Hi Tero,

We are thinking of different use cases.

You are thinking VPN client - VPN server (and similar client/server cases). I 
agree that client-side redirect is useless in this case. MOBIKE takes care very 
well of the multihomed case (one address on WLAN, another on GPRS). So I don't 
care if the current draft doesn't work for that case.

I am thinking of symmetric IKE peers (gateways, or endpoints using transport 
mode ESP; no EAP, rarely any NAT). Is there any reason why the current draft 
cannot support this case in a symmetric manner?

Thanks,
        Yaron

> -----Original Message-----
> From: Tero Kivinen [mailto:kivi...@iki.fi]
> Sent: Friday, March 06, 2009 15:52
> To: Yaron Sheffer
> Cc: Vijay Devarapalli; pasi.ero...@nokia.com; ipsec@ietf.org;
> rfgrave...@gmail.com
> Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-ikev2-redirect-04
> 
> Yaron Sheffer writes:
> > I have a slight preference to keeping the protocol symmetric. But
> > even if we choose not to do that, I think Tero's text (quoted below)
> > leaves too much room for interpretation.
> 
> Redirect is not really symmetric ever. If it would be used in
> symmetric way, then each end would simply create the connection using
> the address they want whenever they want. I.e. if server wanted to
> redirect client to somewhere else later, it would simply inform that
> new gateway to make connection to the client and close the local
> connection. That new gateway would then simply initiate new connection
> to the client and move traffic to there.
> 
> The reason we cannot do that is that client-server connections are
> very often asymmetric, i.e. we are using EAP, or client is behind NAT
> or similar problems.
> 
> > 7.  Use of the Redirect Mechanism between IKEv2 Peers
> >
> >    The Re-direct mechanism described in this document is mainly intended
> >    for use in client-gateway scenarios.  However, the mechanism can also
> >    be used between any two IKEv2 peers, but this protocol is
> >    asymmetric, meaning that only the responder can redirect initiator
> >    to some other server.
> > ---
> >
> > The protocol supports using an Informational exchange for redirect
> > at any time during the SA lifetime, and this is inherently
> > symmetric.
> 
> No, it does not make it symmetric. If the original initiator wants to
> use other local address when connecting, he will simply switch to that
> new address and initiate new connection. Original responder cannot do
> that, as most likely the connection using new address does not work
> because of NATs or because of asymmetric authentication type used
> (EAP).
> 
> > And of course, following an IKE SA rekey, the
> > initiator/responder roles might change. If we go for the restricted
> > option, the new text should cover both of these issues.
> 
> I should have used "original responder" and "original initiator".
> --
> kivi...@iki.fi
> 
> Scanned by Check Point Total Security Gateway.
> 
> Scanned by Check Point Total Security Gateway.
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to