bis.  I reviewed the draft 
and just have a few questions, the first is a nit.


Nit:
In the second paragraph of 1.3, you can drop the last two words of this 
sentence as they are redundant:

   This document does not give any recommendations for the use of
   algorithms, it only gives implementation recommendations for
   implementations.

Will do if we do a new draft version, or else will remind RFC editor of it.

In section 3.2 & 3.3, why isn't there a bigger jump down to SHOULD or SHOULD- 
for:

PRF_HMAC_SHA1     | MUST-    |

| AUTH_HMAC_SHA1_96 | MUST- The justifications seems like a bigger jump would be appropriate.

In 4307 itself, we only had one MUST and that was SHA1. The SHOULD+
candidate was AES_XCBC but it was been overtaken in reality by SHA2.
And AESPRF/AES_MAC is not as widely implemented (example: not
available in NSS) so even those implementors who picked the MUST
and SHOULD algorithm only have SHA1 and AESPRF/AES_MAC. If a 4307bis
implementation only implements the MUST algorithms, it would not interop
with a 4307 implementation that implemented all the MUST and SHOULDs,
if we made SHA1 a SHOULD- or less.

I think the available options we have are MUST- or SHOULD-. I think
MAY or SHOULD NOT would lead to interoperability issues. I think the
MUST- is still the best choice.

Note also that all SHA1 use here is still safe (HMAC and PRF are
different from plain SHA1)

Note though that I would like to keep the status for Type 2 and Type 3
the same, because all sane implementations will use the same INTEG and
PRF algorithms for a given IKE session, so these two are tightly
coupled.

Paul

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to