Hi,

We have published a new version of the IKEv2 Redirect and Authentication
Offload draft (draft-padmakumar-ikev2-redirect-and-auth-offload-01).

The draft may be accessed at:
http://www.ietf.org/internet-drafts/draft-padmakumar-ikev2-redirect-and-auth-offload-01.txt

Abstract:

IKEv2 supports multiple authentication mechanisms like public key
signatures, shared secrets and EAP.  EAP based authentication requires
server to maintain information about the client until EAP completes.  Public
key based authentication mechanisms are highly computational intensive and
demands server CPU resources.

Redirect Mechanism for IKEv2 proposes a mechanism for IKEv2 that enables a
VPN gateway to redirect the VPN client to another VPN gateway, for example,
based on the load condition.

Redirect mechanism can also be used to redirect a client to another router
(trust anchor) to do mutual authentication on behalf of the server.  This
redirection happens during the IKE_SA_INIT and server does not maintain any
information about the redirected client.  After mutual authentication Trust
anchor can redirect the client back to the server with an Access Token which
can be used as a dynamic pre- shared key between the server and client for
password based IKE_AUTH exchange.  Mechanism described here allows servers
to compute the same pre-shared key dynamically, without contacting trust
anchors, based on the information provided by the client during IKE_AUTH
exchange.  Such a mechanism is useful especially for low power devices like
handsets.  For example, a mobile node can redirect such authentications to
its home agent.  This proposal explains a mechanism to offload such
verifications to a set of less critical routers or to a service provider who
offers trust as a service.

We would appreciate your comments.

Thanks,

Pratima, Manik, Padmakumar


---------- Forwarded message ----------
From: <internet-dra...@ietf.org>
Date: Mon, Jul 27, 2009 at 6:30 PM
Subject: I-D Action:draft-padmakumar-ikev2-redirect-and-auth-offload-01.txt
To: i-d-annou...@ietf.org


A New Internet-Draft is available from the on-line Internet-Drafts
directories.

       Title           : IKEv2 Redirect and Authentication Offload
       Author(s)       : A. Padmakumar, et al.
       Filename        :
draft-padmakumar-ikev2-redirect-and-auth-offload-01.txt
       Pages           : 17
       Date            : 2009-07-27

IKEv2 supports multiple authentication mechanisms like public key
signatures, shared secrets and EAP.  EAP based authentication
requires server to maintain information about the client until EAP
completes.  Public key based authentication mechanisms are highly
computational intensive and demands server CPU resources.

Redirect Mechanism for IKEv2 proposes a mechanism for IKEv2 that
enables a VPN gateway to redirect the VPN client to another VPN
gateway, for example, based on the load condition.

Redirect mechanism can also be used to redirect a client to another
router (trust anchor) to do mutual authentication on behalf of the
server.  This redirection happens during the IKE_SA_INIT and server
does not maintain any information about the redirected client.  After
mutual authentication Trust anchor can redirect the client back to
the server with an Access Token which can be used as a dynamic pre-
shared key between the server and client for password based IKE_AUTH
exchange.  Mechanism described here allows servers to compute the
same pre-shared key dynamically, without contacting trust anchors,
based on the information provided by the client during IKE_AUTH
exchange.  Such a mechanism is useful especially for low power
devices like handsets.  For example, a mobile node can redirect such
authentications to its home agent.  This proposal explains a
mechanism to offload such verifications to a set of less critical
routers or to a service provider who offers trust as a service.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-padmakumar-ikev2-redirect-and-auth-offload-01.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.


_______________________________________________
I-D-Announce mailing list
i-d-annou...@ietf.org
https://www.ietf.org/mailman/listinfo/i-d-announce
Internet-Draft<https://www.ietf.org/mailman/listinfo/i-d-announce%0AInternet-Draft>directories:
http://www.ietf.org/shadow.html
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to