Yaron Sheffer writes:
> I'm not suggesting to constrain the protocol. I'm trying to focus the 
> discussion, and focus the criteria. We both know that integrating an 
> existing PAKE into IKEv2 is not such a big deal. But we can spend months 
> debating password management:
> 
> - Do we specify a password policy?
> - Is the policy somehow exposed in the protocol?
> - Do you need special error handling to support password policy ("Your 
> password will be expiring in 3 days")?
> - Do you need special protocol building blocks for password policy, e.g. 
> to allow password change?
> - Do the IKE transport rules (timeouts) need to change to accommodate 
> human input?

As far as I can think all of those would be outside the charter.

> And so on and so forth. This would all be highly important if we're 
> going after the client-gateway case.

I disagree on that. I do not think those are important for the
protocol point of view regardless whether we have client there or not.

> The charter defines the problem we want to solve, based on WG consensus 
> and IESG input. I suggest that we stick to it rather than continue 
> arguing about it.

The charter does not rule client-server or client-gateway out, it
mostly just says that we need to define simplier solution than EAP,
but I do not think it only limits you to server-server or
router-router cases.

For example for home or small office solutions there is no AAA server
and using EAP to do remote access would not be feasible, thus I would
expect most of the people currently use plain PSK in those
environments, and they also do use weak passwords, thus would need
something better.

Also I think that kind of scenario is completely within our charter
(if not, point me to the text which rules that out in our charter,
note that it is still within charter even when that specific example
is not given as example in charter).

Most of the scenario text in charter uses words like "such as",
"usually" etc, i.e they are not limiting charter to only those exact
examples.

The goal is defined as:

"The WG will develop a standards-track extension to IKEv2 to allow
mutual authentication based on "weak" (low-entropy) shared secrets.
The goal is to avoid off-line dictionary attacks without requiring the
use of certificates or EAP. "

http://datatracker.ietf.org/wg/ipsecme/charter/
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to