Hi Paul,

> On Fri, 5 Jun 2020, Scott Fluhrer (sfluhrer) wrote:
> 
> > The draft “Mixing Preshared Keys in IKEv2 for Post-quantum Security” was
> winding through the AUTH48 process, when at the last
> > minute, I received an email from a researcher who thought they found a
> problem with low entropy PPKs (the preshared keys that the
> > draft uses).  While it turned out that what the found really wasn’t a
> problem, such low entropy PPKs are a problem in general.
> 
> We had this discussion in the WG.
> 
> >    An attacker who impersonates the server is able to validate guesses to
> >    the PPK.  Because of this, low entropy PPK values MUST NOT be used.
> 
> My problem with the text is that the setion is about how the users are
> using the software/protocol. So a MUST NOT reads kind of weird, because
> users don't read RFCs. Implementors are the ones who can follow a MUST
> NOT, but the text makes no requirement of implementors.

I read this text as a caveat for implementers to not use 
keys which cannot provide enough entropy in any case (e.g. passwords).
With this reading it's a text for implementers, not for users.

Regards,
Valery.

> I've been here before with PSKs. I had added some code in our
> implementation to do some simple strength check on entropy and
> reject weak PSKs. But there was a discussion on how far one should
> go and of course examples of easy stupid tricks to defeat simplistic
> entropy checks. In the end, it got removed again.
> 
> I would be happy for the draft to recommend something like a minimum
> length of 32 bytes. I can implement that. We know some people will
> use 32 A's or 0's, but where would you draw the line.
> 
> Alternatively, the text could suggest some kind of exponential backoff
> scheme based on wrong PPK values that would dramatically slow down the
> efforts of an attacker. Again, that would be something we can implement.
> 
> I am fine with the first sentence being included. The second one could
> read something like "Because of this, low entropy PPK values MAY be
> rejected and implementations MAY warn about their use". This then leaves
> it up to implementors as to whether they will add some entropy checking
> code or not.
> 
> Paul
> 
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to