[IPsec] IKEv2-bis, conformance requirements

2010-01-26 Thread Tero Kivinen
Valery Smyslov writes: > Section 4 lists conformance requirements for IKEv2 implementations. > > First, the following text: > >Every implementation MUST be capable of doing four-message >IKE_SA_INIT and IKE_AUTH exchanges establishing two SAs (one for IKE, >one for ESP or AH). > >

[IPsec] Closing some more issues for IKEv2bis

2010-01-26 Thread Yoav Nir
Hi all. Time for another set of issues. Issue #142 - Difference from RFC 4718 in rekeying IKE SA Section 2.25.2, "If a peer receives a request to delete a Child SA when it is currently rekeying the IKE SA, it SHOULD reply as usual, with a

Re: [IPsec] IKEv2-bis, conformance requirements

2010-01-26 Thread Yaron Sheffer
Hi Tero, Valery, As much as it would be fun to discuss the conformance criteria (personally I agree that they are too stringent, and would become even less relevant if we add things like password-based auth), it is out of scope of the IKEv2-bis discussion. Referring to the guidelines we agreed

Re: [IPsec] Issue #156: SHOULD generate and accept which types?

2010-01-26 Thread Pasi.Eronen
Valery Smyslov wrote: > And I want to raise one more issue. Section 4 mandates support > for both PKIX and preshared key for conformant implementation. > Isnt't it too strong requirement? This requirement has been in the document for 4+ years. Unless there is concrete evidence of multiple impl

Re: [IPsec] Issue #157: Illustrate the SA payload with a diagram

2010-01-26 Thread Pasi.Eronen
Hi Tero, This picture looks correct to me. Best regards, Pasi > -Original Message- > From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf > Of ext Tero Kivinen > Sent: 25 January, 2010 14:33 > To: Yoav Nir > Cc: ipsec@ietf.org > Subject: Re: [IPsec] Issue #157: Illustra

Re: [IPsec] RFC5555 and Section 2.23.1 (was: IKEv2bis, comments about sections 1-2)

2010-01-26 Thread Pasi.Eronen
Tero Kivinen wrote: > pasi.ero...@nokia.com writes: > > - Section 2.23.1: If the responder doesn't find SPD entry for > > transport mode with the modified traffic selectors, and does a lookup > > with the original selectors, if it finds an entry for transport mode, > > can it use it? > > I do not

Re: [IPsec] CHILD_SA_NOT_FOUND error (was: IKEv2bis, comments about sections 1-2) (#142)

2010-01-26 Thread Pasi.Eronen
Tero Kivinen wrote: > > pasi.ero...@nokia.com writes: > > - Section 2.25: "A peer that receives a CHILD_SA_NOT_FOUND > > notification SHOULD silently delete the Child SA": Is this really > > necessary? I think this notification should only occur in cases where > > DELETE payload for this Child SA

Re: [IPsec] Issue #148: Historical cookie discussion

2010-01-26 Thread Pasi.Eronen
I don't find current 2.6 confusing, so the path of least effort would be to leave it as-is. (But I'm not opposed to some editing if someone is willing to propose text.) Best regards, Pasi > -Original Message- > From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf > Of e

Re: [IPsec] IKEv2-bis comments: 2.17 and onwards (#170)

2010-01-26 Thread Pasi.Eronen
Paul Hoffman wrote: > >B.1 (Group 1): We may want to add: "Use of this group is NOT > RECOMMENDED." > > Please open a tracker issue for this. Even though this is obvious, it > is a tad late to be suggesting new normative language. This "NOT RECOMMENDED" would belong in an update to RFC 4307, not

[IPsec] Closing some more issues for IKEv2bis

2010-01-26 Thread Tero Kivinen
Yoav Nir writes: > Issue #142 - Difference from RFC 4718 in rekeying IKE SA > > Section 2.25.2, "If a peer receives a request to delete a Child SA > when it is currently rekeying the IKE SA, it SHOULD reply as usual, > with a Delete payload."

Re: [IPsec] IKEv2-bis comments: 2.17 and onwards (#170)

2010-01-26 Thread Tero Kivinen
pasi.ero...@nokia.com writes: > Paul Hoffman wrote: > > > >B.1 (Group 1): We may want to add: "Use of this group is NOT > > RECOMMENDED." > > > > Please open a tracker issue for this. Even though this is obvious, it > > is a tad late to be suggesting new normative language. > > This "NOT RECOMME

Re: [IPsec] IKEv2-bis, conformance requirements

2010-01-26 Thread Valery Smyslov
Hi Tero, Tero Kivinen writes: > >A minimal IPv4 responder implementation will ignore the contents of > >the CP payload except to determine that it includes an > >INTERNAL_IP4_ADDRESS attribute and will respond with the address and > >other related attributes regardless of whether

Re: [IPsec] RFC5555 and Section 2.23.1 (was: IKEv2bis, comments about sections 1-2)

2010-01-26 Thread Tero Kivinen
pasi.ero...@nokia.com writes: > Tero Kivinen wrote: > > > pasi.ero...@nokia.com writes: > > > - Section 2.23.1: If the responder doesn't find SPD entry for > > > transport mode with the modified traffic selectors, and does a lookup > > > with the original selectors, if it finds an entry for transp

Re: [IPsec] Issue #156: SHOULD generate and accept which types?

2010-01-26 Thread Valery Smyslov
Hi Pasi, Pasi Eronen writes: > > And I want to raise one more issue. Section 4 mandates support > > for both PKIX and preshared key for conformant implementation. > > Isnt't it too strong requirement? > > > This requirement has been in the document for 4+ years. > > Unless there is concrete e

Re: [IPsec] Comments to draft-ietf-ipsecme-ikev2bis-07.txt

2010-01-26 Thread Tero Kivinen
Paul Hoffman writes: > At 5:05 PM +0200 1/21/10, Tero Kivinen wrote: > > All changes made other than the following. > > >-- > > > >Section 2.8.2 there was removed paragraph: > > > > However, there is a twist to the other case

Re: [IPsec] IKEv2-bis comments: 2.17 and onwards

2010-01-26 Thread Yaron Sheffer
Hi Tero, please see below. Thanks, Yaron > -Original Message- > From: Tero Kivinen [mailto:kivi...@iki.fi] > Sent: Monday, January 25, 2010 13:31 > To: Yaron Sheffer > Cc: IPsecme WG > Subject: [IPsec] IKEv2-bis comments: 2.17 and onwards > > Yaron Sheffer writes: > > 2.21.: EAP

Re: [IPsec] Issue #139: Keying material taken in the order for RoHC

2010-01-26 Thread Paul Hoffman
I have closed the issue, but wanted to post my new text because it rearranges some of Valery's proposed text. Please reply on this thread if you think I have muffed it. A single CHILD_SA negotiation may result in multiple security associations. ESP and AH SAs exist in pairs (one in each d

Re: [IPsec] Issue #139: Keying material taken in the order for RoHC

2010-01-26 Thread Valery Smyslov
Paul Hoffman writes: I have closed the issue, but wanted to post my new text because it rearranges some of Valery's proposed text. Please reply on this thread if you think I have muffed it. A single CHILD_SA negotiation may result in multiple security associations. ESP and AH SAs exist i

[IPsec] Protocol Action: 'Wrapped ESP for Traffic Visibility' to Proposed Standard

2010-01-26 Thread The IESG
The IESG has approved the following document: - 'Wrapped ESP for Traffic Visibility ' as a Proposed Standard This document is the product of the IP Security Maintenance and Extensions Working Group. The IESG contact persons are Pasi Eronen and Tim Polk. A URL of this Internet-Draft is: h

[IPsec] Fwd: Internal WG Review: Recharter of IP Security Maintenance and Extensions (ipsecme)

2010-01-26 Thread Paul Hoffman
Comments should be sent to all of this list, the IESG, and the IAB. --Paul Hoffman >From: IESG Secretary >To: i...@ietf.org, i...@iab.org, paul.hoff...@vpnc.org, yar...@checkpoint.com >Subject: Internal WG Review: Recharter of IP Security Maintenance and > Extensions (ipsecme) >reply-to:

Re: [IPsec] Fwd: Internal WG Review: Recharter of IP Security Maintenance and Extensions (ipsecme)

2010-01-26 Thread Yoav Nir
Hasn't this item just been approved by the IESG? Isn't it done? > >- A standards-track mechanism that allows an intermediary device, such >as a firewall or intrusion detection system, to easily and reliably >determine whether an ESP packet is encrypted wit

Re: [IPsec] Fwd: Internal WG Review: Recharter of IP Security Maintenance and Extensions (ipsecme)

2010-01-26 Thread Yaron Sheffer
1. It's a race condition. 2. It ain't over till it's over - published by the RFC Editor. > -Original Message- > From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf > Of Yoav Nir > Sent: Tuesday, January 26, 2010 23:28 > To: Paul Hoffman; IPsecme WG > Subject: Re: [IPsec]

Re: [IPsec] Fwd: Internal WG Review: Recharter of IP Security Maintenance and Extensions (ipsecme)

2010-01-26 Thread Paul Hoffman
At 11:27 PM +0200 1/26/10, Yoav Nir wrote: >Hasn't this item just been approved by the IESG? Isn't it done? > > >> >>- A standards-track mechanism that allows an intermediary device, such >>as a firewall or intrusion detection system, to easily and reliably

Re: [IPsec] Issue #139: Keying material taken in the order for RoHC

2010-01-26 Thread Paul Hoffman
All good points, Valery. Here's another attempt; please check carefully. A single CHILD_SA negotiation may result in multiple security associations. ESP and AH SAs exist in pairs (one in each direction), so two SAs are created in a single Child SA negotiation for them. Furthermore, Ch

Re: [IPsec] Issue #139: Keying material taken in the order for RoHC

2010-01-26 Thread Valery Smyslov
Paul Hoffman writes: > All good points, Valery. Here's another attempt; please check carefully. > >A single CHILD_SA negotiation may result in multiple security >associations. ESP and AH SAs exist in pairs (one in each direction), >so two SAs are created in a single Child SA negotia

Re: [IPsec] Fwd: Internal WG Review: Recharter of IP Security Maintenance and Extensions (ipsecme)

2010-01-26 Thread Yoav Nir
Yes, but the heuristics document is not standards-track. Never mind, I'm not trying to nit-pick our charter proposal. On Jan 26, 2010, at 11:41 PM, Paul Hoffman wrote: > At 11:27 PM +0200 1/26/10, Yoav Nir wrote: >> Hasn't this item just been approved by the IESG? Isn't it done? >> ___