[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
IKEV2: Issue #2: Cipher suites
There seems general consensus over the cipher suites proposed by Paul
Hoffman. However, not fully closed is the question of which ciphers
ought to be mandatory, and which merely optional.
The working group chairs note that this answer to these issue is very
largely dependent on the application for which IPSEC is used, and a
belief for when IKEv2 is likely to be available in the marketplace.
People who believe that IKEv2 will be deployed rapidly, and perhaps
requiring only software upgrades to existing hardware, have expressed
the desire to avoid requiring AES CBC or AES counter mode, because
many existing hardware accelerators do not support AES or counter
mode. On the other hand, if IKEv2 does not reach maturity quickly,
the lack of a required AES cipher may very well look very silly.
It is also the case that IPSEC as applied to for VPN's will have very
radically different cipher requirements than those already expressed
for use by iSCSI.
For this reason, one potential solution (originally suggested by
Steve Bellovin to the working group chairs) towards achieving closure
on this issue would be to separate out into a separate document --- or
more likely, documents --- the specifications of which ciphers are
mandatory and which are merely optional. Since which ciphers ought to
be mandatory will likely change more frequently than the base document
itself, combined with the need for different profiles for different
applications, we propose that the IKEv2 document remain silent about
which ciphers are required, and that separate documents, for VPN and
iSCSI applications, be drafted that contain these requirements.
IPSEC working group chairs