[16495] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: IPsec +- Perfect Forward Secrecy

daemon@ATHENA.MIT.EDU (Eric Rescorla)
Wed Dec 1 14:57:18 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
To: John Denker <jsd@av8n.com>
Cc: iang@systemics.com, Ben Nagy <bnagy@eeye.com>,
	cryptography@metzdowd.com
Reply-To: EKR <ekr@rtfm.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Wed, 01 Dec 2004 11:18:28 -0800
In-Reply-To: <41AE113B.7030306@av8n.com> (John Denker's message of "Wed, 01
 Dec 2004 13:45:15 -0500")

John Denker <jsd@av8n.com> writes:
> Eric Rescorla wrote:
>
>> Uh, you've just described the ephemeral DH mode that IPsec
>> always uses and SSL provides.
>
> I'm mystified by the word "always" there, and/or perhaps by
> the definition of Perfect Forward Secrecy.  Here's the dilemma:
>
> On the one hand, it would seem to the extent that you use
> ephemeral DH exponents, the very ephemerality should do most
> (all?) of what PFS is supposed to do.  If not, why not?
>
> And yes, IPsec always has ephemeral DH exponents lying around.
>
> On the other hand, there are IPsec modes that are deemed to
> not provide PFS.  See e.g. section 5.5 of
>    http://www.faqs.org/rfcs/rfc2409.html

Sorry, when I said IPsec I mean IKE. I keep trying to forget
about the manual keying modes. AFAICT IKE always uses the
DH exchange as part of establishment.

-Ekr

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post