diff options
Diffstat (limited to 'doc/rfc/rfc4305.txt')
-rw-r--r-- | doc/rfc/rfc4305.txt | 507 |
1 files changed, 507 insertions, 0 deletions
diff --git a/doc/rfc/rfc4305.txt b/doc/rfc/rfc4305.txt new file mode 100644 index 0000000..a740930 --- /dev/null +++ b/doc/rfc/rfc4305.txt @@ -0,0 +1,507 @@ + + + + + + +Network Working Group D. Eastlake 3rd +Request for Comments: 4305 Motorola Laboratories +Obsoletes: 2404, 2406 December 2005 +Category: Standards Track + + + Cryptographic Algorithm Implementation Requirements for + Encapsulating Security Payload (ESP) and Authentication Header (AH) + +Status of This Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2005). + +Abstract + + The IPsec series of protocols makes use of various cryptographic + algorithms in order to provide security services. The Encapsulating + Security Payload (ESP) and the Authentication Header (AH) provide two + mechanisms for protecting data being sent over an IPsec Security + Association (SA). To ensure interoperability between disparate + implementations, it is necessary to specify a set of mandatory-to- + implement algorithms to ensure that there is at least one algorithm + that all implementations will have available. This document defines + the current set of mandatory-to-implement algorithms for ESP and AH + as well as specifying algorithms that should be implemented because + they may be promoted to mandatory at some future time. + + + + + + + + + + + + + + + + + +Eastlake Standards Track [Page 1] + +RFC 4305 Cryptographic Algorithms for ESP & AH December 2005 + + +Table of Contents + + 1. Introduction ....................................................2 + 2. Requirements Terminology ........................................3 + 3. Algorithm Selection .............................................3 + 3.1. Encapsulating Security Payload .............................3 + 3.1.1. ESP Encryption and Authentication Algorithms ........4 + 3.1.2. ESP Combined Mode Algorithms ........................4 + 3.2. Authentication Header ......................................5 + 4. Security Considerations .........................................5 + 5. Acknowledgement .................................................5 + 6. Changes from RFC 2402 and 2406 ..................................6 + 7. Normative References ............................................6 + 8. Informative References ..........................................7 + +1. Introduction + + The Encapsulating Security Payload (ESP) and the Authentication + Header (AH) provide two mechanisms for protecting data being sent + over an IPsec Security Association (SA) [IPsec, ESP, AH]. To ensure + interoperability between disparate implementations, it is necessary + to specify a set of mandatory-to-implement algorithms to ensure that + there is at least one algorithm that all implementations will have + available. This document defines the current set of mandatory-to- + implement algorithms for ESP and AH as well as specifying algorithms + that should be implemented because they may be promoted to mandatory + at some future time. + + The nature of cryptography is that new algorithms surface + continuously and existing algorithms are continuously attacked. An + algorithm believed to be strong today may be demonstrated to be weak + tomorrow. Given this, the choice of mandatory-to-implement algorithm + should be conservative so as to minimize the likelihood of it being + compromised quickly. Thought should also be given to performance + considerations as many uses of IPsec will be in environments where + performance is a concern. + + Finally, we need to recognize that the mandatory-to-implement + algorithm(s) may need to change over time to adapt to the changing + world. For this reason, the selection of mandatory-to-implement + algorithms is not included the main IPsec, ESP, or AH specifications. + It is instead placed in this document. As the choice of algorithm + changes, only this document should need to be updated. + + Ideally, the mandatory-to-implement algorithm of tomorrow should + already be available in most implementations of IPsec by the time it + is made mandatory. To facilitate this, we will attempt to identify + such algorithms (as they are known today) in this document. There is + + + +Eastlake Standards Track [Page 2] + +RFC 4305 Cryptographic Algorithms for ESP & AH December 2005 + + + no guarantee that the algorithms we believe today may be mandatory in + the future will in fact become so. All algorithms known today are + subject to cryptographic attack and may be broken in the future. + +2. Requirements Terminology + + Keywords "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT" and + "MAY" that appear in this document are to be interpreted as described + in [RFC2119]. + + We define some additional terms here: + + SHOULD+ This term means the same as SHOULD. However, it is + likely that an algorithm marked as SHOULD+ will be + promoted at some future time to be a MUST. + SHOULD- This term means the same as SHOULD. However, it is + likely that an algorithm marked as SHOULD- will be + deprecated to a MAY or worse in a future version of this + document. + MUST- This term means the same as MUST. However, we expect + that at some point in the future this algorithm will no + longer be a MUST. + +3. Algorithm Selection + + For IPsec implementations to interoperate, they must support one or + more security algorithms in common. This section specifies the + security algorithm implementation requirements for standards- + conformant ESP and AH implementations. The security algorithms + actually used for any particular ESP or AH security association are + determined by a negotiation mechanism, such as the Internet Key + Exchange (IKE [RFC2409, IKEv2]) or pre-establishment. + + Of course, additional standard and proprietary algorithms beyond + those listed below can be implemented. + +3.1. Encapsulating Security Payload + + The implementation conformance requirements for security algorithms + for ESP are given in the tables below. See Section 2 for definitions + of the values in the "Requirement" column. + + + + + + + + + + +Eastlake Standards Track [Page 3] + +RFC 4305 Cryptographic Algorithms for ESP & AH December 2005 + + +3.1.1. ESP Encryption and Authentication Algorithms + + These tables list encryption and authentication algorithms for the + IPsec Encapsulating Security Payload protocol. + + Requirement Encryption Algorithm (notes) + ----------- -------------------- + MUST NULL (1) + MUST- TripleDES-CBC [RFC2451] + SHOULD+ AES-CBC with 128-bit keys [RFC3602] + SHOULD AES-CTR [RFC3686] + SHOULD NOT DES-CBC [RFC2405] (3) + + Requirement Authentication Algorithm (notes) + ----------- ------------------------ + MUST HMAC-SHA1-96 [RFC2404] + MUST NULL (1) + SHOULD+ AES-XCBC-MAC-96 [RFC3566] + MAY HMAC-MD5-96 [RFC2403] (2) + + Notes: + + (1) Since ESP encryption and authentication are optional, support for + the two "NULL" algorithms is required to maintain consistency + with the way these services are negotiated. Note that while + authentication and encryption can each be "NULL", they MUST NOT + both be "NULL". + (2) Weaknesses have become apparent in MD5; however, these should not + affect the use of MD5 with HMAC. + (3) DES, with its small key size and publicly demonstrated and open- + design special-purpose cracking hardware, is of questionable + security for general use. + +3.1.2. ESP Combined Mode Algorithms + + As specified in [ESP], combined mode algorithms are supported that + provide both confidentiality and authentication services. Support of + such algorithms will require proper structuring of ESP + implementations. Under many circumstances, combined mode algorithms + provide significant efficiency and throughput advantages. Although + there are no suggested or required combined algorithms at this time, + AES-CCM [CCM], which has been adopted as the preferred mode for + security in IEEE 802.11 [802.11i], is expected to be of interest in + the near future. + + + + + + + +Eastlake Standards Track [Page 4] + +RFC 4305 Cryptographic Algorithms for ESP & AH December 2005 + + +3.2. Authentication Header + + The implementation conformance requirements for security algorithms + for AH are given below. See Section 2 for definitions of the values + in the "Requirement" column. As you would suspect, all of these + algorithms are authentication algorithms. + + Requirement Algorithm (notes) + ----------- --------- + MUST HMAC-SHA1-96 [RFC2404] + SHOULD+ AES-XCBC-MAC-96 [RFC3566] + MAY HMAC-MD5-96 [RFC2403] (1) + + Note: + + (1) Weaknesses have become apparent in MD5; however, these should not + affect the use of MD5 with HMAC. + +4. Security Considerations + + The security of cryptographic-based systems depends on both the + strength of the cryptographic algorithms chosen and the strength of + the keys used with those algorithms. The security also depends on + the engineering and administration of the protocol used by the system + to ensure that there are no non-cryptographic ways to bypass the + security of the overall system. + + This document concerns itself with the selection of cryptographic + algorithms for the use of ESP and AH, specifically with the selection + of mandatory-to-implement algorithms. The algorithms identified in + this document as "MUST implement" or "SHOULD implement" are not known + to be broken at the current time, and cryptographic research so far + leads us to believe that they will likely remain secure into the + foreseeable future. However, this is not necessarily forever. We + would therefore expect that new revisions of this document will be + issued from time to time that reflect the current best practice in + this area. + +5. Acknowledgement + + Much of the wording herein was adapted from RFC 4307, "Cryptographic + Algorithms for Use in the Internet Key Exchange Version 2", by + Jeffrey I. Schiller. + + + + + + + + +Eastlake Standards Track [Page 5] + +RFC 4305 Cryptographic Algorithms for ESP & AH December 2005 + + +6. Changes from RFC 2402 and 2406 + + [RFC2402] and [RFC2406] defined the IPsec Authentication Header and + IPsec Encapsulating Security Payload. Each specified the + implementation requirements for cryptographic algorithms for their + respective protocols. They have now been replaced with [AH] and + [ESP], which do not specify cryptographic algorithm implementation + requirements, and this document, which specifies such requirements + for both [AH] and [ESP]. + + The implementation requirements are compared below: + + Old Old New + Req. RFC(s) Requirement Algorithm (notes) + --- ------ ----------- --------- + MUST 2406 SHOULD NOT DES-CBC [RFC2405] (1) + MUST 2402 2406 MAY HMAC-MD5-96 [RFC2403] + MUST 2402 2406 MUST HMAC-SHA1-96 [RFC2404] + + Note: + + (1) The IETF deprecated the use of single DES years ago and has not + included it in any new standard for some time (see IESG note on + the first page of [RFC2407]). But this document represents the + first standards-track recognition of that deprecation by + specifying that implementations SHOULD NOT provide single DES. + The US Government National Institute of Standards and Technology + (NIST) has formally recognized the weakness of single DES by a + notice published in the 26 July 2004 US Government Federal + Register (Docket No. 040602169-4169-01) proposing to withdraw it + as a US Government Standard. Triple DES remains approved by both + the IETF and NIST. + +7. Normative References + + [AH] Kent, S., "IP Authentication Header", RFC 4302, December + 2005. + + [ESP] Kent, S., "IP Encapsulating Security Payload (ESP)", RFC + 4303, December 2005. + + [IPsec] Kent, S., "Security Architecture for the Internet + Protocol", RFC 4301, December 2005. + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + + + + +Eastlake Standards Track [Page 6] + +RFC 4305 Cryptographic Algorithms for ESP & AH December 2005 + + + [RFC2403] Madson, C. and R. Glenn, "The Use of HMAC-MD5-96 within + ESP and AH", RFC 2403, November 1998. + + [RFC2404] Madson, C. and R. Glenn, "The Use of HMAC-SHA-1-96 within + ESP and AH", RFC 2404, November 1998. + + [RFC2405] Madson, C. and N. Doraswamy, "The ESP DES-CBC Cipher + Algorithm With Explicit IV", RFC 2405, November 1998. + + [RFC3566] Frankel, S. and H. Herbert, "The AES-XCBC-MAC-96 + Algorithm and Its Use With IPsec", RFC 3566, September + 2003. + + [RFC3602] Frankel, S., Glenn, R., and S. Kelly, "The AES-CBC Cipher + Algorithm and Its Use with IPsec", RFC 3602, September + 2003. + + [RFC3686] Housley, R., "Using Advanced Encryption Standard (AES) + Counter Mode With IPsec Encapsulating Security Payload + (ESP)", RFC 3686, January 2004. + +8. Informative References + + [802.11i] LAN/MAN Specific Requirements Part 11: Wireless Medium + Access Control (MAC) and physical layer (PHY) + specifications: Medium Access Control (MAC) Security + Enhancements, IEEE Std 802.11i, June 2004. + + [JIS] Schiller, J., "Cryptographic Algorithms for Use in the + Internet Key Exchange Version 2 (IKEv2)", RFC 4307, + December 2005. + + [CCM] Housley, R., "Using Advanced Encryption Standard (AES) + Counter Mode With IPsec Encapsulating Security Payload + (ESP)", RFC 3686, January 2004. + + [IKEv2] Kaufman, C., Ed., "Internet Key Exchange (IKEv2) + Protocol", RFC 4306, December 2005. + + [RFC791] Postel, J., "Internet Protocol", STD 5, RFC 791, + September 1981. + + [RFC2402] Kent, S. and R. Atkinson, "IP Authentication Header", RFC + 2402, November 1998. + + [RFC2406] Kent, S. and R. Atkinson, "IP Encapsulating Security + Payload (ESP)", RFC 2406, November 1998. + + + + +Eastlake Standards Track [Page 7] + +RFC 4305 Cryptographic Algorithms for ESP & AH December 2005 + + + [RFC2407] Piper, D., "The Internet IP Security Domain of + Interpretation for ISAKMP", RFC 2407, November 1998. + + [RFC2409] Harkins, D. and D. Carrel, "The Internet Key Exchange + (IKE)", RFC 2409, November 1998. + +Author's Address + + Donald E. Eastlake 3rd + Motorola Laboratories + 155 Beaver Street + Milford, MA 01757 USA + + Phone: +1-508-786-7554 (w) + +1-508-634-2066 (h) + EMail: Donald.Eastlake@Motorola.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Eastlake Standards Track [Page 8] + +RFC 4305 Cryptographic Algorithms for ESP & AH December 2005 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2005). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at ietf- + ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + +Eastlake Standards Track [Page 9] + |