Thanks, Paul, Sean.

What's the next step?  If there's agreement that we need a new RFC, I'd be 
glad to pitch in with the effort.


Scott Moonen (smoo...@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://scott.andstuff.org/
http://www.linkedin.com/in/smoonen



From:
Paul Hoffman <paul.hoff...@vpnc.org>
To:
"Sean Kevin O'Keeffe" <s...@stratussolutions.com>
Cc:
ipsec@ietf.org
Date:
07/02/2009 10:13 PM
Subject:
Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.



At 9:46 PM -0400 7/2/09, Sean Kevin O'Keeffe wrote:
>We need to differentiate between the values transmitted over the
>wire between IKEv2 peers, and the value they used as a seed to
>derive keying material.

The fact that they're different seems needlessly error-prone.

>I think the KE payload examples are correct in 8.1.  The peers need
>both coordinates to compute the derived point. However, they only
>need to use the x coordinate of this point as the shared secret.

Correct; that's what Scott was referring to when he started this thread.

>In the context of the example in 8.1, I interpreted the errata as
>changing the last sentence in the section to:
>   "girx is the value that is used in the formation of SKEYSEED."

This might make sense, but it still completely disagrees with examples 
given. Look at the end of 8.1:
-----------------------
   The shared secret value g^ir=(girx,giry) where

girx:
 D6840F6B 42F6EDAF D13116E0 E1256520 2FEF8E9E CE7DCE03 812464D0 4B9442DE

giry:
 522BDE0A F0D8585B 8DEF9C18 3B5AE38F 50235206 A8674ECB 5D98EDB2 0EB153A2

   These are concatenated to form

g^ir:
 D6840F6B 42F6EDAF D13116E0 E1256520 2FEF8E9E CE7DCE03 812464D0 4B9442DE
 522BDE0A F0D8585B 8DEF9C18 3B5AE38F 50235206 A8674ECB 5D98EDB2 0EB153A2

   This is the value that is used in the formation of SKEYSEED.
------------------------

Doesn't that say "the concatenated values is used in the formation of 
SKEYSEED"?


>I'm aware of several implementations that comply with this errata,

This might be true, but it doesn't follow from the RFC, or from the 
errata. The fact that several implementations agreed after testing with 
each other is cause to update the RFC.

>so I think a decision to withdraw it requires careful deliberation.

Absolutely. It would be much better to, instead, obsolete this RFC with 
one that matches what the implementations are doing, noting the difference 
in the new RFC.

>That being said, this issue needs to be clearly resolved so
>implementations from different vendors can interoperate.

Fully agree.

--Paul Hoffman, Director
--VPN Consortium
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to