Re: [IPsec] Proposed work item: Childless IKE SA

2009-12-17 Thread Raj Singh
Hi Alper, On Fri, Dec 18, 2009 at 5:19 AM, Alper Yegin wrote: > Hi, > > I'm hoping by now it is understood that "childless IKE SA" is just a > technical detail of what is really on the table. The proposal on the table > is "designing a network access authentication protocol based on IKEv2". > T

Re: [IPsec] Issue #128: Can implementations not reply fully to Deletes?

2009-12-17 Thread David Wierbowski
I'm not sure I'm going to buy that garage door opener if I have to wait for dead peer detection before I can open or close it again :>). Dave Wierbowski From: Tero Kivinen

Re: [IPsec] Proposed work item: Childless IKE SA

2009-12-17 Thread Alper Yegin
Hi, I'm hoping by now it is understood that "childless IKE SA" is just a technical detail of what is really on the table. The proposal on the table is "designing a network access authentication protocol based on IKEv2". That's what this WG and IETF should be discussing. Having multiple solutions

Re: [IPsec] Issue #129: Traffic Selector and ICMPv6/MIPv6

2009-12-17 Thread Scott C Moonen
> I'd like to suggest a slight variation: "MIPv6 MH Type values are > treated as a single 16-bit integer port number, with Type in the > most significant eight bits and the least significant eight bits > set to zero." Julien, thanks. I agree with your suggestion, Scott Moonen (smoo...@us.ibm.co

Re: [IPsec] Issue #129: Traffic Selector and ICMPv6/MIPv6

2009-12-17 Thread Laganier, Julien
Thanks for the text proposal, Scott. I'd like to suggest a slight variation: "MIPv6 MH Type values are treated as a single 16-bit integer port number, with Type in the most significant eight bits and the least significant eight bits set to zero." --julien --

Re: [IPsec] Issue #129: Traffic Selector and ICMPv6/MIPv6

2009-12-17 Thread Scott C Moonen
I suggest replacing the "Start Port" and "End Port" bullets in section 3.13.1 with the following: o Start Port (2 octets) - Value specifying the smallest port number allowed by this Traffic Selector. For protocols for which port is undefined (including protocol 0), or if all port

Re: [IPsec] DISCUSS: draft-ietf-ipsecme-traffic-visibility

2009-12-17 Thread Grewal, Ken
Some comments inline... >It does make more complexity for the middle boxes as they need to cope >with both encrypted WESP and ESP-NULL WESP, thus they still cannot use >just the WESP protocol number to indicate this packet is clear text. >Now they also need to check the bit in the header, and if

Re: [IPsec] DISCUSS: draft-ietf-ipsecme-traffic-visibility

2009-12-17 Thread Grewal, Ken
Agreed. Thanks, Ken >-Original Message- >From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf >Of Jack Kohn >Sent: Wednesday, December 16, 2009 3:33 PM >To: Russ Housley >Cc: ipsec@ietf.org; i...@ietf.org >Subject: Re: [IPsec] DISCUSS: draft-ietf-ipsecme-traffic-visi

Re: [IPsec] WESP and combined-mode algorithms

2009-12-17 Thread Grewal, Ken
Hi Scott, Peter, This text was kept simple deliberately, so we would not need to cover every single case of different algorithm permutations. The intention was as Peter indicates below "... "augmented" meant that the bytes would be logically prepended to the existing ESP data before the ICV was

Re: [IPsec] Issue #130: Do we need to bump the minor version number?

2009-12-17 Thread David Wierbowski
I think it is reasonable to expect that an IKEv2 bis implementation would use an IF statement to control sending the new Notify types. If the minor number was changed an implementation could check the minor version and send the new notify types when the minor version was 1 and send the notify type

[IPsec] IKEv2bis: Variant on issue #64 (PF_KEY text), plus better SAD intro

2009-12-17 Thread Dan McDonald
While re-reading the introductory paragraph in Section 2.9: When an RFC4301-compliant IPsec subsystem receives an IP packet that matches a "protect" selector in its Security Policy Database (SPD), the subsystem protects that packet with IPsec. When no SA exists yet, it is the task of

Re: [IPsec] Issue #130: Do we need to bump the minor version number?

2009-12-17 Thread Richard Graveman
I think the criterion should be: Would a reasonable and correct implementation need to have an IF statement, e.g., if(minor_number == 1) ... I do not not think the criterion should be whether bumping the number breaks older implementations. >From the discussion, leaving the number alone seems fi

Re: [IPsec] Issue #130: Do we need to bump the minor version number?

2009-12-17 Thread Tero Kivinen
Yaron Sheffer writes: > Or else, we could remove the sentence "For example, it might > indicate the ability to process a newly defined notification > message." That is example what changing minor number might mean. All current conforming implementations already know how to process our newly define

Re: [IPsec] DISCUSS: draft-ietf-ipsecme-traffic-visibility

2009-12-17 Thread Tero Kivinen
Yaron Sheffer writes: > I agree with you regarding some of the proposals that have been > floating around re: exposing bits and pieces of encrypted data. I am really concerned about some of those late proposals for WESP extensions, and if someone would have mentioned any of those earlier when we w

Re: [IPsec] Working Group LC: draft-ietf-ipsecme-ikev2bis-06 (yes, IKEv2-bis!)

2009-12-17 Thread Tero Kivinen
David Wierbowski writes: > Comment # 2: > > Section 1.7 (Differences Between RFC 4306 and This Document) states: > >The protocol described in this document retains the same major >version number (2) and minor version number (0) as was used in RFC >4306. That is, the version number is

Re: [IPsec] Issue #130: Do we need to bump the minor version number?

2009-12-17 Thread Yaron Sheffer
Or else, we could remove the sentence "For example, it might indicate the ability to process a newly defined notification message." I thinking bumping the minor version number would be extremely risky. We know that everybody can ignore unknown notifications. We don't know that everybody can deal

Re: [IPsec] #22: Specifying the SA

2009-12-17 Thread Tero Kivinen
Paul Hoffman writes: > This all seems like a compelling argument. However: > > >Because of that I suggest we do not add that text but instead add > >sentense saying: > > > > As CHILD_SA_NOT_FOUND error refers to unknown SPI from the > > responders point of view, it does not fill in the SPI field