From: Ron Hoffman (rhoffman@stny.rr.com)
Date: 03/27/02-10:14:38 AM Z
Message-ID: <000601c1d5aa$7e80a040$6501a8c0@STNY.RR.COM> From: "Ron Hoffman" <rhoffman@stny.rr.com> Subject: Re: 128-bit CAST and US export controls Date: Wed, 27 Mar 2002 11:14:38 -0500 Agreed. My problem stems from the fact that CAST5-CBC with 128-bit keys is a mandatory algorithm and not a recommended algorithm for RFC 2847. So I'm left with either violating the RFC or not providing LIPKEY on those systems which are not allowed to use 128-bit keys. I think I'm going to add a new GSS-API routine to return the available integrity and confidentiality algorithms for a given security context (this is something that I've wanted for Kerberos anyways since the available Kerberos algorithms depend upon the session key type). The application can then decide whether or not to use the context based upon the available algorithms. So, for systems without 128-bit encryption support, I will not negotiate CAST5-CBC and will use DES-CBC instead (assuming the other side offers DES-CBC). Otherwise, the GSS_C_CONF_FLAG will not be returned to the application, indicating confidentiality services are not available. >From an interoperability point of view, a portable application could specify the QOP using the STRONG/MEDIUM/WEAK designations instead of using GSS_C_QOP_DEFAULT. The gss_wrap() request would then return 0 for the conf_state if 128-bit CAST5-CBC was not available. Ron ----- Original Message ----- From: "RJ Atkinson" <rja@extremenetworks.com> To: "Ron Hoffman" <rhoffman@stny.rr.com> Cc: "nfsv4-wg" <nfsv4-wg@sunroof.eng.sun.com> Sent: Wednesday, March 27, 2002 9:46 AM Subject: Re: 128-bit CAST and US export controls > > On Tuesday, March 26, 2002, at 04:38 , Ron Hoffman wrote: > > > The CAST5-CBC encryption algorithm uses 128-bit keys and thus is subject > > to US export controls. > > IETF policy on standards is to ignore any national restrictions > (for any country), because the IETF operates globally. So from > a standards perspective, any US export controls are irrelevant > to the standards making process. Of course particular implementations > might have to make implementation choices based on their own > circumstances, but that ought not be driving the IETF specs. > > IMHO, > > Ran > >
This archive was generated by hypermail 2.1.2 : 03/04/05-01:49:38 AM Z CST