Hi Dan, > And in that case EAP encapsulation of the underlying key exchange would > be completely pointless and extraneous, would double the number of > messages required to complete the exchange, and would increase the amount > of security-critical code.
EAP authentication was not primarily included in IKEv2 to implement some kind of password authentication on top if IKEv2, but to reuse existing EAP methods and infrastructure. The most demanding user of IKEv2 currently is the mobile/telco industry; There are several specs in 3GPP and 3GPP2 using it. Many of them have chosen IKEv2 because they can use their existing EAP-AKA/SIM infrastructure for authentication. > It seems to me that EAP-only authentication in IKEv2: > 1. does not solve a general problem; It does. It allows to omit public key authentication in cases where mutual EAP authentication is sufficient. I'm aware of at least one 3GPP2 spec that already uses EAP-AKA/TLS only authentication, but does not follow this draft. I really see a need for this WG item. > 2. solves the specific problem it is aimed at poorly-- doubling of > the number of messages, requiring writing and testing of new > state EAP state machines that are, otherwise, unnecessary If you're just talking about password authentication, yes. But this allows IKEv2 to work in existing infrastructures (EAP over RADIUS/DIAMETER). We currently see a strong demand for such solutions. > To provide the benefits of EAP-only authentication [...] it would be > much better to support the inclusion of "Secure PSK authentication" as > a work item. Implementing password authentication on top of EAP may be one reason for this draft, but there are several others. And the separated EAP layer allows you to forward authentication to an existing AAA server. Further, many vendors already have generic EAP support. Implementing PSK authentication on top of it is probably simpler and more flexible than integrating it in IKEv2 directly. Best regards Martin _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec