IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Proposed Meeting Discussion Items for the Core IDs



Chris Lonvick <clonvick%cisco.com@localhost> writes:

> On Sun, 7 Nov 2004, [iso-8859-1] Niels Möller wrote:
> 
> > Some of the issues have already been discussed at some length on the
> > list.
> 
> Super!  I'd prefer to track them down in the archives rather than re-hash
> things.  They must have been discussed before I took over as editor.
> Does anyone have any pointers to these discussions and resolutions?

The relevant discussion thread seems to be the "additional core draft
nits in need of WG attention.", starting with a message by Bill
Sommerfield, Mon, 10 Nov 2003 02:12:10 -0500, almost exactly one year
ago. Message-id <200311100712.hAA7CAS4004431%thunk.east.sun.com@localhost>.

I'm including a selection of messages from back then, to try to
summarize the discussion. This is naturally my view of the discussion;
I haven't carefully reread *all* of the discussion, and I may have
missed some disagreeing voices. The relevant archive files seems to be
ftp://ftp.ietf.org/ietf-mail-archive/secsh/2003-11.mail and
ftp://ftp.ietf.org/ietf-mail-archive/secsh/2003-12.mail

> > Ticket 454: triple-des have too few key bits. I think we had consensus
> > to "grandfather" triple-des, however that's going to be expressed in
> > the spec. I.e. just note that triple-des doesn't quite satisfy the
> > requirements, and allow this exception for historical reasons and
> > backwards compatibility. I don't think it's a good idea to lower the
> > general recommendation on key length from 128 to 96 bits.

>From Bill:

: From: Bill Sommerfeld <sommerfeld%east.sun.com@localhost>
: Subject: Re: additional core draft nits in need of WG attention. 
: To: nisse%lysator.liu.se@localhost (Niels Möller)
: Cc: ietf-ssh%NetBSD.org@localhost, Russ Housley <housley%vigilsec.com@localhost>
: Date: Tue, 11 Nov 2003 10:31:10 -0500
: Reply-To: sommerfeld%east.sun.com@localhost
: 
: > > I see a kernel of consensus building for:
: > >  - leave recommended limit at 128 bits
: > >  - explicitly grandfather 3DES
: > 
: > Exactly what does "grandfather" mean here? Change 3DES from REQUIRED
: > to RECOMMENDED? Or OPTIONAL? Or DEPRECATED? 
: 
: My apologies for using an Americanism here.
: 
: "Grandfathering" something means roughly "keep it is, despite not
: (precisely) matching the letter of a newer spec/law/regulations/etc,
: because we've always done it that way".
: 
: So, that would be "keep as REQUIRED".
: 					- Bill

> > Ticket 461: "implicit server authentication". This has been discussed
> > on the list, we may even have had some proposed text.

: From: Bill Sommerfeld <sommerfeld%east.sun.com@localhost>
: Subject: (LAST CALL) Re: Implicit server authentication: Proposed clarification
: To: nisse%lysator.liu.se@localhost (Niels Möller)
: Cc: Joseph Galbraith <galb-list%vandyke.com@localhost>,
: 	Jeffrey Hutzelman <jhutz%cmu.edu@localhost>,
: 	Peter Gutmann <pgut001%cs.auckland.ac.nz@localhost>, housley%vigilsec.com@localhost,
: 	ietf-ssh%NetBSD.org@localhost
: Date: Fri, 19 Dec 2003 13:08:05 -0500
: Reply-To: sommerfeld%east.sun.com@localhost
: 
: [Sorry for the delay in dealing with this loose end.]
: 
: Seeing no further followup to this thread, I'm going to suggest a
: slight modification to Niels's text:
: 
: He wrote:
:    All currently defined key exchange methods use explicit server
:    authentication.  
: 
: This is a little vague for my tastes; I'd say 
: 
:    The key exchange method defined in this documents use explicit server 
:    authentication.
: 
: .. and then have dh-group-exchange and gsskeyex say the same..
: 
: This makes the change the following:
: 
: Before:
: 
:    Server authentication in the key exchange MAY be implicit.  After a
:    key exchange with implicit server authentication, the client MUST
:    wait for response to its service request message before sending any
:    further data.
: 
: After:
: 
:    A key exchange method uses "explicit server authentication" if the
:    key exchange messages include a signature or other proof of the
:    server's authenticity.  A key exchange method uses "implicit server
:    authentication" if, in order to prove its autenticity, the server
:    also has to prove that it knows the shared secret K, by sending a
:    message and a corresponding MAC which the client can verify. [1]
: 
:    The key exchange method defined by this document uses explicit server 
:    authentication.  However, key exchange methods with implicit server
:    authentication MAY be used with this protocol.  After a key exchange
:    with implicit server authentication, the client MUST wait for
:    response to its service request message before sending any further
:    data.
: 
: Please send comments on this proposed change to the WG list by Monday,
: January 4th, 2004.
: 
: 					- Bill

(The "[1]" at the end of one of the paragraphs should be deleted).

> > Ticket 462: discouraging use of different algorithm for the two
> > directions. This has been discussed at length, I argued that it should
> > be allowed and up to local configuration, I don't remember who else
> > agreed with that.

There were quite a lot of discussion about this, and I'm not sure what
we reached any concensus. A few relevant messages from the discussion:

: From: Bill Sommerfeld <sommerfeld%east.sun.com@localhost>
: Subject: additional core draft nits in need of WG attention.
: To: ietf-ssh%netbsd.org@localhost
: Cc: Russ Housley <housley%vigilsec.com@localhost>
: Date: Mon, 10 Nov 2003 02:12:10 -0500
: Reply-To: sommerfeld%east.sun.com@localhost
: 
: 
: transport draft:
: 
: > >5.  Section 4. SSH allows the client and server to employ different
: > >algorithms for the data that they encrypt. This practice should be
: > >discouraged somewhere in the document.  It is likely to cause
: > >interoperability problems, and it offers no security advantage.
: 
: [this is section 5 in version -17]
: 
: suggested resolution:
: 
: immediately after this text:
: 
:    The ciphers in each direction MUST run independently of each other,
:    and implementations MUST allow independently choosing the algorithm
:    for each direction (if multiple algorithms are allowed by local
:    policy.
: 
: insert:
: 
:    Note that there is no security advantage to using different
:    algorithms in each direction; implementations SHOULD use the same
:    algorithm in both directions when allowed by policy.
: [...]

: From: Bill Sommerfeld <sommerfeld%east.sun.com@localhost>
: Subject: Re: additional core draft nits in need of WG attention. 
: To: pgut001%cs.auckland.ac.nz@localhost (Peter Gutmann)
: Cc: nisse%lysator.liu.se@localhost, ietf-ssh%NetBSD.org@localhost
: Date: Sat, 15 Nov 2003 10:57:58 -0500
: Reply-To: sommerfeld%east.sun.com@localhost
: 
: > >If we really want to get rid of this possibility, the cleanest and least
: > >confusing way of doing it would be to define protocol version 2.1 with a
: > >changed KEXINIT format,
: > 
: > I don't really know if such a big change is necessary, just
: > discouraging the use of asymmetric choices (which shouldn't be hard
: > given that nothing (?) does it at the moment, so any attempt to
: > implement it will fail to interop) should be enough.  No need to
: > break things.
: 
: The proposal during the WG session was that we should add text so that
: for both algorithms and language tags, the negotiated value SHOULD be
: the same in both directions.  I'll send a more precise recommended
: edit in the next day or two..
: 
: Note the RFC2119 definition of SHOULD:
:    
:    3. SHOULD   This word, or the adjective "RECOMMENDED", mean that
:    there may exist valid reasons in particular circumstances to ignore
:    a particular item, but the full implications must be understood and
:    carefully weighed before choosing a different course.
: 
: Note that this is somewhat stronger than the plain-english meaning of
: SHOULD.
: 
: Given the current state of the documents (near approval by the IESG),
: I'm extremely reluctant to make a larger change at this point.
: 
: We can revisit this issue when we move beyond Proposed Standard.
: 
: (The process for advancement to Draft Standard requires that we
: document that all of the protocol features interoperate.  if nobody
: has actually implemented asymmetric algorithms, we can strike it at
: that point).
: 
: 					- Bill
: 
: P.S., There are certainly a few obscure applications where it makes
: sense to use different algorithms in each direction.  One which comes
: to mind is the case of a remote sensor/space probe/etc., where the
: "uplink" is low data-rate management/control traffic, where strong
: integrity protection is required to prevent the probe from being
: hijacked, and the "downlink" is a higher-volume, lower-value data
: stream, where weak integrity protection may be sufficient.

: From: Markus Friedl <markus%openbsd.org@localhost>
: Subject: Re: additional core draft nits in need of WG attention.
: To: Peter Gutmann <pgut001%cs.auckland.ac.nz@localhost>
: Cc: ietf-ssh%NetBSD.org@localhost
: Date: Mon, 17 Nov 2003 09:37:16 +0100
: 
: On Mon, Nov 17, 2003 at 02:06:20PM +1300, Peter Gutmann wrote:
: > >In IPsec the algorithms are unidirectional.  Why should it be a SHOULD for
: > >SSH?
: > 
: > In TLS the algorithms are bidirectional.  Why should it not be a SHOULD for
: > SSH?
: 
: Why should the SSH spec be changed again and again?  It's been like
: this for about 7 years.

Best regards,
/Niels



Home | Main Index | Thread Index | Old Index