We have tried to limit the suites supported in 5202 and have our own suite list, different from:

http://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xml

In part this is good as many of those suites are old and should be just lost. But some are marginially important and it is hard to figure out which they are. To get to specifics we have AES-CCM and AES-GCM 8 & 16, we skip 12 for each. But what about ENCR_NULL_AUTH_AES_GMAC? We don't have a 'good' auth only beyond NULL-ENCRYPT with HMAC-SHA2 (there is no AES-CMAC cipher, as that would really not work). So marginally we need to add the GMAC cipher.

Then I am in discussions with a few people to come out with a set of 'compressed' CCM and GCM ciphers that replace the cipher's IV with using ESP's ESN, saving 8 bytes on the 'wire' and in wireless situations this is really worth doing. And I really will need the AES-CCM-8 version of this for one application and AES-GCM-8 for another. One can argue that if the wireless developers are busy screaming about both the ESN and IV, they will opt for the 8-octet ICV.

So what do we do? Do we exactly follow the ESP cipher suite list and be done with it? If it is available for ESP use it if you desire? Or do we maintain our own reduced list and after publishing add more through our expert(s) like IKEv2 does (that is Tero).

As I look over the last paragraph I realize it is not so simple, as the ESP_TRANSFORM is both the encryption and authentication, whereas other users of ESP negotiate these separately. So we do need to go with option 2, our own list as we have, and add GMAC to the current list and be ready to add the compressed versions of CCM and GCM.


_______________________________________________
Hipsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/hipsec

Reply via email to