John Mattsson writes: > Tero Kivinen wrote: > > > and doing Diffie-Hellman for each of them would be too costly > > I agree that was true in the past. Do you think that is still the > case for an optimized implementation of modern algorithms running on > new CPUs? As I wrote in draft-mattsson-tls-psk-ke-dont-dont-don’t:
I do not think it was true even in the past, but router and gateway vendors have always claimed so.. On the other hand they do use very slow hardware on some of thier platforms, so it is true on those environments. Anyways as there has been requests for such feature, then IPsec leaves that decision to the policy, i.e., if your policy requires PFS for each IPsec SA, then IKE will do Diffie-Hellman for each IPsec SA creation, rekey etc. If your policy allows creating or rekeying IPsec SAs without Diffie-Hellman that is possible too, and there are use cases for that too. Things start to look different when you have gateways which have thousads of connections and each of them have thousands of IPsec SAs etc. One of the reason implementations create multiple IPsec SAs is to allow high bandwidth operations i.e., having separate IPsec SA for each cpu-core, and for each separate traffic class. The IPsec SAs there are not independent, as traffic is divided over them using selectors that have nothing to do with security policy. Thus each of those IPsec SAs sharing one long term secret to protect them all does not really matter, as they really are one just IPsec SA split to multiple beacuse of technical reasons.. Then when they want to provide security boundary in time, they will rekey the IKE SA and do Diffie-Hellman there, and then rekey all IPsec SAs using that new IKE SA without using Diffie-Hellman. If they do this every hour or so, then breaking that one IKE SA Diffie-Hellman will allow attacker to see traffic transmitted within that hour, exactly like if all the traffic would have been transmitted using single IPsec SA which is rekeyed every hour with Diffie-Hellman. -- kivi...@iki.fi _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu