I am confused by your choice of names.  The text uses, e.g.,
usmHMACSHA224128AuthProtocol

whereas the MIB module has

 usmHmacSha224128Protocol

Do these refer to the same identity (times six)?

I think that the IANA Considerations needs more work; you might want to
review RFC4181 for a more detailed approach but you need at least
something along the lines of an explicit request that the MIB module be
assigned a number under the appropriate tree, eg

.1 IANA is requested to assign an object identifier for

   Descriptor        OBJECT IDENTIFIER value
         ----------        -----------------------
  snmpUsmHmacSha2MIB           { snmpModules XXX }

[with XXX harking back to the same string in the MIB module itself].

And then for each algorithm, so that the entries in IANA can be tied
into the text of the final RFC,

.2 IANA is requested to assign a value in the SnmpAuthProtocols registry
for each of

Value                 Description                        Reference

aa   usmHMACSHA224128AuthProtocol     RFC YYYY
bb   usmHMACSHA256128AuthProtocol    RFC YYYY
cc   usmHMACSHA256192AuthProtocol    RFC YYYY
dd   usmHMACSHA384256AuthProtocol    RFC YYYY
ee   usmHMACSHA512256AuthProtocol    RFC YYYY
ff    usmHMACSHA512384AuthProtocol    RFC YYYY

-- RFC Ed.: replace YYYY with actual RFC number & remove this line

with aa bb cc  etc appearing in the MIB Module.  As it stands, you might
appear to be requesting that all six get the same value, namely mm.

And then there are Security Considerations.  You are replacing a simple,
well understood choice of two values with a choice of eight, and saying
that there is no need to implement them all.  This gives great scope for
a lack of interoperability.  Should there be a mandatory to implement
value (or negotiation - perhaps not)?

I would like to see some discussion of the benefits, if any, of the six
new options.  I have seen discussions along these lines on the TLS WG
list (with a considerable degree of expertise in cryptography present)
that makes it far from clear cut what the best choice is, and that what
appears to be the strongest may not be a good choice for IETF protocols.

Tom Petch


----- Original Message -----
From: "Johannes Merkle" <[email protected]>
To: <[email protected]>
Cc: "Manfred Lochter" <[email protected]>; <[email protected]>
Sent: Monday, March 24, 2014 12:35 PM
Subject: [OPSAWG] Fwd: New Version Notification
fordraft-hmac-sha-2-usm-snmp-00.txt


> Dear all,
>
> a while ago, I had announced a draft on a new USM authentication
protocol HMAC-SHA-256-128 for use in SNMP. Following
> Uri's suggestion (and with his valuable support) I have considerably
extended the draft:
>  - Further SHA-2 based HMAC authentication protocols have been
included to provide ore flexibility.
>  - A (short) section explains how to perform key change and key
localization with these protocols
>  - A MIB definition has been added.
>
> URL:
http://www.ietf.org/internet-drafts/draft-hmac-sha-2-usm-snmp-00.txt
> Status:
https://datatracker.ietf.org/doc/draft-hmac-sha-2-usm-snmp/
> Htmlized:
http://tools.ietf.org/html/draft-hmac-sha-2-usm-snmp-00
>
>
> Abstract:
>    This memo specifies new optional HMAC-SHA-2 authentication
protocols
>    for the User-based Security Model (USM) for SNMPv3 defined in RFC
>    3414.
>
>
> Due to the extension of the draft to other SHA-2-based HMAC, I have
changed the draft name from
> draft-hmac-sha-256-128-usm-snmp
> to
> draft-hmac-sha-2-usm-snmp
> resulting in a reset of the version number (00).
>
> Is there interest in adoption of this draft by the WG?
>
> Johannes
>
>
> _______________________________________________
> OPSAWG mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/opsawg

_______________________________________________
OPSAWG mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to