Hi Martin,

If you (or anybody else) support EAP-only auth (or any of the other 6 drafts), 
please commit to review it assuming it becomes a WG document. *This* was the 
main point of this discussion thread: we cannot make progress without committed 
editors and reviewers.

Thanks, and apologies for picking on you :-)

        Yaron

> -----Original Message-----
> From: Martin Willi [mailto:mar...@strongswan.org]
> Sent: Tuesday, December 01, 2009 11:27
> To: Dan Harkins
> Cc: Yaron Sheffer; ipsec@ietf.org
> Subject: Re: [IPsec] Proposed work item: EAP-only authentication in IKEv2
> 
> Hi Dan,
> 
> > And in that case EAP encapsulation of the underlying key exchange would
> > be completely pointless and extraneous, would double the number of
> > messages required to complete the exchange, and would increase the
> amount
> > of security-critical code.
> 
> EAP authentication was not primarily included in IKEv2 to implement some
> kind of password authentication on top if IKEv2, but to reuse existing
> EAP methods and infrastructure.
> 
> The most demanding user of IKEv2 currently is the mobile/telco industry;
> There are several specs in 3GPP and 3GPP2 using it. Many of them have
> chosen IKEv2 because they can use their existing EAP-AKA/SIM
> infrastructure for authentication.
> 
> >   It seems to me that EAP-only authentication in IKEv2:
> >      1. does not solve a general problem;
> 
> It does. It allows to omit public key authentication in cases where
> mutual EAP authentication is sufficient. I'm aware of at least one 3GPP2
> spec that already uses EAP-AKA/TLS only authentication, but does not
> follow this draft. I really see a need for this WG item.
> 
> >      2. solves the specific problem it is aimed at poorly-- doubling of
> >         the number of messages, requiring writing and testing of new
> >         state EAP state machines that are, otherwise, unnecessary
> 
> If you're just talking about password authentication, yes. But this
> allows IKEv2 to work in existing infrastructures (EAP over
> RADIUS/DIAMETER). We currently see a strong demand for such solutions.
> 
> > To provide the benefits of EAP-only authentication [...] it would be
> > much better to support the inclusion of "Secure PSK authentication" as
> > a work item.
> 
> Implementing password authentication on top of EAP may be one reason for
> this draft, but there are several others. And the separated EAP layer
> allows you to forward authentication to an existing AAA server.
> Further, many vendors already have generic EAP support. Implementing PSK
> authentication on top of it is probably simpler and more flexible than
> integrating it in IKEv2 directly.
> 
> Best regards
> Martin
> 
> 
> Scanned by Check Point Total Security Gateway.
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to