Daniel Shiu writes:
> Many thanks for all of the comments. I feel that AUTH_HMAC_SHA1_96
> should be formally deprecated not necessarily for its security*
> relative to the deprecated AUTH_HMAC_SHA1_160, but for purposes of
> consistency, clarity and in support of a broad migration away from
> SHA-1 dependencies.

Note, that AUTH_HMAC_SHA1_160 was never defined for general IPsec, it
was only to be used with Fibre Channel Security Association Management
Protocol RFC4595, so no IPsec implementations used it, and it was
deprecated because of that. AUTH_HMAC_SHA1_96 is still in use, and
will slowly be replaced with AUTH_HMAC_SHA2_256_128, which is the new
mandatory to implement algorithm.

Because AUTH_HMAC_SHA1_96 used to be mandatory it was moved t MUST-,
not to SHOULD NOT or MUST NOT while AUTH_HMAC_SHA2_256_128 was made
MUST.

In the next update of the Algorithm Implementation Requirements and
Usage Guidance for IKEv2 (RFC8247) and ESP and AH (RFC8221) they will
most likely be changed to some level of deprecation.

I think that for ESP and AH most implementations have moved to use
AEAD ciphers, but my feeling is that for IKEv2 people still use some
non-AEAD algorithms, i.e., either AUTH_HMAC_SHA1_96 or
AUTH_HMAC_SHA2_256_128. 

> I’m a relative newcomer to IETF and it may be that the administrative and
> process overheads are excessive for these goals and I am happy to take
> guidance on this point.

In IPsecME we update the Algorithm Implementation Requirements and
Usage Guidance documents every few years (5-10), last time we did this
in 2017 and before that 2014 and 2007. So I think we are getting close
to the next time we should review those documents and update the
recommendations.

My plans is to recharter IPsecME WG soon to add new items, and adding
this item there also would make sense. 
-- 
kivi...@iki.fi

_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to