Re: [IPsec] IKEv2: Question on INFORMATIONAL exchange response motivation

2009-04-07 Thread Yoav Nir
Hi Matt Requests and responses have matching MsgID numbers. The requestor can instantly identify the response by its matching Msg ID number. INFORMATIONAL exchanges have message authentication codes applied to messages, so the ID numbers can't (or shouldn't) get "messed up" on the responsder.

Re: [IPsec] Issue #12: Traffic selectors when rekeying vs. the packet that trigerred the rekeying

2009-04-07 Thread Yoav Nir
The traffic selectors in the REKEY exchange are not currently specified. If were designing IKEv2 from scratch, I would be in favor of removing traffic selectors altogether from REKEY exchanges - I don't think it should be called a "rekey" if you get a totally different SA. This does raise the

Re: [IPsec] Issue #98: 1 or two round trips for resumption

2009-04-11 Thread Yoav Nir
I prefer the second proposal. I would rather have one (even if longer) variation of the protocol over two variations (even if one is shorter) With such a possible attack published, auditors are going to force large installations to use the safer (and longer) version anyway, as it is up to the

Re: [IPsec] WG Last Call: draft-ietf-ipsecme-ikev2-redirect-08

2009-04-16 Thread Yoav Nir
I see that in section 6 the following: In such cases, the gateway should send the REDIRECT notification payload in the final IKE_AUTH response message that carries the AUTH payload and the traffic selectors. The gateway MUST NOT send and the client MUST NOT accept a redirect in an ear

Re: [IPsec] WG Last Call: draft-ietf-ipsecme-ikev2-redirect-08

2009-04-18 Thread Yoav Nir
Vijay Devarapalli wrote: > > Hello, > > Yoav Nir wrote: > > I see that in section 6 the following: > > > >In such cases, the gateway should send the REDIRECT notification > >payload in the final IKE_AUTH response message that carries the AUTH > >

Re: [IPsec] WG Last Call: draft-ietf-ipsecme-ikev2-redirect-08

2009-04-20 Thread Yoav Nir
Devarapalli wrote: > Hi, > > On 4/18/09 11:16 AM, "Yoav Nir" wrote: > > > Vijay Devarapalli wrote: > >> > >> Hello, > >> > >> Yoav Nir wrote: > >>> I see that in section 6 the following: > >>> > >&g

Re: [IPsec] IKEv2 INVALID_MESSAGE_ID

2009-04-20 Thread Yoav Nir
Hi Matt. You can't initiate INFORMATIONAL exchanges before the IKE_AUTH exchange(s) concluded successfully. Section 2.3 prohibits sending INVALID_MESSAGE_ID in responses, so you don't use that for the IKE_AUTH exchange. If the IKE_AUTH exchange contains invalid message IDs, these requests MUS

Re: [IPsec] WG Last Call: draft-ietf-ipsecme-ikev2-redirect-08

2009-04-21 Thread Yoav Nir
So are we working with the assumption that the gateway (or the AAA server) can always authenticate any user that connects? > -Original Message- > From: Yaron Sheffer > Sent: Monday, April 20, 2009 10:43 AM > To: Yoav Nir; Vijay Devarapalli > Cc: IPsecme WG > Subje

Re: [IPsec] [IKEv2] IKE_AUTH without TSi, TSr

2009-04-22 Thread Yoav Nir
Hi Raj Matt is correct. There is no way in IKEv2 to do a phase1-only exchange, and then wait for traffic to establish the child SAs. While we do establish an IKE SA if the piggy-backed child SA failed for whatever reason (bad selectors, no proposal chosen), we don't allow for an IKE_AUTH excha

Re: [IPsec] Issue #13: INVALID_MAJOR_VESION similar to other notifies being discussed

2009-04-29 Thread Yoav Nir
I agree with Tero From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Yaron Sheffer Sent: Monday, April 27, 2009 10:32 PM To: IPsecme WG Subject: [IPsec] Issue #13: INVALID_MAJOR_VESION similar to other notifies being discussed > {{ Cla

Re: [IPsec] Issue #37: UNSUPPORTED_CRITICAL_ERROR during initial IKE_INIT

2009-04-30 Thread Yoav Nir
I don't think we should really prohibit such extensions and enhancements. It's just that IKE will fail if you try it with a peer that does not support it. As far as the end-user is concerned, this is not different from an UNSUPPORTED_CRITICAL_PAYLOAD in IKE_AUTH. Either way, the tunnel setup f

Re: [IPsec] Issue #43: Validity period of addresses obtained with config payload

2009-04-30 Thread Yoav Nir
+1 Paso.Eronen wrote: > > Yaron Sheffer wrote: > > > [Sec. 3.15.1:] > > > > Tero: > > > > The text 'The requested address is valid until there are no IKE_SAs > > between the peers.' is incorrect, it most likely should say 'The > > requested address is valid as long as this IKE SA (or its reke

Re: [IPsec] Issue #90: Shorter WESP negotiation

2009-05-02 Thread Yoav Nir
Grewal, Ken wrote: > > Issue #90: shorter WESP negotiation > > In the current traffic visibility draft, we indicate that WESP can be > negotiated via IKEv2 using a new protocol identifier. > Charlie Kaufman suggested that it may be plausible to use a notification > method along the lines of USE_TR

Re: [IPsec] [IKEv2] IKE_AUTH without TSi, TSr

2009-05-06 Thread Yoav Nir
Michael Richardson wrote: > Yoav Nir wrote: > > Hi Raj > > > > Matt is correct. There is no way in IKEv2 to do a phase1-only > > exchange, and then wait for traffic to establish the child SAs. > > > > While we do establish an IKE SA if the piggy-backed c

Re: [IPsec] [IKEv2] IKE_AUTH without TSi, TSr

2009-05-06 Thread Yoav Nir
Hi Michael > Let me suggest a situation where perhaps I would like to > bring up an IKE_SA and not a CHILD_SA: it might be for just > sending initial contact, and perhaps even a DELETE. > > I sometimes move quickly from being "outside" my IPsec > gateway/firewall (such as being on wireless),

[IPsec] Issue #107

2009-05-10 Thread Yoav Nir
Hi all I've submitted issue #107 about certificate encoding. IMO it's not clear how certificate chains are to be encoded in IKEv2. http://trac.tools.ietf.org/wg/ipsecme/trac/ticket/107 Yoav Email secured by Check Point ___ IPsec mailing list IPsec@ie

Re: [IPsec] Issue #107

2009-05-10 Thread Yoav Nir
Paul Hoffman wrote: > > At 2:08 PM +0300 5/10/09, Yoav Nir wrote: > >Hi all > > > >I've submitted issue #107 about certificate encoding. > > > >IMO it's not clear how certificate chains are to be encoded in IKEv2. > > > >http://trac.tools

Re: [IPsec] Issue #107

2009-05-10 Thread Yoav Nir
Paul Hoffman wrote: > > At 12:53 AM +0300 5/11/09, Yoav Nir wrote: > >Paul Hoffman wrote: > >> > >> At 2:08 PM +0300 5/10/09, Yoav Nir wrote: > >> >Hi all > >> > > >> >I've submitted issue #107 about certificate encoding. >

Re: [IPsec] Issue #107

2009-05-11 Thread Yoav Nir
Pasi.Eronen wrote: > > Yoav Nir wrote: > > > You can: > > > > > > a) start using hash-and-url > > > > > > b) hope your peer has the sub-CA > > > > > > c) write an extension to 4306 that allows bundles in CERT > > &g

Re: [IPsec] IV in ESP packets for DES and 3DES methods

2009-05-12 Thread Yoav Nir
WARNING: contains banned part --- Begin Message --- On Tue, 2009-05-12 at 10:05 +, ss murthy nittala wrote: > Hi > > Thanks for the clarifications regarding IV usage for AES methods. > > RFC 2405 (DES) in its implementation note says > > "Common practice is to use random data for the first I

Re: [IPsec] One question for IKE/IPsec

2009-05-13 Thread Yoav Nir
Paul Hoffman wrote: > > At 8:56 PM +0800 5/13/09, Hui Deng wrote: > >Dear IPsec forks, > > > >May I consult one question here: > > > >Whether we could still do IKEv2 negotiation > (Authenticaiton), but not > >use IPsec tunnel? > > You never need to use a tunnel, regardless of how it was > brou

Re: [IPsec] RFC 4869 questions

2009-05-13 Thread Yoav Nir
Scott C Moonen wrote: > > I'm reviewing RFC 4869 and it seems to under-specify the attributes that > are needed to achieve real interoperability: it doesn't specify whether to > do a phase 2 Diffie-Hellman exchange for perfect forward secrecy, nor > does it specify IKEv1 lifetime and lifesize val

Re: [IPsec] RFC 4869 questions

2009-05-13 Thread Yoav Nir
Paul Hoffman wrote: > > >IOW it's up to the initiator whether or not to do PFS, and both > >configurations are OK to use the suite name. > > That was my intention in RFC 4308; I cannot speak for the > authors of RFC 4869. You can't speak for them, but Scott has to figure it out. > >As for lif

[IPsec] Question regarding VID payload

2009-05-17 Thread Yoav Nir
Hi all I've just noticed that section 3.12 of the bis draft has the following text: Writers of Internet-Drafts who wish to extend this protocol MUST define a Vendor ID payload to announce the ability to implement the extension in the Internet-Draft. It is expected that Internet-Drafts

Re: [IPsec] Question regarding VID payload

2009-05-17 Thread Yoav Nir
WARNING: contains banned part --- Begin Message --- 桔牥❥⁳潮桴湩⁧潴瀠敲敶瑮愠挠湯汦捩ⱴ戠瑵琠慨⁴敳瑣潩灳捥晩捩污祬爊晥牥⁳潴∠牗瑩牥⁳景䤠瑮牥敮⵴牤晡獴⸢䰠潯楫杮琠牨畯桧琠敨䤠瑮牥敮ੴ牄晡獴琠慨⁴硥整摮䤠䕋㉶‬潮敮猠祡猠浯瑥楨杮氠歩ⱥ∠獵⁥潮楴楦慣楴湯琊灹⁥㜱㔬㘴‬湡⁤灳捥晩⁹畳灰牯⁴楷桴嘠䑉瘠污敵攊戱㜵慡㔴〷㈲㈵愶戶㐴〳摢昲ち〱∱ਊ桔祥愠汬樠獵⁴慨敶愠渠瑯晩捩瑡潩慰汹慯⁤楷桴琠灹⁥吢䅂戠⁹䅉䅎•湡੤桷瑡癥牥琠敨⁹潤映牯椠瑮牥灯琠獥獴漠⁲潦⁲捡畴污椠瑮牥灯椠桴⁥楦汥੤敲慭湩⁳湵灳捥晩敩⹤ਊ潓眠⁥桳畯摬攠瑩敨⁲湥潣牵条⁥瑳晵⁦楬敫琠

Re: [IPsec] Question regarding VID payload

2009-05-17 Thread Yoav Nir
tion? Note that we never required private notification numbers to be picked at random, so conflict are likely to occur. Thanks, Yaron > -Original Message- > From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of > Yoav Nir > Sent: Sunday, May 17, 2009

[IPsec] FW: I-D Action:draft-nir-ike-nochild-00.txt

2009-05-21 Thread Yoav Nir
Hi all Recently there's been some discussions about creating an IKE SA without child SAs (on purpose). I'm still not entirely convinced that this is necessary, but I have submitted this draft, and would like to hear comments about it. Does it fill the need that some people on this mailing lis

[IPsec] FW: I-D Action:draft-nir-ike-nochild-00.txt

2009-05-21 Thread Yoav Nir
Hi all Recently there's been some discussions about creating an IKE SA without child SAs (on purpose). I'm still not entirely convinced that this is necessary, but I have submitted this draft, and would like to hear comments about it. Does it fill the need that some people on this mailing lis

Re: [IPsec] FW: I-D Action:draft-nir-ike-nochild-00.txt

2009-05-24 Thread Yoav Nir
Hi Raj On Thursday, May 21, 2009 9:44 PM, Raj Singh wrote: > Hi Yoav, > > 1. In section5, why we need N[ADDITIONAL_TS_POSSIBLE] when we want > to create child sa? We don't. That comes from (note careful enough) cut-and-paste. Good catch. > 2. Also, please mention clearly in draft that w

Re: [IPsec] FW: I-D Action:draft-nir-ike-nochild-00.txt

2009-05-25 Thread Yoav Nir
Hi Raj > 3. Also, why its a VID payload, Notify suits better. Because a third > party client will want to connect to some other server. Please give > justification for IKE_AUTH_NO_CHILD to be a VID. Section 3.12 of -bis document says "A Vendor ID payload MAY announce that the sender is capable o

[IPsec] Some comments about redirect

2009-05-27 Thread Yoav Nir
Hi. I've read through the draft again, and here are a few comments: Section 3 has the following line: If the IKE_SA_INIT request did not include the REDIRECT_SUPPORTED payload, the responder MUST NOT send the REDIRECT payload to the VPN

Re: [IPsec] Some comments about redirect

2009-05-27 Thread Yoav Nir
han by IP address. Such a name could be ASCII or UTF-8. From: Tero Kivinen [kivi...@iki.fi] Sent: Wednesday, May 27, 2009 13:02 To: Yoav Nir Cc: ipsec@ietf.org Subject: [IPsec] Some comments about redirect Yoav Nir writes: > Section 10 sets up an IANA registr

Re: [IPsec] Some comments about redirect

2009-05-27 Thread Yoav Nir
GUI. In any case, the client is as aware of the names as the gateways. From: Vijay Devarapalli [vi...@wichorus.com] Sent: Thursday, May 28, 2009 01:04 To: Yoav Nir; Tero Kivinen Cc: ipsec@ietf.org Subject: Re: [IPsec] Some comments about redirect Hi Yoav

Re: [IPsec] Some comments about redirect

2009-05-27 Thread Yoav Nir
apalli [vi...@wichorus.com] Sent: Thursday, May 28, 2009 01:02 To: Yoav Nir; ipsec@ietf.org Subject: Re: [IPsec] Some comments about redirect Hello, On 5/27/09 12:36 AM, "Yoav Nir" wrote: > Hi. > > I've read through the draft again, and here are a few comments: &g

[IPsec] FW: New Version Notification for draft-nir-ike-nochild-01

2009-05-31 Thread Yoav Nir
al Message- From: IETF I-D Submission Tool [mailto:idsubmiss...@ietf.org] Sent: Sunday, May 31, 2009 6:03 PM To: Yoav Nir Subject: New Version Notification for draft-nir-ike-nochild-01 A new version of I-D, draft-nir-ike-nochild-01.txt has been successfuly submitted by Yoav Nir and posted t

Re: [IPsec] WG Last Call: draft-ietf-ipsecme-ikev2-resumption-04.txt

2009-06-01 Thread Yoav Nir
I'm not so sure about that. The authentication in the IKE_AUTH exchange that follows the resumption only proves that the (new) responder can decipher the ticket (or has access to the ticket database). Presumably a "cluster" of gateways backing each other up would have the same IDr, but if they'

Re: [IPsec] WG Last Call: draft-ietf-ipsecme-ikev2-resumption-04.txt

2009-06-17 Thread Yoav Nir
I agree with Yaron that it should be the way it is now described in the draft. If either side deleted the IKE SA, then it should not come back to life through session resumption. Specifically, the client should not get reconnected without authentication. The laptop example is excellent. If I clo

[IPsec] FW: I-D Action:draft-nir-ike-nochild-02.txt

2009-06-17 Thread Yoav Nir
Hi all version -02 of this private submission draft, with two additional co-authors and some more use cases. Enjoy Yoav From: i-d-announce-boun...@ietf.org [i-d-announce-boun...@ietf.org] On Behalf Of internet-dra...@ietf.org [internet-dra...@ietf.org]

Re: [IPsec] WG Last Call for IPv6 Configuration in IKEv2

2009-06-23 Thread Yoav Nir
Hi. IMO the CFG payloads are the last place where there will ever be a shortage of IPv4 addresses. The addresses distributed through CFG payloads in IKEv2 or through extensions to IKEv1 are almost always non-routable addresses, and even for extremely large organizations, there are plenty of tho

[IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

2009-07-01 Thread Yoav Nir
Hi all. This is the fourth iteration of this draft. New in this iteration - Another co-author - Changed the name, so that this item is considered in the rechartering discussion - Fixed some notation and some discussion based on comments from the list Yoav

Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

2009-07-04 Thread Yoav Nir
ut I'm not sure that's a good idea. From: Raj Singh [rsjen...@gmail.com] Sent: Friday, July 03, 2009 16:51 To: Yoav Nir Cc: ipsec@ietf.org Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt Hi Yoav, Mostly the Initiator will

Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

2009-07-06 Thread Yoav Nir
Inline with From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Raj Singh Sent: Sunday, July 05, 2009 5:02 AM To: Yoav Nir Cc: ipsec@ietf.org Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt Hi Yoav, Please find my

Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

2009-07-06 Thread Yoav Nir
, 2009 1:43 PM To: Yoav Nir; Raj Singh Cc: ipsec@ietf.org Subject: RE: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt Hi Yoav/Raj, I think its a good idea for the initiator to announce its capabilities about supporting just IKE SA without child SA. The responder will then act

Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

2009-07-07 Thread Yoav Nir
I've read it again, and it seems fine. One minor issue, though. Section 2 describes the WESP header format. It has the following: HdrLen, 8 bits: Offset to the beginning of the Payload Data in octets. The receiver MUST ensure that this field matches with the header offset computed fro

Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

2009-07-07 Thread Yoav Nir
#x27;t back up this dislike with any good argument. Maybe when we make version 2.1 of IKE, we can add a "critical type" bit to the notification payload. From: Raj Singh [mailto:rsjen...@gmail.com] Sent: Wednesday, July 08, 2009 7:18 AM To: Tero Kivinen Cc:

Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

2009-07-08 Thread Yoav Nir
solvable, because the policies actually conflict. From: Gaurav Poothia [mailto:gpoot...@microsoft.com] Sent: Thursday, July 09, 2009 7:57 AM To: Yoav Nir; 'Raghunandan P (raghup)'; Raj Singh Cc: ipsec@ietf.org Subject: RE: [IPsec] FW: I-D Action:draft-n

Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

2009-07-13 Thread Yoav Nir
Works for me. From: gabriel montenegro [mailto:g_e_montene...@yahoo.com] Sent: Monday, July 13, 2009 9:21 PM To: Yoav Nir; Yaron Sheffer; ipsec@ietf.org Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05 Brian Swander notes that we should

Re: [IPsec] [IKEv2] Questions on windowing in IKEv2

2009-07-22 Thread Yoav Nir
Hi Raj. Too many variables, let's assume values without loss of generality. Suppose N=3, and you have send requests 17, 18 and 19. Because of the network problems, you got responses for 18 and 19, but not *yet* for 17. What the draft (and RFC 4306) says, is that you keep retransmitting 17, unti

Re: [IPsec] [IKEv2] Questions on windowing in IKEv2

2009-07-22 Thread Yoav Nir
AM To: Yoav Nir Cc: ipsec@ietf.org Subject: Re: [IPsec] [IKEv2] Questions on windowing in IKEv2 Hi Yoav, Do you think this behavior contradicts with definition of windowing mentioned in draft that if responder window is 3, initiator can have 3 outstanding request ? Regards, Raj On Wed, Jul 22, 20

Re: [IPsec] [IKEv2] Questions on windowing in IKEv2

2009-07-22 Thread Yoav Nir
discard #17. If it was still valid for the initiator to send request #17 again, the responder would have to retain all the old responses indefinitely. From: Amjad Inamdar (amjads) [mailto:amj...@cisco.com] Sent: Wednesday, July 22, 2009 12:23 PM To: Yoav Nir; Raj

Re: [IPsec] Handling Redirect Loops

2009-07-29 Thread Yoav Nir
Hi Vijay. "default" is usually associated with a particular implementation or product. I think it would be better to say "suggested value" rather than "default value". Also, I don't see a point in mandating that all products should have an extra knob for setting this value. For example, for an

Re: [IPsec] Handling Redirect Loops

2009-07-30 Thread Yoav Nir
Vijar Devarapalli wrote: >Hi Yoav, > >On 7/29/09 9:13 PM, "Yoav Nir" wrote: > >> Hi Vijay. >> >> "default" is usually associated with a particular implementation or >> product. I think it would be better to say "suggested value"

Re: [IPsec] Can off-path attackers trigger DPD ([FWD: Re: [btns] Q: How to deal with connection latch breaks?])

2009-08-12 Thread Yoav Nir
Any "INVALID_IKE_SPI" or "INVALID_SPI" message can trigger DPD (or, as RFC 4306 calls it, "liveness check"). These messages are very easy to spoof. But liveness check is just one round trip between the peers and it's supposed to be rate-limited. I don't think an off-path attacker can cause the l

Re: [IPsec] WG Last Call: draft-ietf-ipsecme-roadmap-03

2009-08-23 Thread Yoav Nir
Sorry for the delay. I believe the draft is in good shape, but I do have some comments. 1. ESN is mentioned as optional for IKEv1 and included in IKEv2. It is not mentioned that this is an optional feature for IPsec (both old and new) 2. Section 4.2.1 describes RFC 4478 (authentication lifetime

Re: [IPsec] #79: Remove CP from Create_Child_SA?

2009-08-25 Thread Yoav Nir
Hi Raj. The issue is concerned with Config payload in Child SA only. Config in INFORMATIONAL will stay, or at least, there is no current proposal to remove it. It can be useful for querying the application version, which is still a defined attribute for CP. Can you elaborate on the cases where

Re: [IPsec] #79: Remove CP from Create_Child_SA?

2009-08-26 Thread Yoav Nir
e_Child SA exchange On Aug 26, 2009, at 10:40 AM, Raj Singh wrote: Hi Yoav, These applications are using same IKE SA for allocating IP to the application specific virtual interfaces, which can be more than one. Let me know if you further clarification. Thanks & Regards, Raj 2009/8/26 Yoa

Re: [IPsec] #107: Sending certificate chains in IKEv2

2009-08-26 Thread Yoav Nir
Good. So how about we close this issue by adding the last sentence below: If multiple certificates are sent, the first certificate MUST contain the public key used to sign the AUTH payload. The other certificates may b

Re: [IPsec] #79: Remove CP from Create_Child_SA?

2009-08-27 Thread Yoav Nir
I disagree. Payloads in a particular CREATE_CHILD_SA exchange should be specifically related to the SA being created. The IKE_AUTH exchange is different, because it is used to set up everything we need to get an IPsec SA going. We do not use the CREATE_CHILD_SA to delete old SAs, to query app

[IPsec] Issue #26: Missing treatment of error cases

2009-08-31 Thread Yoav Nir
Hello all. Issue #26 was submitted by Tero Kivinen. It concerns section 2.21 ("error handling") and states that several things are missing: - handling of errors before authentication - listing what error conditions cause the IKE SA to be deleted entirely - listing how errors are handled in the

Re: [IPsec] Issue #26: Missing treatment of error cases

2009-09-01 Thread Yoav Nir
On Sep 1, 2009, at 5:07 PM, Tero Kivinen wrote: > Yoav Nir writes: >> Following is our suggested new text. Please let us know what you >> think. Also, please take a look at the description of >> "AUTHENTICATION_FAILED" in section 3.10.1. "response to an

Re: [IPsec] Ikev2 HA message Id Issue

2009-09-03 Thread Yoav Nir
Hi Kalyani Of the two, I prefer the 2nd solution, as it is simpler. Reusing message IDs is not that bad, and you can decrease the change by including (in the RESET_MESSAGE_ID notification) a random number as the starting message ID. What I'm not so sure, is that there is a real problem here th

Re: [IPsec] Issue #26: Missing treatment of error cases

2009-09-03 Thread Yoav Nir
Yes, I will soften the language a bit, but I won't mention a DELETE payload. If some implementations do it. others may come to expect it. We don't want to encourage that by suggesting that it's a good idea. On Sep 3, 2009, at 11:52 PM, Keith Welter wrote: >If the error occurs on the >i

Re: [IPsec] Fw: Issue #26: Missing treatment of error cases

2009-09-04 Thread Yoav Nir
Then I should have explained better. If an initiator sees an error in the response, the exchange is already over, so the only way it can notify the responder of the error, is to create a new INFORMATIONAL exchange with an error notification. All the text here discusses the one INFORMATIONAL exc

Re: [IPsec] Issue #26: Missing treatment of error cases

2009-09-04 Thread Yoav Nir
On Sep 4, 2009, at 5:53 PM, David Wierbowski wrote: >Yes, I will soften the language a bit, but I won't mention a DELETE payload. >If some implementations do it. >others may come to expect it. We don't want to encourage that by suggesting >that it's a good idea. Yoav, Why is it a a bad idea t

Re: [IPsec] Issue #26: Missing treatment of error cases

2009-09-06 Thread Yoav Nir
OK. Let's try this again. Is this acceptable? 2.21. Error Handling There are many kinds of errors that can occur during IKE processing. If a request is received that is badly formatted, or unacceptable for reasons of policy (e.g., no matching cryptographic algorithms), the resp

Re: [IPsec] Issue #26: Missing treatment of error cases

2009-09-07 Thread Yoav Nir
On Sep 7, 2009, at 3:48 PM, Tero Kivinen wrote: > Keith Welter writes: >> I would not expect INVALID_SYNTAX to cause the IKE SA to be deleted >> either. > > I do consider INVALID_SYNTAX fatal error, meaning the IKE SA will be > deleted immediately after sending that response containing > INVALID_

Re: [IPsec] Issue #26: Missing treatment of error cases

2009-09-07 Thread Yoav Nir
On Sep 7, 2009, at 4:41 PM, Tero Kivinen wrote: > Yoav Nir writes: >> OK. Let's try this again. Is this acceptable? >> >> 2.21. Error Handling >> >>There are many kinds of errors that can occur during IKE >> processing. >>If

Re: [IPsec] Issue #26: Missing treatment of error cases

2009-09-14 Thread Yoav Nir
OK. One more try: 2.21. Error Handling There are many kinds of errors that can occur during IKE processing. If a request is received that is badly formatted, or unacceptable for reasons of policy (e.g., no matching cryptographic algorithms), the response MUST contain a Notify p

Re: [IPsec] Populating ID_DER_ASN1_DN

2009-09-16 Thread Yoav Nir
On Sep 17, 2009, at 5:33 AM, David Wierbowski wrote: > Section 3.1.5 of RFC 4945 states that when generating an ID type of > ID_DER_ASN1_DN that "implementations MUST populate the contents of > ID with the Subject field from the end-entity certificate, and MUST > do so such that a binary com

Re: [IPsec] Populating ID_DER_ASN1_DN

2009-09-17 Thread Yoav Nir
a requirement that I think could be relaxed. Dave Wierbowski z/OS Comm Server Developer Phone: Tie line: 620-4055 External: 607-429-4055 Yoav Nir ---09/17/2009 02:50:34 AM---On Sep 17, 2009, at 5:33 AM, David Wierbowski wrote: > Section 3.1.5 of RFC 4945 states that when ge From:

Re: [IPsec] Issue #26: Missing treatment of error cases

2009-09-17 Thread Yoav Nir
On Sep 17, 2009, at 7:03 PM, Paul Hoffman wrote: > At 3:51 PM +0300 9/16/09, Tero Kivinen wrote: >> For example the text could look something like this: >> -- > > Yoav, does Tero's proposed new text work for you? > > --Paul Hoffm

[IPsec] Fwd: I-D Action:draft-nir-ipsecme-ipsecha-00.txt

2009-09-21 Thread Yoav Nir
Hi all The draft linked below is a problem statement draft about using IKE&IPsec implementations in high availability and load sharing configurations. I will describe this at tomorrows Interim meeting. Comments are welcome, of course, both on the list and at tomorrow's session. Yoav > >

Re: [IPsec] WG last call: draft-ietf-ipsecme-esp-null-heuristics-01

2009-09-22 Thread Yoav Nir
I support advancing this document, and I think the explanations and pseudo code are good. I do, however, question the value of it in real life. Security policies or the deep inspection kind usually are something like: - allow HTTP and HTTPS, and verify headers - allow ICMP and DNS - may

Re: [IPsec] WESP #109 - WESP header alignment for IPv6

2009-09-25 Thread Yoav Nir
On Sep 24, 2009, at 9:44 PM, Paul Hoffman wrote: At 12:13 PM -0600 9/24/09, Grewal, Ken wrote: Proposed change 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Re: [IPsec] Difference between IPv4 and IPv6 IPsec

2009-10-11 Thread Yoav Nir
Hi Hui I think there is very little difference between IPv4 and IPv6 as regards to IPsec. See below On Oct 11, 2009, at 9:50 AM, Hui Deng wrote: Dear IPsec forks, May I get advice about the differnce between them: 1) IPv4 doesn't mandate the support IPsec, IPv6 also doesn't mandate it base

Re: [IPsec] Closing the IKEv2bis open issues

2009-10-21 Thread Yoav Nir
A few lines above this section it already says "If the responder's policy allows it to accept the first selector of TSi and TSr, then the responder MUST narrow the traffic selectors to a subset that includes the initiator's first choices." So there is a MUST requirement to select the initia

Re: [IPsec] Clarification on identities involved in IKEv2 EAP authentication

2009-11-10 Thread Yoav Nir
On Nov 10, 2009, at 1:40 PM, Amjad Inamdar (amjads) wrote: Hi, With IKEv2 EAP authentication, there are 3 identities involved 1) IDi - IKEv2 initiator identity sent in msg-3 2) EAP identity that gateway (IKE2 responder) can request from the client (IKEv2 initiator) 3) Authenticated EAP identi

Re: [IPsec] Clarification on identities involved in IKEv2EAP authentication

2009-11-11 Thread Yoav Nir
On Nov 11, 2009, at 3:39 PM, Srinivasu S R S Dhulipala (srinid) wrote: > >> 2) If not same, what purpose should each of the above identities serve > > 1) mainly used as a hint for the gateway as to which AAA server to > choose > 2) It's the AAA server that may request the identity, and it's

Re: [IPsec] Clarification on identities involved in IKEv2EAPauthentication

2009-11-11 Thread Yoav Nir
in IKE and later in the EAP session. On Nov 11, 2009, at 4:05 PM, Srinivasu S R S Dhulipala (srinid) wrote: > Hi Yoav, > > Thanks for the quick response. Please see inline. > > -Original Message- > From: Yoav Nir [mailto:y...@checkpoint.com] > Sent: Wednesday,

Re: [IPsec] RFC4869 bis submitted

2009-11-11 Thread Yoav Nir
Hi If you're bissing this thing, can we please please please entirely get rid of the requirement to use ECDSA certificates? While the algorithms and DH groups are subject to configuration in the UI and negotiation in IKE, the algorithm used to sign the certificates is outside the IKE implement

Re: [IPsec] Clarification on identities involved in IKEv2EAPauthentication

2009-11-12 Thread Yoav Nir
On Nov 12, 2009, at 5:34 AM, Raj Singh wrote: > The selection of AAA server will be based on IDi then EAP will happen. > The gateway will get EAP authenticated ID from the AAA server. > If EAP identity is different from IDi and no policy is found for EAP identity. > The gateway should initiate de

Re: [IPsec] RFC4869 bis submitted

2009-11-13 Thread Yoav Nir
for ECDSA certs to that list. Definitely not when they're in the same "list" as VPN-A and VPN-B. From: Paul Hoffman [paul.hoff...@vpnc.org] Sent: Friday, November 13, 2009 02:58 To: Yoav Nir; Law, Laurie; ipsec@ietf.org Subject: Re: [IPsec]

Re: [IPsec] How long does an IKEv1 session take to complete?

2009-11-18 Thread Yoav Nir
What Dan and Gregory said. But assuming an unloaded gateway, with "normal" hardware (Any Intel, AMD or PowerPC processor from the last 10 years or a recent ARM), then even if you use relatively secure parameters (2048-bit DH group, 2048-bit RSA keys) the round trip time is going to dominate. Th

Re: [IPsec] #117: Hash and URL interop

2009-11-25 Thread Yoav Nir
+1 Even things that seem obvious like https and ftp require a lot of considerations, like how to verify the certificate in https, or what identity to present in ftp. If someone wants to specify additional URL methods, they can specify then in an I-D. On Nov 24, 2009, at 8:24 PM, Paul Hoffman

Re: [IPsec] Proposed work item: Childless IKE SA

2009-12-01 Thread Yoav Nir
There were several motivations listed for childless IKE SAs. - remote access, where you create an IKE SA when the user wants to connect, and only create child SAs in response to traffic - authentication only over a physically secure network (not necessarily EAP, but I think this is the use case

Re: [IPsec] Proposed work item: Childless IKE SA

2009-12-09 Thread Yoav Nir
Hi Alper. The "Do phase 1 first, and phase 2 as traffic demands it" motivation is from the remote access VPN domain (though may be useful for others). The "Do only phase 1, because we don't need encryption and MAC, just peer authentication" motivation is from the 3GPP (though it could be useful

Re: [IPsec] Issue #128: Can implementations not reply fully to Deletes?

2009-12-15 Thread Yoav Nir
Section 1.4.1 also says: "A node MAY refuse to accept incoming data on half-closed connections but MUST NOT unilaterally close them and reuse the SPIs." So if your peer is only responding with empty INFORMATIONAL responses to your deletes, you're going to accumulate more and more stale inboun

Re: [IPsec] Issue #128: Can implementations not reply fully to Deletes?

2009-12-16 Thread Yoav Nir
ng DELETE payloads are an exception to the "you may return > an empty INFORMATIONAL" rule. > > Thanks, >Yaron > > > From: ipsec-boun...@ietf.org [ipsec-boun...@ietf.org] On Behalf Of Yoav Nir > [y...@checkpoint.com] > Se

Re: [IPsec] crypting with aes-xcbc-mac hashing

2009-12-16 Thread Yoav Nir
On Dec 16, 2009, at 6:36 AM, rahul bharadhwaj wrote: Hi all Could anyone let me know which crypt algo des/3des/aes should be used with aes-xcbc-mac hashing. As aes-xcbc-mac uses aes for authentication and integrity, is it correct to apply des for encryption or is there any restriction. Tha

Re: [IPsec] IKEv2 Diffie-Hellman Elliptic curve mess (RFC4753, RFC5114, RFC4869, and draft-solinas-rfc4753bis-01)

2009-12-19 Thread Yoav Nir
If there is such an implementation, then it's not interoperating with all the other implementations and should be fixed. If someone shipped something like that, then the only reason they haven't noticed yet, is because they (1) didn't test it well enough, and (2) their customers are using some

Re: [IPsec] IKEv2 Diffie-Hellman Elliptic curve mess (RFC4753, RFC5114, RFC4869, and draft-solinas-rfc4753bis-01)

2009-12-21 Thread Yoav Nir
On Dec 21, 2009, at 8:54 PM, wrote: > Dan, > >> If we allocate new numbers to do it right then we will, in fact, live >> forever with an ambiguous interpretation of groups 19, 20, and 21. I >> agree we should fix the problem and not live with ambiguity. The proposal >> to allocate new numbers

Re: [IPsec] Traffic visibility - consensus call

2010-01-04 Thread Yoav Nir
On Jan 5, 2010, at 12:27 AM, Yaron Sheffer wrote: > Hi, > > We have had a few "discusses" during the IESG review of the WESP draft. To > help resolve them, we would like to reopen the following two questions to WG > discussion. Well reasoned answers are certainly appreciated. But plain "yes"

Re: [IPsec] Traffic visibility - consensus call

2010-01-06 Thread Yoav Nir
On Jan 7, 2010, at 9:14 AM, Charlie Kaufman wrote: > Oh sigh!! What is it about IPsec that makes people go down this same path > every time: IPsec? So I guess you haven't been following the TLS mailing list these past couple of months. I don't think anyone's described a practical attack on

Re: [IPsec] ikev2bis clarification on port floating

2010-01-12 Thread Yoav Nir
Hi Scott When writing remote access VPN clients (running on phones, PCs, tablets, probably not z/OS) it's usually safe to assume that the peer (a gateway) supports NAT-T. This is because on the real Internet, a RAS that does not support NAT-T simply doesn't work. NATs are everywhere. So it's p

Re: [IPsec] question about 2.8.1 simultaneous child SA rekeying

2010-01-18 Thread Yoav Nir
Hi On Jan 18, 2010, at 12:48 PM, Toshihiko Tamura wrote: > Hi, I want to ask about simultaneous Child SA rekeying > at section 2.8.1 in IKEv2bis. > > I'm sure it is convenient to support this function, > but why is current IKEv2bis draft saying this fucntion > as SHOULD? > -

Re: [IPsec] Notify types, was: RE: Review of rest of draft-ietf-ipsecme-ikev2 (section 2.23.1 forward)

2010-01-19 Thread Yoav Nir
+1 Anybody who starts implementing IKEv2 in a few months using the new RFC should not have to care about the history, and which notify type was added at which point, except to know that some implementations in the field may not support these newer notifications. -Original Message- From

Re: [IPsec] Issue #150: What happens if the peer receives TEMPORARY_FAILURE and does not understand it

2010-01-20 Thread Yoav Nir
We can't really prescribe actions for (presumably older) implementations that don't support this spec. Such implementations will do what it says in RFC 4306 and the clarifications document: TEMPORARY_FAILURE is an error notification, so therefore the exchange failed. In that case the old SA r

Re: [IPsec] Issue #153: List of EAP methods

2010-01-20 Thread Yoav Nir
Agree. Certainly types 4-6 have to be removed, as they are just methods, and we RECOMMEND not to use them. I can see some value in mentioning type 1 (Identity), because later in that same section we mention that the responder should not send such requests. I think we should remove all the rest,

Re: [IPsec] Issue #152: EAP failure and acknowledgement

2010-01-20 Thread Yoav Nir
We do have this: The responder MAY at any time terminate the IKE exchange by sending an EAP payload containing the Failure message. I guess "terminate" means that the initiator does not send any more messages. This is also on

Re: [IPsec] Issue #148: Historical cookie discussion

2010-01-20 Thread Yoav Nir
I think remove. Also the reference to PHOTURIS On Jan 20, 2010, at 11:01 PM, Paul Hoffman wrote: > In 2.6, first paragraph: the historical discussion going back to the previous > century is very confusing to a newcomer: instead of saying what a cookie is, > we tell a story. I suggest to remove

<    2   3   4   5   6   7   8   9   >