Re: [IPsec] review of draft-pauly-ipsecme-split-dns-01

2016-08-08 Thread Tero Kivinen
[not waring any hats] Paul Wouters writes: > As explains in another thread on the list, that just complicates sending > this information down to a locally running DNS server. None of the > current ones take DNS wireformat for on-the-fly reconfiguration. > However, they do take DNS presentation

Re: [IPsec] I-D Action: draft-ietf-ipsecme-safecurves-02.txt

2016-08-08 Thread Tero Kivinen
Yoav Nir writes: > Hi. > > New in this version: > - A few textual changes in the Introduction (suggested by Tero) You seemed to skip my proposed changes for the IANA considerations section. As an IANA expert, I would be more happy with the actual table version of the allocations there, as it

Re: [IPsec] I-D Action: draft-fluhrer-qr-ikev2-02.txt

2016-08-08 Thread Tero Kivinen
Paul Hoffman writes: > On 5 Aug 2016, at 8:23, Yaron Sheffer wrote: > > > The trick to that is to add a new column to the IANA table > > https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-5 > > That's the first of two tricks: the second is getting agreement

Re: [IPsec] Review of draft-ietf-ipsecme-ddos-protection-06

2016-07-01 Thread Tero Kivinen
Valery Smyslov writes: > > I think this document should update 7296 due to adding non-encrypted > > payloads to IKE_AUTH - even though the core IKEv2 RFC does not say that > > is not allowed. Someone implementing 7296 should be aware of it to allow > > it in their implementation. > > Hmmm... Not

Re: [IPsec] Call for adoption on draft-fluhrer-qr-ikev2 as an IPSecME WG document

2016-07-01 Thread Tero Kivinen
[This replies to emails other people also sent to list, but I just picked the last email to list some points, and I am talking here as an implementor not as a chair]. David McGrew writes: > Yes; that draft is a good starting point. The goal should be to > develop an RFC that updates RFC 7383 and

[IPsec] Early Code Point allocation for INTERNAL_DNS_DOMAIN for draft-pauly-ipsecme-split-dns

2017-02-01 Thread Tero Kivinen
The authors of the draft-pauly-ipsecme-split-dns has asked the early IANA code point allocation for the INTERNAL_DNS_DOMAIN specified in draft-pauly-ipsecme-split-dns. This request only covers INTERNAL_DNS_DOMAIN and does NOT include INTERNAL_DNSSEC_TA. As a WG chair I have checked the request,

[IPsec] Working group last call for the draft-nir-ipsecme-eddsa-00

2017-02-08 Thread Tero Kivinen
This message will start two week working group last call for the draft-nir-ipsecme-eddsa-00 [1] draft. Please send your comments, questions etc to WG mailing list before 2017-02-24. If you belive that the document is ready to be submitted to the IESG for consideration as a standard track RFC

[IPsec] Meeting in the Chicago IETF 98 and agenda items

2017-02-08 Thread Tero Kivinen
I think we have still enough drafts going forward and work to do that is useful for us to meet in the Chicago. I am planning to put in a request for one 1.5 hour session, but if someone has some other agenda items which are not in our current items to be worked on (rfc4307bis, rfc7321bis, eddsa,

[IPsec] Regarding max limit of payloads to avoid unwanted processing.

2017-02-22 Thread Tero Kivinen
Sandeep Kampati writes: > 3.5. Identification Payloads > > ID_IPV4_ADDR1 > A single four (4) octet IPv4 address. > > Questions: do we need to consider "single four (4) octet IPv4 > address" as MUST point and reject the packet if we receive more > length for it.

Re: [IPsec] Working group last call for the draft-nir-ipsecme-eddsa-00

2017-02-09 Thread Tero Kivinen
Ah I noticed that my last call email had wrong draft name in the subject line and in the link. The correct draft name is of course draft-ietf-ipsecme-eddsa-00 not *-nir-* version. David Schinazi writes: > I've reviewed this draft. I support it and believe it is ready to move forward > towards

[IPsec] [Editorial Errata Reported] RFC7296 (4930)

2017-02-09 Thread Tero Kivinen
RFC Errata System writes: > The following errata report has been submitted for RFC7296, > "Internet Key Exchange Protocol Version 2 (IKEv2)". > > -- > You may review the report below and at: > http://www.rfc-editor.org/errata_search.php?rfc=7296=4930 > >

[IPsec] IPsecME status update 2017-02-10

2017-02-10 Thread Tero Kivinen
IETF 98 session request done for 1.5 hours. Agenda could be: - Document status of "finished" documents - rfc4307bis - rfc7321bis - Document status of "almost finished" documents - EdDSA - tcp-encaps - Document status of other adopted WG drafts - split-dns - Work items - Quantum

Re: [IPsec] Working group last call for the draft-nir-ipsecme-eddsa-00

2017-02-15 Thread Tero Kivinen
Andreas Steffen writes: > I personally think that 0 would have been legitimate for the "Identity" > hash but the next unassigned value (5) is also ok for me. > > Could you please ask IANA for an early assignment of the code point? > strongSwan 5.5.2 with Ed25519 support is ready to be deployed, >

Re: [IPsec] Quantum Resistance Requirements

2016-08-19 Thread Tero Kivinen
Scott Fluhrer (sfluhrer) writes: > > Or could we introduce some things now that would make "dropping in" a > > replacement easier? > > Nothing comes to mind; according to the above wild speculation, the > difficulties that people are likely to encounter are more to do with > the implementations,

Re: [IPsec] Ben Campbell's No Objection on charter-ietf-ipsecme-10-01: (with COMMENT)

2016-09-02 Thread Tero Kivinen
kathleen.moriarty.i...@gmail.com writes: > Could you respond on the timeline and if you think it's reasonable > and why or if it should be changed. Sure. Out of the nine documents to be published, there is two which are already going out from the WG, i.e., which are already submitted for

Re: [IPsec] Compression, was: Re: draft-mglt-ipsecme-rfc7321bis-03

2016-09-05 Thread Tero Kivinen
Yaron Sheffer writes: > Yes, these are lossy algorithms, but the TLS/HTTP attacks are all with > lossless algorithms. And as far as I know, they are applicable to any > situation where here is an attacker that can force traffic on the wire, > mixed with other, non-attacker controlled traffic.

[IPsec] Mirja Kühlewind's Block on charter-ietf-ipsecme-10-00: (with BLOCK)

2016-08-31 Thread Tero Kivinen
Mirja Kuehlewind writes: > Similar to Spencer's commet I have problems understanding what the > following really means: > > "To make IKE work in these environments, IKE packets need to be > encapsulated in a TCP tunnel. The group will define a mechanism to > tunnel IKE and IPsec over a TCP-based

Re: [IPsec] Spencer Dawkins' No Objection on charter-ietf-ipsecme-10-00: (with COMMENT)

2016-08-31 Thread Tero Kivinen
Kathleen Moriarty writes: > >> "There have been middle boxes blocking IKE negotiation over UDP. To > >> make IKE work in these environments, IKE packets need to be > >> encapsulated in a TCP tunnel. > > > > > > "In a TCP tunnel" is perhaps a little confusing, as IPinIP or an IPsec > > tunnel was

Re: [IPsec] Mirja Kühlewind's Block on charter-ietf-ipsecme-10-00: (with BLOCK)

2016-08-31 Thread Tero Kivinen
this might be the right group. If there is an unknown number of open > questions to be answers, it might not. I think the current draft mostly already answers to the questions, and I do not think there are that many open issues with it. > > Am 31.08.2016 um 13:57 schrieb Tero Ki

Re: [IPsec] Mirja Kühlewind's Block on charter-ietf-ipsecme-10-00: (with BLOCK)

2016-08-31 Thread Tero Kivinen
Mirja Kuehlewind (IETF) writes: > thanks for providing the reference to the draft. That was very > helpful and confirmed my initial assumption that you don’t want to > ‚change‘ TCP. So this work seems to be fine in this group, however, > the wording in the charter is very misleading. What's about

[IPsec] RFC4307bis and RFC7321bis: summary of changes

2016-09-09 Thread Tero Kivinen
Both of them still miss the summary of changes since 4307 and and 7321 sections. Now when we hopefully have agreed on what changes are going to make, so we might want to add summaries: -- Algorithms mentioned in the RFC4307

Re: [IPsec] Interoperability problem concerning RFC 7427

2016-10-05 Thread Tero Kivinen
Paul Wouters writes: > I'm really against this solution. As you said, we can expect more of > this with ECC variants, and it will just be a large cluttering of the > integ registry. Do you really think we will see this more in ECC? How will that happen more in the ECC? If I have Ed25519 key, why

Re: [IPsec] Interoperability problem concerning RFC 7427

2016-10-05 Thread Tero Kivinen
Valery Smyslov writes: > The reasons can be various. For example, after wide adoption > of EdDSA some vulnerability is found in the scheme and some > modifications are introduced to eliminate it (analogously to If there would be vulnerability in the signature scheme, I think we would say you

[IPsec] Call for adoptation of draft-nir-ipsecme-eddsa-01 as an IPsecME WG document

2016-10-06 Thread Tero Kivinen
I think this document is still waiting for curdle to finalize the OIDs, but otherwise I think it is in good shape, so we should adopt this document for WG document now, so we can go forward when curdle gets its document ready. So this is 2 week call for adoptation of the

[IPsec] Interoperability problem concerning RFC 7427

2016-10-04 Thread Tero Kivinen
[This is bit old email, but I have not seen any replies to this, and I am sending this as implementor not as chair.] Valery Smyslov writes: > The problem is that RFC7427 doesn't provide any means to find out > what kind of signatures peer supports. If you have RSA certificate, > you need somehow

Re: [IPsec] WGLC on draft-ietf-ipsecme-rfc4307bis-11

2016-09-15 Thread Tero Kivinen
Paul Wouters writes: > > Section 4.2 > > > > | RSASSA-PSS with Empty Parameters | MUST NOT | | > > | RSASSA-PSS with Default Parameters | MUST NOT | | > > > > Well, I'm a confused with these requirements. As far as I > > understand the RSASSA-PSS parameters default

[IPsec] Ben Campbell's No Objection on charter-ietf-ipsecme-10-02: (with COMMENT)

2016-09-15 Thread Tero Kivinen
Ben Campbell writes: > -- > COMMENT: > -- > > The milestones are all in the past. Should 2016 be 2017? Also, I notice > the milestone list does not cover the

[IPsec] IPsecME Status update 2016-08-26

2016-08-26 Thread Tero Kivinen
Charter update New version posted to list 2016-07-20, no objection in list, should go forward, on the 2016-09-01 IESG telechat. Document Status: - draft-ietf-ipsecme-ddos-protection (David) WGLC should be done, ready to go forward. - draft-ietf-ipsecme-rfc4307bis (David) Should be

[IPsec] Working group Last call for draft-ietf-ipsecme-safecurves

2016-08-26 Thread Tero Kivinen
Tero Kivinen writes: > Now when we have new version of the draft-ietf-ipsecme-safecurves, so > I will now start two week working group last call (WGLC) for > draft-ietf-ipsecme-safecurves-03 [1]. > > Please send your comments, questions etc to the WG mailing list before >

[IPsec] Flexible multi-factor authentication

2016-09-29 Thread Tero Kivinen
Wang Jian writes: > The MFA we finally implemented is like > > 1. Users first authenticate themselves with username & password I.e., some suitable EAP method. > 2. according to the user's security group, another OTP authentication > step is needed or not. For users that OTP is needed, OTP >

Re: [IPsec] [saag] trapdoor'ed DH (and RFC-5114 again)

2016-10-18 Thread Tero Kivinen
Yoav Nir writes: > I’m not entirely comfortable with calling something a MUST NOT when all we > have is conjecture, but I have no love and no need of those DH groups. Same here, and it also makes it so that we cannot say our implementation is conforming rfc4307bis, even when we do already have

Re: [IPsec] [saag] trapdoor'ed DH (and RFC-5114 again)

2016-10-18 Thread Tero Kivinen
Yoav Nir writes: > > Same here, and it also makes it so that we cannot say our > > implementation is conforming rfc4307bis, even when we do already have > > support for AES, SHA2, 2048-bit DH, i.e. all the mandatory to > > implement algorithms in the new document, but we do also have code to > >

[IPsec] IKE and SCTP IPsec support (RFC3554) ?

2016-11-23 Thread Tero Kivinen
Paul Wouters writes: > Has anyone done support for SCTP in IKEv2 ? (or even in IKEv1?) > > If so, how are the SA's negotiated? a matrix of src/dst addresses > as seperate CREATE_CHILD_SA's ? Or multiple traffic selector payloads > in a single CHILD SA? > > It seems IKEv1 ID_LIST is not present

[IPsec] IETF97 meeting raw notes

2016-11-15 Thread Tero Kivinen
Paul Wouters writes: > Tero: Agenda talk > Tero: ddos and safecurves in AUTH48 ... Thanks for writing the minutes. I cleaned them up a bit, and posted them the datatracker. If there are any more comments or corrections to the minutes, please send them to me. Minutes can be found from the end of

Re: [IPsec] Take a stand for key hygine

2016-11-17 Thread Tero Kivinen
Watson Ladd writes: > I might be confused, but the slides in > https://www.ietf.org/proceedings/97/slides/slides-97-ipsecme-signature-forms-ambiguity-in-ikev2-00.pdf > seem to very clearly want something else. Apologies for my > insufficient context inclusion. Yes, with RSA I think it might be

[IPsec] IPsecME status update 2016-10-28

2016-10-28 Thread Tero Kivinen
Agenda of IETF 97, Seoul posted: Tuesday, November 15, 2016 13:30-15:30 Tuesday Afternoon session I - Agenda bashing, adminstrivia - Chairs (5 min) - Status of ready WG drafts - Chairs (5 min) (ddos-protection, safecurves, rfc4307bis, rfc7321bis)

Re: [IPsec] FW: Quantum Resistance Requirements

2016-10-31 Thread Tero Kivinen
Michael Richardson writes: > > - Authentication; if someone with a Quantum Computer can break the DH > > in real time, do we care if he can act as a man-in-the-middle? Scott > > Fluhrer: not important Michael Richardson: important, provided that we > > don't run into the same

[IPsec] Stephen Farrell's Yes on draft-ietf-ipsecme-safecurves-05: (with COMMENT)

2016-10-13 Thread Tero Kivinen
Stephen Farrell writes: > Stephen Farrell has entered the following ballot position for > draft-ietf-ipsecme-safecurves-05: Yes > > -- > COMMENT: > -- > - Sorry

Re: [IPsec] Quantum Resistant IKEv2

2016-12-08 Thread Tero Kivinen
Valery Smyslov writes: > CREATE_CHILD_SA exchange and rekey the IKE SA using PPK. But > CREATE_CHILD_SA doesn’t allow to exchange identities. So, if > pseudonyms were used in IKE_AUTH, how are you going to exchange real > identities? Real IDs are never exchanged over wire. The server sees

Re: [IPsec] RFC4301, rfc7321bis and Manual keys

2016-12-08 Thread Tero Kivinen
Paul Wouters writes: > >> If we assume rfc7431bis can be used with manual keys too, we need to add > >> some more text saying these ciphers cannot be used with manual keys. > > >> Anyways, I think it should be time to mark manual keys as SHOULD NOT. > > While I agree, I don't think 7321bis

Re: [IPsec] Quantum Resistant IKEv2

2016-12-08 Thread Tero Kivinen
Michael Richardson writes: > > o Valery Smyslov gave a suggestion that we instead stir in the PPK > > into the initial SK_d; as all keying material is generated based on > > that, this would also mean that IPsec SAs and any child IKE SAs are > > also protected. This also means that

[IPsec] Working group last call for the draft-ietf-ipsecme-tcp-encaps

2017-01-11 Thread Tero Kivinen
This message will start two week working group last call for the draft-ietf-ipsecme-tcp-encaps-04 [1] draft. Please send your comments, questions etc to WG mailing list before 2017-01-29. If you belive that the document is ready to be submitted to the IESG for consideration as a standard track

[IPsec] Review of the draft-ietf-ipsecme-tcp-encaps-04

2017-01-11 Thread Tero Kivinen
This draft should be quite ready for the WGLC, so I will start that shortly, but here are comments from my chair review of the draft. Consider these comments just like any WGLC comments. -- In section 6, there is text saying: In order to close an IKE session, either the initiator or

Re: [IPsec] Review of the draft-ietf-ipsecme-tcp-encaps-04

2017-01-12 Thread Tero Kivinen
Valery Smyslov writes: > > Initiator then recreates tcp session with responder and sends some ESP > > traffic with sequence numbers of 0x1001-0x1005. Attacker kills that > > TCP connection, creates completely new TCP session and replays the old > > ESP message with sequence number of 0x1000 (which

Re: [IPsec] Review of draft-pauly-ipsecme-split-dns-02

2017-01-12 Thread Tero Kivinen
Valery Smyslov writes: > > > > This way if you have originally configured company1.com to the > > > > internal dns names, and then company decides to buy another company > > > > called company2.com, teh client can still request company1.com and > > > > server can return both company1.com and

Re: [IPsec] Review of the draft-ietf-ipsecme-tcp-encaps-04

2017-01-12 Thread Tero Kivinen
Valery Smyslov writes: > > This should be happening anyways, as there will not be reordering happening > > inside the TCP connection, so this will not cause issues for normal > > cases. > > > > Same for the IKE SA, i.e. the message-id must be larger than anything > > seen before, not just

[IPsec] Review of draft-ietf-ipsecme-rfc7321bis-01

2017-01-12 Thread Tero Kivinen
Timothy Carlin writes: > My comments: > > * Section 4 mentions that that 256-bit keys are raised to the SHOULD level.  > Should this read as these are now the MUST level as ENCR_AES_CBC and > ENCR_AES_GCM_16 are at the MUST level according to Table 1 (with the [1] > endnote)? Yes, I think this

Re: [IPsec] Review of draft-pauly-ipsecme-split-dns-02

2017-01-12 Thread Tero Kivinen
Valery Smyslov writes: > > This way if you have originally configured company1.com to the > > internal dns names, and then company decides to buy another company > > called company2.com, teh client can still request company1.com and > > server can return both company1.com and company2.com in its

Re: [IPsec] Review of the draft-ietf-ipsecme-tcp-encaps-04

2017-01-13 Thread Tero Kivinen
Valery Smyslov writes: > > > > Initiator then recreates tcp session with responder and sends some ESP > > > > traffic with sequence numbers of 0x1001-0x1005. Attacker kills that > > > > TCP connection, creates completely new TCP session and replays the old > > > > ESP message with sequence number

Re: [IPsec] Review of draft-pauly-ipsecme-split-dns-02

2017-01-13 Thread Tero Kivinen
Paul Wouters writes: > > Yes, and No. If the client rejects the INTERNAL_DNS_DOMAIN because of > > policy reasons, then it is not internal name anymore, thus it can use > > DNS server configured elsewhere. But yes, I agree there should be > > clarification explaining that only those internal names

Re: [IPsec] Review of the draft-ietf-ipsecme-tcp-encaps-04

2017-01-13 Thread Tero Kivinen
Tommy Pauly writes: > This MUST should probably be downgraded to a SHOULD, and add > explanation about the reuse case. The point of this text was to make > sure that initiators don’t needlessly leave TCP connections open to > responders, and take up resources on the responder. A better text >

Re: [IPsec] Quantum Resistant IKEv2

2016-12-30 Thread Tero Kivinen
Michael Richardson writes: > > This has the issue that differences in the PPK will not be detected, > > i.e., if PPKs are mismatched because of configuration error, we do get > > IKEv2 SA up and running, and we create IPsec Child SAs without errors, > > but then all traffic in

Re: [IPsec] Quantum Resistant IKEv2

2016-12-30 Thread Tero Kivinen
Michael Richardson writes: > > If server side identity protection is also needed, then server side IDr > > would also be similar pseudonym, but that would require server to keep > > track of which IDr was given to which client, and pick suitable IDr > > based on the IDi coming in.

Re: [IPsec] Quantum Resistant IKEv2

2017-01-02 Thread Tero Kivinen
Michael Richardson writes: > > Tero Kivinen <kivi...@iki.fi> wrote: > > That is why I think it is important that we do detect the failures > > correctly. > > >> > SK_d provides quantum resistance for the IPsec SAs and Child IKE > &

Re: [IPsec] Quantum Resistant IKEv2

2016-12-29 Thread Tero Kivinen
Scott Fluhrer (sfluhrer) writes: > o There is the option listed in the draft, where we modify both the KEYMAT > and SKEYSEED computations; stirring it into the KEYMAT implies that the IPsec > SAs are generated with QR-resistant keying material, while stirring it into > the SKEYSEED implies that

Re: [IPsec] Quantum Resistant IKEv2

2016-12-29 Thread Tero Kivinen
Valery Smyslov writes: > Hi Tero, > > > > CREATE_CHILD_SA exchange and rekey the IKE SA using PPK. But > > > CREATE_CHILD_SA doesn’t allow to exchange identities. So, if > > > pseudonyms were used in IKE_AUTH, how are you going to exchange real > > > identities? > > > > Real IDs are never

[IPsec] Review of draft-pauly-ipsecme-split-dns-02

2017-01-10 Thread Tero Kivinen
This document was marked as "waiting for more reviews before taking as WG draft", so I did my review now. Here are my comments: -- In the section 1 there is text: The client device can use the internal DNS

[IPsec] RFC4301, rfc7321bis and Manual keys

2016-12-07 Thread Tero Kivinen
The RFC4301 requires support for manual keys (section 4.5), but I hope nobody really uses them. The rfc7321bis provides mandatory to implement algorithms for the IKEv2 use, and does not really specifically cover manual keys cases, but it does not really say that manual keyed SAs are out of scope

Re: [IPsec] Review of draft-pauly-ipsecme-split-dns-02

2017-03-23 Thread Tero Kivinen
Paul Wouters writes: > > When an IPsec connection is terminated, the DNS forwarding must be > > unconfigured. The DNS forwarding itself MUST be be deleted. All > > cached data of the INTERNAL_DNS_DOMAIN provided DNS domainis MUST be > > flushed. This includes negative cache entries.

Re: [IPsec] Ben Campbell's Yes on draft-ietf-ipsecme-rfc7321bis-05: (with COMMENT)

2017-03-23 Thread Tero Kivinen
Paul Wouters writes: > > -3: I wonder why "... is not to be used..." is not "... MUST NOT be > > used...". But the section goes on to say if you do it anyway, you MUST > > NOT use certain cryptosuites. So, does "... is not to be used..." mean > > "SHOULD NOT"? Or is this one of those "MUST NOT BUT

Re: [IPsec] AD review of draft-ietf-ipsecme-tcp-encaps

2017-03-28 Thread Tero Kivinen
Kathleen Moriarty writes: > Sorry I dropped the ball. I can start IETF last call, but since we > are in IETF week, should it be extended a week? Yes, I think extending it by a week would be better. -- kivi...@iki.fi ___ IPsec mailing list

[IPsec] [Lwip] Number of fixed SPI

2017-03-26 Thread Tero Kivinen
Daniel Migault writes: > For unicast communications, a single SPI can be used over multiple > nodes as long as the remote peer, as long as both nodes uses IP > addresses and SPI to index the SAs. With the transport mode, the > number of SPI is equivalent to the number of hosts, while with > tunnel

[IPsec] IPsecME document status

2017-03-29 Thread Tero Kivinen
Here is the current status of the working group documents: -- Document Status: - draft-ietf-ipsecme-rfc4307bis (David) Approved. Revised ID already done. - draft-ietf-ipsecme-rfc7321bis (David) Approved. Revised ID needed.

[IPsec] Starting two week working group adoptation call for draft-mglt-ipsecme-implicit-iv

2017-03-29 Thread Tero Kivinen
As discussed in the meeting, we are starting two week working group adoptation call for the draft-mglt-ipsecme-implicit-iv. Please read the draft and send your comments to this list, and also tell if you support adoptation of this draft as WG draft. The document is available at

[IPsec] Preleminary minutes of the IPsecME meeting

2017-03-29 Thread Tero Kivinen
Here are the preliminary minutes of the IPsecME meeting in Chicago. Send corrections, and additions etc to me. Thanks to Michael and Tommy for taking the minutes. -- IPSECme meeting. IETF98. Tero and David as Chairs. Room

[IPsec] Quantum Resistance SK_d, SK_pi, SK_pr etc mixing

2017-03-29 Thread Tero Kivinen
So I have proposed earlier that we should mix the ppk to SK_d, SK_pi, and SK_pr, i.e., something like this: SKEYSEED = prf(Ni | Nr, g^ir) {SK_d' | SK_ai | SK_ar | SK_ei | SK_er | SK_pi' | SK_pr'} = prf+ (SKEYSEED, Ni | Nr | SPIi | SPIr) If no

Re: [IPsec] Quantum Resistance SK_d, SK_pi, SK_pr etc mixing

2017-04-04 Thread Tero Kivinen
Valery Smyslov writes: > > Modifying the SK_pi, and SK_pr will mean that if the PPK is wrong the > > IKEv2 authentication will fail, and we will get exactly same failure > > for wrong PPK than we do with wrong shared key or digital signature > > failures. This means that attacker do not gain any

Re: [IPsec] Quantum Resistance SK_d, SK_pi, SK_pr etc mixing

2017-04-04 Thread Tero Kivinen
[Not wearing any hats] Scott Fluhrer (sfluhrer) writes: > - Move the notifies to the prior messages (that is, in the clear). > If we do this, then by the time we derive keys, we know whether > we're using a PPK (even if the responder doesn't know which one it > is until it hears the initiator's

Re: [IPsec] Quantum Resistance SK_d, SK_pi, SK_pr etc mixing

2017-04-06 Thread Tero Kivinen
Valery Smyslov writes: > Hi Tero, > > > I.e., when you configure node A for PPK use, you need to give node A > > all the PPKs for all peers it has. I.e., the configuration loaded on > > the node A needs to provide all PPKs it will need. > > If node A is mostly an initiator (e.g. a remote access

[IPsec] draft-ietf-ipsecme-eddsa-01 pre-hash SHOULD NOT or MUST NOT

2017-04-05 Thread Tero Kivinen
Now the pre-hash algorithms are SHOULD NOT: The pre-hashed versions of Ed25519 and Ed448 (Ed25519ph and Ed448ph respectively) SHOULD NOT be used in IKE. I think we could say MUST NOT be used. I.e, say that pre-hash versions MUST NOT be used, and that Ed25519 and Ed448 MUST be used with

Re: [IPsec] Quantum Resistance SK_d, SK_pi, SK_pr etc mixing

2017-04-10 Thread Tero Kivinen
Michael Richardson writes: > > Tero Kivinen <kivi...@iki.fi> wrote: > > Scott Fluhrer (sfluhrer) writes: > >> Going through this suggestion (and tweaking it a bit): > >> > >> Pluses: - I believe it can be made a bit more flexible th

Re: [IPsec] Quantum Resistance SK_d, SK_pi, SK_pr etc mixing

2017-04-13 Thread Tero Kivinen
Scott Fluhrer (sfluhrer) writes: > I've been pondering another question, and I think I'll bring it up > before finalizing the next version of the draft. > > After the WG meeting, we (Tero and myself) met in the hallway and > had a little chat. One of the things that I took away from it (and >

Re: [IPsec] Can IPSec (RFC 5996) support tunnels with end point being (virtual) CPEs which has a set of workload attached (say Virtual Machines) all having virtual IP addresses?

2017-04-18 Thread Tero Kivinen
Michael Richardson writes: > linda> Is the "INTERNAL_IP4_ADDRESS" in RFC5996 intended for establishing > linda> IPSec tunnel between remote VMs behind NAPT (all VMs have the virtual > linda> IP address)? > This is used when transport mode is used through a NAPT. > It doesn't apply to tunnel mode.

Re: [IPsec] Quantum Resistance SK_d, SK_pi, SK_pr etc mixing

2017-04-05 Thread Tero Kivinen
Paul Wouters writes: > On Tue, 4 Apr 2017, Tero Kivinen wrote: > > > N(PPK_SUPPORTED) --> > > > For example if the PPKs are taken from the 1GB one-time-pad file > > shared by the peers (one file per user), then the ppk_id could simply > > be 32-bit offs

Re: [IPsec] Quantum Resistance SK_d, SK_pi, SK_pr etc mixing

2017-04-05 Thread Tero Kivinen
Scott Fluhrer (sfluhrer) writes: > Going through this suggestion (and tweaking it a bit): > > Pluses: > - I believe it can be made a bit more flexible than you make it out; > it don't believe that you actually need to update every node with > every PPK at the start. With this protocol, the

Re: [IPsec] Quantum Resistance SK_d, SK_pi, SK_pr etc mixing

2017-04-06 Thread Tero Kivinen
Scott Fluhrer (sfluhrer) writes: > With your idea, there are three steps (and so the admin would update > each node in the network twice): > > - Step 0 is "never use PPKs"; we're running the standard IKE protocol. > - Step 1 is "if we're the initiator, then use PPKs if the responder >

Re: [IPsec] Proposed method to achieve quantum resistant IKEv2

2017-08-14 Thread Tero Kivinen
Michael Richardson writes: > I don't think we need to do this. > I think that unknown transform types will be ignored by compliant > implementations. Nope. It will ignore unknown transform IDs for each known transform type, but it MUST understand each transform type, and if it does not understand

Re: [IPsec] Proposed method to achieve quantum resistant IKEv2

2017-08-14 Thread Tero Kivinen
Daniel Van Geest writes: > 1) QS SA Negotiation > > When negotiating a QS SA, it’s not enough to negotiate QS key > agreement algorithm(s), one also has to ensure that the algorithms > selected by the other transform types are also QS. All of these kind of issues are really policy matters, thus

[IPsec] draft-abad-i2nsf-sdn-ipsec-flow-protection

2017-07-18 Thread Tero Kivinen
Valery Smyslov writes: > I'm very much concerned with the IKE-less option presented in the > draft. > > First, the Network Controller becomes a very attractive target for > attacks in this case, since an attacker, if attack is successful, > will gain all the keys for the whole system. And it is

Re: [IPsec] [I2nsf] draft-abad-i2nsf-sdn-ipsec-flow-protection

2017-07-19 Thread Tero Kivinen
Rafa Marin-Lopez writes: > I.e. any TLA would love to get their hands on all the traffic keys in > one location, and then be able to decrypt any traffic going inside any > of the IPsec tunnels. > > If controller only has the PSKs or similar to do the authentication >

[IPsec] Preliminary minutes of the IETF 99 IPsecME meeting

2017-07-21 Thread Tero Kivinen
Here are the minutes of the meeting (thanks Yaron), if you have fixes, additions etc to them send them to me. I will post these to the meeting materials next week. -- Minutes of the IETF 99 IPsecME WG meeting Prague 2017-07-21.

[IPsec] [Technical Errata Reported] RFC7296 (5056)

2017-06-30 Thread Tero Kivinen
RFC Errata System writes: > The following errata report has been submitted for RFC7296, > "Internet Key Exchange Protocol Version 2 (IKEv2)". > > -- > You may review the report below and at: > http://www.rfc-editor.org/errata/eid5056 > >

Re: [IPsec] Mirja Kühlewind's Discuss on draft-ietf-ipsecme-tcp-encaps-09: (with DISCUSS)

2017-04-26 Thread Tero Kivinen
Tommy Pauly writes: > > -- > > DISCUSS: > > -- > > > > This draft suggests that ports that are assigned to other services can > > simply be used. This is not

[IPsec] Ben Campbell's Discuss on draft-ietf-ipsecme-tcp-encaps-09: (with DISCUSS and COMMENT)

2017-04-26 Thread Tero Kivinen
Ben Campbell writes: > -- > COMMENT: > -- > > Substantive Comments: > > -3, first paragraph: > Are people confident there will never, ever be a need to demux

Re: [IPsec] informal ports and transport review of ipsecme-cha...@tools.ietf.org

2017-04-26 Thread Tero Kivinen
Paul Wouters writes: > On Tue, 25 Apr 2017, Joe Touch wrote: > > Every bit pattern, including those using magic numbers, is already > > owned and under the control of each assigned port. It is not > > appropriate for any new service to hijack that pattern as having a > > different meaning UNLESS

Re: [IPsec] Mirja Kühlewind's Discuss on draft-ietf-ipsecme-tcp-encaps-09: (with DISCUSS)

2017-04-27 Thread Tero Kivinen
Eric Rescorla writes: > AFAICT there are two separate issues: > > - The use of 4500, which, as Tero says, we can just update the registry to > point to this document for. > - The use of 443, which seems more complicated Yes. > WRT 443, I would assert the following facts: > > - It's not

Re: [IPsec] Mirja Kuehlewind's Discuss on draft-ietf-ipsecme-tcp-encaps-09: (with DISCUSS)

2017-04-27 Thread Tero Kivinen
Spencer Dawkins at IETF writes: > The reason optional ports in URIs work, is that someone handed you a URI with > that port number who has some reason to believe that the port number is OK to > use with the host included in the URI. > > Is that a reasonable assumption about the way IPsec and IKE

Re: [IPsec] Mirja Kuehlewind's Discuss on draft-ietf-ipsecme-tcp-encaps-09: (with DISCUSS)

2017-04-27 Thread Tero Kivinen
Mirja Kühlewind writes: > > I agree that this kind of port squatting is regrettable, but I also don't > > think it really > > helps to not publish RFCs that document widely used protocols because we > > are sad they port-squatted. > > > > I proposed a way to deal with this in an earlier e-mail.

Re: [IPsec] Ben Campbell's Discuss on draft-ietf-ipsecme-tcp-encaps-09: (with DISCUSS and COMMENT)

2017-04-27 Thread Tero Kivinen
Ben Campbell writes: > > > On Apr 26, 2017, at 6:06 AM, Tero Kivinen <kivi...@iki.fi> wrote: > > > > Ben Campbell writes: > >> ---

Re: [IPsec] ipsecme - New Meeting Session Request for IETF 99

2017-04-24 Thread Tero Kivinen
Linda Dunbar writes: > Can you add I2NSF to the "Conflict to Avoid" list? Seems, I can't do that, when I try I get "The page you were looking for coundn't be found" error... Ah, found another route which gave me correct url. Added now... And next I need to write a ticket about the wrong url...

Re: [IPsec] Proposed method to achieve quantum resistant IKEv2

2017-08-09 Thread Tero Kivinen
Valery Smyslov writes: > It is not clear for me (and I raised this concern in Prague) why do > you use QSKE as an additional Key Exchange mechanism instead of > replacing DH KE with it? We’ve been being told by cryptographers > that conventional public key cryptography won’t provide security in >

Re: [IPsec] Proposed method to achieve quantum resistant IKEv2

2017-08-09 Thread Tero Kivinen
Cen Jung Tjhai writes: >>And I think if the IKE_SA_INIT messages grow too large with QSKE, >>then it’s better to develop generic fragmentation mechanism for >>IKE_SA_INIT, rather than making it specific for fragmenting QSKE >>blobs. Generic mechanism would allow to reuse it in case we’ll have >>to

[IPsec] draft-fluhrer-qr-ikev2 AUTH issue

2017-08-17 Thread Tero Kivinen
Paul Wouters writes: > Received PPK_SUPPORT Have PPK PPK MandatoryAction > -- > Yes No *Standard IKE protocol > Yes Yes *Include

Re: [IPsec] Question about ipsecme-tcp-encaps

2017-05-18 Thread Tero Kivinen
Tommy Pauly writes: > However: > a) That’s in a paragraph that starts “If a TCP connection is being > used to resume a previous IKE session…”; does it apply only in that case? > > No, the MUST close applies for all connections, regardless of resumption. We > could add a paragraph

Re: [IPsec] Question about ipsecme-tcp-encaps

2017-05-18 Thread Tero Kivinen
Yoav Nir writes: > But since Tommy’s happy with tearing down the connection after one invalid > SPI, that solves the problem nicely. I do not think we want to do that. There are valid cases where we might get unknown SPIs, so tearing connection down after one of those is not good solution. > By

Re: [IPsec] Mirja Kuehlewind's Discuss on draft-ietf-ipsecme-tcp-encaps-09: (with DISCUSS)

2017-05-02 Thread Tero Kivinen
Tommy Pauly writes: > I'll defer to Tero on this one. Tero, what do you prefer to do with the IANA > Considerations text? [Note, that I am just talking as individual here, these IANA actions do not relate the IKEv2 registries where I am IANA Expert] I proposed to change both the UDP and TCP

Re: [IPsec] Mirja Kuehlewind's Discuss on draft-ietf-ipsecme-tcp-encaps-09: (with DISCUSS)

2017-05-03 Thread Tero Kivinen
Mirja Kuehlewind (IETF) writes: > my thinking was that the main problem is that 3947 was not obsoleted > and I’m assuming we need a document to fix that. This is partly issue, but it is not issue we need to solve here, as this document is not something that should obsolete 3947. Also 3947 only

Re: [IPsec] Mirja Kuehlewind's Discuss on draft-ietf-ipsecme-tcp-encaps-09: (with DISCUSS)

2017-05-02 Thread Tero Kivinen
Mirja Kuehlewind (IETF) writes: > so first updating is a request to IANA, so you have to remove the > first sentence. Agreed, forgot to remove that. > Then the update of the UPD port should probably be done in a > separate document that potentially also obsoletes 3947 if that was > missed with

Re: [IPsec] [Technical Errata Reported] RFC5282 (5109)

2017-09-12 Thread Tero Kivinen
Black, David writes: > Well, RFC 5282 actually prohibits the responder from selecting that > combination, but requiring separate proposals for combined-mode and normal > ciphers is a cleaner and simpler approach. Yes, and RFC5996 restricted that even more, saying that you need to use separate

Re: [IPsec] IANA IKEv2 parameters, encryption type=17

2017-10-02 Thread Tero Kivinen
Paul Wouters writes: > > for 8, 12, 16 octet versions came to be 18, 19, and 20, and the number > > 17 which was most likely allocated for the 4 octet ICV was marked as > > reserved. > > Except it is marked unassigned, not reserved. So one could use this > number in the future. I for sure have

<    2   3   4   5   6   7   8   9   10   11   >