RFCs 4753 and 5114 provide vague recommendations for choice of 
Diffie-Hellman group relative to symmetric key sizes.  They don't 
specifically address how to look at a set of chosen SA encryption and 
authentication algorithms and arrive at a choice of suitable 
Diffie-Hellman group, nor do they address the use of PFS.  So:

1) For the IKE SA, the Diffie-Hellman operation generates two encryption 
and two authentication keys.  Should the Diffie-Hellman strength generally 
be equivalent to the longest key length, or to the sum of the key lengths? 
 If we sum up all four symmetric key lengths, most choices will exceed the 
strength provided by the currently available Diffie-Hellman groups.  But 
if we don't sum up the symmetric key lengths, then we are making 
Diffie-Hellman the weakest link in the chain (i.e., we aren't obtaining 
significant added value by generating different values for each of SK_ei, 
SK_er, SK_ai, SK_ar).  Which is the case?

1b) In any case, we don't have suitable Diffie-Hellman groups for use with 
HMAC-SHA2-384 and HMAC-SHA2-512.  Interestingly, the upcoming NIST and DoD 
standards push into the realm of 256-bit symmetric algorithms 
(HMAC-SHA2-256) with SHOULD+ or MUST, but for Diffie-Hellman only into the 
realm of 112 bits (NIST makes group 24 a MUST) or 128 bits (DoD makes 
group 19 a MUST).  Do the folks from DoD or NIST have any comments on this 
disparity?

2) If we are recommending parity between symmetric algorithms and DH group 
choice, is there any place that we are also recommending the use of 
perfect forward secrecy to guard against weaknesses there?  Not using 
perfect forward secrecy goes even further to make the Diffie-Hellman the 
weakest link in the chain.  And yet RFC 4308 does not require PFS, and 
NIST's own RFC 4869 doesn't even mention it.  Do the folks from NIST have 
any comments on why PFS is not mandated, let alone mentioned, in RFC 4869?

3) IKEv2 does not allow perfect forward secrecy for the first child SA. 
Similar to question 1 above, how does that play into the recommendation 
for DH group size to choose?  Admittedly, there probably isn't much lost 
if the IKE SA keys are compromised.  So should we look only at the child 
SA symmetric key sizes when considering what IKE SA DH group is 
appropriate?  Or should we sum up the IKE and child SA symmetric key 
lengths?

Thanks,


Scott Moonen (smoo...@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://scott.andstuff.org/
http://www.linkedin.com/in/smoonen
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to