Internet DRAFT - draft-grieco-suite-vpn-d
draft-grieco-suite-vpn-d
Network Working Group D. McGrew
Internet-Draft A. Grieco
Intended status: Informational Cisco Systems, Inc.
Expires: January 7, 2010 July 6, 2009
Suite VPN-D: Cryptographic Algorithm Suite with 112-bit Security for
IPSEC
draft-grieco-suite-vpn-d-00.txt
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 7, 2010.
Copyright Notice
Copyright (c) 2009 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents in effect on the date of
publication of this document (http://trustee.ietf.org/license-info).
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document.
McGrew & Grieco Expires January 7, 2010 [Page 1]
Internet-Draft 112-bit Crypto for IPSEC July 2009
Abstract
This document defines a suite of cryptographic algorithms that target
a 112-bit security level. Additionally, this document defines the
use of these algorithms for use in IPSEC.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Conventions Used In This Document . . . . . . . . . . . . 3
2. Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1. Considerations . . . . . . . . . . . . . . . . . . . . . . 4
2.1.1. Naming . . . . . . . . . . . . . . . . . . . . . . . . 4
2.2. Suite D Algorithms . . . . . . . . . . . . . . . . . . . . 4
3. Suite D Algorithms in IPSec . . . . . . . . . . . . . . . . . 5
4. Security Considerations . . . . . . . . . . . . . . . . . . . 6
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7
6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 8
7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 9
7.1. Normative References . . . . . . . . . . . . . . . . . . . 9
7.2. Informative References . . . . . . . . . . . . . . . . . . 9
Appendix A. Other 2048 bit MODP Groups . . . . . . . . . . . . . 10
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 11
McGrew & Grieco Expires January 7, 2010 [Page 2]
Internet-Draft 112-bit Crypto for IPSEC July 2009
1. Introduction
[SuiteB] defines a set of cryptographic algorithms that are secure,
well reviewed, and are efficient at high data rates and high security
levels. Currently, support for Suite B is only partly available
across the industry. Traditionally, the adoption of new algorithms
by the industry is a complex and slow process involving multiple
actors, including policy makers in government and industry, standards
organizations, and vendors of crypto software and hardware, network
devices and software, and operating systems. Complications around
ownership of some intellectual property rights as also slowed
adoption of Suite B.
In this document, we define a suite of crypto algorithms that overlap
with Suite B, that contains only algorithms that are believed to be
unencumbered by intellectual property considerations and that targets
a 112-bit security level. This level is not as high as that of Suite
B, but it is believed to be adequately secure to meet present
commercial needs. It provides a halfway point between current
industry practice and Suite B.
It is hoped that the adoption of this new suite will simplify and
shorten the process of adopting Suite B while providing 112-bit
security.
As with previous user interface suites ("UI suites") for IPSec (see
[RFC4308] and [RFC4869]), this document simply defines a few
collections of algorithms for IPSec and does not modify the protocol
itself in any way.
1.1. Conventions Used In This Document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
McGrew & Grieco Expires January 7, 2010 [Page 3]
Internet-Draft 112-bit Crypto for IPSEC July 2009
2. Algorithms
2.1. Considerations
There were four main criteria taken into consideration when
developing the list of algorithms to be recommended:
o IPR licensing concerns
o Targeted strength equivalence of at least 112 bits of security
o Acceptance of algorithms by the industry and governments,
including NIST approval of algorithms
o Interoperability between VPN devices
2.1.1. Naming
The naming of the suite of algorithms defined here is based on the
precedent set forth in RFC4308 where the denotation of "VPN-A" and
"VPN-B" is used. Due to concerns over naming conflicts with
organizations that already exist in the industry, the "VPN-C"
designation was bypassed and therefore the suite defined here is
referenced as "VPN-D".
2.2. Suite D Algorithms
For Authenticated Encryption in the data plane, AES with 128 bit keys
in GCM mode with 128 bit ICV [RFC4106] MUST be used.
For Integrity checks (when Authenticated Encryption is not in use),
HMAC-SHA-256-128 [RFC4868] MUST be used.
For hashing algorithms, SHA-256 [SHA2] MUST be used.
For certificate based signatures, RSA-2048 and SHA-256 MUST be used.
For Diffie-Hellman key exchanges, a 2048-bit MODP group MUST be used.
Explicitly, Diffie-Hellman Group 14 [RFC3526] MUST be used.
For pseudo-random generation function, PRF-HMAC-SHA-256 [RFC4868]
MUST be used.
McGrew & Grieco Expires January 7, 2010 [Page 4]
Internet-Draft 112-bit Crypto for IPSEC July 2009
3. Suite D Algorithms in IPSec
Suite-VPN-D defines the set of algorithms intended to be used for
IPSec VPN applications and fully complies with the MUST Suite D
algorithms defined above.
+---------------------------+-----------------------------+
| Protocol | Algorithm |
+---------------------------+-----------------------------+
| ESP encryption transform | AES-GCM-128 w/ 16 octet ICV |
| | |
| ESP integrity transform | N/A |
| | |
| Pseudo Random Function | PRF-HMAC-SHA-256 |
| | |
| IKE encryption transform | AES-CBC-128 |
| | |
| IKEv1 hash | SHA-256 |
| | |
| IKEv2 integrity transform | HMAC-SHA-256-128 |
| | |
| IKE Diffie-Hellman Group | 14 |
| | |
| IKE X509 authentication | RSA-2048 with SHA-256 |
| | |
| IKE Pre-Shared Key | not less than 128 bits |
+---------------------------+-----------------------------+
Suite-VPN-D Cryptosuite
For IKEv1 implementations, Main mode SHOULD be used.
IKEv1 implementations MUST support rekeying of Phase 2. For IKEv2
implementations, CREATE-CHILD_SA exchanges MUST be supported. Rekey
operations that include the optional Diffie-Hellman key MUST use a
key that is DH Group 14.
If the pre-shared key option is used, then it MUST have a min-entropy
of 128 bits. This means that the key must be chosen at random in
such a way that the most probable key will occur with probability no
greater than 2^(-128). A practical way to achieve this is to choose
the key uniformly at random; for example, a string of 22 base64
characters chosen uniformly at random has sufficient min-entropy.
McGrew & Grieco Expires January 7, 2010 [Page 5]
Internet-Draft 112-bit Crypto for IPSEC July 2009
4. Security Considerations
The target of 112-bit security level for the suite is generally
believed to be sufficient for some time given current technologies
[RFC3766]. This security level is also supported by current NIST
recommendations for key strengths [NIST.800-57.2007].
McGrew & Grieco Expires January 7, 2010 [Page 6]
Internet-Draft 112-bit Crypto for IPSEC July 2009
5. IANA Considerations
The IANA registry called "Cryptographic Suites for IKEv1, IKEv2, and
IPsec" should be updated with an identifier of 'VPN-D' following the
criteria set forth in [RFC4308].
McGrew & Grieco Expires January 7, 2010 [Page 7]
Internet-Draft 112-bit Crypto for IPSEC July 2009
6. Acknowledgements
The authors would like to thank Scott Fluhrer and Igor Balabine for
their review and comment on this document.
McGrew & Grieco Expires January 7, 2010 [Page 8]
Internet-Draft 112-bit Crypto for IPSEC July 2009
7. References
7.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3526] Kivinen, T. and M. Kojo, "More Modular Exponential (MODP)
Diffie-Hellman groups for Internet Key Exchange (IKE)",
RFC 3526, May 2003.
[RFC3766] Orman, H. and P. Hoffman, "Determining Strengths For
Public Keys Used For Exchanging Symmetric Keys", BCP 86,
RFC 3766, April 2004.
[RFC4106] Viega, J. and D. McGrew, "The Use of Galois/Counter Mode
(GCM) in IPsec Encapsulating Security Payload (ESP)",
RFC 4106, June 2005.
[RFC4868] Kelly, S. and S. Frankel, "Using HMAC-SHA-256, HMAC-SHA-
384, and HMAC-SHA-512 with IPsec", RFC 4868, May 2007.
[SHA2] "FIPS 180-2: Secure Hash Standard,", Federal Information
Processing Standard (FIPS) http://csrc.nist.gov/
publications/fips/fips180-2/fips180-2.pdf, 2002.
7.2. Informative References
[NIST.800-57.2007]
National Institute of Standards and Technology,
"Recommendation for Key Management - Part 1: General",
NIST 800-57, March 2007.
[RFC4308] Hoffman, P., "Cryptographic Suites for IPsec", RFC 4308,
December 2005.
[RFC4869] Law, L. and J. Solinas, "Suite B Cryptographic Suites for
IPsec", RFC 4869, May 2007.
[RFC5114] Lepinski, M. and S. Kent, "Additional Diffie-Hellman
Groups for Use with IETF Standards", RFC 5114,
January 2008.
[SuiteB] "Fact Sheet for NSA Suite B Cryptography",
http://www.nsa.gov/ia/industry/crypto_suite_b.cfm.
McGrew & Grieco Expires January 7, 2010 [Page 9]
Internet-Draft 112-bit Crypto for IPSEC July 2009
Appendix A. Other 2048 bit MODP Groups
In this document, we make use of Diffie-Hellman Group 14 in Suite
VPN-D to provide 2048 bit MODP for IKE. Diffie-Hellman Group 24
[RFC5114] might also be considered to for this purpose. However, the
authors note, the prime chosen for Group 24 is not a safe prime and
modified IKE hanlding based on public key validation routines might
be required.
McGrew & Grieco Expires January 7, 2010 [Page 10]
Internet-Draft 112-bit Crypto for IPSEC July 2009
Authors' Addresses
David A. McGrew
Cisco Systems, Inc.
510 McCarthy Blvd.
Milpitas, CA 95035
US
Email: mcgrew@cisco.com
URI: http://www.mindspring.com/~dmcgrew/dam.htm
Anthony H. Grieco
Cisco Systems, Inc.
510 McCarthy Blvd.
Milpitas, CA 95035
US
Email: agrieco@cisco.com
McGrew & Grieco Expires January 7, 2010 [Page 11]