draft-ietf-curdle-gss-keyex-sha2-07.txt   draft-ietf-curdle-gss-keyex-sha2-08.txt 
Internet Engineering Task Force S. Sorce Internet Engineering Task Force S. Sorce
Internet-Draft H. Kario Internet-Draft H. Kario
Updates: 4462 (if approved) Red Hat, Inc. Updates: 4462 (if approved) Red Hat, Inc.
Intended status: Standards Track Nov 6, 2018 Intended status: Standards Track Jan 2, 2019
Expires: May 10, 2019 Expires: July 6, 2019
GSS-API Key Exchange with SHA2 GSS-API Key Exchange with SHA2
draft-ietf-curdle-gss-keyex-sha2-07 draft-ietf-curdle-gss-keyex-sha2-08
Abstract Abstract
This document specifies additions and amendments to RFC4462. It This document specifies additions and amendments to RFC4462. It
defines a new key exchange method that uses SHA-2 for integrity and defines a new key exchange method that uses SHA-2 for integrity and
deprecates weak DH groups. The purpose of this specification is to deprecates weak DH groups. The purpose of this specification is to
modernize the cryptographic primitives used by GSS Key Exchanges. modernize the cryptographic primitives used by GSS Key Exchanges.
Status of This Memo Status of This Memo
skipping to change at page 1, line 34 skipping to change at page 1, line 34
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 10, 2019. This Internet-Draft will expire on July 6, 2019.
Copyright Notice Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the Copyright (c) 2019 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
skipping to change at page 4, line 22 skipping to change at page 4, line 22
[I-D.ietf-curdle-ssh-curves] to complement the 3 classic NIST defined [I-D.ietf-curdle-ssh-curves] to complement the 3 classic NIST defined
curves required by [RFC5656]. curves required by [RFC5656].
5.1. Generic GSS-API Key Exchange with ECDH 5.1. Generic GSS-API Key Exchange with ECDH
This section reuses much of the scheme defined in Section 2.1 of This section reuses much of the scheme defined in Section 2.1 of
[RFC4462] and combines it with the scheme defined in Section 4 of [RFC4462] and combines it with the scheme defined in Section 4 of
[RFC5656]; in particular, all checks and verification steps [RFC5656]; in particular, all checks and verification steps
prescribed in Section 4 of [RFC5656] apply here as well. prescribed in Section 4 of [RFC5656] apply here as well.
For curve25519 and curve448 related computations see Section 6 of Key-agreement schemes ECDHE-Curve25519 and ECDHE-Curve448 perform the
[RFC7748]; implementations MUST check whether the computed Diffie- Diffie-Helman protocol using the functions X25519 and X448,
Hellman shared secret is the all-zero value and abort if so. respectively. Implementations SHOULD compute these functions using
the algorithms described in [RFC7748]. When they do so,
implementations MUST check whether the computed Diffie-Hellman shared
secret is the all-zero value and abort if so, as described in
Section 6 of [RFC7748]. Alternative implementations of these
functions SHOULD abort when either input forces the shared secret to
one of a small set of values, as discussed in Section 7 of [RFC7748].
This section defers to [RFC7546] as the source of information on GSS- This section defers to [RFC7546] as the source of information on GSS-
API context establishment operations, Section 3 being the most API context establishment operations, Section 3 being the most
relevant. All Security Considerations described in [RFC7546] apply relevant. All Security Considerations described in [RFC7546] apply
here too. here too.
The parties generate each an ephemeral key pair, according to The parties generate each an ephemeral key pair, according to
Section 3.2.1 of [SEC1v2]. Keys are verified upon receipt by the Section 3.2.1 of [SEC1v2]. Keys are verified upon receipt by the
parties according to Section 3.2.3.1 of [SEC1v2]. parties according to Section 3.2.3.1 of [SEC1v2].
skipping to change at page 10, line 33 skipping to change at page 10, line 33
silently delegating credentials to the attacker, who can then silently delegating credentials to the attacker, who can then
impersonate the user at will. impersonate the user at will.
8. References 8. References
8.1. Normative References 8.1. Normative References
[I-D.ietf-curdle-ssh-curves] [I-D.ietf-curdle-ssh-curves]
Adamantiadis, A., Josefsson, S., and M. Baushke, "Secure Adamantiadis, A., Josefsson, S., and M. Baushke, "Secure
Shell (SSH) Key Exchange Method using Curve25519 and Shell (SSH) Key Exchange Method using Curve25519 and
Curve448", draft-ietf-curdle-ssh-curves-07 (work in Curve448", draft-ietf-curdle-ssh-curves-08 (work in
progress), January 2018. progress), June 2018.
[RFC1321] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321, [RFC1321] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321,
DOI 10.17487/RFC1321, April 1992, DOI 10.17487/RFC1321, April 1992,
<https://www.rfc-editor.org/info/rfc1321>. <https://www.rfc-editor.org/info/rfc1321>.
[RFC2045] Freed, N. and N. Borenstein, "Multipurpose Internet Mail [RFC2045] Freed, N. and N. Borenstein, "Multipurpose Internet Mail
Extensions (MIME) Part One: Format of Internet Message Extensions (MIME) Part One: Format of Internet Message
Bodies", RFC 2045, DOI 10.17487/RFC2045, November 1996, Bodies", RFC 2045, DOI 10.17487/RFC2045, November 1996,
<https://www.rfc-editor.org/info/rfc2045>. <https://www.rfc-editor.org/info/rfc2045>.
 End of changes. 6 change blocks. 
10 lines changed or deleted 16 lines changed or added

This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/