Subject: IETF Security Area Advisory Group (SAAG) meeting notes from Oslo
To: None <>
From: None <>
List: tech-security
Date: 07/15/1999 07:00:36
IETF Security Area Directors:

	Jeff Schiller <jis@mit.edu>
	Marcus Leech <leech@nortel.ca>

____

Which Working Groups Met in Oslo:
	CAT
	IPsec
	PKIX
	XMLDSIG (joint with W3C)
	AFT
	IDWG
	OpenPGP
	S/MIME

____

CAT:
	revising charter
	working on GSS-API for Java
	Kerberos revisions are going to WG Last Call

IPsec:
	explicit congestion notification proposal from Sally Floyd discussed
	Steve Bellovin gave a quick summary of IAB workshop
		please make sure there are no IP address dependencies in IPsec
	some IKE clarifications

PKIX:
	RFC 2459 - defect in cert path for X.509 validation has been
		reported to ITU; 2459 must be revised.
	policies and procedures for CA's document is being widely reviewed.
	time stamps and patents; there is some lawsuit in progress.
	Qualified CERTs - a European thing documenting how a legal name
		can be bound to a cert, published by the EU.
	Attribute Certificates - used to bind attributes to a public key;
		document in progress.

XML DSIG:
	XML Digital Signatures is working jointly with W3C; this means one
	document, not two.
	requirements draft is out.
	some controversy about canonicalization
	a revised, simplified top-level syntax was devised.

AFT:
	updates to RFC 1928 - socks.
	discussion of update to RFC 1961 - the GSS-API interaction.

IDWG:
	discussion on exploding out the requirements for the Intrusion
		Detection Exchange Format protocol.

IP Security Policy BOF:
	Multidomain IKE presentation
	possible role of COPS in IKE
	semantic model of IPsec policies
	charter discussion

OpenPGP:
	Key Server synchronization protocol discussion
	RFC 2440 revisions, draft due shortly.
	RFC 2015 revisions, new draft ready to go
	OpenPGP ready to advance to "draft" status; time for implementation

S/MIME:
	(hasn't met yet)
	five RFCs 2630 - 2634 all published
	time to revise charter to deal with remaining issues

BOFs that met:
	IPSP
	Secure Time
	IPSRA

Secure Time:
	purpose is to add some extensions to NTP;
	they're in "need to get to a working group" hell, while bashing charter

IP Secure Remote Access BOF:
	did not meet, but will continue

____

DNS-SEC and DNS-IND WGs merged.

Web Transaction Security (WTS) will shut down. Documents to be published as
experimental. This is SHTTP; everyone uses SSL instead. "An example of
expedient  overtaking ``better.''" - JIS.

Security Area Working Groups are going to have web pages - Jeff will be
whacking up better web pages on his flight back home.


The IESG section of the IETF web pages contains the state of documents in
the standards process.

____

NOTA BENE: IP Security Will Deprecate DES and 3DES will be the new required
cipher, HOWEVER, there is a strong desire to have an additional required
cipher. Candidates: CAST-128, BLOWFISH, AES Candidates (these are 128 bit
block ciphers - if you coded for 64 bit blocks, Beware). AES is a year away
from final selection. Maybe CAST-256, and TWOFISH.

Major question: how to select an additional cipher?

Bob Moskowitz thinks that we need a very fast cipher for small boxes. Other
criteria include: speed, not DES based, no intellectual properties
problems, no cryptanalytic deficiencies ("secure"), 128 bit block size,
keyspace >= 128 bits (key strength versus key size), key set up time.

Next month the AES candidate list will be narrowed to five.

Pushback to wait until the AES selection is finished.

Bellovin: we should at least wait until next month because the AES
candidate list will be narrowed, and the "Crypto" conference will happen,
and we can get feedback.

saag@lists.tislabs.com (majordomo) is where the SAAG mailing list lives.

____

It would be a good idea to have DOI (protocol) numbers for each of the AES
cipher - this is an IPsec WG issue.

It would also be a good idea for implementors to make sure that their
software can really do 128-bit block ciphers.

Also make sure that software is ready for long keys (> 128 bits), though it
may be a year or three before this is really required.

____

Steve Bellovin wants feedback on an IAB Security Mechanisms draft document
which is intended as a cookbook for the rest of the IETF to pick
appropriate security mechanisms during protocol design - this would also be
useful to various software developers.

	your itinerant Security Officer,

	Erik <fair@clock.org>