Hi,

at the ipsecme meeting at IETF106 I was asked by the chairs to send feedback to 
the list 
on QSKE interoperability testing event that took place on November 7.

The slides about this event are available here:
https://datatracker.ietf.org/meeting/106/materials/slides-106-ipsecme-hybrid-qske-for-ikev2-interoperability-testing-event-01

The event was organized by Secunet. There were 3 active participants 
(strongSwan, QuaSiModO and ELVIS-PLUS)
and few observers. We tested initial IKE SA setup using multiple key exchanges 
according to 
draft-tjhai-ipsecme-hybrid-qske-ikev2-04. Rekeying wasn't tested since only one
implementation supported it.

The results are: 
- strongSwan and ELVIS+ were able to establish SA using three classical DH 
exchanges. 
- strongSwan and QuaSiModO performed hybrid key exchange with classical DH + 
post-quantum KE (newHope);
   the key exchange itself was successful, but SA wasn't established due to 
incorrect AUTH calculation.

There was some discussion about the draft and its possible implementations.
First, the stable code points are badly needed, at least for IKE_INTERMEDIATE.
I've already requested early code points assignments for IKE_INTERMEDIATE, 
so hopefully this issue will soon be resolved.
Then, there were some discussion on how rekey must be done. The conclusion
was that using a new dedicated exchange for follow-up key exchanges is much 
better than re-using INFORMATIONAL. This was already discussed among the 
draft authors and we agree that it's a right way to go. Some concerns were 
also expressed about using nonces in each additional KE instead of re-using a 
pair of nonces from IKE_SA_INIT (or CREATE_CHILD_SA). I think it's a good
idea and we probably follow this way after we discuss the security 
implications of it among the authos.
Some vendors that haven't yet implemented the draft expressed an intent
to do it once the specification becomes more stable (preferably - becomes an 
RFC).

Event participants are in CC of this message, so they can correct
me if I was inaccurate in its description or forgot to mention something 
important.

Regards,
Valery.

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to