SORT BY:

LIST ORDER
THREAD
AUTHOR
SUBJECT


SEARCH

IPS HOME


    [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

    RE: iSCSI IPsec-Related Algorithm Proposal



    David:
    
    CBC MAC has been standardized for years (see FIPS PUB 113 or ANSI X9.17).
    These standards used DES as the algorithm.  We just need to substitute AES
    for DES.  Another excellent reference can be found in section 9.5.1 in
    "Handbook of Applied Cryptography" by Menezes, van Oorschot, and Vanstone.
    Use of any other algorithms (e.g., one of the new SHAs) raises concerns
    about being able to scale to 1Gbit/sec.
    
    On the second issue, even if you specify a re-keying algorithm that does not
    solve your problem.  You must also extend the size of the sequence number
    field itself so that you are not having to re-key as often.  At the December
    2000 IETF meeting, Steve Kent of the IPsec WG presented proposals covering
    AES CBC MAC and sequence number rollover (see attached presentation).  If
    the sequence number space were increased to per Steve's proposal, that may
    also make "manual" re-key viable for the short term (i.e., 2002 products).
    
    I would expect that we could achieve quick alignment with the IPsec WG on
    these issues, have the IPsec WG generate any missing RFCs (if they are not
    already doing so), and reference them in our specification.
    
    Howard
    
    
    
    -----Original Message-----
    From: Black_David@emc.com [mailto:Black_David@emc.com]
    Sent: Friday, June 29, 2001 5:25 PM
    To: howard.c.herbert@intel.com; ips@ece.cmu.edu
    Subject: RE: iSCSI IPsec-Related Algorithm Proposal
    
    
    > Specifically, phase one products would use AES CBC MAC mode as the
    integrity
    > algorithm and AES CBC mode as the confidentiality algorithm.  This
    proposal
    > means vendors only have to implement a single base-algorithm with slight
    > mode variations in order to have a complete 1 Gbit solution (integrity and
    > confidentiality).  Adopting AES in phase one also establishes a foundation
    > upon which to build phase two solutions (different modes of operation on
    the
    > same base algorithm).
    
    What would you recommend as reference specifications for these algorithms,
    and specifically their use with ESP?  There are no RFCs specifying this,
    and I haven't seen an Internet-Draft on the MAC (there is one on use of 
    AES for confidentiality).  My personal preference would be for something
    AES-based (perhaps using one of the new SHA hashes in an HMAC instead
    of the AES CBC MAC) rather than falling back to things like SHA-1 and 3DES.
    
    Meanwhile, we have another issue.  As of the outcome of the Nashua meeting,
    the minimum (MUST implement) requirement for keying ESP was manual keying.
    That's not going to be sufficient because there will be situations in which
    iSCSI
    causes ESP's 32-bit sequence number to roll over, creating a vulnerability
    to
    replay attacks.  This is going to require specification of a MUST implement
    rekeying algorithm.  IKE or a subset is one possibility, and working out the
    details of SRP-based keying (and rekeying) of ESP is another.  A somewhat
    drafty draft on the latter may appear prior to London assuming that I can
    find
    the "copious spare time" to get it written.
    
    Comments?
    
    Thanks,
    --David
    
    ---------------------------------------------------
    David L. Black, Senior Technologist
    EMC Corporation, 42 South St., Hopkinton, MA  01748
    +1 (508) 435-1000 x75140     FAX: +1 (508) 497-8500
    black_david@emc.com       Mobile: +1 (978) 394-7754
    ---------------------------------------------------
    
    
    

    IPsec_WG_1200.ZIP



Home

Last updated: Tue Sep 04 01:04:22 2001
6315 messages in chronological order