Hi all. Time for another set of issues.

Issue #142 - Difference from RFC 4718 in rekeying IKE SA
========================================================
Section 2.25.2, "If a peer receives a request to delete a Child SA when it is 
currently rekeying the IKE SA, it SHOULD reply as usual, with a Delete 
payload." I noticed this is different from whatRFC 4718 recommended, but this 
is probably OK, given the other text... (but I still hope this was intentional 
change :-)

The relevant text in RFC 4718 is in section 5.11.8:
   It seems this situation is tricky to handle correctly.  Our proposal
   is as follows: if a host receives a request to rekey the IKE_SA when
   it has CHILD_SAs in "half-open" state (currently being created or
   rekeyed), it should reply with NO_PROPOSAL_CHOSEN.  If a host
   receives a request to create or rekey a CHILD_SA after it has started
   rekeying the IKE_SA, it should reply with NO_ADDITIONAL_SAS.

   The case where CHILD_SAs are being closed is even worse.  Our
   recommendation is that if a host receives a request to rekey the
   IKE_SA when it has CHILD_SAs in "half-closed" state (currently being
   closed), it should reply with NO_PROPOSAL_CHOSEN.  And if a host
   receives a request to close a CHILD_SA after it has started rekeying
   the IKE_SA, it should reply with an empty Informational response.
   This ensures that at least the other peer will eventually notice that
   the CHILD_SA is still in "half-closed" state and will start a new
   IKE_SA from scratch.

This seems to be a change to bits on the wire, so we would like the group's 
approval. AFAICT no discussion has taken place so far.



Issue #145 - IKE_SA rekeying wording in 2.8
===========================================
Section 2.8, sentence: "Note that, when rekeying..." This is in wrong place; 
the rest of this paragraph is about IKE_SA rekeying, so it should be moved to 
the previous paragraph.
[[ Tero noted this as well, but Paul disagreed, saying that the placement was 
correct. This needs to be resolved. ]]

I don't really see how this is in the wrong place. The entire paragraph reads 
as follows:
   To rekey a Child SA within an existing IKE SA, create a new,
   equivalent SA (see Section 2.17 below), and when the new one is
   established, delete the old one.  Note that, when rekeying, the new
   Child SA SHOULD NOT have different traffic selectors and algorithms
   than the old one.

This is about Child SAs. It's only the next paragraph that talks about IKE SAs. 
I think this should stay where it is. Again, no discussion was spotted on the 
list.



Issue #144 - Placement of INVALID_KE_PAYLOAD text
=================================================
There are two places that have very similar text about INVALID_KE_PAYLOAD: 
Section 1.3 (for CREATE_CHILD_SA exchange), and Section 2.7 (for IKE_SA_INIT 
exchange). Especially the latter seems a bit strange, everything else in that 
section applies to CREATE_CHILD_SA exchanges, too, but this paragraph 
explicitly applies to IKE_SA_INIT only (although INVALID_KE_PAYLOAD works 
roughly the same way in CREATE_CHILD_SA, too). Perhaps the text in 2.7 should 
be moved to 1.2?

So the proposal is to move the contents of the penultimate paragraph (below) in 
section 2.7 ("Cryptographic Algorithm Negotiation") to section 1.2 ("Initial 
Exchanges").  What do you think?

   Since the initiator sends its Diffie-Hellman value in the
   IKE_SA_INIT, it must guess the Diffie-Hellman group that the
   responder will select from its list of supported groups.  If the
   initiator guesses wrong, the responder will respond with a Notify
   payload of type INVALID_KE_PAYLOAD indicating the selected group.  In
   this case, the initiator MUST retry the IKE_SA_INIT with the
   corrected Diffie-Hellman group.  The initiator MUST again propose its
   full set of acceptable cryptographic suites because the rejection
   message was unauthenticated and otherwise an active attacker could
   trick the endpoints into negotiating a weaker suite than a stronger
   one that they both prefer.





Regarding issue #140, we're still waiting for an explanation about how the 
whole transport mode through NAT issue is relevant to RFC 5555.

Yoav



_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to