Re: [IPsec] Issue #175: Better wording for NAT mobility issues

2010-02-04 Thread Raj Singh
Hi Paul, One clear change is that updating the address, port info is changed from authenticated packet to integrity protected packet. Does this change is to allow recovery from NAT mapping removal during establishment of IKEv2 SA e.g. with EAP authentication, during retransmission of IKE_AUTH exch

[IPsec] Issue #175: Better wording for NAT mobility issues

2010-02-04 Thread Paul Hoffman
The last bullet in 2.23 is confusing. A proposed rewrite is: Old: There are cases where a NAT box decides to remove mappings that are still alive (for example, the keepalive interval is too long, or the NAT box is rebooted). To recover in these cases, hosts that do not support other methods of r

Re: [IPsec] Fwd: Issue : Regarding EAP identity

2010-02-04 Thread Raj Singh
Hi Dan, On Fri, Feb 5, 2010 at 2:47 AM, Dan Harkins wrote: > > Hi Raj, > > RFC 3748 (the RFC defining EAP) says: > > The Identity Response may not be the appropriate > identity for the method; it may have been truncated or obfuscated > so as to provide privacy, or it may have b

[IPsec] LZF for IPcomp

2010-02-04 Thread Thor Lancelot Simon
I'm considering implementing LZF as an IPcomp transform. LZF is a small (core transform is about 1K), very fast, patent-free LZ family compressor. (http://oldhome.schmorp.de/marc/liblzf.html) It compresses about 2X-4X as fast as Deflate and uncompresses almost as fast as memcpy() on many

Re: [IPsec] Fwd: Issue : Regarding EAP identity

2010-02-04 Thread Dan Harkins
Hi Raj, RFC 3748 (the RFC defining EAP) says: The Identity Response may not be the appropriate identity for the method; it may have been truncated or obfuscated so as to provide privacy, or it may have been decorated for routing purposes. In other words, the identity

Re: [IPsec] Fwd: Issue : Regarding EAP identity

2010-02-04 Thread Raj Singh
Hi Yoav, According to RFC-3579 [Appendix-A] RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP) shows that NAS (IKEv2 Gateway) sends an EAP-Request/Identity as the initial packet to IKEv2 initiator. Here IKEv2 will come to know EAP identity and

Re: [IPsec] Closing issue #143 (rewrite of section 1.5)

2010-02-04 Thread Valery Smyslov
Paul Hoffman writes: > >Probably s/informational/Informational ? I'm not sure because the > >term "Informational Message" is never formally introduced in the document > >apart from this section... > > Actually, it is introduced in 1.4: "Note that some informational messages, not > exchanges, can b

Re: [IPsec] Closing issue #143 (rewrite of section 1.5)

2010-02-04 Thread Paul Hoffman
At 9:48 AM +0300 2/4/10, Valery Smyslov wrote: >These two paragraphs are left from previous version and >should be removed (now all they are talking about is explained >in more details below). There were bits in those two paragraphs that were still new, but on further looking, I see that those bi

Re: [IPsec] Fwd: Issue : Regarding EAP identity

2010-02-04 Thread Yoav Nir
The IKEv2 responder enforces policy, so it has to know the identity, both for enforcement and auditing. Suppose y...@checkpoint.com is allowed to access server X, while alper.ye...@yegin.org is not, then the IKEv2 responder needs to both block your attempts to access server X (perhaps by failing

Re: [IPsec] Fwd: Issue : Regarding EAP identity

2010-02-04 Thread Alper Yegin
Hello, Why would the IKEv2 responder need to know the real identity? There can be privacy reasons for hiding it from any entity other than the AAA/authentication server. I'm thinking that mandating AAA server to reveal that value is not necessary and also problematic. Alper > -Original M