Re: [IPsec] Query regarding IKE_SA_AUTH response

2011-04-27 Thread Raj Singh
Hi Prashant, As per RFC 5996, Initiator sending AUTHENTICATION_FAILED would be sufficient in case of peer's authentication failure: Sec. 2.21.2 Error Handling in IKE_AUTH ... If the error occurs on the initiator, the notification MAY be returned in a separate INFORMATIONAL exchange, usually wit

[IPsec] [IKEv2] IKE_AUTH without TSi, TSr

2009-04-21 Thread raj singh
Hi Group, What is the expected behavior if as a responder we do not receive TSi and TSr in IKE_AUTH exchange ? Shall we go ahead and establish IKEv2 SA ? If yes, shall we send out TSi and TSr ? Or we should reject the packet ? If we reject the packet during packet validation with doing ID and AUTH

Re: [IPsec] [IKEv2] IKE_AUTH without TSi, TSr

2009-04-21 Thread raj singh
TAX. This would > require the message ID and the checksum to be valid. Note that this has (may > only) be sent in an encrypted response. > > Please correct me if I am wrong. > > Regards, > Matt > > >> 2009/4/22 raj singh >> >>> Hi Group, >>> >&

Re: [IPsec] [IKEv2] IKE_AUTH without TSi, TSr

2009-04-21 Thread raj singh
ated and encrypted INVALID_SYNTAX notification over > the IKE_SA that has just been authenticated seems to be correct. > > Regards, > Matt > > >> >> 2009/4/22 raj singh >> >>> Hi Matt, >>> >>> There is possibility of just IKEv2 SA ge

Re: [IPsec] [IKEv2] IKE_AUTH without TSi, TSr

2009-04-22 Thread raj singh
stion 2, the text refers to a child SA creation that failed, not > to one that was never attempted. > > Of course it is possible to generate that effect - propose non-existant > cryptographic algorithms, or IPv7 addresses in the selectors, but that IMO > is a misuse of the protocol. >

Re: [IPsec] [IKEv2] IKE_AUTH without TSi, TSr

2009-04-22 Thread raj singh
ply. This is needed as > INVALID_SYNTAX is authenticated and encrypted. > > > Regards, > Matt > > 2009/4/22 raj singh > >> Hi Matt/Youv, >> >> Thanks for your reply. >> I will conclude as IKE_AUTH exchange MUST have TSi and TSr payload. We >&

Re: [IPsec] [IKEv2] IKE_AUTH without TSi, TSr

2009-04-22 Thread raj singh
Hi Tero, It make sense. The same point i want to make, if we as a responder are not going to process the packet, there is NO need to add IDr and AUTH with INVALID_SYNTAX during IKE_AUTH. Regards, Raj On Wed, Apr 22, 2009 at 4:43 PM, Tero Kivinen wrote: > Matthew Cini Sarreo writes: > > You sti

Re: [IPsec] [IKEv2] Error in Child SA creation

2009-04-22 Thread raj singh
Hi Matt, I agree with Jeff. Sending INVALID_SYNTAX notify with no payload and immediately delete IKEv2 SA will be good idea in case of malformed IKE_AUTH request. As SA is still unauthenticated, sending DELETE notify will cause another problems. Thanks, Raj On Thu, Apr 23, 2009 at 2:04 AM, J.

Re: [IPsec] [IKEv2] IKE_AUTH without TSi, TSr

2009-05-14 Thread raj singh
Hi Yoav, If check for mandatory payloads per exchange type is MUST, if it fails we MUST return INVALID_SYNTAX, why we are not saying it explicitly in the draft ? Putting it clearly in the draft make more sense and avoids many confusions. Thanks, Raj On Wed, May 6, 2009 at 7:24 PM, Yoav Nir wro

Re: [IPsec] [IKEv2] IKE_AUTH without TSi, TSr

2009-05-15 Thread raj singh
Hi Team, One more question. The INVALID_SYNTAX notify in response to missing payload in IKE_AUTH should be send encrypted using DH keys or unencrypted ? Thanks, raj On Fri, May 15, 2009 at 10:12 AM, raj singh wrote: > Hi Yoav, > > If check for mandatory payloads per exchange type is

Re: [IPsec] IKEv2 Certificate Information

2009-05-18 Thread Raj Singh
Hi Anil, Please find my reply inline. On Tue, May 19, 2009 at 10:55 AM, Anil Maguluri < anil.magul...@lntinfotech.com> wrote: > > Hi All, > > I would like to know what are the different certificates to support in > IKEv2? raj> The most commonly supported certificate forms are: http://tools.ie

Re: [IPsec] IKEv2 Certificate Information

2009-05-18 Thread Raj Singh
ndatory to develop VPN based PKI system? > > Regards, > Anil Kumar Maguluri > > > > > *Raj Singh * > > 05/19/2009 11:28 AM > To > Anil Maguluri > cc > ipsec@ietf.org Subject > Re: [IPsec] IKEv2 Certificate Information > > > > > H

Re: [IPsec] FW: I-D Action:draft-nir-ike-nochild-00.txt

2009-05-21 Thread Raj Singh
Hi Yoav, 1. In section5, why we need N[ADDITIONAL_TS_POSSIBLE] when we want to create child sa? 2. Also, please mention clearly in draft that what should be the behavior of responder if a faulty initiator sends modified IKE_AUTH request, even if responder has not send IKE_AUTH_NO_CHILD VID payload

Re: [IPsec] Inconsistent usage of SA

2009-05-24 Thread Raj Singh
Hi Emre, IKE SA is bi-directional i.e. one SA is used in both directions, initiator to responder and responder to initiator. CHILD_SAs i.e. IPsec SAs (AH, ESP) are uni-directional, one in each direction. So we 2 IPsec SAs per connection. Thanks, Raj On Fri, May 22, 2009 at 7:41 PM, Gunduzhan, Em

Re: [IPsec] FW: I-D Action:draft-nir-ike-nochild-00.txt

2009-05-24 Thread Raj Singh
Hi Yoav, On Sun, May 24, 2009 at 3:38 PM, Yoav Nir wrote: > Hi Raj > > On Thursday, May 21, 2009 9:44 PM, Raj Singh wrote: > > Hi Yoav, > > > > 1. In section5, why we need N[ADDITIONAL_TS_POSSIBLE] when we want > > to create child sa? > > We don't. T

Re: [IPsec] Inconsistent usage of SA

2009-05-26 Thread Raj Singh
Hi Emre, On Tue, May 26, 2009 at 6:38 PM, Gunduzhan, Emre wrote: > Steve, > > Thanks for the clarification. So, at the end of the initial IKE_AUTH > exchange, there will (typically) be a pair of CHILD SAs created, one in each > direction, is this correct? > Yes. > That is, you never create a

[IPsec] Questions on ikev2-redirect-10

2009-05-26 Thread Raj Singh
Hi Vijay, I have some question on ikev2-redirect-10 draft. In section 5, -- Once the client sends an acknowledgment to the gateway, it SHOULD delete the existing security associations with the old gateway by sending an Informational message with a DELETE payload. The gateway MAY

Re: [IPsec] Questions on ikev2-redirect-10

2009-05-27 Thread Raj Singh
Hi Vijay, On Thu, May 28, 2009 at 3:24 AM, Vijay Devarapalli wrote: > Hi, > > On 5/26/09 10:10 PM, "Raj Singh" wrote: > > > Hi Vijay, > > > > I have some question on ikev2-redirect-10 draft. > > > > In section 5, > > -- > >

Re: [IPsec] Questions on ikev2-redirect-10

2009-05-31 Thread Raj Singh
A gentle reminder. On Thu, May 28, 2009 at 8:37 AM, Raj Singh wrote: > Hi Vijay, > > On Thu, May 28, 2009 at 3:24 AM, Vijay Devarapalli wrote: > >> Hi, >> >> On 5/26/09 10:10 PM, "Raj Singh" wrote: >> >> > Hi Vijay, >> > >> &

Re: [IPsec] Final comments for ikev2-redirect-10

2009-06-06 Thread Raj Singh
Hi Team, I agree with Pasi. Regards, Raj On Fri, Jun 5, 2009 at 5:12 PM, wrote: > Vijay Devarapalli wrote: > > > > And having these two cases is more complex than having just one > > > (IKE_SA is not used for any more exchanges). What benefits does > > > this additional complexity (both in spe

Re: [IPsec] FW: I-D Action:draft-nir-ike-nochild-02.txt

2009-06-17 Thread Raj Singh
Hi Yoav, Please find my inputs: 1. In section 3: . A supporting responder that advertised the VID payload in the IKE_INIT response MUST process a modified IKE_AUTH request, and MUST reply with a modified IKE_AUTH response. Such a responder MUST NOT reply with a modified IKE_AUT

Re: [IPsec] FW: I-D Action:draft-nir-ike-nochild-02.txt

2009-06-17 Thread Raj Singh
Hi Yoav, On Thu, Jun 18, 2009 at 11:24 AM, Raj Singh wrote: > Hi Yoav, > > Please find my inputs: > > 1. In section 3: > > . > >A supporting responder that advertised the VID payload in the >IKE_INIT response MUST process a modified IKE_AUTH request

Re: [IPsec] I-D Action:draft-ietf-ipsecme-ikev2-redirect-11.txt

2009-07-01 Thread Raj Singh
Hi Padam, It possible and avoidable by configuring a policy on client for MAX no. of REDIRECTs. Draft has a mention of this scenario in Section 10. With Regards, Raj On Wed, Jul 1, 2009 at 4:24 PM, Padmakumar AV wrote: > Hi Vijay, > > I have a doubt regarding the usage of redirect during INIT

Re: [IPsec] I-D Action:draft-ietf-ipsecme-ikev2-redirect-11.txt

2009-07-01 Thread Raj Singh
r to a victim or another node or do continuous > redirects. I don't understand how the spokes resolve this problem by having > a policy at the spoke side to restrict the maximum number of redirects as > its final plan is to connect to a hub. > > Thanks > Padmakumar > &g

Re: [IPsec] IKEv2 bis section order

2009-07-01 Thread Raj Singh
Hi Team, I think we can have Introduction and IKE Protocol View [today's Sec. 1.2-1.5] as Section 1 and move Usage scenario to IKE Protocol Details and Variations. Usage scenario can make more sense after brief protocol description and it's difference with IKEv1. Regards, Raj On Thu, Jul 2, 2009

Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

2009-07-03 Thread Raj Singh
Hi Yoav, Mostly the Initiator will decide that it wants to bring UP only IKE SA without child SA. But currently there is no notify/VID from Initiator to Responder to indicate that initiator wants to bring only IKE SA. Even if responder does not supports "childless IKE_AUTH", it will process IKE_SA

Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

2009-07-04 Thread Raj Singh
ks, > > Yaron > > > ------ > > *From:* ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] *On Behalf > Of *Raj Singh > *Sent:* Friday, July 03, 2009 16:51 > *To:* Yoav Nir > *Cc:* ipsec@ietf.org > *Subject:* Re: [IPsec] FW: I-D

Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

2009-07-04 Thread Raj Singh
; > Thanks, > > Yaron > > > -- > > *From:* Raj Singh [mailto:rsjen...@gmail.com] > *Sent:* Saturday, July 04, 2009 13:37 > *To:* Yaron Sheffer > *Cc:* Yoav Nir; ipsec@ietf.org > > *Subject:* Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt > > >

Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

2009-07-04 Thread Raj Singh
work at initiator and responder. Its can see goodness in idea. When initiator has dummy proposal ready, the initiator need not to send childless notify/VID payload. > > > > From: Raj Singh [rsjen...@gmail.com] > Sent: Friday, July 03, 2009 16:51 > To: Yoav Ni

Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

2009-07-07 Thread Raj Singh
Hi Tero, Thanks for your valuable inputs. Please find re inputs inline. On Wed, Jul 8, 2009 at 1:00 AM, Tero Kivinen wrote: > Raj Singh writes: > > Your suggestion of having "critical" bit set on childless notify/VID > payload > > from initiator in IKE_SA_I

Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

2009-07-08 Thread Raj Singh
> > > Alternatively, we could adopt Yaron’s suggestion, and make a new payload, > with a critical bit turned on or off according to requirement level. I don’t > like having empty payloads, but I can’t back up this dislike with any good > argument. > > > > Maybe when

Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

2009-07-09 Thread Raj Singh
> > and whether subsequent child SAs should be permitted. This does still > have > > a problem where the initiator requires that the IKE_AUTH be childless and > > the responder does not support the extension. > > > > Alternatively, we could adopt Yaron's sugge

[IPsec] [IKEv2] Questions on windowing in IKEv2

2009-07-21 Thread Raj Singh
Hi Group, According to IKEv2bis-04, section 2.3 - An IKE endpoint MUST NOT exceed the peer's stated window size for transmitted IKE requests. In other words, if the responder stated its window size is N, then when the initiator needs to make a re

Re: [IPsec] [IKEv2] Questions on windowing in IKEv2

2009-07-22 Thread Raj Singh
ally not happen in the > above scenario, because once the network is back, the responder will also > reply to #17. > > > > Hope this helps > > > -- > > *From:* ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] *On Behalf > Of *Ra

[IPsec] Question regarding security considerations with NAT-T scenario in IKEv2

2009-07-29 Thread Raj Singh
Hi Group, I have question regarding security considerations with NAT-T scenario in IKEv2. According to ikev2-bis-04, section 2.23 --- There are cases where a NAT box decides to remove mappings that are still alive (for examp

Re: [IPsec] Question regarding security considerations with NAT-T scenario in IKEv2

2009-07-30 Thread Raj Singh
Hi Tero, On Thu, Jul 30, 2009 at 2:16 PM, Tero Kivinen wrote: > Raj Singh writes: > > 1. Initiator is behind N(P)AT and float the port to (4500, 4500) > > > > and send IKE_AUTH with source port 4500 now N(P)AT changes source port > > as 1024 but there is a man-in

Re: [IPsec] #79: Remove CP from Create_Child_SA?

2009-08-25 Thread Raj Singh
Hi Yaron, Also, there are use cases when application needs more than 1 IP address for internal purpose. With current ikev2bis, this is possible as we can request address after session establishment using CP[CFG_REQUEST] in INFORMATIONAL exchange. If we say that we want to support in ONLY IKE_AUTH

Re: [IPsec] #79: Remove CP from Create_Child_SA?

2009-08-26 Thread Raj Singh
needs more than 1 IP > address? > > Yoav > > On Aug 26, 2009, at 6:08 AM, Raj Singh wrote: > > Hi Yaron, > > Also, there are use cases when application needs more than 1 IP address for > internal purpose. > With current ikev2bis, this is possible as we can reques

Re: [IPsec] SCTP Multihoming with IPSec (RFC 3554)

2009-08-27 Thread Raj Singh
Hi Bhasker, This document will help you: http://www.ipsec-howto.org/ipsec-howto.pdf *It has sample configs for racoon. *Thanks & Regards, Raj On Thu, Aug 27, 2009 at 6:53 PM, Bhaskar Dutta wrote: > On Thu, Aug 27, 2009 at 5:43 PM, Tero Kivinen wrote: > > > > Bhaskar Dutta writes: > > > Does

Re: [IPsec] Fw: Issue #26: Missing treatment of error cases

2009-09-05 Thread Raj Singh
Hi Keith, It has been already discussed on the list that each exchange has some mandatory payload types. Firstly, the exchange packet should be checked that it contains all mandatory payload for that exchnage then it should check each payload before actually processing the packet. In your example

Re: [IPsec] Fw: Issue #26: Missing treatment of error cases

2009-09-06 Thread Raj Singh
; Regards, Raj On Sun, Sep 6, 2009 at 6:39 AM, Raj Singh wrote: > Hi Keith, > > It has been already discussed on the list that each exchange has some > mandatory payload types. > Firstly, the exchange packet should be checked that it contains all > mandatory payload for that exch

Re: [IPsec] Populating ID_DER_ASN1_DN

2009-09-16 Thread Raj Singh
Hi David, On Thu, Sep 17, 2009 at 8:03 AM, David Wierbowski wrote: > Section 3.1.5 of RFC 4945 states that when generating an ID type of > ID_DER_ASN1_DN that "implementations MUST populate the contents of ID with > the Subject field from the end-entity certificate, and MUST do so such that > a b

Re: [IPsec] Clarification on identities involved in IKEv2EAPauthentication

2009-11-11 Thread Raj Singh
The selection of AAA server will be based on IDi then EAP will happen. The gateway will get EAP authenticated ID from the AAA server. If EAP identity is different from IDi and no policy is found for EAP identity. The gateway should initiate deletion of the SA. Also, if policy is found based on EAP

Re: [IPsec] Proposed work item: IKE/IPsec high availability and load sharing - YES

2009-12-01 Thread Raj Singh
Hi Team, According to me, High Availability needs protocol level support from IKEv2 due to windowing and sequence numbers in IPsec. This will enhance performance and avoid proprietary versions of different vendors. Here we can discuss various problem and solution of IPsec and HA, which surely need

Re: [IPsec] Proposed work item: Failure detection in IKEv2 - YES

2009-12-01 Thread Raj Singh
Hi Team, According to me, we need to support this draft as WG item as it appears to enhance the failure detection time. Currently, there are many scenarios, in which we detect and delete stale SA only by max. re-transmits. I would like to review this draft. Regards, Raj 2009/11/29 Yaron Sheffer

Re: [IPsec] Proposed work item: Childless IKE SA

2009-12-17 Thread Raj Singh
Hi Alper, On Fri, Dec 18, 2009 at 5:19 AM, Alper Yegin wrote: > Hi, > > I'm hoping by now it is understood that "childless IKE SA" is just a > technical detail of what is really on the table. The proposal on the table > is "designing a network access authentication protocol based on IKEv2". > T

Re: [IPsec] Some IPSEC/IKE NAT Issues

2009-12-28 Thread Raj Singh
Hi Syed, On Mon, Dec 28, 2009 at 5:51 PM, Syed Ajim Hussain wrote: > > > Hi All >I have some doubt about NAT With IPSEC/IKE , > > Example Take a Topology : > > IKE_PEER1 --- NAT1 NAT2 Server---IKE_PEER3 > (1.1.1.1) | (1.1.1.10) (2.1.1.1) (2.1.1.2) (

Re: [IPsec] Review of section 1 of the draft-ietf-ipsecme-ikev2bis-06.txt

2010-01-16 Thread Raj Singh
* * * * Section 1.2. The Initial Exchanges Communication using IKE always begins with IKE_SA_INIT and IKE_AUTH exchanges (known in IKEv1 as Phase 1). These initial exchanges normally consist of four messages, though in some scenarios that number can grow. All communications using

Re: [IPsec] Issue #156: SHOULD generate and accept which types?

2010-01-22 Thread Raj Singh
Hi Team, I agree with Tero explanation and Valery objection as well. There is discrepancy between 3.5 and 4. 1. Section 4 mandates certificates but section 3.5 doesn't. 2. Its seen in practice that some implementation uses IP addresses as default ID even though they are using certificate based aut

Re: [IPsec] Issue #156: SHOULD generate and accept which types?

2010-01-22 Thread Raj Singh
On Fri, Jan 22, 2010 at 5:15 PM, Tero Kivinen wrote: > > Raj Singh writes: > > I agree with Tero explanation and Valery objection as well. > > There is discrepancy between 3.5 and 4. > > Not really. Not all requirements needs to be in one place. One place > can s

Re: [IPsec] Detecting NAT rebooting

2010-02-01 Thread Raj Singh
Hi Paul, A system can detect NAT mapping removal from CHANGED source port from authenticated IKE PACKET. A system can detect NAT mapping removal from CHANGED source port of UDP encapsulated packet from authenticated IPsec PACKET. Also, system knows in process of NAT detection, where it is behind

Re: [IPsec] Issue #173: Trigger packets should not be required

2010-02-02 Thread Raj Singh
I support this change. On Wed, Feb 3, 2010 at 4:22 AM, Dan McDonald wrote: > On Tue, Feb 02, 2010 at 02:49:11PM -0800, Paul Hoffman wrote: >> In a few places in the new section 2.23.1 in IKEv2bis, it says that one >> must have a trigger packet when starting negotiation. This assumption >> should

[IPsec] Fwd: Issue : Regarding EAP identity

2010-02-02 Thread Raj Singh
Hi Paul, Ticket Issue#174 opened for it. Regards, Raj -- Forwarded message -- From: Paul Hoffman Date: Wed, Feb 3, 2010 at 9:41 AM Subject: Re: Issue : Regarding EAP identity To: Raj Singh Cc: Yaron Sheffer At 9:09 AM +0530 2/3/10, Raj Singh wrote: Hi Paul, In ikev2bis07

Re: [IPsec] Fwd: Issue : Regarding EAP identity

2010-02-02 Thread Raj Singh
P-GTC, there’s no need for a separate > “authenticated identity”. In these cases the IKE responder should simply use > the original IDi for policy lookup. > > > > Thanks, > > Yaron > > > > *From:* ipsec-boun...@ietf.org [mailto:ipsec-boun..

Re: [IPsec] Fwd: Issue : Regarding EAP identity

2010-02-04 Thread Raj Singh
; > Unless there is a single policy for all authenticated users, you do need > the user identity. > > -Original Message- > From: Alper Yegin [mailto:alper.ye...@yegin.org] > Sent: Thursday, February 04, 2010 3:40 PM > To: Yoav Nir; 'Raj Singh'; Yaron Sheff

Re: [IPsec] Fwd: Issue : Regarding EAP identity

2010-02-04 Thread Raj Singh
in a position to see that but our shared friend here > can vouch for me." How do you think that's gonna fly? Not too well, I'd > imagine. > > On a lighter note: It will be like flying without passport. :-) With Regards, Raj > regards, > > Dan. > > On Thu,

Re: [IPsec] Issue #175: Better wording for NAT mobility issues

2010-02-04 Thread Raj Singh
Hi Paul, One clear change is that updating the address, port info is changed from authenticated packet to integrity protected packet. Does this change is to allow recovery from NAT mapping removal during establishment of IKEv2 SA e.g. with EAP authentication, during retransmission of IKE_AUTH exch

[IPsec] Clarification needed regarding IRAC requesting an internal address from IRAS.

2010-02-05 Thread Raj Singh
Hi Team, When IRAC requests an internal address from IRAS. Now IRAS gets the address for IRAC and applies some local policies and fails. In this case which notify is it should send INTERNAL_ADDRESS_FAILURE or generic NO_PROPOSAL_CHOSEN? IKEv2 SA comes up in both cases. Please provide your views.

Re: [IPsec] Issue #175: Better wording for NAT mobility issues

2010-02-08 Thread Raj Singh
2010/2/8 Tero Kivinen > Raj Singh writes: > > One clear change is that updating the address, port info is changed from > > authenticated packet > > to integrity protected packet. > > In this case that does not really matter. > > > Does this change is to all

Re: [IPsec] Fwd: Issue : Regarding EAP identity

2010-02-10 Thread Raj Singh
> > > > > > regards, > > > > Dan. > > > > On Tue, February 9, 2010 2:53 am, Alper Yegin wrote: > > > Dan, > > > > > > I'm not aware of any such document. > > > > > > Alper > > > > > > &

Re: [IPsec] Just three more issues for IKEv2bis

2010-02-18 Thread Raj Singh
Hi Yoav, On Fri, Feb 19, 2010 at 3:22 AM, Yoav Nir wrote: > Hi all. > > There are only three issues this time, because this is the last batch. > > Issue #173 - Trigger packets should not be required > === > In a few places in the new section 2.23.1

Re: [IPsec] Please review draft-ietf-ipsecme-aes-ctr-ikev2-05.txt

2010-03-03 Thread Raj Singh
Hi Sean, Section 5. IANA Considerations can be reworded in-line with ikev2bis. 5. IANA Considerations IANA has already registered the type and value for AES-CTR. Name Number Defined In ENCR_AES_CTR 13 (RFC3686 <

Re: [IPsec] Issue #177. (was: HA/LS terminology)

2010-03-24 Thread Raj Singh
+1 I agree with Dan. On Wed, Mar 24, 2010 at 1:16 PM, Dan Harkins wrote: > > On Tue, March 23, 2010 7:24 pm, Yoav Nir wrote: > > > > On Mar 23, 2010, at 6:05 PM, Dan Harkins wrote: > > > >> > >> Hi, > >> > >> "hot standby" implies a box sitting ("hot") twiddling its thumbs doing > >> little bu

Re: [IPsec] New PAKE Criteria draft posted (def. of gateway)

2010-03-29 Thread Raj Singh
Hi Team, The similar scenarios are beautifully handled by Redirect RFC-5685. The Redirect RFC emphasize on client-gateway terminology, which is typical use of Redirect mechanism in IKEv2 where Gateway redirects client to another less loaded gateway but at the same time RFC is also applicable to ro

Re: [IPsec] New PAKE Criteria draft posted (def. of gateway)

2010-03-30 Thread Raj Singh
re right in ignoring this case. I'm saying that > you can only get the protocol that you want if you define the requirements > clearly up front. > > Thanks, >Yaron > > > On 29.3.2010 16:58, Raj Singh wrote: > >> Hi Team, >> >> The similar

Re: [IPsec] Complexing of Traffic Selector (TSi & TSr)

2010-06-19 Thread Raj Singh
Hi Jaemin, If initiator narrows down the TSr, then 1. the responder is not aware of initiator has narrowed down TSr and if it initiates a traffic which is from a broader section of range which Initiator has not accepted, there will data black-hole. 2. I think, better solution will be, If initiator

Re: [IPsec] Complexing of Traffic Selector (TSi & TSr)

2010-06-21 Thread Raj Singh
t; to the difference of protocol ID and violation of the intended policy. > > Can initiator remove the above case and follow the RFC? > > I'm looking forward to the experts' responses. > > Thanks in advance. > > From My iPhone > > 2010. 6. 20. 오후 2:36 Raj Singh 작성

Re: [IPsec] HA design team started

2010-07-11 Thread Raj Singh
hat we can discuss this draft with more details in Maastricht meeting. Regards, Raj Singh On Fri, Jun 18, 2010 at 11:56 AM, Yaron Sheffer wrote: > Hi, > > As promised, we have started a design team on IPsec HA. Paul and I have > asked Raj Singh to lead the team. His job is to make sure

[IPsec] New version of IPsec Cluster Solution Draft posted [earliar, HA design team started]

2010-07-19 Thread Raj Singh
he draft as soon as submission window re-opens. Please read the draft and give you comments before Maastricht meeting. Regards, Raj On Sun, Jul 11, 2010 at 4:39 PM, Raj Singh wrote: > Hi Group, > > We would like to present the HA design team's output for IPsec Cluster > Solutio

Re: [IPsec] Comments draft-kagarigi-ipsecme-ikev2-windowsync-04

2010-09-05 Thread Raj Singh
On Sun, Sep 5, 2010 at 11:56 AM, Yoav Nir wrote: > > On Sep 4, 2010, at 3:01 PM, Kalyani Garigipati (kagarigi) wrote: > > > > > 1. If window size is say some five and range expected is 4-8, and if > > peer has got all four requests with values 5,6,7,8 and 4 is lost, then > > there would be no mes

Re: [IPsec] I-D Action:draft-ietf-ipsecme-ipsecha-protocol-00.txt

2010-09-06 Thread Raj Singh
Hi Pekka, Thanks for your comments. Please find my reply inline. Best Regards, Raj On Mon, Sep 6, 2010 at 11:13 AM, Pekka Riikonen wrote: > > From the draft: > > There were some concerns about the current window sync process. The > concern was to make IKEv2 window sync optional but we b

Re: [IPsec] HA protocol -01 - comments

2010-10-14 Thread Raj Singh
Hi Yaron, Thanks for comments. We will address them in next version. On Thu, Oct 14, 2010 at 2:27 PM, Yaron Sheffer wrote: > Hi, > > the new draft is a good realization of our discussions since the previous > version. Please see a few comments below. My main point is that if you > choose to impl

Re: [IPsec] draft-ietf-ipsecme-ipsecha-protocol-02.txt

2010-11-18 Thread Raj Singh
Hi Tero, Thanks for the comments. Opened Ticket #204 for format error in notification payload. Regarding the second issue. Some clarification is needed: The text meant that the message containing IKEV2_MESSAGE_ID_SYNC notification is allowed with message id zero only. This doesn't mean that messa

Re: [IPsec] HA protocol replay protection

2010-11-18 Thread Raj Singh
Hi Yaron, Thanks for the comments, Ticket#205 create to track this. On Thu, Nov 11, 2010 at 8:46 PM, Yaron Sheffer wrote: > Hi, > > it seems to me we have created an overly complicated solution for replay > protection of the Msg ID = 0 messages. Specifically, I think both the > failover counter