Re: [IPsec] #107: Sending certificate chains in IKEv2

2009-08-26 Thread Tero Kivinen
David Wierbowski writes: > I agree with Tero that Yoav's proposed text adds clarity and effectively it > does not add a new MUST; however, to address Paul's concern can we just > change the words "MUST be" to the word "are" or lower case "should be?" > For example: > >o X.509 Certificate - Si

Re: [IPsec] #28: Obtaining src/dest IP addresses for UDP-encapsulated transport mode ESP

2009-08-26 Thread Scott C Moonen
Tero, I am not comfortable with the following statement: . . . thus it will send back traffic selectors having IPN1 and IP2 as their IP addresses . . . I would prefer that the server re-map the TS values back to IP1 and IPN2 when sending its response. This is consistent with the genera

[IPsec] IPSECME Virtual Interim Meeting

2009-08-26 Thread IESG Secretary
The ipsecme WG will have a virtual interim WG meeting in about a month. We will have a conference call on Tuesday September 22, 15:00 GMT (18:00 Israel, 17:00 CET, 11:00 EDT, 8:00 PDT), for 2 hours. We are planning on the same format as the previous time: a VoIP conference bridge and posted slides

Re: [IPsec] #107: Sending certificate chains in IKEv2

2009-08-26 Thread Yaron Sheffer
Hi Yoav, This text (to be added for this specific encoding) duplicates the existing text at the end of this same section. Moreover, we keep saying "multiple certificates" without mentioning the semantics of these multiple certs, i.e. they should form a trust chain. Thanks, Yaron > -

Re: [IPsec] #107: Sending certificate chains in IKEv2

2009-08-26 Thread David Wierbowski
I agree with Tero that Yoav's proposed text adds clarity and effectively it does not add a new MUST; however, to address Paul's concern can we just change the words "MUST be" to the word "are" or lower case "should be?" For example: o X.509 Certificate - Signature (4) contains a DER encoded X

Re: [IPsec] #28: Obtaining src/dest IP addresses for UDP-encapsulated transport mode ESP

2009-08-26 Thread Dan McDonald
On Wed, Aug 26, 2009 at 03:52:11PM +0300, Tero Kivinen wrote: > I wrote better long description about the problem, and also proposed > solution text at 2009-04-07: > http://www.ietf.org/mail-archive/web/ipsec/current/msg04131.html The text referenced above summarizes the problem AND solution qu

Re: [IPsec] draft-ietf-ipsecme-traffic-visibility-07.txt comments

2009-08-26 Thread Gabriel Montenegro
Thanks Tero. Good catches. We'll address them in the upcoming revision. > -Original Message- > From: Tero Kivinen [mailto:kivi...@iki.fi] > Sent: Monday, 24 August, 2009 6:03 AM > To: ipsec@ietf.org > Cc: draft-ietf-ipsecme-traffic-visibil...@tools.ietf.org; ipsecme- > cha...@tools.ietf.or

Re: [IPsec] #107: Sending certificate chains in IKEv2

2009-08-26 Thread David Wierbowski
We use multiple certificate payloads when using X.509 Certificate - Signature (4) encoding. I do not really see how this could be questioned. RFC 4306 clearly says X.509 Certificate - Signature (4) encoding contains a single certificate as pointed out below. The logical conclusion is that if y

[IPsec] #107: Sending certificate chains in IKEv2

2009-08-26 Thread Tero Kivinen
Yaron Sheffer writes: > What this doesn't say is how we send this chain of certificates. Is it > multiple separate CERT payloads (in that case it should say so) or is it a > single CERT payload (and then we should also say so) If you use format that can only store one certificate (for example X.5

Re: [IPsec] #107: Sending certificate chains in IKEv2

2009-08-26 Thread Yoav Nir
Good. So how about we close this issue by adding the last sentence below: If multiple certificates are sent, the first certificate MUST contain the public key used to sign the AUTH payload. The other certificates may b

Re: [IPsec] #107: Sending certificate chains in IKEv2

2009-08-26 Thread Tero Kivinen
Martin Willi writes: > It is not even clear from the spec how to encode multiple certificates > in a single cert payload with type 4 (just concatenate?). There is no way to encode more than one certificate with X.509 Certificate - Signature (#4) format in one certificate payload. -- kivi...@iki.

[IPsec] #28: Obtaining src/dest IP addresses for UDP-encapsulated transport mode ESP

2009-08-26 Thread Tero Kivinen
Yaron Sheffer writes: > [2.23, NAT Traversal] > > o Implementations MUST process received UDP-encapsulated ESP packets > >even when no NAT was detected. > > > > o The original source and destination IP address required for the > >transport mode TCP and UDP packet checksum

Re: [IPsec] #79: Remove CP from Create_Child_SA?

2009-08-26 Thread Tero Kivinen
Yoav Nir writes: > But if it's different IP addresses for different applications, then > there are probably also different traffic selectors for these > applications, and then possibly different IPsec SAs. Most likely, but it is still most likely going to be few -> many mapping, i.e. you have few

Re: [IPsec] #79: Remove CP from Create_Child_SA?

2009-08-26 Thread Yoav Nir
Interesting. But if it's different IP addresses for different applications, then there are probably also different traffic selectors for these applications, and then possibly different IPsec SAs. If that's the case, then maybe it does make sense to get IP addresses in the Create_Child SA excha

Re: [IPsec] #79: Remove CP from Create_Child_SA?

2009-08-26 Thread Raj Singh
Hi Yoav, These applications are using same IKE SA for allocating IP to the application specific virtual interfaces, which can be more than one. Let me know if you further clarification. Thanks & Regards, Raj 2009/8/26 Yoav Nir > Hi Raj. > The issue is concerned with Config payload in Child SA

Re: [IPsec] #107: Sending certificate chains in IKEv2

2009-08-26 Thread Martin Willi
Hi, > Input from actual implementations (and bakeoffs) will be most valuable > here. We and I think all vendors I have tested against use multiple certificate payloads (however, multi-level CA is a feature not tested with many participants). It is not even clear from the spec how to encode multi