Hi Yoav, Pull Request: https://github.com/ietf-ipsecme/drafts/pull/2
Hi, Valery has created this pull request. During the meeting in Honolulu and subsequent discussion on the list, several people requested that there be a negotiation of the algorithm used in the puzzle rather than fixing it to SHA-256. The pull request suggests figuring out which algorithms the Initiator supports by examining the SA payload in the IKE_SA_INIT request, and using the PRF algorithms. I’m posting this to the list, even thought we’re not sure about this. Specifically, PRF_AES128_XCBC and (I think) PRF_AES128_CMAC won’t work with the bitcoin-like puzzle that is currently in the draft. Why? For convenience assume a 16-byte cookie, a fixed zero IV (as always in AES-XCBC) and fixed zero key. So let Y = AESENC(key, IV XOR COOKIE) = AESENC(zero, COOKIE) Let Z = AESDEC(key, zero) = AESDEC(zero, zero) Extend the cookie by Y XOR Z. The result will give you a 128-bit tag of all zeros. Way too easy. You forgot about the mandatory 10* padding in AES-XCBC. So, the result of AESDEC(zero, zero) should not be a random string, but should look like properly padded one. But anyway, I think that if we use PRF for puzzles, then the puzzle definition should be changed. Let R=PRF(K,S). Then the puzzle should be: using supplied cookie as message S, find a key K so, that result R contains the requested number of trailing zero bits. I'm not a cryptographer, but I think this variant of puzzle should be secure for all PRFs, defined in IPsec. Why? First, every secure PRF is a secure MAC (not visa versa). This is pointed out by several sources. Then, secure MAC should not allow attacker to recover a key given the message and the authentication tag. In our case the authentication tag is not fully given, but it must have some properties (desired number of trailing zero bits), so it is not arbitrary. Another way to do this is to add a notification in the Initiator’s request listing the hash algorithms that it supports. We could reuse the RFC 7427 registry of hash algorithms. I don't think this is a good idea. First, it will require initiator to include a list of supported hash algorithms into request message. This will unnecessary increase its size in all cases: at this point initiator has no idea whether responder will ever use puzzles or even whether it supports them. I think this is a waste of resources, especially taking into consideration that we may reuse information, that is always present in the request message. Personally, I really don’t like this algorithm agility, because we don’t want to give the Initiator the options of a hard vs easy puzzle. So suppose the Responder supports two algorithms, SHA-256 and SHA-512, and that the latter is half as fast as the former, then a SHA-512 puzzle would have to have 1 bit less than the SHA-256 puzzle. But in fact, we know that SHA-512 is faster on 64-bit platforms, while SHA-256 is faster on 32-bit platforms. Add some GOST-certified hash to the mix, and the administrator’s task becomes that much harder. If the difference in algorithms speeds is significant, then some weights could be added to algorithm definitions to make the required time to solve puzzle roughly the same on the same platform. OTOH often when a protocol is published without algorithm agility, we end up extending it later. Exactly. Yoav Regards, Valery.
_______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec