From: IT Superhack <itsuperhack@web.de>
To: development@lists.ipfire.org
Subject: Re: [PATCH] Mark recommended ciphers/algorithms
Date: Sun, 10 Jan 2016 17:29:38 +0100 [thread overview]
Message-ID: <569286F2.2030904@web.de> (raw)
In-Reply-To: <1451925110.31655.257.camel@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 3388 bytes --]
Hi Michael,
Michael Tremer:
> Hello and happy new year,
>
> On Fri, 2016-01-01 at 17:54 +0100, IT Superhack wrote:
>> Hello Michael, hello Larsen,
>>
>> sorry for not replying a while; xmas is always very busy
>
> Same.
>
>>>>> There seems to be a problem with the word "recommended". In the
>>>>> patches
>>>>> submitted, I recommended always the most strongest cipher.
>>>>> However,
>>>>> as
>>>>> you said, some of them are simply one step too much. Should
>>>>> then
>>>>> both
>>>>> be
>>>>> recommended?
>>>>
>>>> I am not sure. Can anyone come up with a more fitting expression?
>>>> If we
>>>> mark everything as "recommended" that is strong enough for now
>>>> after
>>>> our consideration, we will have most of them tagged with that
>>>> word.
>>>> In
>>>> that case it would make more sense to mark the weak stuff as such
>>>> to
>>>> keep readability. Maybe that is the way to go. But does the
>>>> average
>>>> Joe
>>>> know what is meant by "weak"?
>>>
>>> Joe should know enough that "weak" is normally not what is wanted.
>>> Otherwise he should RTFM
>>>
>>> You could recommend the strongest cipher that would take an
>>> attacker
>>> millions of years to break, but on the other hand force the
>>> hardware
>>> to
>>> burn its CPU, while another "not as strong as the recommended one"
>>> cipher
>>> would also take an attacker thousands of years, but not consume
>>> that
>>> much
>>> CPU.
>> Maybe it is better to mark just the weak or broken entries. I agree,
>> "recommended" is not very specific here - maybe "strongest" would be
>> better. Especially to mark AES-256-CBC on the OpenVPN main page.
>
> Using "strongest" is a very good idea. As mentioned earlier it is hard
> to tell if an algorithm is good or bad, but we can rank them based on
> key sizes, etc. And in the end there will be a "strongest" cipher.
Hmmm, what about CAMELLIA at the IPsec page? As far as I know, it is
not weaker or stronger than AES, but slower and there aren't any GCM
modes available.
>
> That is still as subjective as "weak" is, but I think it is easy to
> understand for every user.
Yup.
>
>>> If we have "weak". Should we have "broken", too? For example we
>>> have to
>>> support MD5. I wouldn't say that MD5 is weak. It is more than that.
>> Okay, so we have:
>> MD5 "broken"
>> SHA1 "weak"
>> DH-1024-params "broken" (? not sure about this)
>> DH-2048-params "weak"
>> AES-256-CBC "recommended"/"strongest" (on OpenVPN page only)
>>
>> Do you think this is a good way to start? If yes, I could send in
>> some
>> patches.
>
> I can agree on this with all the labels except "broken" for DH-1024. It
> works and it makes sense to use this for short-lived keys. It should be
> avoided if we can, so I would suggest "very weak".
Okay.
>
> I think we can label AES-256-GCM as "strongest" on the IPsec page, too.
1. As above, what about CAMELLIA?
2. Which AES-256-GCM suite is the strongest one? (128/96/64 bits ICV?)
>
>>
>>>
>>> Why should IKEv2 be recommended? AFAIK there are no known design
>>> issues
>>> with IKEv1. Some algorithms might not be available, but this is not
>>> an
>>> issue for now since AES, SHA2, (AKA the strong ones) are supported.
>> @Michael: That is correct, I did not RTFM. o:-)
>>
>> Looking forward to hear from you. Happy new year!
>>
>> Best regards,
>> Timmothy Wilson
>
> Best,
> -Michael
Best regards,
Timmothy Wilson
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 455 bytes --]
next prev parent reply other threads:[~2016-01-10 16:29 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-11-23 14:18 [PATCH] Disallow OpenVPN DH params less than 1024 bits IT Superhack
2015-11-24 14:14 ` ue
2015-12-01 22:58 ` Michael Tremer
2015-12-02 9:07 ` IT Superhack
2015-12-02 10:47 ` Michael Tremer
2015-12-02 18:19 ` IT Superhack
2015-12-07 16:35 ` [PATCH] Mark recommended ciphers/algorithms IT Superhack
2015-12-10 17:16 ` Michael Tremer
2015-12-13 15:10 ` IT Superhack
2015-12-13 17:47 ` Larsen
2015-12-15 14:13 ` Michael Tremer
2015-12-15 15:03 ` Larsen
2015-12-15 21:18 ` Michael Tremer
2015-12-16 8:06 ` Larsen
2015-12-18 16:12 ` IT Superhack
2016-01-01 16:54 ` IT Superhack
2016-01-04 16:31 ` Michael Tremer
2016-01-10 16:29 ` IT Superhack [this message]
2016-01-10 22:22 ` Michael Tremer
2016-01-02 13:03 ` ue
2016-01-04 16:36 ` Michael Tremer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=569286F2.2030904@web.de \
--to=itsuperhack@web.de \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox