Dan Harkins writes:
>   FIPS 186-3 (The Digital Signature Algorithm) specifies that security
> strength levels of DSA are a minimum of the security strength of the
> hash algorithm and the (L,N) pair from the domain parameter set. If
> one wished to achieve a security strength level with DSA that would
> be valid, according to NIST, "beyond 2030" one would need to use
> SHA-512 but IKEv2 only uses SHA-1 with "DSS Digital Signature"
> (authentication method value of 3) so that wouldn't work.

That SHA-1 text is leftover from the RFC4306 and from the IKEv1, i.e.
when the only supported DSS was the one using SHA-1. The RFC5996 did
update from the 1994 FIPS 186 to draft FIPS 186-3 but that comment
about SHA-1 did not get removed.

On the other hand I would expect most of the implementations ignore
that comment, and go with the actual DSS documentation when using DSS
signatures, and use the hashes defined in there.

This is one of those cases where, when that text was added it seemed
to help understanding the issue, as SHA-1 was the only allowed hash
function for DSS, but with updated documents with later references,
that comment came misleading but did not get removed..

>   So to actually address this in the hash-specific canonical way
> requires new auth methods for different permutations of DSS with
> SHA-224, SHA-256, SHA-384, and SHA-512 as well as different
> permutations of ECDSA with brainpool curves using the 5 different
> SHA varients. But this is getting, as you say, "cumbersome".

So you are saying that each DSS even with ECDSA do require to tell
what hash function is used separately? I have assume that when I do
get DSA public key in the certificate, and know the length of the DSA
key, I can know which hash function is used when using that key?

But if I am mistaken, then we might need to add extra DSS methods too
(but lets not add them to IKEv1, as I do not want new modifications to
IKEv1. IKEv1 does this same way than IKEv2 does, i.e. it assumes you
know which hash function is used with DSS and ignores the negotiated
hash function when using DSS).

Note, that there is no MUSTs or anything like that in the RFC5996
saying you MUST use SHA-1, it is just statement that DSS as defined in
year 1994 version used SHA-1.
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to