[IPsec] Please review draft-ietf-ipsecme-aes-ctr-ikev2-05.txt

2010-03-04 Thread Tero Kivinen
Paul Hoffman writes: > Based on Pasi's AD review, the authors significantly shortened the > document. It seems prudent to have the WG review the new, shorter > version. In particular, it would be good for developers to look at > the new short document and see if it is complete enough to implement >

Re: [IPsec] Please review draft-ietf-ipsecme-aes-ctr-ikev2-05.txt

2010-03-04 Thread Tero Kivinen
Raj Singh writes: > Section 5. IANA Considerations can be reworded in-line with > ikev2bis. It would be better align it with ikev2-parameters iana registry. > 5. IANA Considerations > > IANA has already registered the type and value for AES-CTR. > > Name Number Defined In

Re: [IPsec] [Cfrg] Beginning discussion on secure password-only authentication for IKEv2

2010-03-04 Thread Blumenthal, Uri - 0662 - MITLL
Well, during my long and fruitful career I've come across many asinine statements - but this pearl from your collection outshines mine! Indeed "straight from the horse's" (or in the context - "mule's"?) mouth (no offense meant to those wonderful equestrians). I'm struck speechless (which is unu

[IPsec] Last Call: draft-ietf-ipsecme-ikev2bis (Internet Key Exchange Protocol: IKEv2) to Proposed Standard

2010-03-04 Thread The IESG
The IESG has received a request from the IP Security Maintenance and Extensions WG (ipsecme) to consider the following document: - 'Internet Key Exchange Protocol: IKEv2 ' as a Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this acti

Re: [IPsec] [Cfrg] Beginning discussion on secure password-only authentication for IKEv2

2010-03-04 Thread Yaron Sheffer
Can someone please explain the joke to me? Nelson was asked about TLS-PSK (RFC 4279) and he replied that it can easily be abused. TLS-PSK (similarly to IKE-PSK) is vulnerable to dictionary attacks if used with a short secret (a.k.a. "password"), at least in the presence of an active attacker. So

Re: [IPsec] Please review draft-ietf-ipsecme-aes-ctr-ikev2-05.txt

2010-03-04 Thread Scott C Moonen
Caveat: I have not reviewed in detail. But I noticed a typo below line 3020 -- "may hve". Scott Moonen (smoo...@us.ibm.com) z/OS Communications Server TCP/IP Development http://www.linkedin.com/in/smoonen |> | From: | |> >---

Re: [IPsec] [Cfrg] Beginning discussion on secure password-only authentication for IKEv2

2010-03-04 Thread Yoav Nir
Explaining a joke spoils all the fun, but here goes: It's not like PKI is working out better for user authentication. And password-in-https-form is also vulnerable to online dictionary attacks. Now if they were using TLS-EAP But that, of course, suffers from excessive layering. __

[IPsec] Fwd: Last Call: draft-ietf-ipsecme-ikev2bis (Internet Key Exchange Protocol: IKEv2) to Proposed Standard

2010-03-04 Thread Paul Hoffman
Of definite interest to the WG: >X-Original-To: ietf-annou...@ietf.org >Delivered-To: ietf-annou...@core3.amsl.com >X-idtracker: yes >To: IETF-Announce >From: The IESG >Subject: Last Call: draft-ietf-ipsecme-ikev2bis (Internet Key Exchange > Protocol: IKEv2) to Proposed Standard >Date: Thu

Re: [IPsec] [Cfrg] Beginning discussion on secure password-only authentication for IKEv2

2010-03-04 Thread Yaron Sheffer
Hi Peter, I completely agree with the rest of the argument. But I don't know of a realistic way to do it with TLS-PSK (people will *always* use short passwords, it's not like it's the exception to the rule). TLS-SRP is one possible solution. Or, as Yoav suggests, TLS-EAP with several alternativ