Internet DRAFT - draft-ietf-moskowitz-auth-dss
draft-ietf-moskowitz-auth-dss
R. Moskowitz, ICSA, Inc.
Internet Draft
Document: <draft-ietf-moskowitz-auth-dss-00.txt> May 1999
The Use of DSS within ESP and AH
Status of this Memo
This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
1. Abstract
This memo describes the use of DSS [FIPS-186] in as an
authentication mechanism within the IPSEC Encapsulating Security
Payload [ESP] and the IPSEC Authentication Header [AH]. DSS provides
data origin authentication and integrity protection.
DSS authenticated ESP or AH can be used with the Host Identity
Payload [HIP99]. Further information on the other components
necessary for ESP and AH implementations is provided by [Thayer97a].
2. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
this document are to be interpreted as described in [RFC-2119].
3. Introduction
This memo specifies the use of DSS [FIPS-186] as an authentication
mechanism within the context of the Encapsulating Security Payload
Moskowitz 1
The Use of DSS within ESP and AH May 1999
and the Authentication Header. The goal of DSS is to ensure that the
packet is authentic and cannot be modified in transit.
DSS uses SHA1 [FIPS-180-1] with DSA [DSA-1], a public key
authentication algorithm to authenticate the message.
In this memo, DSS is used within the context of ESP and AH. For
further information on how the various pieces of ESP - including the
confidentiality mechanism -- fit together to provide security
services, refer to [ESP] and [Thayer97a]. For further information on
AH, refer to [AH] and [Thayer97a]. For further information on how to
use the Host Identity Payload to exchange the DSA public keys within
the same datagram as the AH or ESP payload, refer to HIP [HIP99].
4. Algorithm
[FIPS-180-1] describes the underlying SHA1 algorithm, while [FIPS-
186] describes the DSA algorithm and the complete signing and
validation process.
DSS operates on 64-byte blocks of data. Padding requirements are
specified in [FIPS-180-1] and are part of the SHA-1 algorithm. If
you build SHA-1 according to [FIPS-180-1] you do not need to add any
additional padding as far as DSS is concerned. With regard to
"implicit packet padding" as defined in [AH] no implicit packet
padding is required.
The length of the authenticator value is based on the length of the
DSA keys. Unlike HMAC-SHA-1-96 [HMAC-SHA-1-96], they MUST NOT be
truncated. Thus the selection of the DSA parameters will directly
impact the size of the AH or ESP payload.
5. Performance
DSA is estimated to be 100 times slower than HMAC-SHA-1-96. Thus
until fast hardware implementations for DSA are available, this auth
mode is best suited to special cases like protocols that have very
few packets. That is where the cost of establishing the HMAC keying
material exceeds the cost of the DSA operations on each datagram.
6. Keying Material
DSA is a public key algorithm. While no fixed key length is
specified in [FIPS-186], a common length is 320 bits. Key lengths
are defined in the DSA parameters. The method of establishing the
DSA parameters are outside the bonds of this document.
Moskowitz 2
The Use of DSS within ESP and AH May 1999
[FIPS-186] discusses requirements for key material, which includes a
discussion on requirements for strong randomness. A strong pseudo-
random function MUST be used to generate the required key.
7. Security Considerations
Any implementation of the DSA requires the ability to generate
random or pseudorandom integers. Such numbers are used to
derive a user's private key, x, and a user's per message secret
number, k. These randomly or pseudorandomly generated
integers are selected to be between 0 and the 160- bit prime q (as
specified in the standard).
8. IANA Considerations
The IP Security Domain of Interpretation [DOI] defines the IPSEC
Security Association Attributes in section 4.5. DSS represents a new
Authentication Algorithm. IANA will assign a value of [N] for DSS.
9. References
[ESP], Kent, S., and R. Atkinson, "IP Encapsulating Security
Payload", RFC 2406, November 1998.
[AH], Kent, S., and R. Atkinson, "IP Authentication Header", RFC
2402, November 1998.
[FIPS-186], US National Bureau of Standards, "Digital Signature
Standard (DSS)", Federal Information Processing Standard (FIPS)
Publication 186, May 1994,
http://www.itl.nist.gov/div897/pubs/fip186.htm.
[FIPS-180-1], NIST, FIPS PUB 180-1: Secure Hash Standard, April
1995. http://csrc.nist.gov/fips/fip180-1.txt (ascii)
http://csrc.nist.gov/fips/fip180-1.ps (postscript)
[Thayer97a], Thayer, R., Doraswamy, N., and R. Glenn, "IP Security
Document Roadmap", RFC 2411, November 1998.
[RFC-2119], Bradner, S, "Key words for use in RFCs to Indicate
Requirement Levels", RFC 2119, Harvard University, March 1997
[HMAC-SHA-1-96], Madson, C., and R. Glenn, "The Use of HMAC-SHA-1
within ESP and AH", RFC 2404, November 1998.
[DOI], Piper, D., "The Internet IP Security Domain of Interpretation
for ISAKMP", RFC 2407, November 1998.
10. Acknowledgments
Moskowitz 3
The Use of DSS within ESP and AH May 1999
This document is derived in part from HMAC-SHA-1-96 by Cheryl Madson
and Rob Glenn. I would also like to thank Steve Bellovin, Baiju
Patel, and Hilarie Orman for their comments and recommendations
this document.
11. Author's Addresses
Robert Moskowitz
ICSA, Inc.
1200 Walnut Bottom Rd.
Carlisle, PA 17013
Email: rgm@icsa.net
Moskowitz 4