public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: Michael Tremer <michael.tremer@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [PATCH] Mark recommended ciphers/algorithms
Date: Sun, 10 Jan 2016 22:22:43 +0000	[thread overview]
Message-ID: <1452464563.5665.19.camel@ipfire.org> (raw)
In-Reply-To: <569286F2.2030904@web.de>

[-- Attachment #1: Type: text/plain, Size: 7919 bytes --]

Hi,

On Sun, 2016-01-10 at 17:29 +0100, IT Superhack wrote:
> Hi Michael,
> 
> Michael Tremer:
> > Hello and happy new year,
> > 
> > On Fri, 2016-01-01 at 17:54 +0100, IT Superhack wrote:
> > > Hello Michael, hello Larsen,
> > > 
> > > sorry for not replying a while; xmas is always very busy
> > 
> > Same.
> > 
> > > > > > There seems to be a problem with the word "recommended". In
> > > > > > the
> > > > > > patches
> > > > > > submitted, I recommended always the most strongest cipher.
> > > > > > However,
> > > > > > as
> > > > > > you said, some of them are simply one step too much. Should
> > > > > > then
> > > > > > both
> > > > > > be
> > > > > > recommended?
> > > > > 
> > > > > I am not sure. Can anyone come up with a more fitting
> > > > > expression?
> > > > > If we
> > > > > mark everything as "recommended" that is strong enough for
> > > > > now
> > > > > after
> > > > > our consideration, we will have most of them tagged with that
> > > > > word.
> > > > > In
> > > > > that case it would make more sense to mark the weak stuff as
> > > > > such
> > > > > to
> > > > > keep readability. Maybe that is the way to go. But does the
> > > > > average
> > > > > Joe
> > > > > know what is meant by "weak"?
> > > > 
> > > > Joe should know enough that "weak" is normally not what is
> > > > wanted. 
> > > > Otherwise he should RTFM 
> > > > 
> > > > You could recommend the strongest cipher that would take an
> > > > attacker 
> > > > millions of years to break, but on the other hand force the
> > > > hardware
> > > > to  
> > > > burn its CPU, while another "not as strong as the recommended
> > > > one"
> > > > cipher  
> > > > would also take an attacker thousands of years, but not consume
> > > > that
> > > > much  
> > > > CPU.
> > > Maybe it is better to mark just the weak or broken entries. I
> > > agree,
> > > "recommended" is not very specific here - maybe "strongest" would
> > > be
> > > better. Especially to mark AES-256-CBC on the OpenVPN main page.
> > 
> > Using "strongest" is a very good idea. As mentioned earlier it is
> > hard
> > to tell if an algorithm is good or bad, but we can rank them based
> > on
> > key sizes, etc. And in the end there will be a "strongest" cipher.
> Hmmm, what about CAMELLIA at the IPsec page? As far as I know, it is
> not weaker or stronger than AES, but slower and there aren't any GCM
> modes available.

I think that camellia is slower is just marketing or something like
that. On my machine it is actually *a lot* faster than AES.

This machine does not have AES-NI, but even on those machines CAMELLIA
benefits from AES-NI.

[ms(a)rice-oxley ~]$ openssl speed {aes,camellia}-256-cbc
Doing aes-256 cbc for 3s on 16 size blocks: 14349124 aes-256 cbc's in 2.99s
Doing aes-256 cbc for 3s on 64 size blocks: 3813409 aes-256 cbc's in 3.00s
Doing aes-256 cbc for 3s on 256 size blocks: 969069 aes-256 cbc's in 3.00s
Doing aes-256 cbc for 3s on 1024 size blocks: 243184 aes-256 cbc's in 3.00s
Doing aes-256 cbc for 3s on 8192 size blocks: 30436 aes-256 cbc's in 3.01s
Doing camellia-256 cbc for 3s on 16 size blocks: 16332000 camellia-256 cbc's in 3.00s
Doing camellia-256 cbc for 3s on 64 size blocks: 5406041 camellia-256 cbc's in 2.99s
Doing camellia-256 cbc for 3s on 256 size blocks: 1471399 camellia-256 cbc's in 3.00s
Doing camellia-256 cbc for 3s on 1024 size blocks: 376682 camellia-256 cbc's in 3.00s
Doing camellia-256 cbc for 3s on 8192 size blocks: 47506 camellia-256 cbc's in 3.00s
OpenSSL 1.0.1k-fips 8 Jan 2015
built on: Fri Dec  4 15:45:46 2015
options:bn(64,64) md2(int) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx) 
compiler: -I. -I.. -I../include  -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DKRB5_MIT -m64 -DL_ENDIAN -DTERMIO -Wall -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches  -m64 -mtune=generic -Wa,--noexecstack -DPURIFY -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM
The 'numbers' are in 1000s of bytes per second processed.
type             16 bytes     64 bytes    256 bytes   1024 bytes   8192 bytes
aes-256 cbc      76784.61k    81352.73k    82693.89k    83006.81k    82834.46k
camellia-256 cbc    87104.00k   115714.59k   125559.38k   128574.12k   129723.05k

3DES is very slow though:

[ms(a)rice-oxley ~]$ openssl speed des-ede3
Doing des ede3 for 3s on 16 size blocks: 5230784 des ede3's in 3.00s
Doing des ede3 for 3s on 64 size blocks: 1328063 des ede3's in 3.00s
Doing des ede3 for 3s on 256 size blocks: 333500 des ede3's in 2.99s
Doing des ede3 for 3s on 1024 size blocks: 83474 des ede3's in 3.00s
Doing des ede3 for 3s on 8192 size blocks: 10474 des ede3's in 3.00s
OpenSSL 1.0.1k-fips 8 Jan 2015
built on: Fri Dec  4 15:45:46 2015
options:bn(64,64) md2(int) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx) 
compiler: -I. -I.. -I../include  -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DKRB5_MIT -m64 -DL_ENDIAN -DTERMIO -Wall -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches  -m64 -mtune=generic -Wa,--noexecstack -DPURIFY -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM
The 'numbers' are in 1000s of bytes per second processed.
type             16 bytes     64 bytes    256 bytes   1024 bytes   8192 bytes
des ede3         27897.51k    28332.01k    28553.85k    28492.46k    28601.00k

> > 
> > That is still as subjective as "weak" is, but I think it is easy to
> > understand for every user.
> Yup.
> > 
> > > > If we have "weak". Should we have "broken", too? For example we
> > > > have to
> > > > support MD5. I wouldn't say that MD5 is weak. It is more than
> > > > that.
> > > Okay, so we have:
> > > MD5		"broken"
> > > SHA1		"weak"
> > > DH-1024-params	"broken" (? not sure about this)
> > > DH-2048-params	"weak"
> > > AES-256-CBC	"recommended"/"strongest" (on OpenVPN page
> > > only)
> > > 
> > > Do you think this is a good way to start? If yes, I could send in
> > > some
> > > patches.
> > 
> > I can agree on this with all the labels except "broken" for DH
> > -1024. It
> > works and it makes sense to use this for short-lived keys. It
> > should be
> > avoided if we can, so I would suggest "very weak".
> Okay.
> > 
> > I think we can label AES-256-GCM as "strongest" on the IPsec page,
> > too.
> 1. As above, what about CAMELLIA?

I consider CAMELLIA just as strong as AES. It might have benefits over
AES even. However I consider the GCM cipher mode to be safer (and
usually faster) than CBC which puts those into an order.

> 2. Which AES-256-GCM suite is the strongest one? (128/96/64 bits
> ICV?)

If you have good random numbers a longer IV should be better. I don't
think that that makes a huge difference though.

> > 
> > > 
> > > > 
> > > > Why should IKEv2 be recommended? AFAIK there are no known
> > > > design
> > > > issues
> > > > with IKEv1. Some algorithms might not be available, but this is
> > > > not
> > > > an
> > > > issue for now since AES, SHA2, (AKA the strong ones) are
> > > > supported.
> > > @Michael: That is correct, I did not RTFM. o:-)
> > > 
> > > Looking forward to hear from you. Happy new year!
> > > 
> > > Best regards,
> > > Timmothy Wilson
> > 
> > Best,
> > -Michael
> Best regards,
> Timmothy Wilson
> 
> 

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 819 bytes --]

  reply	other threads:[~2016-01-10 22:22 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-11-23 14:18 [PATCH] Disallow OpenVPN DH params less than 1024 bits IT Superhack
2015-11-24 14:14 ` ue
2015-12-01 22:58   ` Michael Tremer
2015-12-02  9:07     ` IT Superhack
2015-12-02 10:47       ` Michael Tremer
2015-12-02 18:19         ` IT Superhack
2015-12-07 16:35         ` [PATCH] Mark recommended ciphers/algorithms IT Superhack
2015-12-10 17:16           ` Michael Tremer
2015-12-13 15:10             ` IT Superhack
2015-12-13 17:47               ` Larsen
2015-12-15 14:13               ` Michael Tremer
2015-12-15 15:03                 ` Larsen
2015-12-15 21:18                   ` Michael Tremer
2015-12-16  8:06                     ` Larsen
2015-12-18 16:12             ` IT Superhack
2016-01-01 16:54             ` IT Superhack
2016-01-04 16:31               ` Michael Tremer
2016-01-10 16:29                 ` IT Superhack
2016-01-10 22:22                   ` Michael Tremer [this message]
2016-01-02 13:03             ` ue
2016-01-04 16:36               ` Michael Tremer

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1452464563.5665.19.camel@ipfire.org \
    --to=michael.tremer@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox