IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: draft-baushke-ssh-dh-group-sha2-01 (was Re: DH group exchange)



Hello Mark,

appreciated, and agreed.

Given these recommendations, we should consider what to do about hmac-sha2-384.

In RFC 6668, we mentioned it, but did not actually define it.

It seems that there is now a need to define hmac-sha2-384 formally. It has the advantage of 16 fewer bytes being used for MAC.

On the other hand, I'm not sure that there's a need for rsa-sha2-384. I don't see advantages compared to rsa-sha2-512, which the current draft defines.

I wonder what the implications are for AES-GCM. As generally used, the tag size is not more than 128 bits. Is this deemed sufficiently quantum resistant?

denis


----- Original Message -----
From: Mark D. Baushke
Sent: Wednesday, January 27, 2016 11:19
To: ietf-ssh%NetBSD.org@localhost ; NielsMöller ; Damien Miller ; Peter Gutmann ; denis bider ; Jeffrey Hutzelman ; Stephen Farrell ; Jon Bright ; Simon Tatham
Subject: Re: draft-baushke-ssh-dh-group-sha2-01 (was Re: DH group exchange)

Hi Folks,

> URL: https://datatracker.ietf.org/doc/draft-baushke-ssh-dh-group-sha2

I just noticed that the Information Assurance Directorate at the NSA has
a new article on 'CNSA Suite and Quantum Computing FAQ' ... their URL is

https://www.iad.gov/iad/library/ia-guidance/ia-solutions-for-classified/algorithm-guidance/cnsa-suite-and-quantum-computing-faq.cfm

Reading the document, they are mandating that NSS no longer use
Diffie-Hellman with 2048-bit keys instead they are suggesting
IETF RFC 3526 (Groups 15-18).

They are also no longer interested in using SHA-256 wanting SHA-384.

For folks interested in compliance with the CNSA Suite, does it make
sense for the baushke-ssh-dh-gorup-sha2 ID to be updated to specify
either SHA-384 (or possibly SHA-512)?

That is change from this:

   Key Exchange Method Name          Note
   diffie-hellman-group1-sha1        NOT RECOMMENDED
   diffie-hellman-group14-sha256     RECOMMENDED
   diffie-hellman-group15-sha256     RECOMMENDED
   diffie-hellman-group16-sha256     OPTIONAL

to this:

   Key Exchange Method Name          Note
   diffie-hellman-group1-sha1        NOT RECOMMENDED
   diffie-hellman-group14-sha256     RECOMMENDED
   diffie-hellman-group15-sha384     RECOMMENDED
   diffie-hellman-group16-sha384     OPTIONAL
   diffie-hellman-group17-sha512     OPTIONAL
   diffie-hellman-group18-sha512     OPTIONAL

I am suggesting sha512 for group17 and group18 as a minor bit of
future-proffing and/or performance trade-off for sha512 hardware
acceleration that may exist.

Comments please?

-- Mark



Home | Main Index | Thread Index | Old Index