Hi Tero,

I think you are too quick to dismiss the option of using EAP-only for 
site-to-site and transport deployments, where the EAP state machine is embedded 
into the IKE endpoint. For people who already have client-side EAP, this is not 
adding a lot. It's not as efficient as tailor-made password authentication in 
IKE, but OTOH it is much more generic.

Thanks,
        Yaron

> -----Original Message-----
> From: Tero Kivinen [mailto:kivi...@iki.fi]
> Sent: Tuesday, December 01, 2009 15:04
> To: Yaron Sheffer
> Cc: Dan Harkins; Matthew Cini Sarreo; ipsec@ietf.org
> Subject: Re: [IPsec] Proposed work item: IKEv2 password authentication
> (SPSK) - NO
> 
> Yaron Sheffer writes:
> > I'm sorry, but you are misstating the difference between the
> > proposals. One is adding a notification and eliminating one existing
> > (certificate) check; the other is adding an IKE mode, and changing
> > the protocol state machine in the process.
> 
> Not true.
> 
> Both are adding new IKEv2 authentication mode.
> 
> In EAP only authentication the EAP_ONLY_AUTHENTICATION notify also
> makes it so that server DOES NOT need to have certificate and public
> key, meaning it does not send it s first AUTH payload in message 4.
> 
> The main benefit from this is that the server DOES NOT need to have
> private key.
> 
> (at least in draft-eronen-ipsec-ikev2-eap-auth-07.txt)
> 
> We currently already have 4 authentication modes.
> 
>      Client                           Server
> 1)   Shared key                               Shared key
> 2)   Public key                               Shared key
> 3)   Shared key                               Public key
> 4)   EAP                              Public key
> 
> EAP only will add one more:
> 
> 5)   mutual-EAP                               mutual-EAP
> 
> and SPSK will add one more:
> 
> 6)   Password                         Password
> 
> > Regardless of all the other pros and cons, the proposals are clearly
> > not comparable as far as changing the protocol.
> 
> The changes required for EAP only might be smaller, but testing effort
> for both of them is same, except EAP only really requires you to test
> with all supported mutual key generating EAP methods (and also test
> with others and make sure they are not accepted).
> 
> One thing I think most of you are missing is that their usage
> scenarios are COMPLETELY different.
> 
> EAP-only can be used when there is clear client-server setup, existing
> EAP infrastructure (for example EAP-SIM or EAP-AKA), and where there
> is no certificates or shared keys in use at all. This setup is
> asymmetric, one party (the user) always initiates the connection. SPSK
> cannot be used in such setup, as there is no password it can find.
> 
> SPSK can be used when there is requirement for host to host (or site
> to site) connection, where either end can initiate traffic and
> exchanges and where entities still want to use passwords instead of
> public keys to authenticate. Shared keys could be used there, but in
> most setups the shared keys used in those scenarios are not strong
> enough to be resistant against dictionary attacks. EAP-only cannot be
> used there as this is not client-server setup. In these setup the
> authentication needs to be symmetric.
> 
> For this reason I do not think we need to decide to take on or the
> other, we can take both as I do see use for both of them.
> 
> If I would need to select one, I would select SPSK, as that is
> something which cannot be done by IKEv2 now.
> 
> EAP-only is an optimization (both in protocol level, and especially in
> adminstrative level) for the existing EAP-Public key authentication.
> --
> kivi...@iki.fi
> 
> Scanned by Check Point Total Security Gateway.
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to