On Fri, 9 May 2025, Kampanakis, Panos wrote:

[ speaking as individual ]

Good catch! I could not find any IKEv2 drafts with normative language regarding 
ephemeral keys. And indeed section 2.12 of RFC7296 allows for reuse. I think we 
have since moved to a world where ephemeral is cheap and PFS is required.

I am leaning towards taking your suggested text and using "RECOMMENDED" instead of 
"REQUIRED" and referencing RFC7296 section 2.12 about why. Other WGs have had long discussions 
about normative language on this topic and I think pointing it out and "RECOMMENDing" it is the 
important thing. The actual normative language, I don't have strong feelings about.

Doesn't FIPS already require it? I understand TLS servers might want to
allow re-use, but IKEv2 has its own anti-ddos build-in and doesn't get
as many connections to it as a TLS server does. I'd much rather nudge
people to REQUIRED.

I'd like to keep PFS out of this discussion though. I am not sure the
world is moving towards more PFS for IPsec, as it makes hardware
offloading more complicated and it is generally accepted that the inner
protocols already handle retransmits (eg TCP or applications already
needing to handle UDP retransmits in their protocol)

Paul

-----Original Message-----
From: Rebecca Guthrie <rmgu...@uwe.nsa.gov>
Sent: Thursday, May 8, 2025 2:26 PM
To: ipsec@ietf.org; Kampanakis, Panos <kpa...@amazon.com>; Ravago, Gerardo 
<g...@amazon.com>
Subject: RE: [EXTERNAL] [IPsec] I-D Action: 
draft-ietf-ipsecme-ikev2-mlkem-00.txt

CAUTION: This email originated from outside of the organization. Do not click 
links or open attachments unless you can confirm the sender and know the 
content is safe.



Hi all,

Glad to see this document adopted by the WG.

One small question- in Section 3, the draft reads, "As with (EC)DH keys today, 
generating an ephemeral key exchange keypair for ECDH and ML-KEM is still REQUIRED per 
connection by this specification (IND-CPA security)."

However, my understanding of RFC7296 (Section 2.12) is that it doesn't actually 
prohibit the re-use of ephemeral keys." Is there guidance other than 7296 that 
explicitly prohibits ephemeral key re-use?

Or is it better to rephrase to something like: "Generating an ephemeral key exchange 
keypair for ECDH and ML-KEM is REQUIRED per connection by this specification, as is 
common practice for (EC)DH keys today."

Thanks,

Rebecca

Rebecca Guthrie
she/her
Center for Cybersecurity Standards (CCSS) Cybersecurity Collaboration Center 
(CCC) National Security Agency (NSA)

-----Original Message-----
From: internet-dra...@ietf.org <internet-dra...@ietf.org>
Sent: Thursday, May 1, 2025 6:14 AM
To: i-d-annou...@ietf.org
Cc: ipsec@ietf.org
Subject: [IPsec] I-D Action: draft-ietf-ipsecme-ikev2-mlkem-00.txt

Internet-Draft draft-ietf-ipsecme-ikev2-mlkem-00.txt is now available. It is a 
work item of the IP Security Maintenance and Extensions (IPSECME) WG of the 
IETF.

  Title:   Post-quantum Hybrid Key Exchange with ML-KEM in the Internet Key 
Exchange Protocol Version 2 (IKEv2)
  Authors: Panos Kampanakis
           Gerardo Ravago
  Name:    draft-ietf-ipsecme-ikev2-mlkem-00.txt
  Pages:   10
  Dates:   2025-04-29

Abstract:

  NIST recently standardized ML-KEM, a new key encapsulation mechanism,
  which can be used for quantum-resistant key establishment.  This
  draft specifies how to use ML-KEM as an additional key exchange in
  IKEv2 along with traditional key exchanges.  This Post-Quantum
  Traditional Hybrid Key Encapsulation Mechanism approach allows for
  negotiating IKE and Child SA keys which are safe against
  cryptanalytically-relevant quantum computers and theoretical
  weaknesses in ML-KEM.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-mlkem/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-ipsecme-ikev2-mlkem-00.html

Internet-Drafts are also available by rsync at:
rsync.ietf.org::internet-drafts


_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org


_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to