Internet DRAFT                                            Vishwas Manral
UPDATES RFC 4305                                              IPInfusion
Expires December 2006                                           June 2006
Category: Standards Track


        Cryptographic Algorithm Implementation Requirements for
  Encapsulating Security Payload (ESP) and Authentication Header (AH)
                draft-manral-ipsec-rfc4305-bis-errata-01.txt


Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on October 16, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2006).


Abstract

   The IPsec series of protocols makes use of various cryptographic
   algorithms in order to provide security services.  The Encapsulating
   Security Payload (ESP) and the Authentication Header (AH) provide two
   mechanisms for protecting data being sent over an IPsec Security
   Association (SA).  To ensure interoperability between disparate
   implementations, it is necessary to specify a set of mandatory-to-
   implement algorithms to ensure that there is at least one algorithm
   that all implementations will have available.  This document defines
   the current set of mandatory-to-implement algorithms for ESP and AH
   as well as specifying algorithms that should be implemented because
   they may be promoted to mandatory at some future time.




V. Manral          Expires December 2006                       [Page 1]


INTERNET-DRAFT    Implementation requirements for ESP        June 2006
                     and AH

Table of Contents

   1. Introduction ....................................................2
   2. Requirements Terminology ........................................3
   3. Algorithm Selection .............................................3
      3.1. Encapsulating Security Payload .............................3
           3.1.1. ESP Encryption and Authentication Algorithms ........4
           3.1.2. ESP Combined Mode Algorithms ........................4
      3.2. Authentication Header ......................................5
   4. Security Considerations .........................................5
   5. Acknowledgement .................................................6
   6. Changes from RFC 2402 and 2406 ..................................6
   7. Normative References ............................................7
   8. Informative References ..........................................7
   Appendix A .........................................................9
   Appendix B .........................................................9

1.  Introduction

   The Encapsulating Security Payload (ESP) and the Authentication
   Header (AH) provide two mechanisms for protecting data being sent
   over an IPsec Security Association (SA) [IPsec, ESP, AH].  To ensure
   interoperability between disparate implementations, it is necessary
   to specify a set of mandatory-to-implement algorithms to ensure that
   there is at least one algorithm that all implementations will have
   available.  This document defines the current set of mandatory-to-
   implement algorithms for ESP and AH as well as specifying algorithms
   that should be implemented because they may be promoted to mandatory
   at some future time.

   The nature of cryptography is that new algorithms surface
   continuously and existing algorithms are continuously attacked.  An
   algorithm believed to be strong today may be demonstrated to be weak
   tomorrow.  Given this, the choice of mandatory-to-implement algorithm
   should be conservative so as to minimize the likelihood of it being
   compromised quickly.  Thought should also be given to performance
   considerations as many uses of IPsec will be in environments where
   performance is a concern.

   Finally, we need to recognize that the mandatory-to-implement
   algorithm(s) may need to change over time to adapt to the changing
   world.  For this reason, the selection of mandatory-to-implement
   algorithms is not included the main IPsec, ESP, or AH specifications.
   It is instead placed in this document.  As the choice of algorithm
   changes, only this document should need to be updated.

   Ideally, the mandatory-to-implement algorithm of tomorrow should
   already be available in most implementations of IPsec by the time it







V. Manral          Expires December 2006                       [Page 2]


INTERNET-DRAFT    Implementation requirements for ESP        June 2006
                     and AH

   is made mandatory.  To facilitate this, we will attempt to identify
   such algorithms (as they are known today) in this document.  There is
   no guarantee that the algorithms we believe today may be mandatory in
   the future will in fact become so.  All algorithms known today are
   subject to cryptographic attack and may be broken in the future.

2.  Requirements Terminology

   Keywords "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT" and
   "MAY" that appear in this document are to be interpreted as described
   in [RFC2119].

   We define some additional terms here:

   SHOULD+     This term means the same as SHOULD.  However, it is
               likely that an algorithm marked as SHOULD+ will be
               promoted at some future time to be a MUST.
   SHOULD-     This term means the same as SHOULD.  However, it is
               likely that an algorithm marked as SHOULD- will be
               deprecated to a MAY or worse in a future version of this
               document.
   MUST-       This term means the same as MUST.  However, we expect
               that at some point in the future this algorithm will no
               longer be a MUST.

3.  Algorithm Selection

   For IPsec implementations to interoperate, they must support one or
   more security algorithms in common.  This section specifies the
   security algorithm implementation requirements for standards-
   conformant ESP and AH implementations.  The security algorithms
   actually used for any particular ESP or AH security association are
   determined by a negotiation mechanism, such as the Internet Key
   Exchange (IKE [RFC2409, IKEv2]) or pre-establishment.

   Of course, additional standard and proprietary algorithms beyond
   those listed below can be implemented.

3.1.  Encapsulating Security Payload

   The implementation conformance requirements for security algorithms
   for ESP are given in the tables below.  See Section 2 for definitions
   of the values in the "Requirement" column.










V. Manral          Expires December 2006                       [Page 3]


INTERNET-DRAFT    Implementation requirements for ESP        June 2006
                     and AH

3.1.1.  ESP Encryption and Authentication Algorithms

   These tables list encryption and authentication algorithms for the
   IPsec Encapsulating Security Payload protocol.

      Requirement    Encryption Algorithm (notes)
      -----------    --------------------
      MUST           NULL (1)
      MUST-          TripleDES-CBC [RFC2451]
      SHOULD+        AES-CBC with 128-bit keys [RFC3602]
      SHOULD         AES-CTR [RFC3686]
      SHOULD NOT     DES-CBC [RFC2405] (3)

      Requirement    Authentication Algorithm (notes)
      -----------    ------------------------
      MUST           HMAC-SHA1-96 [RFC2404] (4)
      SHOULD+        AES-XCBC-MAC-96 [RFC3566]
      MAY            NULL (1)
      MAY            HMAC-MD5-96 [RFC2403] (2)

   Notes:

   (1) Since ESP encryption is optional, support for the "NULL"
       algorithm is required to maintain consistency with the way
       services are negotiated. Note that while authentication
       and encryption can each be "NULL", they MUST NOT both be
       "NULL".

   (2) Weaknesses have become apparent in MD5 [MD5-COLL]; however, these
       should not affect the use of MD5 with HMAC.

   (3) DES, with its small key size and publicly demonstrated and open-
       design special-purpose cracking hardware, is of questionable
       security for general use.

   (4) Collisions attacks are now known in SHA-1 [SHA-1COLL]; however,
       these should not affect the use of SHA-1 with HMAC.

3.1.2.  ESP Combined Mode Algorithms

   As specified in [ESP], combined mode algorithms are supported that
   provide both confidentiality and authentication services.  Support of
   such algorithms will require proper structuring of ESP
   implementations.  Under many circumstances, combined mode algorithms
   provide significant efficiency and throughput advantages.  Although
   there are no suggested or required combined algorithms at this time,
   AES-CCM [CCM], which has been adopted as the preferred mode for




V. Manral          Expires December 2006                       [Page 4]


INTERNET-DRAFT    Implementation requirements for ESP        June 2006
                     and AH

   security in IEEE 802.11 [802.11i], is expected to be of interest in
   the near future.

3.2.  Authentication Header

   The implementation conformance requirements for security algorithms
   for AH are given below.  See Section 2 for definitions of the values
   in the "Requirement" column.  As you would suspect, all of these
   algorithms are authentication algorithms.

    Requirement    Algorithm (notes)
      -----------    ---------
      MUST           HMAC-SHA1-96 [RFC2404] (1)
      SHOULD+        AES-XCBC-MAC-96 [RFC3566]
      MAY            HMAC-MD5-96 [RFC2403] (2)

   Note:

   (1) Collisions attacks are now known in SHA-1; however, these should
       not affect the use of SHA-1 with HMAC.

   (2) Weaknesses have become apparent in MD5; however, these should not
       affect the use of MD5 with HMAC.

4. Application support

   Applications running over IP can utilize IPsec to gain services that
   include access control, connectionless integrity, data origin
   authentication, detection and rejection of replays (a form of partial
   sequence integrity), confidentiality (via encryption), and limited
   traffic flow confidentiality.

   Any application using ESP or AH should use the algorithm supported in
   this document. However an application can mandate the support of a more
   stringent set of algorithm support as well as add support for new
   algorithms, however the application cannot make the requirements
   more lenient(i.e. MUST cannot be made a MAY or a SHOULD though a SHOULD
   and a MAY can be made to a MUST).

5.  Security Considerations

   The security of cryptographic-based systems depends on both the
   strength of the cryptographic algorithms chosen and the strength of
   the keys used with those algorithms.  The security also depends on
   the engineering and administration of the protocol used by the system
   to ensure that there are no non-cryptographic ways to bypass the
   security of the overall system.

   This document concerns itself with the selection of cryptographic
   algorithms for the use of ESP and AH, specifically with the selection





V. Manral          Expires December 2006                       [Page 5]


INTERNET-DRAFT    Implementation requirements for ESP        June 2006
                     and AH

   of mandatory-to-implement algorithms.  The algorithms identified in
   this document as "MUST implement" or "SHOULD implement" are not known
   to be broken at the current time, and cryptographic research so far
   leads us to believe that they will likely remain secure into the
   foreseeable future.  However, this is not necessarily forever.  We
   would therefore expect that new revisions of this document will be
   issued from time to time that reflect the current best practice in
   this area.

6.  Acknowledgement

   Much of the wording herein was adapted from RFC4305, the parent document
   of this document. RFC4305 itself borrows text from RFC 4307, "Cryptographic
   Algorithms for Use in the Internet Key Exchange Version 2", by
   Jeffrey I. Schiller.

   Thanks to the following people for reporting or responding to reports
   of the errors in RFC4305:

   Paul Hoffman, Stephen Kent, Paul Koning and Lars Völker.

7.  Changes from RFC 2402 and 2406

   [RFC2402] and [RFC2406] defined the IPsec Authentication Header and
   IPsec Encapsulating Security Payload.  Each specified the
   implementation requirements for cryptographic algorithms for their
   respective protocols.  They have now been replaced with [AH] and
   [ESP], which do not specify cryptographic algorithm implementation
   requirements, and this document, which specifies such requirements
   for both [AH] and [ESP].

   The implementation requirements are compared below:

   Old   Old         New
   Req.  RFC(s)      Requirement  Algorithm (notes)
   ---   ------      -----------  ---------
   MUST  2406        SHOULD NOT   DES-CBC [RFC2405] (1)
   MUST  2402 2406   MAY          HMAC-MD5-96 [RFC2403]
   MUST  2402 2406   MUST         HMAC-SHA1-96 [RFC2404]
   MUST  2406        MAY          NULL Authentication
   MUST  2406        MUST         NULL Encryption

   Note:

   (1) The IETF deprecated the use of single DES years ago and has not
      included it in any new standard for some time (see IESG note on
      the first page of [RFC2407]).  But this document represents the
      first standards-track recognition of that deprecation by
      specifying that implementations SHOULD NOT provide single DES.
      The US Government National Institute of Standards and Technology
      (NIST) has formally recognized the weakness of single DES by a




V. Manral          Expires December 2006                       [Page 6]


INTERNET-DRAFT    Implementation requirements for ESP        June 2006
                     and AH

      notice published in the 26 July 2004 US Government Federal
      Register (Docket No. 040602169-4169-01) proposing to withdraw it
      as a US Government Standard.  Triple DES remains approved by both
      the IETF and NIST.

















































V. Manral          Expires December 2006                       [Page 6]


INTERNET-DRAFT    Implementation requirements for ESP        June 2006
8.  Normative References

   [AH]        Kent, S., "IP Authentication Header", RFC 4302, December
               2005.

   [ESP]       Kent, S., "IP Encapsulating Security Payload (ESP)", RFC
               4303, December 2005.

   [IPsec]     Kent, S., "Security Architecture for the Internet
               Protocol", RFC 4301, December 2005.

   [RFC2119]   Bradner, S., "Key words for use in RFCs to Indicate
               Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC2403]   Madson, C. and R. Glenn, "The Use of HMAC-MD5-96 within
               ESP and AH", RFC 2403, November 1998.

   [RFC2404]   Madson, C. and R. Glenn, "The Use of HMAC-SHA-1-96 within
               ESP and AH", RFC 2404, November 1998.

   [RFC2405]   Madson, C. and N. Doraswamy, "The ESP DES-CBC Cipher
               Algorithm With Explicit IV", RFC 2405, November 1998.

   [RFC3566]   Frankel, S. and H. Herbert, "The AES-XCBC-MAC-96
               Algorithm and Its Use With IPsec", RFC 3566, September
               2003.

   [RFC3602]   Frankel, S., Glenn, R., and S. Kelly, "The AES-CBC Cipher
               Algorithm and Its Use with IPsec", RFC 3602, September
               2003.

   [RFC3686]   Housley, R., "Using Advanced Encryption Standard (AES)
               Counter Mode With IPsec Encapsulating Security Payload
               (ESP)", RFC 3686, January 2004.

9.  Informative References

   [802.11i]   LAN/MAN Specific Requirements   Part 11: Wireless Medium
               Access Control (MAC) and physical layer (PHY)
               specifications:  Medium Access Control (MAC) Security
               Enhancements, IEEE Std 802.11i, June 2004.

   [JIS]       Schiller, J., "Cryptographic Algorithms for Use in the
               Internet Key Exchange Version 2 (IKEv2)", RFC 4307,
               December 2005.

   [CCM]       Housley, R., "Using Advanced Encryption Standard (AES)
               Counter Mode With IPsec Encapsulating Security Payload
               (ESP)", RFC 3686, January 2004.





V. Manral          Expires December 2006                       [Page 7]


INTERNET-DRAFT    Implementation requirements for ESP        June 2006
                     and AH

   [IKEv2]     Kaufman, C., Ed., "Internet Key Exchange (IKEv2)
               Protocol", RFC 4306, December 2005.

   [RFC791]    Postel, J., "Internet Protocol", STD 5, RFC 791,
               September 1981.

   [RFC2402]   Kent, S. and R. Atkinson, "IP Authentication Header", RFC
               2402, November 1998.

   [RFC2406]   Kent, S. and R. Atkinson, "IP Encapsulating Security
               Payload (ESP)", RFC 2406, November 1998.

   [RFC2407]   Piper, D., "The Internet IP Security Domain of
               Interpretation for ISAKMP", RFC 2407, November 1998.

   [RFC2409]   Harkins, D. and D. Carrel, "The Internet Key Exchange
               (IKE)", RFC 2409, November 1998.

   [MD5-COLL]  V. Klima, "Finding MD5 Collisions – a Toy For a Notebook",
               http://eprint.iacr.org/2005/075, March 2005

   [SHA-1COLL] Rijmen, V. and E. Oswald, "Update on SHA-1",
               http://eprint.iacr.org/2005/010, January 2005






























V. Manral          Expires December 2006                       [Page 8]


INTERNET-DRAFT    Implementation requirements for ESP        June 2006
                     and AH


Appendix A.  To be done

     o  Support for any new algorithms and updating state for existing algorithms.

Appendix B.  Change Log

   B.1 Changes from RFC 4305 to 00 Version

     o  Editorial changes

     o  Section 3.1.1 - Text changes for making authentication algorithm
        from a MUST to a MAY the support for the NULL Authentication
        Algorithm and also related note. Also added text for SHA-1 collision
        attacks.

     o  Section 3.2 - Added text for collision attack for SHA-1.

     o  Section 6 - Added change of support for NULL Authentication and NULL
        encryption.

     o  Informative References - Added references for collision attack for SHA-1
        and MD5.

     o  Added appendix A for possible work to be done.

   B.2 Changes from 00 to 01 Version

     o  Added a section for Application support.

     o  Typo and editorial changes


Author's Address

   Vishwas Manral
   IPInfusion
   Bangalore
   India

   Phone:   +1-408-794-1516
            +91-98456-61911
   EMail:   vishwas@ipinfusion.com









V. Manral          Expires December 2006                       [Page 9]


INTERNET-DRAFT    Implementation requirements for ESP        June 2006
                     and AH

Full Copyright Statement

   Copyright (C) The Internet Society (2006).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at ietf-
   ipr@ietf.org.

Acknowledgement

   Funding for the RFC Editor function is currently provided by the
   Internet Society.







V. Manral          Expires December 2006                       [Page 10]