Re: [IPsec] Labeled IPsec options

2019-12-11 Thread Valery Smyslov
Hi Paul, I don't think option 4 is a good idea. If old responder encounters an unknown payload with Critical bit set in IKE_AUTH, it will return back UNSUPPORTED_CRITICAL_PAYLOAD and IKE SA won't be set up. See section 2.21.2 of RFC7296. This would require initiator to retry from IKE_SA_INIT,

Re: [IPsec] Last Call: (Postquantum Preshared Keys for IKEv2) to Proposed Standard

2019-12-11 Thread Paul Hoffman
On 11 Dec 2019, at 11:11, Yoav Nir wrote: Hi, Paul On 11 Dec 2019, at 20:03, Paul Hoffman wrote: On 11 Dec 2019, at 8:23, Salz, Rich wrote: We are seeing a flurry of these kind of “post quantum protection” things. This is the only one I have seen that is a method, not a new key

Re: [IPsec] [Last-Call] Last Call: (Postquantum Preshared Keys for IKEv2) to Proposed Standard

2019-12-11 Thread Yoav Nir
Hi, Paul > On 11 Dec 2019, at 20:03, Paul Hoffman wrote: > > On 11 Dec 2019, at 8:23, Salz, Rich wrote: > >> We are seeing a flurry of these kind of “post quantum protection” things. > > This is the only one I have seen that is a method, not a new key exchange > algorithm. It is

Re: [IPsec] Labeled IPsec options

2019-12-11 Thread Hu, Jun (Nokia - US/Mountain View)
+1 for option4, +0.5 for option3 One factor to consider is the granularity of label, for me it is per CHILD_SA; option1 is per TS (e.g TS with label and TS without label could be mixed in the same payload), option2 is per TS payload (e.g. you could have TSi with label, TSr without label)

Re: [IPsec] Last Call: (Postquantum Preshared Keys for IKEv2) to Proposed Standard

2019-12-11 Thread Valery Smyslov
Hi Rich, I think that Kenny's slides only support the idea, that the draft should be Standards Track. In particular, the slide "The Coming Crypt-Apocalypse?" has a bullet: * And traffic captured now could be broken later, so it’s a problem *today* if you have data that needs to

Re: [IPsec] [Last-Call] Last Call: (Postquantum Preshared Keys for IKEv2) to Proposed Standard

2019-12-11 Thread Salz, Rich
> A much better title would be "Mixing Preshared Keys in IKEv2 for Postquantum Resistance". That's better. I misunderstood the document as both you and David Mcgrew kindly explained. I withdraw my concerns and hope the title is changed. ___

Re: [IPsec] [Last-Call] Last Call: (Postquantum Preshared Keys for IKEv2) to Proposed Standard

2019-12-11 Thread Paul Hoffman
On 11 Dec 2019, at 8:23, Salz, Rich wrote: We are seeing a flurry of these kind of “post quantum protection” things. This is the only one I have seen that is a method, not a new key exchange algorithm. It is understandable that you could have missed this from the title which misstates the

Re: [IPsec] Last Call: (Postquantum Preshared Keys for IKEv2) to Proposed Standard

2019-12-11 Thread David McGrew (mcgrew)
Hi Rich, I strongly disagree with your statement that “this is premature”, and the slides that you cite do not support that claim. I totally agree with the points in Kenny’s slides, especially as they pertain to QKD and SDO-shopping, but they say nothing about improvements to security

Re: [IPsec] Last Call: (Postquantum Preshared Keys for IKEv2) to Proposed Standard

2019-12-11 Thread Salz, Rich
Slides: https://datatracker.ietf.org/meeting/99/materials/slides-99-saag-post-quantum-cryptography Video: https://www.youtube.com/watch?v=abmd1n5WUvc=1451s On 12/11/19, 11:36 AM, "Scott Fluhrer (sfluhrer)" wrote: Did Kenny make this statement in the context of postquantum cryptography

Re: [IPsec] Last Call: (Postquantum Preshared Keys for IKEv2) to Proposed Standard

2019-12-11 Thread Scott Fluhrer (sfluhrer)
Did Kenny make this statement in the context of postquantum cryptography (that is, public key algorithms that are believed to be secure even if the adversary has a quantum computer)? That would certainly be a reasonable statement (as most postquantum algorithms are fairly new, and are still

Re: [IPsec] Last Call: (Postquantum Preshared Keys for IKEv2) to Proposed Standard

2019-12-11 Thread Salz, Rich
We are seeing a flurry of these kind of “post quantum protection” things. This is premature. The co-chair of the CFRG, Kenny Paterson, said so awhile back. At best, this should be EXPERIMENTAL. I would like to see an IESG policy that makes all drafts on this topic be EXPERIMENTAL.

Re: [IPsec] Last Call: (Postquantum Preshared Keys for IKEv2) to Proposed Standard

2019-12-11 Thread Paul Hoffman
I'm glad to see this document finally make it towards standardization. Just a minor editorial note: capitalizing "Quantum Computers" is incorrect and should be fixed before it goes to the RFC Editor. --Paul Hoffman ___ IPsec mailing list

[IPsec] Last Call: (Postquantum Preshared Keys for IKEv2) to Proposed Standard

2019-12-11 Thread The IESG
The IESG has received a request from the IP Security Maintenance and Extensions WG (ipsecme) to consider the following document: - 'Postquantum Preshared Keys for IKEv2' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action.