On Mar 22, 2010, at 11:18 AM, <black_da...@emc.com> <black_da...@emc.com> wrote:

> Summarizing what I said in the meeting:
> 
> (1) The performance criteria should include performance with large complex 
> secrets (e.g., pre-shared keys), not just the smaller passwords that people 
> can reasonably be expected to remember.
> 
> This is because a password-based authentication mechanism may be usefully 
> applied to shared secret authentication implementations that derive a 
> supposedly strong secret solely from a password (see the discussion of 
> pre-shared key authentication in Section 2.15 of RFC 4306).  Password-based 
> authentication would provides some defense against this and other key 
> generation weaknesses.  The original password that was used to generate the 
> shared secret may no longer be available, so good performance on large 
> complex secrets would enable password based authentication to use the derived 
> (supposedly strong) secret as the password.

IKE already has PSK-based authentication. If my "password" is 
9975612f178b31164bef5bb672cbeb1db6437d6459ff1d8a17f12ec73fcd5c92, then I don't 
need any new-fangled mode, because the authentication described in section 2.15 
of RFC 4306 is good enough.

The new mode we're looking for is for giving a little security for people who 
use the password "yoav71", thinking that nobody would ever guess it.
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to