Hi,

Here are my comments on the draft:

I would thought:
AES_CBC is no more than MUST- for interoperability but could be dowgraded
also to SHOULD.

In addition I would also have recommend max length IV for AES-GCM unless
there is special constrains like IoT devices.
AES-GCM with a 16 octet ICV MUST
AES-CCM with a 16 octet ICV MUST

Especially thinking of constrained devices.
AES-GCM with 8 octet SHOULD : the reason for not having SHOULD+ is that
most IoT devices seems to use CCM
AES-CCM with 8 octet SHOULD+

I would have thought of 3DES with similar or slightly less weight as
CHACHA20_POLY1025 so
CHACHA20_POLY1025 SHOULD
3DES SHOULD or SHOULD-

I also agree we should mentionned that recommendation only applies to
IKEv2.

BR,
Daniel

On Fri, Oct 9, 2015 at 8:19 AM, Paul Wouters <p...@nohats.ca> wrote:

> On Fri, 9 Oct 2015, Yoav Nir wrote:
>
> On Sep 28, 2015, at 6:10 PM, Paul Hoffman <paul.hoff...@vpnc.org> wrote:
>>>
>>> Sure. Someone volunteer to write up the short draft, and that author
>>> should put Jeff Schiller at the top of the acknowledgements, and send it to
>>> the WG.
>>>
>>> --Paul Hoffman
>>>
>>
>>
>> A new version of I-D, draft-nir-ipsecme-rfc4307bis-00.txt
>> has been successfully submitted by Yoav Nir and posted to the
>> IETF repository.
>>
>
> Oops. Guess our drafts crossed the beams. I had send one to Daniel
> to look at. I've attached it in case some text is useful. It was
> based more on the structure of RFC 7321.
>
> I actually like how 7321 has the tables filled with links to the
> actual RFC's. (which I had not done yet myself)
>
> Some comments on your text:
>
> I think AES_CBC should be MUST- as it is on the way out.
>
> I have talked with one of the AES_GCM authors and got the advise to
> only use the largest octet ICV's. Why are you promoting the 8 octet
> version instead of the 16 octet version? I also think AES_GCM should
> be a MUST, not a SHOULD. It is the preferred algorithm at this point.
>
> I also think 3DES probably should be a SHOULD- because it is the only
> other non-AES algorithm in widespread use. While we all want it to go
> away, we should do so only after chacha20-poly1305 sees more adoption.
>
> Why is sha2-512 not a SHOULD?
>
>
> Can we add a recommendation to use integ == prf for non-AEAD algorithms?
>
> Windows uses 8192 modp, which I think should be a SHOULD. I think we
> should mention modp 1536 as SHOULD- or MAY.
>
> Can we recommend that the initial exchanges and create child sa use
> the same MODP group? and that we recommend PFS for create_child_sa.
>
> Can we recommend that a default proposal set should have at least one
> MUST algorithm for each type?
>
> Can we recommend not to apply these recommendations for IKEv1 because
> that will cause more interop problems (see my draft for text)
>
>
> Paul
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
>
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to