RFCs 4753 and 5114 provide vague recommendations for choice of
Diffie-Hellman group relative to symmetric key sizes. They don't
specifically address how to look at a set of chosen SA encryption and
authentication algorithms and arrive at a choice of suitable
Diffie-Hellman group, nor do they address the use of PFS. So:
1) For the IKE SA, the Diffie-Hellman operation generates two encryption
and two authentication keys. Should the Diffie-Hellman strength generally
be equivalent to the longest key length, or to the sum of the key lengths?
If we sum up all four symmetric key lengths, most choices will exceed the
strength provided by the currently available Diffie-Hellman groups. But
if we don't sum up the symmetric key lengths, then we are making
Diffie-Hellman the weakest link in the chain (i.e., we aren't obtaining
significant added value by generating different values for each of SK_ei,
SK_er, SK_ai, SK_ar). Which is the case?
1b) In any case, we don't have suitable Diffie-Hellman groups for use with
HMAC-SHA2-384 and HMAC-SHA2-512. Interestingly, the upcoming NIST and DoD
standards push into the realm of 256-bit symmetric algorithms
(HMAC-SHA2-256) with SHOULD+ or MUST, but for Diffie-Hellman only into the
realm of 112 bits (NIST makes group 24 a MUST) or 128 bits (DoD makes
group 19 a MUST). Do the folks from DoD or NIST have any comments on this
disparity?
2) If we are recommending parity between symmetric algorithms and DH group
choice, is there any place that we are also recommending the use of
perfect forward secrecy to guard against weaknesses there? Not using
perfect forward secrecy goes even further to make the Diffie-Hellman the
weakest link in the chain. And yet RFC 4308 does not require PFS, and
NIST's own RFC 4869 doesn't even mention it. Do the folks from NIST have
any comments on why PFS is not mandated, let alone mentioned, in RFC 4869?
3) IKEv2 does not allow perfect forward secrecy for the first child SA.
Similar to question 1 above, how does that play into the recommendation
for DH group size to choose? Admittedly, there probably isn't much lost
if the IKE SA keys are compromised. So should we look only at the child
SA symmetric key sizes when considering what IKE SA DH group is
appropriate? Or should we sum up the IKE and child SA symmetric key
lengths?
Thanks,
Scott Moonen (smoo...@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://scott.andstuff.org/
http://www.linkedin.com/in/smoonen
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec