You're good!  :-)

On the vendor side - perhaps EKE patent concern was the cause (you 
implement/sell free SRP and get slapped with EKE licensing)? And the users 
found alternative solutions in the meanwhile?

Do you think weak passwords are too dangerous overall (many other ways of 
attacking them outside of direct protocol attempts that we try to defend 
against), and so we shouldn't entertain them at all?

Tnx!
Regards,
Uri

----- Original Message -----
From: pgut001 <pgut...@wintermute02.cs.auckland.ac.nz>
To: s...@cs.columbia.edu <s...@cs.columbia.edu>; Blumenthal, Uri - 0662 - MITLL
Cc: c...@irtf.org <c...@irtf.org>; hannes.tschofe...@gmx.net 
<hannes.tschofe...@gmx.net>; ipsec@ietf.org <ipsec@ietf.org>; 
paul.hoff...@vpnc.org <paul.hoff...@vpnc.org>
Sent: Tue Mar 02 19:41:43 2010
Subject: Re: [Cfrg] [IPsec] Beginning discussion on secure password-only 
authentication for IKEv2

"Steven M. Bellovin" <s...@cs.columbia.edu> writes:

>Note that the EKE patent expires in October 2011.  (At least I think it does;
>it was filed in October 1991.)  Depending on when you expect implementations
>to appear-- and given how long it takes to produce standards-track documents
>in the IETF -- it might not be a problem.

Given that SRP implementations have been available and more or less freely 
usable for quite some time and TLS-PSK is completely unencumbered anyway, I 
think the real issue won't be "when will implementations appear" but "why 
isn't anyone using them when they are available"?

(Mind you that's a layer 8 issue, and therefore not our problem :-).

Peter.
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to