From owner-freebsd-questions@freebsd.org Sun Mar 21 01:44:55 2021 Return-Path: Delivered-To: freebsd-questions@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6211C5BA8AD for ; Sun, 21 Mar 2021 01:44:55 +0000 (UTC) (envelope-from dewayne@heuristicsystems.com.au) Received: from hermes.heuristicsystems.com.au (hermes.heuristicsystems.com.au [203.41.22.115]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2560 bits) client-digest SHA256) (Client CN "hermes.heuristicsystems.com.au", Issuer "Heuristic Systems Type 4 Host CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F30n06WtHz3lSf for ; Sun, 21 Mar 2021 01:44:51 +0000 (UTC) (envelope-from dewayne@heuristicsystems.com.au) Received: from [10.0.5.3] (noddy.hs [10.0.5.3]) (authenticated bits=0) by hermes.heuristicsystems.com.au (8.15.2/8.15.2) with ESMTPSA id 12L1hLMg079746 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT) for ; Sun, 21 Mar 2021 12:43:22 +1100 (AEDT) (envelope-from dewayne@heuristicsystems.com.au) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=heuristicsystems.com.au; s=hsa; t=1616291002; x=1616895803; bh=D/sCbUJT8EOaMGgvbkYgyu8ML5sDfgDVdwgX3heQyww=; h=From:To:Subject:Message-ID:Date; b=Bu4kxlwBclljikgCp8RccM0mGochDzHpZjrxc9m8QcQrypE8TXfJ/VIMit1iHdlz2 d2gPCWOsvAMLI8n6iF95dxjVWDiJReBS1I+qBpDB5NP9l65H5B+uVx808ZyyUo1ZD4 N4zky0F3Arnca8cIEDOFVmW2w9702RfYvnEaH8VGdIBwg857F7ZYr X-Authentication-Warning: b3.hs: Host noddy.hs [10.0.5.3] claimed to be [10.0.5.3] From: Dewayne Geraghty To: "freebsd-questions@freebsd.org" Subject: IPSEC loosing camellia in IPSEC on FreeBSD13? Message-ID: Date: Sun, 21 Mar 2021 12:42:18 +1100 User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:78.0) Gecko/20100101 Thunderbird/78.5.1 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4F30n06WtHz3lSf X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=heuristicsystems.com.au header.s=hsa header.b=Bu4kxlwB; dmarc=none; spf=pass (mx1.freebsd.org: domain of dewayne@heuristicsystems.com.au designates 203.41.22.115 as permitted sender) smtp.mailfrom=dewayne@heuristicsystems.com.au X-Spamd-Result: default: False [-5.20 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; HAS_XAW(0.00)[]; RCVD_DKIM_ARC_DNSWL_MED(-0.50)[]; RCVD_IN_DNSWL_MED(-0.20)[203.41.22.115:from]; DKIM_TRACE(0.00)[heuristicsystems.com.au:+]; NEURAL_HAM_SHORT(-1.00)[-1.000]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:1221, ipnet:203.40.0.0/13, country:AU]; MID_RHS_MATCH_FROM(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; R_DKIM_ALLOW(-0.20)[heuristicsystems.com.au:s=hsa]; FROM_HAS_DN(0.00)[]; DWL_DNSWL_MED(-2.00)[heuristicsystems.com.au:dkim]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-questions@freebsd.org]; DMARC_NA(0.00)[heuristicsystems.com.au]; RCPT_COUNT_ONE(0.00)[1]; TO_DN_EQ_ADDR_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; MAILMAN_DEST(0.00)[freebsd-questions] X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 21 Mar 2021 01:44:55 -0000 For those that skim release notes, https://www.freebsd.org/releases/13.0R/relnotes/ I noticed that FreeBSD13 drops from IPSEC: - some integrity checks as well as blowfish, cast128, des, des3 & variants AND camellia. From my stable/12 "man setkey" this leaves ciphers: null, aes-cbc, aes-ctr and aes-gcm16. Apparently the reason is that it wasn't mentioned in RFC8221, while section 1.2 states "As a result, any algorithm listed at the IPsec IANA registry that is not mentioned in this document MAY be implemented." it goes on to explain what must not be used. (Camellia is not part of that list) Camellia does appear in the IANA registry https://www.iana.org/assignments/isakmp-registry/isakmp-registry.xhtml#isakmp-registry-9 Can anyone help me to understand why camellia should be removed? On a purely number of rounds basis, camellia is better. Both AES and camellia use S boxes, camellia uses 18 rounds for 128b keys and 24 rounds on 192 and 256 bit keys, while commercial/public AES-128 uses 10 rounds and AES-256 14 rounds. FreeBSD is better by having more choice of ciphers and somewhat ahead of the pack (rfc4312 (Camellia use with ipsec)). Ref: https://cgit.freebsd.org/src/commit/?id=16aabb761c0a PS And yes I use IPSEC with camellia between FreeBSD boxes and I was planning on upgrading some old internet facing systems. Twofish would be better ;)