Network Working Group Request for Comments: 4869 Category: Informational May Suite B Cryptographic Suites for IPsec. Status of This Memo

Similar documents
Internet Engineering Task Force (IETF) Request for Comments: 6379 Obsoletes: 4869 Category: Informational October 2011 ISSN:

Updates: 2409 May 2005 Category: Standards Track. Algorithms for Internet Key Exchange version 1 (IKEv1)

Network Working Group Request for Comments: Category: Standards Track August 2008

Network Working Group. J. Lee Samsung Electronics T. Iwata Nagoya University August 2006

Category: Informational May Use of Hash Algorithms in Internet Key Exchange (IKE) and IPsec

Network Working Group Request for Comments: 4162 Category: Standards Track KISA August 2005

Network Working Group. Category: Standards Track August Dynamic Host Configuration Protocol for IPv6 (DHCPv6) Relay Agent Remote-ID Option

Network Working Group Request for Comments: 4432 March 2006 Category: Standards Track

Network Working Group. Category: Standards Track January 2006

Network Working Group. J. Lee Samsung Electronics June 2006

Network Working Group. Cisco Systems June 2007

Category: Informational September 2004

Network Working Group Request for Comments: 4573 Category: Standard Track July MIME Type Registration for RTP Payload Format for H.

Network Working Group. Category: Standards Track June Dynamic Host Configuration Protocol for IPv6 (DHCPv6) Relay Agent Subscriber-ID Option

Request for Comments: 5179 Category: Standards Track May 2008

Category: Standards Track October 2006

Category: Standards Track December 2007

Network Working Group Request for Comments: 4603 Category: Informational Cisco Systems July Additional Values for the NAS-Port-Type Attribute

Network Working Group. Category: Standards Track NIST May Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec

Expires: October 9, 2005 April 7, 2005

Network Working Group. February 2005

Category: Standards Track June 2006

Request for Comments: 5010 Category: Standards Track Cisco Systems, Inc. September 2007

Request for Comments: 3934 Updates: 2418 October 2004 BCP: 94 Category: Best Current Practice

Request for Comments: 4255 Category: Standards Track SPARTA January Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints

Network Working Group Request for Comments: 4424 February 2006 Updates: 4348 Category: Standards Track

Request for Comments: 4633 Category: Experimental August 2006

Network Working Group. Updates: 3463, 4468, 4954 June 2008 Category: Best Current Practice. A Registry for SMTP Enhanced Mail System Status Codes

Request for Comments: 4509 Category: Standards Track May Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)

Request for Comments: 5208 Category: Informational May 2008

Category: Standards Track October Vendor-Identifying Vendor Options for Dynamic Host Configuration Protocol version 4 (DHCPv4)

Request for Comments: K. Norrman Ericsson June 2006

Network Working Group. Category: Standards Track June 2005

Request for Comments: 4680 Updates: 4346 September 2006 Category: Standards Track

Network Working Group. Intended status: Standards Track Columbia U. Expires: March 5, 2009 September 1, 2008

Category: Standards Track Cisco Systems, Inc. March 2005

Network Working Group Request for Comments: December 2004

Category: Standards Track September MIB Textual Conventions for Uniform Resource Identifiers (URIs)

Request for Comments: May 2007

Request for Comments: 3932 October 2004 BCP: 92 Updates: 3710, 2026 Category: Best Current Practice

Network Working Group. Category: Informational May OSPF Database Exchange Summary List Optimization

Category: Standards Track June Requesting Attributes by Object Class in the Lightweight Directory Access Protocol (LDAP) Status of This Memo

Network Working Group. Category: Standards Track Samsung S. Kumar Tech Mahindra Ltd S. Madanapalli Samsung May 2008

Request for Comments: 3566 Category: Standards Track Intel September The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec

September The Internet Assigned Number Authority (IANA) tel Uniform Resource Identifier (URI) Parameter Registry. Status of This Memo

Internet Engineering Task Force (IETF) Category: Informational. July Reclassification of Suite B Documents to Historic Status

Network Working Group Request for Comments: August Address-Prefix-Based Outbound Route Filter for BGP-4

Network Working Group. Siemens Networks GmbH & Co KG February Online Certificate Status Protocol (OCSP) Extensions to IKEv2

Network Working Group. N. Williams Sun Microsystems June 2006

Network Working Group Request for Comments: Cisco Systems, Inc. December 2005

Network Working Group. Category: Standards Track Juniper Networks August 2008

Request for Comments: 4759 Category: Standards Track Neustar Inc. L. Conroy Roke Manor Research November 2006

Network Working Group Request for Comments: 4143 Category: Standards Track Brandenburg November 2005

C. Martin ipath Services February A Policy Control Mechanism in IS-IS Using Administrative Tags

Category: Standards Track May Transport Layer Security Protocol Compression Methods

Network Working Group. M. Duckett T. Anschutz BellSouth J. Moisand Juniper Networks September 2006

Network Working Group. February Media Gateway Control Protocol (MGCP) Redirect and Reset Package

Network Working Group. Category: Standards Track Cisco Systems May 2007

Network Working Group. Category: Standards Track July 2007

Request for Comments: 4571 Category: Standards Track July 2006

Request for Comments: 5079 Category: Standards Track December Rejecting Anonymous Requests in the Session Initiation Protocol (SIP)

Request for Comments: Category: Best Current Practice June 2008

Network Working Group Request for Comments: 4242 Category: Standards Track University of Southampton B. Volz Cisco Systems, Inc.

Network Working Group. Category: Informational January 2006

Request for Comments: Starent Networks A. Lior Bridgewater Systems K. Leung Cisco Systems October 2007

Category: Standards Track Cisco H. Tschofenig Nokia Siemens Networks August 2008

Jabber, Inc. August 20, 2004

Category: Best Current Practice February Early IANA Allocation of Standards Track Code Points

Network Working Group. BCP: 131 July 2007 Category: Best Current Practice

Category: Standards Track Redback Networks June 2008

Category: Standards Track LabN Consulting, LLC July 2008

Intended status: Informational. B. Wyman October 2, 2007

Network Working Group. Category: Standards Track NIST November 1998

Request for Comments: 4715 Category: Informational NTT November 2006

Category: Standards Track Cisco Systems, Inc January The Secure Shell (SSH) Session Channel Break Extension

Request for Comments: 3861 Category: Standards Track August 2004

Category: Experimental April BinaryTime: An Alternate Format for Representing Date and Time in ASN.1

Category: Standards Track March Extensible Provisioning Protocol (EPP) Transport Over TCP

Expires in six months 24 October 2004 Obsoletes: RFC , , 3377, 3771

Isode Limited March 2008

Network Working Group Request for Comments: Cisco Systems, Inc. June 2006

Network Working Group. Category: Informational October 2005

Network Working Group. Category: Standards Track Cisco Systems, Inc. April 2004

Network Working Group Request for Comments: A. Zinin Alcatel-Lucent March 2007

Network Working Group Internet-Draft January 25, 2006 Expires: July 29, Feed Rank draft-snell-atompub-feed-index-05.txt. Status of this Memo

Request for Comments: 4393 Category: Standards Track March MIME Type Registrations for 3GPP2 Multimedia Files

Network Working Group Request for Comments: 4558 Category: Standards Track Cisco Systems D. Papadimitriou Alcatel June 2006

Category: Standards Track October 2006

Network Working Group Internet-Draft August 2005 Expires: February 2, Atom Link No Follow draft-snell-atompub-feed-nofollow-00.

Network Working Group Request for Comments: February 2006

Request for Comments: 5156 Category: Informational April 2008

Network Working Group Request for Comments: 5167 Category: Informational Polycom March 2008

Request for Comments: 3968 Updates: 3427 December 2004 BCP: 98 Category: Best Current Practice

Network Working Group. Category: Informational SPARTA, Inc. S. Crocker Shinkuro Inc. S. Krishnaswamy SPARTA, Inc. August 2007

HIIT L. Eggert Nokia April Host Identity Protocol (HIP) Registration Extension

Network Working Group Request for Comments: September IANA Considerations for the IPv4 and IPv6 Router Alert Options

Network Working Group. Category: Informational April A Uniform Resource Name (URN) Namespace for the Open Geospatial Consortium (OGC)

Category: Experimental June 2006

Category: Informational Woven Systems May 2008

Request for Comments: Category: Standards Track January 2008

Transcription:

Network Working Group Request for Comments: 4869 Category: Informational L. Law J. Solinas NSA May 2007 Status of This Memo Suite B Cryptographic Suites for IPsec This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The IETF Trust (2007). Abstract This document proposes four optional cryptographic user interface suites ("UI suites") for IPsec, similar to the two suites specified in RFC 4308. The four new suites provide compatibility with the United States National Security Agency s Suite B specifications. Table of Contents 1. Introduction...2 2. Requirements Terminology...2 3. New UI Suites...2 3.1. Suite "Suite-B-GCM-128"...2 3.2. Suite "Suite-B-GCM-256"...3 3.3. Suite "Suite-B-GMAC-128"...4 3.4. Suite "Suite-B-GMAC-256"...5 4. Security Considerations...5 5. IANA Considerations...6 6. References...6 6.1. Normative References...6 6.2. Informative References...7 Law & Solinas Informational [Page 1]

1. Introduction [RFC4308] proposes two optional cryptographic user interface suites ("UI suites") for IPsec. The two suites, VPN-A and VPN-B, represent commonly used present-day corporate VPN security choices and anticipated future choices, respectively. This document proposes four new UI suites based on implementations of the United States National Security Agency s Suite B algorithms (see [SuiteB]). As with the VPN suites, the Suite B suites are simply collections of values for some options in IPsec. Use of UI suites does not change the IPsec protocols in any way. 2. Requirements Terminology The key words "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY" in this document are to be interpreted as described in [RFC2119]. 3. New UI Suites Each of the following UI suites provides choices for ESP (see [RFC4303]) and for IKEv1 and IKEv2 (see [RFC2409] and [RFC4306]). The four suites are differentiated by the choice of cryptographic algorithm strengths and a choice of whether the Encapsulating Security Payload (ESP) is to provide both confidentiality and integrity or integrity only. The suite names are based on the Advanced Standard [AES] mode and AES key length specified for ESP. IPsec implementations that use these UI suites SHOULD use the suite names listed here. IPsec implementations SHOULD NOT use names different than those listed here for the suites that are described, and MUST NOT use the names listed here for suites that do not match these values. These requirements are necessary for interoperability. 3.1. Suite "Suite-B-GCM-128" This suite provides ESP integrity protection and confidentiality using 128-bit AES-GCM (see [RFC4106]). This suite or the following suite should be used when ESP integrity protection and encryption are both needed. ESP: AES with 128-bit keys and 16-octet Check Value (ICV) in GCM mode [RFC4106] NULL Law & Solinas Informational [Page 2]

IKEv1: Hash Group Type AES with 128-bit keys in CBC mode HMAC-SHA-256 [RFC4868] SHA-256 [FIPS-180-2] [RFC4634] 256-bit random ECP group [RFC4753] ECP For IKEv1, Phase 1 SHOULD use Main mode. IKEv1 implementations MUST support pre-shared key authentication [RFC2409] for interoperability. The authentication method used with IKEv1 MAY be either pre-shared key [RFC2409] or ECDSA-256 [RFC4754]. IKEv2: Authentication AES with 128-bit keys in CBC mode HMAC-SHA-256 [RFC4868] HMAC-SHA-256-128 [RFC4868] 256-bit random ECP group [RFC4753] ECDSA-256 [RFC4754] Rekeying of Phase 2 (for IKEv1) or the CREATE_CHILD_SA (for IKEv2) MUST be supported by both parties in this suite. 3.2. Suite "Suite-B-GCM-256" This suite provides ESP integrity protection and confidentiality using 256-bit AES-GCM (see [RFC4106]). This suite or the preceding suite should be used when ESP integrity protection and encryption are both needed. ESP: AES with 256-bit keys and 16-octet ICV in GCM mode [RFC4106] NULL IKEv1: Hash Group Type AES with 256-bit keys in CBC mode HMAC-SHA-384 [RFC4868] SHA-384 [FIPS-180-2] [RFC4634] 384-bit random ECP group [RFC4753] ECP For IKEv1, Phase 1 SHOULD use Main mode. IKEv1 implementations MUST support pre-shared key authentication [RFC2409] for interoperability. The authentication method used with IKEv1 MAY be either pre-shared key [RFC2409] or ECDSA-384 [RFC4754]. Law & Solinas Informational [Page 3]

IKEv2: Authentication AES with 256-bit keys in CBC mode HMAC-SHA-384 [RFC4868] HMAC-SHA-384-192 [RFC4868] 384-bit random ECP group [RFC4753] ECDSA-384 [RFC4754] Rekeying of Phase 2 (for IKEv1) or the CREATE_CHILD_SA (for IKEv2) MUST be supported by both parties in this suite. 3.3. Suite "Suite-B-GMAC-128" This suite provides ESP integrity protection using 128-bit AES-GMAC (see [RFC4543]) but does not provide confidentiality. This suite or the following suite should be used only when there is no need for ESP encryption. ESP: NULL AES with 128-bit keys in GMAC mode [RFC4543] IKEv1: Hash Group Type AES with 128-bit keys in CBC mode HMAC-SHA-256 [RFC4868] SHA-256 [FIPS-180-2] [RFC4634] 256-bit random ECP group [RFC4753] ECP For IKEv1, Phase 1 SHOULD use Main mode. IKEv1 implementations MUST support pre-shared key authentication [RFC2409] for interoperability. The authentication method used with IKEv1 MAY be either pre-shared key [RFC2409] or ECDSA-256 [RFC4754]. IKEv2: Authentication AES with 128-bit keys in CBC mode HMAC-SHA-256 [RFC4868] HMAC-SHA-256-128 [RFC4868] 256-bit random ECP group [RFC4753] ECDSA-256 [RFC4754] Rekeying of Phase 2 (for IKEv1) or the CREATE_CHILD_SA (for IKEv2) MUST be supported by both parties in this suite. Law & Solinas Informational [Page 4]

3.4. Suite "Suite-B-GMAC-256" This suite provides ESP integrity protection using 256-bit AES-GMAC (see [RFC4543]) but does not provide confidentiality. This suite or the preceding suite should be used only when there is no need for ESP encryption. ESP: NULL AES with 256-bit keys in GMAC mode [RFC4543] IKEv1: Hash Group Type AES with 256-bit keys in CBC mode HMAC-SHA-384 [RFC4868] SHA-384 [FIPS-180-2] [RFC4634] 384-bit random ECP group [RFC4753] ECP For IKEv1, Phase 1 SHOULD use Main mode. IKEv1 implementations MUST support pre-shared key authentication [RFC2409] for interoperability. The authentication method used with IKEv1 MAY be either pre-shared key [RFC2409] or ECDSA-384 [RFC4754]. IKEv2: Authentication AES with 256-bit keys in CBC mode HMAC-SHA-384 [RFC4868] HMAC-SHA-384-192 [RFC4868] 384-bit random ECP group [RFC4753] ECDSA-384 [RFC4754] Rekeying of Phase 2 (for IKEv1) or the CREATE_CHILD_SA (for IKEv2) MUST be supported by both parties in this suite. 4. Security Considerations This document inherits all of the security considerations of the IPsec, IKEv1, and IKEv2 documents. See [CNSSP-15] for guidance on the use of AES in these suites for the protection of U.S. Government information. Some of the security options specified in these suites may be found in the future to have properties significantly weaker than those that were believed at the time this document was produced. Law & Solinas Informational [Page 5]

5. IANA Considerations IANA has created and will maintain a registry called "Cryptographic Suites for IKEv1, IKEv2, and IPsec" (see [IANA-Suites]). The registry consists of a text string and an RFC number that lists the associated transforms. The four new suites in this document have been added to this registry after approval by an expert designated by the IESG. The new values for the registry are: Identifier Defined in Suite-B-GCM-128 RFC 4869 Suite-B-GCM-256 RFC 4869 Suite-B-GMAC-128 RFC 4869 Suite-B-GMAC-256 RFC 4869 6. References 6.1. Normative References [FIPS-180-2] FIPS 180-2 with change notice, "Secure Hash Standard", National Institute of Standards and Technology, February 2004. [IANA-Suites] Internet Assigned Numbers Authority, "Cryptographic Suites for IKEv1, IKEv2, and IPsec", <http://www.iana.org/assignments/crypto-suites>. [RFC2119] [RFC2409] [RFC4106] [RFC4303] [RFC4306] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. Harkins, D. and D. Carrel, "The Internet Key Exchange (IKE)", RFC 2409, November 1998. Frankel, S., Glenn, R., and S. Kelly, "The AES-CBC Cipher Algorithm and Its Use with IPsec", RFC 3602, September 2003. Viega, J. and D. McGrew, "The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP)", RFC 4106, June 2005. Kent, S., "IP Encapsulating Security Payload (ESP)", RFC 4303, December 2005. Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", RFC 4306, December 2005. Law & Solinas Informational [Page 6]

[RFC4308] [RFC4543] [RFC4753] [RFC4754] [RFC4868] Hoffman, P., "Cryptographic Suites for IPsec", RFC 4308, December 2005. McGrew, D. and J. Viega, "The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH", RFC 4543, May 2006. Fu, D. and J. Solinas, "ECP Groups for IKE and IKEv2", RFC 4753, November 2006. Fu, D. and J. Solinas, "IKE and IKEv2 Authentication Using ECDSA", RFC 4754, November 2006. Kelly, S. and S. Frankel, "Using HMAC-SHA-256, HMAC- SHA-384, and HMAC-SHA-512 with IPsec", RFC 4868, May 2007. 6.2. Informative References [AES] [CNSSP-15] [RFC4634] [SuiteB] U.S. Department of Commerce/National Institute of Standards and Technology, "Advanced Standard (AES)", FIPS PUB 197, November 2001, <http://csrc.nist.gov/publications/fips/index.html>. Committee on National Security Systems, "National Policy on the Use of the Advanced Standard (AES) to Protect National Security Systems and National Security Information", June 2003, <http://www.cnss.gov/assets/pdf/cnssp_15_fs.pdf>. Eastlake 3rd, D. and T. Hansen, "US Secure Hash Algorithms (SHA and HMAC-SHA)", RFC 4634, July 2006. U.S. National Security Agency, "Fact Sheet NSA Suite B Cryptography", July 2005, <http://www.nsa.gov/ia/ industry/crypto_suite_b.cfm?menuid=10.2.7>. Law & Solinas Informational [Page 7]

Authors Addresses Laurie E. Law National Information Assurance Research Laboratory National Security Agency EMail: lelaw@orion.ncsc.mil Jerome A. Solinas National Information Assurance Research Laboratory National Security Agency EMail: jasolin@orion.ncsc.mil Law & Solinas Informational [Page 8]

Full Copyright Statement Copyright (C) The IETF Trust (2007). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org. Acknowledgement Funding for the RFC Editor function is currently provided by the Internet Society. Law & Solinas Informational [Page 9]