[IPsec] Re: AUTH_HMAC_SHA1_96 not formally deprecated

2024-08-12 Thread Daniel Shiu
Many thanks for all of the comments. I feel that AUTH_HMAC_SHA1_96 should be formally deprecated not necessarily for its security* relative to the deprecated AUTH_HMAC_SHA1_160, but for purposes of consistency, clarity and in support of a broad migration away from SHA-1 dependencies. I’m a rela

[IPsec] Re: AUTH_HMAC_SHA1_96 not formally deprecated

2024-08-12 Thread Tero Kivinen
Daniel Shiu writes: > Many thanks for all of the comments. I feel that AUTH_HMAC_SHA1_96 > should be formally deprecated not necessarily for its security* > relative to the deprecated AUTH_HMAC_SHA1_160, but for purposes of > consistency, clarity and in support of a broad migration away from > SHA-

[IPsec] Re: AUTH_HMAC_SHA1_96 not formally deprecated

2024-08-12 Thread Paul Wouters
On Mon, 12 Aug 2024, Tero Kivinen wrote: Because AUTH_HMAC_SHA1_96 used to be mandatory it was moved t MUST-, not to SHOULD NOT or MUST NOT while AUTH_HMAC_SHA2_256_128 was made MUST. In the next update of the Algorithm Implementation Requirements and Usage Guidance for IKEv2 (RFC8247) and E

[IPsec] Re: Comments on draft-pan-ipsecme-anti-replay-notification

2024-08-12 Thread Tero Kivinen
Paul Wouters writes: > I don't believe in this, but if I did, wouldn't you extend the Transorm Type 5 > to: > > - SN > - ESN > - SN without replay protection > - ESN without replay protection > > Hence my comment about bytes and flags being a bit confusing. I > don't think we can repurpose this r

[IPsec] Re: WGLC of the draft-ietf-ipsecme-ikev2-qr-alt-03

2024-08-12 Thread Valery Smyslov
Hi Tero, > Valery Smyslov writes: > > The draft uses the method similar to RFC 8784: > > > > SK_d = prf+ (PPK, SK_d') > > > > with the replacement of SK_d with SKEYSEED. > > > > The rationale for using the current form: > > 1. This is the most straightforward and conservative use of prf, when