Re: [IPsec] IPR statement for draft-detienne-ikev2-recovery

2010-03-22 Thread Frederic Detienne
Hi Paul, I am afraid you are mistaken. Yoav, Yaron, Pratima and I had a discussion about the draft's IPR back in Dublin in July 2008. We told back then that we would have rights released. The process takes its own time but as far as Pratima and I are concerned, we did due diligence. Will you s

[IPsec] PAKE Criteria draft posted

2010-03-22 Thread Yaron Sheffer
Hi, version -01 of the draft has been on the IPsecME wiki for the last few days. It is now posted under https://datatracker.ietf.org/doc/draft-sheffer-ipsecme-pake-criteria/ (with a new date, but the same content). Thanks, Yaron ___ IPsec mai

Re: [IPsec] IPR statement for draft-detienne-ikev2-recovery

2010-03-22 Thread Paul Hoffman
At 9:51 AM +0100 3/22/10, Frederic Detienne wrote: >I am afraid you are mistaken. Yoav, Yaron, Pratima and I had a discussion >about the draft's IPR back in Dublin in July 2008. We told back then that we >would have rights released. The process takes its own time but as far as >Pratima and I are

[IPsec] Fwd: I-D Action:draft-sheffer-ipsecme-hush-00.txt

2010-03-22 Thread Yaron Sheffer
Hi, we will *not* discuss this document at today's IPsecME session. But we would appreciate your comments anyway. Thanks, Yaron Original Message Subject:I-D Action:draft-sheffer-ipsecme-hush-00.txt Date: Mon, 22 Mar 2010 01:15:02 -0700 (PDT) From: internet-dr

[IPsec] [Technical Errata Reported] RFC5739 (2089)

2010-03-22 Thread RFC Errata System
The following errata report has been submitted for RFC5739, "IPv6 Configuration in Internet Key Exchange Protocol Version 2 (IKEv2)". -- You may review the report below and at: http://www.rfc-editor.org/errata_search.php?rfc=5739&eid=2089 -

[IPsec] [Editorial Errata Reported] RFC5739 (2090)

2010-03-22 Thread RFC Errata System
The following errata report has been submitted for RFC5739, "IPv6 Configuration in Internet Key Exchange Protocol Version 2 (IKEv2)". -- You may review the report below and at: http://www.rfc-editor.org/errata_search.php?rfc=5739&eid=2090 -

Re: [IPsec] IPR statement for draft-detienne-ikev2-recovery

2010-03-22 Thread Frederic Detienne
Hi Paul, I am still puzzled that you see fit to check in private with Yoav and in public with us. For the records, at least one of the co-chairs (Yaron) was advised about the IPR at the same time as Yoav. regards, fred On 22 Mar 2010, at 15:09, Paul Hoffman wrote: > At 9:51 AM +0100

Re: [IPsec] IPR statement for draft-detienne-ikev2-recovery

2010-03-22 Thread Yaron Sheffer
Hi Frederic, this is correct, however we did not share this information because it was an individual submission at the time, and we expected Cisco to do the right thing, i.e. to inform the WG in a timely manner (and later, we simply forgot). For some reason, Cisco chose to publish the IPR st

[IPsec] I-D Action:draft-ietf-ipsecme-esp-null-heuristics-07.txt

2010-03-22 Thread Internet-Drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the IP Security Maintenance and Extensions Working Group of the IETF. Title : Heuristics for Detecting ESP-NULL packets Author(s) : T. Kivinen, D. McDonald

[IPsec] synchronizing crypto state

2010-03-22 Thread David McGrew
Hi Yoav, another requirement for IPsec HA is to coordinate the use of distinct counters between multiple crypto engines. The problem (and a convenient solution) is described in http://tools.ietf.org/html/draft-ietf-msec-ipsec-group-counter-modes-05 David __

[IPsec] Terminology issue (minor)

2010-03-22 Thread shore
This is probably a small thing, but in general the term "cluster" implies at least some degree of shared state among cluster members. I understand that there's some suggestion of that in saying that a cluster protects the same domain but there's really quite a bit more to it than that - it's going

[IPsec] Password-Based Auth: Two criteria comments

2010-03-22 Thread Black_David
Summarizing what I said in the meeting: (1) The performance criteria should include performance with large complex secrets (e.g., pre-shared keys), not just the smaller passwords that people can reasonably be expected to remember. This is because a password-based authentication mechanism may be

Re: [IPsec] synchronizing crypto state

2010-03-22 Thread Dan Harkins
Hi, Another solution is to use a cipher mode (like SIV) that does not lose all security if a counter is reused. Then you don't have to worry at all it. Dan. On Mon, March 22, 2010 9:29 am, David McGrew wrote: > Hi Yoav, > > another requirement for IPsec HA is to coordinate the use of dist

Re: [IPsec] Password-Based Auth: Two criteria comments

2010-03-22 Thread Yaron Sheffer
Hi David, I think both of these are (correct) requirements, rather than criteria. None of the algorithms I've seen care whether it's a 6-char ASCII password, or 512 truly-random bits. None of them say anything about management (with the possible exception of the "augmented" algorithms where t

[IPsec] criteria for failure detection

2010-03-22 Thread Hu, Jun (Jun)
Hi, First of all, I am not sure if this fit into existing "supported scenarios" criteria or it is a new one, the failure detection time is cirtical to some services runs over ipsec tunnel, such services like VoIP can only tolerate sub-second(or 1~2 seconds max) of transport failure, otherwise th

Re: [IPsec] Password-Based Auth: Two criteria comments

2010-03-22 Thread Yoav Nir
On Mar 22, 2010, at 11:18 AM, wrote: > Summarizing what I said in the meeting: > > (1) The performance criteria should include performance with large complex > secrets (e.g., pre-shared keys), not just the smaller passwords that people > can reasonably be expected to remember. > > This is b

Re: [IPsec] synchronizing crypto state

2010-03-22 Thread Yoav Nir
That would be good, but we don't want to madate not using certain modes of operation when you have a cluster. That would be very counter-productive. OTOH, because of the replay counter, we've already agreed that an outbound child SA cannot be shared among members of a load-sharing cluster. As f

Re: [IPsec] criteria for failure detection

2010-03-22 Thread Yoav Nir
Failure detection by either QCD or SIR takes 1-2 roundtrips, whether this is subsecond or not depends on round-trip time. In case of a non-synchronized hot-standby gateway, those 2 roundtrips begin the moment that the standby gateway becomes active, so the call probably doesn't get dropped. In

Re: [IPsec] Password-Based Auth: Two criteria comments

2010-03-22 Thread Black_David
Yoav, > IKE already has PSK-based authentication. If my "password" is > 9975612f178b31164bef5bb672cbeb1db6437d6459ff1d8a17f12ec73fcd5c92, then I don't need any new-fangled > mode, because the authentication described in section 2.15 of RFC 4306 is good enough. If that "password" was generated fro

[IPsec] Password-Based Auth: One criteria comment

2010-03-22 Thread Sean Turner
Criteria: the scheme must support arbitrary octets as the input. I don't want to pick one that doesn't support whatever the current/future IETF character set encoding is. spt ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo