Hi Yoav,

On Fri, Feb 19, 2010 at 3:22 AM, Yoav Nir <y...@checkpoint.com> wrote:

> Hi all.
>
> There are only three issues this time, because this is the last batch.
>
> Issue #173 - Trigger packets should not be required
> ===================================================
> In a few places in the new section 2.23.1 in IKEv2bis, it says that one
> must have a trigger packet when starting negotiation. This assumption
> should be removed so as not to cause new requirements in IKEv2bis:
> there is no requirement for trigger packets in RFC 4306 or in the rest
> of IKEv2bis.
>
> - "When the client starts creating the IKEv2 SA and Child SA for sending
> traffic to the server, it has a triggering packet with source IP address
> of IP1, and a destination IP address of IPN2" should be changed to
> "...it may have a triggering packet...".
>
> - "The first traffic selector of TSi and TSr SHOULD have very specific
> traffic selectors including protocol and port numbers from the packet
> triggering the request" should be changed to "...SHOULD have very
> specific traffic selectors including protocol and port numbers, such as
> from the packet...".
>
> - The same change is made in the third bullet of the client list near
> the end of the section.
>
> I fully agree with this, and I think the document should be updated as
> suggested here. Moreover, section 2.9 describes the SINGLE_PAIR_REQUIRED
> error notification. Obviously you can't have both a trigger packet and a
> single_pair, so one of them should go. Trigger packets are at best
> recommended, not mandatory.
>
>
>
> Issue #174 - How to behave when EAP identity is not send by AAA
> ===============================================================
> In ikev2bis07
>
> ----- ikev2-bis-07 section 2.16, last paragraph ------------
>
>   When the initiator authentication uses EAP, it is possible that the
>   contents of the IDi payload is used only for AAA routing purposes and
>   selecting which EAP method to use. This value may be different from the
>   identity authenticated by the EAP method. It is important that policy
>   look ups and access control decisions use the actual authenticated
>   identity. Often the EAP server is implemented in a separate AAA server
>   that communicates with the IKEv2 responder. In this case, the
>   authenticated identity has to be sent from the AAA server to the IKEv2
>   responder.
>
> It says the authenticated EAP identity "has to" be send from AAA server,
> my interpretation and implementation "has to" is obvious MUST. If AAA
> doesn't send the authenticated EAP identity, what should be the
> behavior? Also, what if AAA server EAP server is not AAA server?
>
>
> There has been a lively discussion about this (a thread titled
> "Regarding EAP identity"). I can't say that the thread reached any firm
> conclusion, but a lot of ground has been covered about how AAA servers
> work, and about whether or not they communicate to the server something
> other then identity, such as policy. Despite the fact that the second A
> in AAA stands for "authorization", it was generally agreed that it is
> still the job of the IKE gateway to enforce policy, and if that policy
> comes from a AAA server, that is totally outside the scope of this
> document.
>
> So in conclusion, how about replacing "the authenticated identity has to
> be sent" with "the authenticated identity, if different from that in the
> IDi payload, has to be sent..." ? Would that satisfy everyone?
>
> "the authenticated identity, if different from that in the
IDi payload, MUST/SHOULD be sent..." would be good.

>
> Issue #175 - Better wording for NAT mobility issues
> ===================================================
> The last bullet in 2.23 is confusing. A proposed rewrite is:
>
> Old:
>   There are cases where a NAT box decides to remove mappings that are
>   still alive (for example, the keepalive interval is too long, or the NAT
>   box is rebooted). To recover in these cases, hosts that do not support
>   other methods of recovery such as MOBIKE [MOBIKE], and that are not
>   behind a NAT, SHOULD send all packets (including retransmission packets)
>   to the IP address and port from the last valid authenticated packet from
>   the other end (that is, they should dynamically update the address). A
>   host behind a NAT SHOULD NOT do this because it opens a possible denial
>   of service attack. Any authenticated IKE packet or any authenticated
>   UDP- encapsulated ESP packet can be used to detect that the IP address
>   or the port has changed. When IKEv2 is used with MOBIKE, dynamically
>   updating the addresses described above interferes with MOBIKE's way of
>   recovering from the same situation. See Section 3.8 of [MOBIKE] for more
>   information.
>
> New:
>   There are cases where a NAT box decides to remove mappings that are
>   still alive (for example, the keepalive interval is too long, or the NAT
>   box is rebooted). This will be apparent to a host if it receives a
>   packet whose integrity protection validates, but has a different port,
>   address, or both from the one that was associated with the SA in the
>   validated packet. When such a validated packet is found, a host that
>   does not support other methods of recovery such as MOBIKE [MOBIKE], and
>   that is not behind a NAT, SHOULD send all packets (including
>   retransmission packets) to the IP address and port in the validated
>   packet, and SHOULD store this as the new address and port combination
>   for the SA (that is, they SHOULD dynamically update the address). A host
>   behind a NAT SHOULD NOT do this type of dynamic address update if a
>   validated packet has different port and/or address values because it
>   opens a possible denial of service attack (such as allowing an attacker
>   to break the connection with a single packet). When IKEv2 is used with
>   MOBIKE, dynamically updating the addresses described above interferes
>   with MOBIKE's way of recovering from the same situation. See Section 3.8
>   of [MOBIKE] for more information.
>
> No discussion, but I like the change. Anyone objects?
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to