Hi,

I'd like to skip through the architectural bits in a hurry, and then come back to Tero's proposal. All while rapidly flipping hats :-)

In the past I was of the opinion that IKEv2+EAP (with Mutual EAP, RFC 5998) could get us all we need for password authentication, and eliminate the use of insecure "shortened shared secrets" (abused PSK) in IKEv2. An implementer could use Dan's EAP-pwd or my EAP-EKE (now both published as RFCs) and be done. The WG consensus was that we need specific IKE auth methods, because implementing EAP is a pain in some situations. I have accepted this consensus and I see no reason to reopen this discussion.

[WG co-chair hat off:]

Unfortunately we had just enough energy to decide that we want a "native IKEv2" way to do authentication with short secrets; we did not have enough energy to pick a winner method. And I don't think we as a WG, or the authors of the individual proposals, have the energy to go through a "framework" exercise at this point in time. The documents are now in IETF LC after having been held up for more than half a year.

Now to Tero's proposal: I'm afraid it is too much of an abstraction for what we really need to achieve. I am as unhappy as anybody that we could not settle on a single method, but this is water under the bridge. Given this situation, we want to minimize the pain for implementors who implement 1-2 of these methods (I have abandoned HUSH in favor of PACE a while ago, and I somehow don't see anybody implementing all three).

So I don't think we need a whole framework. We just need a way for the two peers to negotiate which method(s) they support early enough, i.e. in IKE_SA_INIT. In PACE we use a notification, and I strongly urge the two other documents' authors to do the same. But I'm willing to be convinced to switch to another method if that's the group's preference. Other than that, I really don't see the value in uniform "meta-payloads" and "super-notifications", or how they would simplify implementations.

Thanks,
        Yaron
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to