Matthew Cini Sarreo writes:
> From a developer point of view, I share the same opinion as Yaron about this
> issue. Instead of creating new solutions, I personally think that it would
> be better to offer guidlines on how to implement current solutions (i.e EAP)
> and provide documents targeting implementers. This would create less
> confusion and keep IKEv2 a clean, easy to understand and use protocol.

I think it would be much more complicated to try to turn EAP from
client / server protocol to symmetric protocol, than to add new
exchange to IKEv2.

Note, that I do not comment anything about how the current SPKS draft
is done, as I have not really read it, but I think we should add
secure password protocol to the IKEv2 and not use EAP for that when
using symmetric site to site, or host to host scenarios.

If we had that clean secure password protocol, then we could leave out
EAP in some environments, which would make protocol implementation
much easier.

Looking at the state machine of IKE_AUTH in our own implementation,
EAP causes most of the complexity (mostly because EAP is open ended).

On the other hand if we add multiple authentication support to the
state machine pictures, then that is even more complex than EAP...

Good thing with SPSK is that it is alternative for all other
authentication modes, i.e. adds one to the shared key-shared key,
shared key-public key, public key-shared key, and EAP-public key list.
I.e. it does not multiply the test cases but just adds one to the list
of current authentication modes, raising it from 4 to 5. EAP only
authentication mode raises it by one more.

Multiple authentication support raises it to power of n (depending how
many different authentication rounds you support)...
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to