Network Working Group. Category: Standards Track September Telnet Encryption: DES3 64 bit Cipher Feedback

Similar documents
Network Working Group. Category: Informational September 2000

September Copyright (C) The Internet Society (2000). All Rights Reserved.

Request for Comments: 2420 Category: Standards Track September The PPP Triple-DES Encryption Protocol (3DESE)

Request for Comments: Columbia U. November 2000

Category: Standards Track November Registration of Charset and Languages Media Features Tags. Status of this Memo

Network Working Group. Updates: 1858 June 2001 Category: Informational. Protection Against a Variant of the Tiny Fragment Attack

Network Working Group Request for Comments: Category: Standards Track April 2001

Using SRP for TLS Authentication

Request for Comments: 3401 Updates: 2276 October 2002 Obsoletes: 2915, 2168 Category: Informational

Request for Comments: 3007 Updates: 2535, 2136 November 2000 Obsoletes: 2137 Category: Standards Track. Secure Domain Name System (DNS) Dynamic Update

Request for Comments: 2711 Category: Standards Track BBN October 1999

Category: Standards Track August 2002

Network Working Group Request for Comments: DayDreamer March 1999

Request for Comments: 3206 Category: Standards Track February 2002

Network Working Group. Category: Informational Cisco Systems J. Brezak Microsoft February 2002

Network Working Group. Category: Standards Track. R. Hinden Nokia August 1999

Category: Standards Track August 2002

Category: Standards Track December 2003

Request for Comments: 2712 Category: Standards Track CyberSafe Corporation October 1999

Category: Standards Track October Session Description Protocol (SDP) Simple Capability Declaration

Network Working Group. Category: Standards Track January 1999 Updates: 2284, 1994, PPP LCP Internationalization Configuration Option

Network Working Group. Category: Standards Track NIST November 1998

Updates: 2710 September 2003 Category: Standards Track. Source Address Selection for the Multicast Listener Discovery (MLD) Protocol

Request for Comments: 2536 Category: Standards Track March DSA KEYs and SIGs in the Domain Name System (DNS)

Request for Comments: February Mobile IP Vendor/Organization-Specific Extensions

Request for Comments: 3566 Category: Standards Track Intel September The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec

Network Working Group. November Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4)

Request for Comments: 2976 Category: Standards Track October 2000

Network Working Group. Category: Standards Track March 2001

Request for Comments: 3548 July 2003 Category: Informational

Network Working Group Request for Comments: October Ethernet Automatic Protection Switching (EAPS) Version 1

Network Working Group Request for Comments: 2671 Category: Standards Track August 1999

Category: Standards Track June 1999

Network Working Group. Category: Standards Track Cisco Systems. D. Katz Juniper Networks Y. Rekhter. Cisco Systems. February 1998

Network Working Group Request for Comments: 3397 Category: Standards Track Apple Computer, Inc. November 2002

Expires: February 25, 2004 August 27, Using the NETCONF Configuration Protocol over Secure Shell (SSH) draft-wasserman-netconf-over-ssh-00.

Category: Informational March Portable Font Resource (PFR) - application/font-tdpfr MIME Sub-type Registration

Network Working Group. Category: Standards Track September The SRP Authentication and Key Exchange System

Request for Comments: 2537 Category: Standards Track March RSA/MD5 KEYs and SIGs in the Domain Name System (DNS)

Category: Standards Track September 2003

Category: Standards Track January 1994

Request for Comments: 3306 Category: Standards Track Microsoft August 2002

Network Working Group Request for Comments: Category: Best Current Practice January 2004

Network Working Group Request for Comments: IBM L. Masinter AT&T December 1999

RFC 3173 IP Payload Compression Protocol September 2001

Network Working Group Request for Comments: 3634 Category: Standards Track Comcast Cable J. Bevilacqua N. Davoust YAS Corporation December 2003

Network Working Group Request for Comments: 3363 Updates: 2673, T. Hain Editors August 2002

Request for Comments: 3153 Category: Standards Track C. Fox Cisco Systems August 2001

Request for Comments: 2393 Category: Standards Track Hi/fn R. Pereira TimeStep M. Thomas AltaVista Internet December 1998

Network Working Group Request for Comments: 2996 Category: Standards Track November 2000

Network Working Group Request for Comments: 2921 Category: Informational September 2000

J. Basney, NCSA Category: Experimental October 10, MyProxy Protocol

Request for Comments: 2771 Category: Informational February An Abstract API for Multicast Address Allocation

Network Working Group Request for Comments: 3137 Category: Informational Cisco Systems A. Zinin Nexsi Systems D. McPherson Amber Networks June 2001

Request for Comments: 2230 Category: Informational November 1997

Category: Informational 1 April 2001

Category: Standards Track January 1999

Request for Comments: 3110 Obsoletes: 2537 May 2001 Category: Standards Track. RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)

Network Working Group. Category: Standards Track December 2001

Network Working Group Request for Comments: 2751 Category: Standards Track January 2000

Request for Comments: 3601 Category: Standards Track September 2003

Request for Comments: 2493 Category: Standards Track January 1999

Network Working Group Request for Comments: 2342 Category: Standards Track Innosoft May 1998

Request for Comments: 3578 Category: Standards Track dynamicsoft J. Peterson NeuStar L. Ong Ciena August 2003

Network Working Group. Category: Experimental February TCP Congestion Control with Appropriate Byte Counting (ABC)

Category: Standards Track A. Malis Ascend Communications, Inc. September Inverse Address Resolution Protocol. Status of this Memo

Category: Informational March Methods for Avoiding the "Small-Subgroup" Attacks on the Diffie-Hellman Key Agreement Method for S/MIME

Network Working Group. A. Keromytis U. of Pennsylvania March DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System

Network Working Group. Category: Standards Track Nortel Networks April 2002

An Extension to the Selective Acknowledgement (SACK) Option for TCP

Updates: 2409 May 2005 Category: Standards Track. Algorithms for Internet Key Exchange version 1 (IKEv1)

Use and Interpretation of HTTP Version Numbers

Network Working Group. Obsoletes: draft-ietf-dhc-new-opt-msg-00.txt June 2000 Expires December 2000

Network Working Group. Extreme Networks July Intermediate System to Intermediate System (IS-IS) Cryptographic Authentication

Request for Comments: 3243 Category: Informational April 2002

draft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo

Copyright (C) The Internet Society (2001). All Rights Reserved.

Updates: 2535 November 2003 Category: Standards Track

Network Working Group. Category: Standards Track October Simple Authentication and Security Layer (SASL)

Category: Standards Track December 1998

Category: Informational November 2000

Request for Comments: 2672 Category: Standards Track August 1999

Network Working Group. Category: Informational September Nortel Networks. Multi-link Multi-node PPP Bundle Discovery Protocol

Request for Comments: 3192 Obsoletes: 2304 October 2001 Updates: 2846 Category: Standards Track

January The sender of this command is willing to send environment variables. The sender of this command refuses to send environment variables.

Request for Comments: October Transmission of IPv6 Packets over IEEE 1394 Networks

Network Working Group. Category: Standards Track September 2003

Network Working Group. Category: Standards Track September MIME Content Types in Media Feature Expressions

Category: Best Current Practice March 2000

R. Bergman Hitachi Koki Imaging Solutions September 2002

Network Working Group. Category: Standards Track June Dynamic Host Configuration Protocol for IPv6 (DHCPv6) Relay Agent Subscriber-ID Option

Category: Standards Track Cisco Systems, Inc. March 2005

Network Working Group. Category: Standards Track Netscape Communications Corp. May 1999

Category: Standards Track Cisco Systems, Inc January The Secure Shell (SSH) Session Channel Break Extension

E. Lewis ARIN September 23, KEY RR Secure Entry Point Flag draft-ietf-dnsext-keyrr-key-signing-flag-09. Status of this Memo

Network Working Group. Category: Standards Track ivmg V. Paxson ACIRI/ICSI E. Crabbe Exodus Communications June 2000

Request for Comments: 2476 Category: Standards Track MCI December 1998

Request for Comments: March 2003

Network Working Group. Sun Microsystems October 2001

Network Working Group Request for Comments: Category: Standards Track A. B. Roach dynamicsoft June 2002

Transcription:

Network Working Group J. Altman Request for Comments: 2947 Columbia University Category: Standards Track September 2000 Status of this Memo Telnet Encryption: DES3 64 bit Cipher Feedback This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2000). All Rights Reserved. Abstract This document specifies how to use the Triple-DES (data encryption standard) encryption algorithm in cipher feedback mode with the telnet encryption option. 1. Command Names and Codes Encryption Type DES3_CFB64 3 Suboption Commands CFB64_IV 1 CFB64_IV_OK 2 CFB64_IV_BAD 3 2. Command Meanings IAC SB ENCRYPT IS DES3_CFB64 CFB64_IV <initial vector> IAC SE The sender of this command generates a random 8 byte initial vector, and sends it to the other side of the connection using the CFB64_IV command. The initial vector is sent in clear text. Only the side of the connection that is WILL ENCRYPT may send the CFB64_IV command. Altman Standards Track [Page 1]

IAC SB ENCRYPT REPLY DES3_CFB64 CFB64_IV_OK IAC SE IAC SB ENCRYPT REPLY DES3_CFB64 CFB64_IV_BAD IAC SE The sender of these commands either accepts or rejects the initial vector received in a CFB64_IV command. Only the side of the connection that is DO ENCRYPT may send the CFB64_IV_OK and CFB64_IV_BAD commands. The CFB64_IV_OK command MUST be sent for backwards compatibility with existing implementations; there really isn t any reason why a sender would need to send the CFB64_IV_BAD command except in the case of a protocol violation where the IV sent was not of the correct length (i.e., 8 bytes). 3. Implementation Rules Once a CFB64_IV_OK command has been received, the WILL ENCRYPT side of the connection should do keyid negotiation using the ENC_KEYID command. Once the keyid negotiation has successfully identified a common keyid, then START and END commands may be sent by the side of the connection that is WILL ENCRYPT. Data will be encrypted using the DES3 64 bit Cipher Feedback algorithm. If encryption (decryption) is turned off and back on again, and the same keyid is used when re-starting the encryption (decryption), the intervening clear text must not change the state of the encryption (decryption) machine. If a START command is sent (received) with a different keyid, the encryption (decryption) machine must be re-initialized immediately following the end of the START command with the new key and the initial vector sent (received) in the last CFB64_IV command. If a new CFB64_IV command is sent (received), and encryption (decryption) is enabled, the encryption (decryption) machine must be re-initialized immediately following the end of the CFB64_IV command with the new initial vector, and the keyid sent (received) in the last START command. If encryption (decryption) is not enabled when a CFB64_IV command is sent (received), the encryption (decryption) machine must be reinitialized after the next START command, with the keyid sent (received) in that START command, and the initial vector sent (received) in this CFB64_IV command. Altman Standards Track [Page 2]

4. Algorithm DES3 64 bit Cipher Feedback key1 key2 key3 v v v +-------+ +-------+ +-------+ +-> DES-e -> DES-d -> DES-e -- + +-------+ +-------+ +-------+ v INPUT --(-------------------------------->(+)+---> DATA +------------------------------------+ Given: iv: Initial vector, 64 bits (8 bytes) long. Dn: the nth chunk of 64 bits (8 bytes) of data to encrypt (decrypt). On: the nth chunk of 64 bits (8 bytes) of encrypted (decrypted) output. V0 = DES-e(DES-d(DES-e(iV, key1),key2),key3) On = Dn ^ Vn V(n+1) = DES-e(DES-d(DES-e(On, key1),key2),key3) 5. Integration with the AUTHENTICATION telnet option As noted in the telnet ENCRYPTION option specifications, a keyid value of zero indicates the default encryption key, as might be derived from the telnet AUTHENTICATION option. If the default encryption key negotiated as a result of the telnet AUTHENTICATION option contains less than 16 bytes, then the DES3_CFB64 option must not be offered or used as a valid telnet encryption option. The following rules are to be followed for creating three DES encryption keys based upon the available encrypt key data: keys_to_use = bytes of key data / DES block size (8 bytes) where the keys are labeled "key1" through "key6" with "key1" being the first 8 bytes; "key2" the second 8 bytes;... and "key6" being sixth 8 bytes (if available). Altman Standards Track [Page 3]

When two keys are available: key2, and encrypted with key1; key1, and encrypted with key2 When three keys are available: key3, and encrypted with key1 When four keys are available: key4, and encrypted with key1 When five keys are available: key4, and encrypted with key5 When six keys are available:. data sent from the client is encrypted with key4, decrypted with key5, and encrypted with key6 In all cases, the keys used by DES3_CFB64 must have their parity corrected after they are determined using the above algorithm. Note that the above algorithm assumes that it is safe to use a non-des key (or part of a non-des key) as a DES key. This is not necessarily true of all cipher systems, but we specify this behaviour as the default since it is true for most authentication systems in popular use today, and for compatibility with existing Altman Standards Track [Page 4]

implementations. New telnet AUTHENTICATION mechanisms may specify alternative methods for determining the keys to be used for this cipher suite in their specification, if the session key negotiated by that authentication mechanism is not a DES key and and where this algorithm may not be safely used. 6. Security Considerations Encryption using Cipher Feedback does not ensure data integrity; the active attacker has a limited ability to modify text, if he can predict the clear-text that was being transmitted. The limitations faced by the attacker (that only 8 bytes can be modified at a time, and the following 8-byte block of data will be corrupted, thus making detection likely) are significant, but it is possible that an active attacker still might be able to exploit this weakness. The tradeoff here is that adding a message authentication code (MAC) will significantly increase the number of bytes needed to send a single character in the telnet protocol, which will impact performance on slow (i.e. dialup) links. 7. Acknowledgments This document was based on the "Telnet Encryption: DES 64 bit Cipher Feedback" document originally written by Dave Borman of Cray Research with the assistance of the IETF Telnet Working Group. Author s Address Jeffrey Altman, Editor Columbia University 612 West 115th Street Room 716 New York NY 10025 USA Phone: +1 (212) 854-1344 EMail: jaltman@columbia.edu Altman Standards Track [Page 5]

Full Copyright Statement Copyright (C) The Internet Society (2000). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Acknowledgement Funding for the RFC Editor function is currently provided by the Internet Society. Altman Standards Track [Page 6]