From ipsec-bounces@ietf.org Fri Apr 1 15:38:20 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA09408 for ; Fri, 1 Apr 2005 15:38:19 -0500 (EST) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DHSfl-0002Ds-7n; Fri, 01 Apr 2005 15:23:17 -0500 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DHSfi-0002Di-MV for ipsec@megatron.ietf.org; Fri, 01 Apr 2005 15:23:16 -0500 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA05616 for ; Fri, 1 Apr 2005 15:23:11 -0500 (EST) Received: from ip-66-80-10-146.dsl.sca.megapath.net ([66.80.10.146] helo=smtp.intoto.com) by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DHSn5-0001YX-0I for ipsec@ietf.org; Fri, 01 Apr 2005 15:30:53 -0500 Received: from not-angel.intoto.com ([10.1.5.11]) by smtp.intoto.com (SMSSMTP 4.0.0.59) with SMTP id M2005040112223027860 for ; Fri, 01 Apr 2005 12:22:30 -0800 Received: from subha (dhcp-66.intoto.com [10.1.5.66]) (authenticated bits=0) by not-angel.intoto.com (8.13.1/8.13.1) with ESMTP id j31KN2M7015830 for ; Fri, 1 Apr 2005 12:23:03 -0800 Message-ID: <00e801c536f8$531e4850$4205010a@subha> From: "Subha" To: Date: Fri, 1 Apr 2005 12:21:02 -0800 MIME-Version: 1.0 X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.2180 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 X-Spam-Score: 0.5 (/) X-Scan-Signature: 2857c5c041d6c02d7181d602c22822c8 Subject: [Ipsec] Number of SPD Policies X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============1233530883==" Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org This is a multi-part message in MIME format. --===============1233530883== Content-Type: multipart/alternative; boundary="----=_NextPart_000_00E5_01C536B5.44BACB00" This is a multi-part message in MIME format. ------=_NextPart_000_00E5_01C536B5.44BACB00 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Hi List-members, If I need to apply both ESP and AH SAs between the two=20 security gateways for a given traffic stream, do I need to=20 create two policies or one policy ?=20 Can someone indicate this with repect to the following combinations 1) IKEv1 + 2401 2) IKEv1 + 2401bis 3) IKEv2 + 2401 4) IKEv2 + 2401bis >From IKEv1 or IKEv2 perspective, my understanding is that there are no restrictictions posted.=20 2401bis seems to indicate that if there is nested tunneling i.e. if the security tunnel is going to terminate in 2 different remote = gateways,=20 then we need to have two SPD policies. (Reference Appendix -E in = 2401-bis) However if the terminating tunnel endpoint is the same remote gateway = and both ESP and AH needs to be applied to a particular traffic stream, then = a single SPD Policy should suffice. I did not see any statement in = 2401-bis=20 restricting this. Can someone please clarify ? Thanks, Subha ------=_NextPart_000_00E5_01C536B5.44BACB00 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Hi List-members,
 
If I need to apply both ESP and AH = SAs=20 between the two 
security gateways for a given traffic stream, do I need to=20
create two policies or one policy ? =
 
Can someone indicate this with repect = to the=20 following combinations
 
1) IKEv1 + 2401
2) IKEv1 + 2401bis
3) IKEv2 + 2401
4) IKEv2 + 2401bis
 
From IKEv1 or IKEv2 perspective, my = understanding=20 is that there are
no restrictictions posted. =
 
2401bis seems to indicate that if = there is=20 nested tunneling  i.e. if
the security tunnel is going to = terminate in 2=20 different remote gateways,
then we need to have two SPD = policies.=20 (Reference Appendix -E in = 2401-bis)
 
However if the = terminating tunnel=20 endpoint is the same remote gateway and
both ESP and AH needs to be = applied to a=20 particular traffic stream, then
a single SPD Policy should suffice. I did not see any statement in 2401-bis=20
restricting this.
 
Can someone please clarify = ?
 
Thanks,
Subha 
------=_NextPart_000_00E5_01C536B5.44BACB00-- --===============1233530883== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline Content-Transfer-Encoding: 7bit _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec --===============1233530883==-- From ipsec-bounces@ietf.org Fri Apr 1 15:46:33 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA12312 for ; Fri, 1 Apr 2005 15:46:33 -0500 (EST) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DHShh-0002gx-84; Fri, 01 Apr 2005 15:25:17 -0500 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DHShd-0002gG-1O; Fri, 01 Apr 2005 15:25:13 -0500 Received: from CNRI.Reston.VA.US (localhost [127.0.0.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA05941; Fri, 1 Apr 2005 15:25:09 -0500 (EST) Message-Id: <200504012025.PAA05941@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: i-d-announce@ietf.org From: Internet-Drafts@ietf.org Date: Fri, 01 Apr 2005 15:25:09 -0500 Cc: ipsec@ietf.org Subject: [Ipsec] I-D ACTION:draft-ietf-ipsec-rfc2401bis-06.txt X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the IP Security Protocol Working Group of the IETF. Title : Security Architecture for the Internet Protocol Author(s) : S. Kent, K. Seo Filename : draft-ietf-ipsec-rfc2401bis-06.txt Pages : 101 Date : 2005-4-1 This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). Comments should be sent to Stephen Kent (kent@bbn.com). [RFC Editor: Please remove this line prior to publication as an RFC.] A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-ipsec-rfc2401bis-06.txt To remove yourself from the I-D Announcement list, send a message to i-d-announce-request@ietf.org with the word unsubscribe in the body of the message. You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce to change your subscription settings. Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-ietf-ipsec-rfc2401bis-06.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-ietf-ipsec-rfc2401bis-06.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <2005-4-1155052.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-ietf-ipsec-rfc2401bis-06.txt --OtherAccess Content-Type: Message/External-body; name="draft-ietf-ipsec-rfc2401bis-06.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2005-4-1155052.I-D@ietf.org> --OtherAccess-- --NextPart Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline Content-Transfer-Encoding: 7bit _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec --NextPart-- From ipsec-bounces@ietf.org Fri Apr 1 17:36:20 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA28589 for ; Fri, 1 Apr 2005 17:36:20 -0500 (EST) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DHUhT-0003S7-6a; Fri, 01 Apr 2005 17:33:11 -0500 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DHUhQ-0003Rz-Kl for ipsec@megatron.ietf.org; Fri, 01 Apr 2005 17:33:08 -0500 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA28318 for ; Fri, 1 Apr 2005 17:33:06 -0500 (EST) Received: from aragorn.bbn.com ([128.33.0.62]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DHUoq-0002JX-0N for ipsec@ietf.org; Fri, 01 Apr 2005 17:40:48 -0500 Received: from [128.89.89.106] (dhcp89-089-106.bbn.com [128.89.89.106]) by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j31MWvvH023230; Fri, 1 Apr 2005 17:32:58 -0500 (EST) Mime-Version: 1.0 Message-Id: In-Reply-To: <00e801c536f8$531e4850$4205010a@subha> References: <00e801c536f8$531e4850$4205010a@subha> Date: Fri, 1 Apr 2005 17:32:11 -0500 To: "Subha" From: Stephen Kent Subject: Re: [Ipsec] Number of SPD Policies X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41 X-Virus-Status: Clean X-Spam-Score: 0.8 (/) X-Scan-Signature: 21bf7a2f1643ae0bf20c1e010766eb78 Cc: ipsec@ietf.org X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============1131032227==" Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org --===============1131032227== Content-Type: multipart/alternative; boundary="============_-1099727713==_ma============" --============_-1099727713==_ma============ Content-Type: text/plain; charset="us-ascii" ; format="flowed" At 12:21 PM -0800 4/1/05, Subha wrote: >Hi List-members, > >If I need to apply both ESP and AH SAs between the two >security gateways for a given traffic stream, do I need to >create two policies or one policy ? > >Can someone indicate this with repect to the following combinations > >1) IKEv1 + 2401 YES, the status quo >2) IKEv1 + 2401bis not a good match, because 2401bis mandates support for features available in IKEv2 that are not in IKE v1. >3) IKEv2 + 2401 this combination should work. >4) IKEv2 + 2401bis YES, the intended match up > >From IKEv1 or IKEv2 perspective, my understanding is that there are >no restrictictions posted. > >2401bis seems to indicate that if there is nested tunneling i.e. if >the security tunnel is going to terminate in 2 different remote gateways, >then we need to have two SPD policies. (Reference Appendix -E in 2401-bis) What 2401bis says is that to accommodate a nested SA, in general, one will need multiple SPD entries and coordinated entries in the forwarding tables on both the protected and unprotected sides of the IPsec boundary. It does not say this is an issue that arises when the endpoints for the tunnel are distinct. The example in Appendix E is just an example, not a comprehensive discussion of how one configures the SPD and forwarding tables to accommodate nesting in general. >However if the terminating tunnel endpoint is the same remote gateway and >both ESP and AH needs to be applied to a particular traffic stream, then >a single SPD Policy should suffice. I did not see any statement in 2401-bis >restricting this. In the example you cited above, applying AH and ESP to traffic, note that the SPD definition in 2401bis specifies application of only one security protocol per SA. So I believe that more than one SPD entry is required to achieve even this simple nested SA example. Steve --============_-1099727713==_ma============ Content-Type: text/html; charset="us-ascii" Re: [Ipsec] Number of SPD Policies
At 12:21 PM -0800 4/1/05, Subha wrote:
Hi List-members,
 
If I need to apply both ESP and AH SAs between the two 
security gateways for a given traffic stream, do I need to
create two policies or one policy ?
 
Can someone indicate this with repect to the following combinations
 
1) IKEv1 + 2401

YES, the status quo

2) IKEv1 + 2401bis

not a good match, because 2401bis mandates support for features available in IKEv2 that are not in IKE v1.

3) IKEv2 + 2401

this combination should work.

4) IKEv2 + 2401bis

YES, the intended match up

 
From IKEv1 or IKEv2 perspective, my understanding is that there are
no restrictictions posted.
 
2401bis seems to indicate that if there is nested tunneling  i.e. if
the security tunnel is going to terminate in 2 different remote gateways,
then we need to have two SPD policies. (Reference Appendix -E in 2401-bis)

What 2401bis says is that to accommodate a nested SA, in general, one will need multiple SPD entries and coordinated entries in the forwarding tables on both the protected and unprotected sides of the IPsec boundary. It does not say this is an issue that arises when the endpoints for the tunnel are distinct. The example in Appendix E is just an example, not a comprehensive discussion of how one configures the SPD and forwarding tables to accommodate nesting in general.


However if the terminating tunnel endpoint is the same remote gateway and
both ESP and AH needs to be applied to a particular traffic stream, then
a single SPD Policy should suffice. I did not see any statement in 2401-bis
restricting this.


In the example you cited above, applying AH and ESP to traffic, note that the SPD definition in 2401bis specifies application of only one security protocol per SA. So I believe that more than one SPD entry is required to achieve even this simple nested SA example.

Steve
--============_-1099727713==_ma============-- --===============1131032227== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline Content-Transfer-Encoding: 7bit _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec --===============1131032227==-- From ipsec-bounces@ietf.org Fri Apr 1 19:41:03 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA07255 for ; Fri, 1 Apr 2005 19:41:03 -0500 (EST) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DHWeT-0000YP-CI; Fri, 01 Apr 2005 19:38:13 -0500 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DHWeR-0000YK-Dj for ipsec@megatron.ietf.org; Fri, 01 Apr 2005 19:38:11 -0500 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA07123 for ; Fri, 1 Apr 2005 19:38:08 -0500 (EST) Received: from ip-66-80-10-146.dsl.sca.megapath.net ([66.80.10.146] helo=smtp.intoto.com) by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DHWlr-0006OE-JK for ipsec@ietf.org; Fri, 01 Apr 2005 19:45:52 -0500 Received: from not-angel.intoto.com ([10.1.5.11]) by smtp.intoto.com (SMSSMTP 4.0.0.59) with SMTP id M2005040116373228585 ; Fri, 01 Apr 2005 16:37:32 -0800 Received: from subha (dhcp-66.intoto.com [10.1.5.66]) (authenticated bits=0) by not-angel.intoto.com (8.13.1/8.13.1) with ESMTP id j320c0J1032335; Fri, 1 Apr 2005 16:38:04 -0800 Message-ID: <015701c5371b$f3885510$4205010a@subha> From: "Subha" To: "Stephen Kent" References: <00e801c536f8$531e4850$4205010a@subha> Subject: Re: [Ipsec] Number of SPD Policies Date: Fri, 1 Apr 2005 16:35:59 -0800 MIME-Version: 1.0 X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.2180 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 X-Spam-Score: 0.5 (/) X-Scan-Signature: 3b3709b7fb3320c78bd7b1555081f0fc Cc: ipsec@ietf.org X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============1540217239==" Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org This is a multi-part message in MIME format. --===============1540217239== Content-Type: multipart/alternative; boundary="----=_NextPart_000_0154_01C536D8.E2D0AE90" This is a multi-part message in MIME format. ------=_NextPart_000_0154_01C536D8.E2D0AE90 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Re: [Ipsec] Number of SPD PoliciesHi Steve, I have some follow-up questions. In the following questions I have assumed that 3 IPsec Protocols shall = be applied on a given traffic stream. 1) When IKEv2 is used with RFC2401 compliant implementation, can a = single IKEv2=20 CREATE_CHILD_SA negotiate IPcomp, ESP and AH SAs for the given traffic=20 selector?=20 2) When IKEv2 is used with RFC2401-bis compliant implementation, there = has to=20 be theee IKEv2 CREATE_CHILD_SA Exchanges. (1) Plain Traffic selectors for IPcomp SA (2) Same Source IP, Destination IP and IPComp for Protocol - Traffic = Selectors for ESP SA (3) Tunnel Outer Header Source IP, Tunnel Outer Header Destination IP = and Protocol=3DESP for AH SA. 3) An implementation needs to know through some other means,=20 whether the peer supports RFC2401 or 2401-bis.=20 Thanks, Subha ----- Original Message -----=20 From: Stephen Kent=20 To: Subha=20 Cc: ipsec@ietf.org=20 Sent: Friday, April 01, 2005 2:32 PM Subject: Re: [Ipsec] Number of SPD Policies At 12:21 PM -0800 4/1/05, Subha wrote: Hi List-members, If I need to apply both ESP and AH SAs between the two=20 security gateways for a given traffic stream, do I need to create two policies or one policy ? Can someone indicate this with repect to the following combinations 1) IKEv1 + 2401 YES, the status quo 2) IKEv1 + 2401bis not a good match, because 2401bis mandates support for features = available in IKEv2 that are not in IKE v1. 3) IKEv2 + 2401 this combination should work. 4) IKEv2 + 2401bis YES, the intended match up From IKEv1 or IKEv2 perspective, my understanding is that there are no restrictictions posted. 2401bis seems to indicate that if there is nested tunneling i.e. if the security tunnel is going to terminate in 2 different remote = gateways, then we need to have two SPD policies. (Reference Appendix -E in = 2401-bis) What 2401bis says is that to accommodate a nested SA, in general, one = will need multiple SPD entries and coordinated entries in the forwarding = tables on both the protected and unprotected sides of the IPsec = boundary. It does not say this is an issue that arises when the = endpoints for the tunnel are distinct. The example in Appendix E is just = an example, not a comprehensive discussion of how one configures the SPD = and forwarding tables to accommodate nesting in general. However if the terminating tunnel endpoint is the same remote = gateway and both ESP and AH needs to be applied to a particular traffic stream, = then a single SPD Policy should suffice. I did not see any statement in = 2401-bis restricting this. In the example you cited above, applying AH and ESP to traffic, note = that the SPD definition in 2401bis specifies application of only one = security protocol per SA. So I believe that more than one SPD entry is = required to achieve even this simple nested SA example. Steve ------=_NextPart_000_0154_01C536D8.E2D0AE90 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Re: [Ipsec] Number of SPD Policies
Hi  Steve,
 
I have some follow-up = questions.
 
In the following questions I have = assumed that 3=20 IPsec Protocols shall be applied
on a given traffic stream.
 
1) When IKEv2 is used with RFC2401 = compliant=20 implementation, can a single IKEv2
CREATE_CHILD_SA negotiate IPcomp, ESP = and AH SAs=20 for the given traffic
selector?
 
2) When IKEv2 is used with RFC2401-bis = compliant=20 implementation, there has to
be theee IKEv2 CREATE_CHILD_SA=20 Exchanges.
 
(1) Plain Traffic selectors for IPcomp=20 SA
(2) Same Source IP, Destination IP and = IPComp for=20 Protocol  - Traffic Selectors for ESP SA
(3) Tunnel Outer Header Source IP, = Tunnel Outer=20 Header Destination IP and Protocol=3DESP
 for AH SA.
 
3) An implementation needs to = know through=20 some other means,
whether the peer supports RFC2401 or 2401-bis.
 
Thanks,
Subha
 
 
----- Original Message -----
From:=20 Stephen Kent =
To: Subha
Sent: Friday, April 01, 2005 = 2:32=20 PM
Subject: Re: [Ipsec] Number of = SPD=20 Policies

At 12:21 PM -0800 4/1/05, Subha wrote:
Hi=20 List-members,
 
If I = need=20 to apply both ESP and AH SAs between the=20 two 
security gateways=20 for a given traffic stream, do I need to
create two policies=20 or one policy ?
 
Can = someone=20 indicate this with repect to the following = combinations
 
1) = IKEv1 +=20 2401

YES, the status quo

2) = IKEv1 +=20 2401bis

not a good match, because 2401bis mandates support for features = available=20 in IKEv2 that are not in IKE v1.

3) = IKEv2 +=20 2401

this combination should work.

4) = IKEv2 +=20 2401bis

YES, the intended match up

 
From = IKEv1 or IKEv2=20 perspective, my understanding is that there are
no = restrictictions=20 posted.
 
2401bis seems to=20 indicate that if there is nested tunneling  i.e.=20 if
the = security tunnel=20 is going to terminate in 2 different remote = gateways,
then we need=20 to have two SPD policies. (Reference Appendix -E in=20 2401-bis)

What 2401bis says is that to accommodate a nested SA, in general, = one=20 will need multiple SPD entries and coordinated entries in the = forwarding=20 tables on both the protected and unprotected sides of the IPsec = boundary. It=20 does not say this is an issue that arises when the endpoints for the = tunnel=20 are distinct. The example in Appendix E is just an example, not a=20 comprehensive discussion of how one configures the SPD and forwarding = tables=20 to accommodate nesting in general.


However if the=20 terminating tunnel endpoint is the same remote gateway=20 and
both = ESP=20 and AH needs to be applied to a particular traffic stream,=20 then
a = single SPD Policy=20 should suffice. I did not see any statement in=20 2401-bis
restricting=20 this.


In the example you cited above, applying AH and ESP to traffic, = note that=20 the SPD definition in 2401bis specifies application of only one = security=20 protocol per SA. So I believe that more than one SPD entry is required = to=20 achieve even this simple nested SA example.

Steve
------=_NextPart_000_0154_01C536D8.E2D0AE90-- --===============1540217239== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline Content-Transfer-Encoding: 7bit _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec --===============1540217239==-- From ipsec-bounces@ietf.org Mon Apr 4 07:56:54 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA22373 for ; Mon, 4 Apr 2005 07:56:54 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DIQB3-0002kc-Q8; Mon, 04 Apr 2005 07:55:33 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DIQB1-0002kX-JP for ipsec@megatron.ietf.org; Mon, 04 Apr 2005 07:55:31 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA22206 for ; Mon, 4 Apr 2005 07:55:30 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DIQIx-0008IZ-D0 for ipsec@ietf.org; Mon, 04 Apr 2005 08:03:44 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j34BtHvP022128 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Mon, 4 Apr 2005 14:55:17 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j34BtEt0022125; Mon, 4 Apr 2005 14:55:14 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16977.11042.656521.73950@fireball.kivinen.iki.fi> Date: Mon, 4 Apr 2005 14:55:14 +0300 From: Tero Kivinen To: "Subha" Subject: Re: [Ipsec] Number of SPD Policies In-Reply-To: <015701c5371b$f3885510$4205010a@subha> References: <00e801c536f8$531e4850$4205010a@subha> <015701c5371b$f3885510$4205010a@subha> X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 14 min X-Total-Time: 15 min X-Spam-Score: 0.0 (/) X-Scan-Signature: 0ddefe323dd869ab027dbfff7eff0465 Content-Transfer-Encoding: 7bit Cc: ipsec@ietf.org, Stephen Kent X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Subha writes: > 1) When IKEv2 is used with RFC2401 compliant implementation, can a > single IKEv2 CREATE_CHILD_SA negotiate IPcomp, ESP and AH SAs for > the given traffic selector? Trying to use IKEv2 and RFC2401 is not very good idea, as some of the features of the IKEv2 cannot be expressed in the RFC2401 policy. Also the same thing applies to other way around, meaning that IKEv2 is mostly matching RFC2401bis. This means that especially implementations will only support IKEv2 for the features required for the RFC2401bis. As RFC2401bis does NOT require ESP and AH to be negotiated simultaenously, I guess most of the implementations WILL NOT support it. IPcomp can be negotiated in addition to the ESP or AH in the IKEv2 too, but the negotiation is quite different than what was for IKEv1 (or RFC2401). Also note, that IKEv2 draft explicitly mandates RFC2401bis handling of the ECN flag, i.e. meaning that you cannot use base RFC2401 with IKEv2, you need to extend your RFC2401 implementation to include RFC2401bis ECN handling if you want to use IKEv2. > 2) When IKEv2 is used with RFC2401-bis compliant implementation, > there has to be theee IKEv2 CREATE_CHILD_SA Exchanges. No. IKEv2 allows IPcomp to be negotiated only when some other child SA is negotiated. IPComp is mostly outside the scope of IPsec,and RFC2401bis does not really cover that at all (it just mentions that it can be negotiated). You do 2 CREATE_CHILD_SA exchanges. > (1) Plain Traffic selectors for IPcomp SA There is no way to do that in IKEv2, you MUST have either ESP or AH. > (2) Same Source IP, Destination IP and IPComp for Protocol - > Traffic Selectors for ESP SA No, Plain traffic selectors for ESP SA, and include IPCOMP_SUPPORTED notify to mention that you want to do ip compression. > (3) Tunnel Outer Header Source IP, Tunnel Outer Header Destination > IP and Protocol=ESP for AH SA. Yes, this is the second one. -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Mon Apr 4 17:05:33 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA09870 for ; Mon, 4 Apr 2005 17:05:33 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DIYFb-0006uy-Ex; Mon, 04 Apr 2005 16:32:47 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DIYFW-0006u1-Nx; Mon, 04 Apr 2005 16:32:42 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA01750; Mon, 4 Apr 2005 16:32:41 -0400 (EDT) Received: from [132.151.6.50] (helo=newodin.ietf.org) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DIYNX-00060r-Ep; Mon, 04 Apr 2005 16:40:59 -0400 Received: from apache by newodin.ietf.org with local (Exim 4.43) id 1DIYFV-0007oV-MV; Mon, 04 Apr 2005 16:32:41 -0400 X-test-idtracker: no From: The IESG To: IETF-Announce Message-Id: Date: Mon, 04 Apr 2005 16:32:41 -0400 X-Spam-Score: 0.0 (/) X-Scan-Signature: 2409bba43e9c8d580670fda8b695204a Cc: ipsec mailing list , ipsec chair , Internet Architecture Board , ipsec chair , RFC Editor Subject: [Ipsec] Protocol Action: 'IP Encapsulating Security Payload (ESP)' to Proposed Standard X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org The IESG has approved the following document: - 'IP Encapsulating Security Payload (ESP) ' as a Proposed Standard This document is the product of the IP Security Protocol Working Group. The IESG contact persons are Russ Housley and Sam Hartman. Technical Summary This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406, published in November 1998. Working Group Summary The IPsec Working Group came to consensus on this document. Protocol Quality This document was reviewed by Russell Housley for the IESG. _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Mon Apr 4 17:07:14 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA10362 for ; Mon, 4 Apr 2005 17:07:14 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DIXs6-000871-DS; Mon, 04 Apr 2005 16:08:30 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DIXs1-0007zT-La for ipsec@megatron.ietf.org; Mon, 04 Apr 2005 16:08:28 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA25663 for ; Mon, 4 Apr 2005 16:08:23 -0400 (EDT) Received: from ip-66-80-10-146.dsl.sca.megapath.net ([66.80.10.146] helo=smtp.intoto.com) by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DIY00-0003kZ-Rf for ipsec@ietf.org; Mon, 04 Apr 2005 16:16:41 -0400 Received: from not-angel.intoto.com ([10.1.5.11]) by smtp.intoto.com (SMSSMTP 4.0.0.59) with SMTP id M2005040413074405881 ; Mon, 04 Apr 2005 13:07:44 -0700 Received: from subha (dhcp-66.intoto.com [10.1.5.66]) (authenticated bits=0) by not-angel.intoto.com (8.13.1/8.13.1) with ESMTP id j34K8DGL016758; Mon, 4 Apr 2005 13:08:18 -0700 Message-ID: <003701c53952$0aabf430$4205010a@subha> From: "Subha" To: "Tero Kivinen" References: <00e801c536f8$531e4850$4205010a@subha><015701c5371b$f3885510$4205010a@subha> <16977.11042.656521.73950@fireball.kivinen.iki.fi> Subject: Re: [Ipsec] Number of SPD Policies Date: Mon, 4 Apr 2005 13:08:13 -0700 MIME-Version: 1.0 X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.2180 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 X-Spam-Score: 0.8 (/) X-Scan-Signature: 3b3709b7fb3320c78bd7b1555081f0fc Cc: ipsec@ietf.org, Stephen Kent X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============1033506679==" Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org This is a multi-part message in MIME format. --===============1033506679== Content-Type: multipart/alternative; boundary="----=_NextPart_000_002E_01C53917.5B86A930" This is a multi-part message in MIME format. ------=_NextPart_000_002E_01C53917.5B86A930 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Hi,=20 It looks like 2401bis brings up a limitation that we cannot define different AH strength for ESP encrypted packets between the same two security gateways. For e.g. let us assume the following scenario.=20 Local local Remote Remote LAN GW GW LAN 10.1.5.x-------66.80.90.10----66.80.10.2----192.168.1.x 10.1.6.x--------66.80.90.10----66.80.10.2----192.168.2.x As per RFC 2401, we could define two SPD Policies for each of them,=20 especially AH strength can be different for both of them. for 10.1.5.x to 192.168.1.x.We could define AH=3D MD5 and ESP=3DDES. for 10.1.6.x to 192.168.2.x We could define AH=3DSHA and ESP=3D3DES. But with 2401bis, we can define only one AH encryption strength=20 for both the policies. i.e.for SPD1 10.1.5.x to 192.168.1.x ESP =3D DES -ReturntoIpsec i.e.for SPD2 10.1.6.x to 192.168.2.x ESP =3D 3DES -ReturntoIpsec i.e for SPD3 66.80.90.10 to 66.80.10.2 AH =3D MD5 -ForwardOut We can no longer specify service based cryptographic strength,=20 if the Service is ESP between the two tunnel endpoints. Is this understanding correct ?=20 To overcome this limitation, a configuration can allow=20 Administrator to enter ESP and AH transform in the same policy. If the Policy is 2401bis, the implementation can negotiate using IKEv2 with the peer, for 2 sets of traffic selectors, one with Plain Taffic selectors and the other with Tunnel header IPs + ESP traffic selector. By this mechanism, the AH Algorithm=20 applied to a given packet will depend on the selectors of the=20 clear text packet. Of-course, there may be implications on IKEv2 also based on this. But this is one mechanism that can=20 be considered to provide service level cryptography strength. Also, in the above example, if the forwarding entries such=20 as ReturntoIpsec was not present for SPD1, rather=20 ForwardOut was configured, the encrypted ESP packet would=20 be directly sent out. Is this a correct understanding ? Thanks, Subha ----- Original Message -----=20 From: "Tero Kivinen" To: "Subha" Cc: "Stephen Kent" ; Sent: Monday, April 04, 2005 4:55 AM Subject: Re: [Ipsec] Number of SPD Policies > Subha writes: >> 1) When IKEv2 is used with RFC2401 compliant implementation, can a >> single IKEv2 CREATE_CHILD_SA negotiate IPcomp, ESP and AH SAs for >> the given traffic selector? >=20 > Trying to use IKEv2 and RFC2401 is not very good idea, as some of the > features of the IKEv2 cannot be expressed in the RFC2401 policy. Also > the same thing applies to other way around, meaning that IKEv2 is > mostly matching RFC2401bis. This means that especially implementations > will only support IKEv2 for the features required for the RFC2401bis. > As RFC2401bis does NOT require ESP and AH to be negotiated > simultaenously, I guess most of the implementations WILL NOT support > it. >=20 > IPcomp can be negotiated in addition to the ESP or AH in the IKEv2 > too, but the negotiation is quite different than what was for IKEv1 > (or RFC2401). >=20 > Also note, that IKEv2 draft explicitly mandates RFC2401bis handling of > the ECN flag, i.e. meaning that you cannot use base RFC2401 with > IKEv2, you need to extend your RFC2401 implementation to include > RFC2401bis ECN handling if you want to use IKEv2.=20 >=20 >> 2) When IKEv2 is used with RFC2401-bis compliant implementation, >> there has to be theee IKEv2 CREATE_CHILD_SA Exchanges. >=20 > No. IKEv2 allows IPcomp to be negotiated only when some other child SA > is negotiated. IPComp is mostly outside the scope of IPsec,and > RFC2401bis does not really cover that at all (it just mentions that it > can be negotiated). >=20 > You do 2 CREATE_CHILD_SA exchanges. >=20 >> (1) Plain Traffic selectors for IPcomp SA >=20 > There is no way to do that in IKEv2, you MUST have either ESP or AH. >=20 >> (2) Same Source IP, Destination IP and IPComp for Protocol - >> Traffic Selectors for ESP SA >=20 > No, Plain traffic selectors for ESP SA, and include IPCOMP_SUPPORTED > notify to mention that you want to do ip compression.=20 >=20 >=20 >> (3) Tunnel Outer Header Source IP, Tunnel Outer Header Destination >> IP and Protocol=3DESP for AH SA. >=20 > Yes, this is the second one.=20 > --=20 > kivinen@safenet-inc.com > ------=_NextPart_000_002E_01C53917.5B86A930 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Hi,
 
It looks like 2401bis brings up = a=20 limitation that we cannot
define different = AH strength for=20 ESP encrypted packets
between the same two security=20 gateways.
 
For e.g. let us assume the = following=20 scenario.
 
Local          = ;=20 local           =20 Remote     Remote
LAN          &= nbsp;   GW        =         GW    = ;    LAN
10.1.5.x-------66.80.90.10----66.80.10.2----192.168.1.x
10.1.6.x--------66.80.90.10----66.80.10.2----192.168.2.x<= /DIV>
 
As per RFC 2401, we could = define two=20 SPD Policies for each of them,
especially AH strength can be different for both of them.
 
for 10.1.5.x = to=20 192.168.1.x.We could define AH=3D = MD5 and=20 ESP=3DDES.
for 10.1.6.x to 192.168.2.x We = could define=20 AH=3DSHA and ESP=3D3DES.
 
But with 2401bis, we can define = only one AH=20 encryption strength
for both the = policies.
 
i.e.for SPD1 10.1.5.x to = 192.168.1.x ESP =3D=20 DES  -ReturntoIpsec
i.e.for SPD2 10.1.6.x to = 192.168.2.x ESP =3D=20 3DES -ReturntoIpsec
i.e for SPD3 66.80.90.10 = to 66.80.10.2=20 AH =3D MD5 -ForwardOut
 
We can no longer specify = service based=20 cryptographic strength,
if the Service = is ESP between the two tunnel = endpoints.
 
Is this = understanding=20 correct ?
 
To overcome this limitation, a=20 configuration can allow
Administrator to enter ESP and = AH transform=20 in the same policy.
If the Policy is 2401bis, the=20 implementation can negotiate
using IKEv2 with the peer, for = 2 sets of=20 traffic selectors,
one with Plain Taffic selectors = and the=20 other with Tunnel header
IPs + ESP traffic = selector.  By this=20 mechanism, the AH = Algorithm=20
applied to a given packet will = depend on=20 the selectors of the =
clear text = packet. Of-course, there=20 may be implications on
IKEv2 also based on this. But = this is one=20 mechanism that can 
be = considered  to=20 provide service level = cryptography=20 strength.
 
Also, in the above example, if = the=20 forwarding entries such
as ReturntoIpsec was not = present for SPD1, rather
ForwardOut was configured, the = encrypted=20 ESP packet would =
be directly sent out.  Is = this a=20 correct understanding=20 ?
 
Thanks,
Subha
 
 
----- Original Message ----- =
From: "Tero Kivinen" <kivinen@iki.fi>
To: "Subha" <subhaav@intoto.com>
Cc: "Stephen Kent" <kent@bbn.com>; <ipsec@ietf.org>
Sent: Monday, April 04, 2005 4:55 = AM
Subject: Re: [Ipsec] Number of SPD=20 Policies

> Subha writes:
>> 1) When IKEv2 is used with = RFC2401=20 compliant implementation, can a
>> single IKEv2 CREATE_CHILD_SA = negotiate IPcomp, ESP and AH SAs for
>> the given traffic=20 selector?
>
> Trying to use IKEv2 and RFC2401 is not very = good=20 idea, as some of the
> features of the IKEv2 cannot be expressed = in the=20 RFC2401 policy. Also
> the same thing applies to other way around, = meaning=20 that IKEv2 is
> mostly matching RFC2401bis. This means that = especially=20 implementations
> will only support IKEv2 for the features = required for=20 the RFC2401bis.
> As RFC2401bis does NOT require ESP and AH to be=20 negotiated
> simultaenously, I guess most of the implementations = WILL NOT=20 support
> it.
>
> IPcomp can be negotiated in = addition to the=20 ESP or AH in the IKEv2
> too, but the negotiation is quite = different than=20 what was for IKEv1
> (or RFC2401).
>
> Also note, = that IKEv2=20 draft explicitly mandates RFC2401bis handling of
> the ECN flag, = i.e.=20 meaning that you cannot use base RFC2401 with
> IKEv2, you need to = extend=20 your RFC2401 implementation to include
> RFC2401bis ECN handling = if you=20 want to use IKEv2.
>
>> 2) When IKEv2 is used with = RFC2401-bis=20 compliant implementation,
>> there has to be theee IKEv2=20 CREATE_CHILD_SA Exchanges.
>
> No. IKEv2 allows IPcomp to = be=20 negotiated only when some other child SA
> is negotiated. IPComp = is mostly=20 outside the scope of IPsec,and
> RFC2401bis does not really cover = that at=20 all (it just mentions that it
> can be negotiated).
> =
> You=20 do 2 CREATE_CHILD_SA exchanges.
>
>> (1) Plain Traffic = selectors=20 for IPcomp SA
>
> There is no way to do that in IKEv2, you = MUST=20 have either ESP or AH.
>
>> (2) Same Source IP, = Destination IP=20 and IPComp for Protocol  -
>>     = Traffic=20 Selectors for ESP SA
>
> No, Plain traffic selectors for = ESP SA,=20 and include IPCOMP_SUPPORTED
> notify to mention that you want to = do ip=20 compression.
>
>
>> (3) Tunnel Outer Header = Source IP,=20 Tunnel Outer Header Destination
>>     IP = and=20 Protocol=3DESP for AH SA.
>
> Yes, this is the second one. =
>=20 --
>
kivinen@safenet-inc.com
> ------=_NextPart_000_002E_01C53917.5B86A930-- --===============1033506679== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline Content-Transfer-Encoding: 7bit _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec --===============1033506679==-- From ipsec-bounces@ietf.org Tue Apr 5 05:23:08 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA27845 for ; Tue, 5 Apr 2005 05:23:08 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DIk9P-00068B-TI; Tue, 05 Apr 2005 05:15:12 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DIk9L-00064U-1d for ipsec@megatron.ietf.org; Tue, 05 Apr 2005 05:15:07 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA26591 for ; Tue, 5 Apr 2005 05:15:00 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DIkHN-0000Av-3w for ipsec@ietf.org; Tue, 05 Apr 2005 05:23:26 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j359EovZ006628 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Tue, 5 Apr 2005 12:14:50 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j359EmJj006625; Tue, 5 Apr 2005 12:14:48 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16978.22280.545861.239449@fireball.kivinen.iki.fi> Date: Tue, 5 Apr 2005 12:14:48 +0300 From: Tero Kivinen To: "Subha" Subject: Re: [Ipsec] Number of SPD Policies In-Reply-To: <003701c53952$0aabf430$4205010a@subha> References: <00e801c536f8$531e4850$4205010a@subha> <015701c5371b$f3885510$4205010a@subha> <16977.11042.656521.73950@fireball.kivinen.iki.fi> <003701c53952$0aabf430$4205010a@subha> X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 4 min X-Total-Time: 4 min X-Spam-Score: 0.0 (/) X-Scan-Signature: 7655788c23eb79e336f5f8ba8bce7906 Content-Transfer-Encoding: 7bit Cc: ipsec@ietf.org, Stephen Kent X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Subha writes: > It looks like 2401bis brings up a limitation that we cannot > define different AH strength for ESP encrypted packets > between the same two security gateways. Yes, I think you are right. The question is: Is there any reason to really do that? Why are you doing AH+ESP between the local GW and Remote GW in any case, why are you not simply using ESP with suitable auth algorithm? As you are using tunnel mode there AH does not offer anything more compared to the ESP. The only case where I can see there would be use for AH+ESP is when the AH and ESP are terminated by different hosts, i.e. AH goes to from host to firewall, and the ESP goes from host through the firewall to the other end host. As there EVER any valid scenario where you would need to use AH+ESP where both of those are terminated by same peers? -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Tue Apr 5 08:20:00 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA13638 for ; Tue, 5 Apr 2005 08:20:00 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DImsm-0003ya-4d; Tue, 05 Apr 2005 08:10:12 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DImsj-0003yA-PQ for ipsec@megatron.ietf.org; Tue, 05 Apr 2005 08:10:10 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA12079 for ; Tue, 5 Apr 2005 08:10:08 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DIn0s-0006j3-Cb for ipsec@ietf.org; Tue, 05 Apr 2005 08:18:34 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j35C9xZB008379 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Tue, 5 Apr 2005 15:10:00 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j35C9wN5008376; Tue, 5 Apr 2005 15:09:58 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16978.32790.327313.883104@fireball.kivinen.iki.fi> Date: Tue, 5 Apr 2005 15:09:58 +0300 From: Tero Kivinen To: Charlie Kaufman X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 3 min X-Total-Time: 3 min X-Spam-Score: 0.0 (/) X-Scan-Signature: 79899194edc4f33a41f49410777972f8 Content-Transfer-Encoding: 7bit Cc: ipsec@ietf.org Subject: [Ipsec] Error in draft-ietf-ipsec-ikev2-17.txt X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit I found error (or typo) in the draft-ietf-ipsec-ikev2-17.txt that probably should be fixed in the author 48 hours period. The section 2.6 still refers to the SPIr when it should say "Cookie". I.e. CHANGE If it matches, the responder knows that SPIr was generated since the last change to and that IPi must be the same as the source address it saw the first time. to If it matches, the responder knows that Cookie was generated since the last change to and that IPi must be the same as the source address it saw the first time. (This typo is left over from the times we didn't have N(COOKIE) notify, but instead generated SPIr and used it as a COOKIE). -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Tue Apr 5 08:20:00 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA13637 for ; Tue, 5 Apr 2005 08:20:00 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DImyd-0005yt-HW; Tue, 05 Apr 2005 08:16:15 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DImyZ-0005yU-P1 for ipsec@megatron.ietf.org; Tue, 05 Apr 2005 08:16:14 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA13020 for ; Tue, 5 Apr 2005 08:16:10 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DIn6h-00076g-W6 for ipsec@ietf.org; Tue, 05 Apr 2005 08:24:37 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j35CG6PD008416 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Tue, 5 Apr 2005 15:16:06 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j35CG2oj008411; Tue, 5 Apr 2005 15:16:02 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16978.33154.351915.320602@fireball.kivinen.iki.fi> Date: Tue, 5 Apr 2005 15:16:02 +0300 From: Tero Kivinen To: pasi.eronen@nokia.com, paul.hoffman@vpnc.org X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 2 min X-Total-Time: 2 min X-Spam-Score: 0.0 (/) X-Scan-Signature: 2e8fc473f5174be667965460bd5288ba Content-Transfer-Encoding: 7bit Cc: ipsec@ietf.org Subject: [Ipsec] Comments of draft-eronen-ipsec-ikev2-clarifications-02.txt X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit > If a CREATE_CHILD_SA exchange includes a KEi payload, at > least one of the SA offers MUST include the Diffie-Hellman > group of the KEi MUST be an element of the group the > initiator expects the responder to accept (additional > Diffie-Hellman groups can be proposed). I think the above sentece is missing some things: "... include the Diffie-Hellman group of the KEi MUST be an ..." Perhaps it should be: "If a CREATE_CHILD_SA exchange includes a KEi payload, at least one of the SA offers MUST include the Diffie-Hellman group of the KEi. The Diffie-Hellman group of the KEi MUST be an element of the group the initiator expects the responder to accept (additional Diffie-Hellman groups can be proposed)." Also if we think more about the IKE SA rekeying, I do not think there is any reason to do that unless you also do new Diffie-Hellman there too. Rekeying IKE SA because of the IKE message ID wrapping is not common. The current IKEv2 text is not clear wheather the intension was that IKE SA rekey MUST have KE payloads, but I think we should mandate them, i.e. say in the NEW-1.3.2 that KE payloads are not optional there. The section 5 should also point out that INTERNAL_ADDRESS_EXPIRY is not mandatory in the IKEv2, and in most cases it would be best not to use it at all. Most of the clients will not tolerate the server not to give the same address back when the address lease expires. This means that only reason to do address expiry is to know when the client stops using the address. In IKEv2 this time is very clear as it is also tied to the IKE SA. If the IKE SA is deleted then the client cannot use the address anymore, and when he recretes the IKE SA he need to get the address again using configuration payloads (he also need to recreate all IPsec SAs and change the traffic selectors to match new addresses etc). Because of that I would recommend that INTERNAL_ADDRESS_EXPIRY SHOULD NOT be used in the IKEv2. > 6.1 Diffie-Hellman for first CHILD_SA > > Section 1.2 shows that IKE_AUTH messages do not contain KEi/KEr or > Ni/Nr payloads. This implies that the SA payload in IKE_AUTH > exchange cannot contain Transform Type 4 (Diffie-Hellman Group) with > any other value than NONE. And most commonly that should be coded as leaving out transform type 4 completely. > 6.5 Reducing the window size > > In IKEv2, the window size is assumed to be a (possibly configurable) > property of a particular implementation, and is not related to > congestion control (unlike the window size in TCP, for instance). > > In particular, there is no way to reduce the window size of an > existing IKE_SA. However, when rekeying an IKE_SA, the new IKE_SA > starts with window size 1 until it is explicitly increased by sending > a new SET_WINDOW_SIZE notification. More precisely, you could send SET_WINDOW_SIZE notification with smaller window than before, but it is not defined what responder should do in that case. He might have more request than allowed by the new window size already out, thus he cannot reduce the window size. Because of this the reduction of window size cannot be done before the responder processing rules have been define, i.e. currently reducing window size is forbidden. > 6.9 SPI values for messages outside of an IKE_SA > > The IKEv2 specification does not say what SPI values should be used > for Informational requests sent outside of an IKE_SA. > > There seem to be two cases when such a message can be sent: > INVALID_IKE_SPI and INVALID_SPI notifications. Especially in the > latter case, no meaningful IKE SPI values are available. > > A strict interpretation of the specification would require the sender > to invent garbage values for the SPI fields. However, we think this > was not the intention, and using zero values is acceptable. I think whole section should be clarified. There cannot be any informational exchanges outside the IKE SA, thus there will always be IKE SPIs for that packet. IKEv2 DOES NOT have non-authenticated notifications that the IKEv1 had. The section 1.5 describes about case where the responder of packet could send out packet looking like informational exchange as a response to the packet it receives, but that is not part of an informational exchange, and responder should not act based on the received packet, except it might start DPD because of the packet (i.e. it is treader similarly than ICMP host unreachable etc are treated). In that case using all zero SPI fields is acceptable. > 6.11 INVALID_IKE_SPI ... > Since the INVALID_IKE_SPI notification is sent outside of an IKE_SA, > and it is not about an existing SA, it seems that using Notification > Data would be the logical choice. However, this issue needs more > discussion and we do not yet propose any solution in this document. The INVALID_IKE_SPI can also be sent inside the existing IKE SA. See section 1.5 of IKEv2 draft for more details. As the description of the INVALID_IKE_SPI says that unrecognized destination SPI, which would indicate that destination SPI was the one we didn't know anything about. So my interpretation would be to use SPI field of the notification payload (as it does not say put it in the data field), and only put destination SPI there, with protocol ID of IKE. On the other hand section 3.10 says sthat SPI size for the notification concerning MUST be zero, so I agree this is not really consistent. > 6.12 Which message should contain INITIAL_CONTACT ... > The text does talk about authenticated identities, so it seems the > notification cannot be sent before both endpoints have been > authenticated. Thus, the possible places are the last IKE_AUTH > response message and a separate Informational exchange. Initiator usually knows to whom is is supposed to talk to and he knows weather he has SA with him before or not (if he had IKE SA he would have used it, or he had some other reason not to use it). So it means that initiator can send INITIAL_CONTACT in IKE_AUTH and responder can respond to that in the same packet. I would actually prefer that instead of using separate informational exchange. > Based on how this was implemented in IKEv1, it seems the intent was > to use a separate Informational exchange. In IKEv1 it was supposed to be sent inside the main mode, but as the extra payloads are not authenticated there, some implementations use separate informational exchange for it. For IKEv1 it was actually very bad idea to use separate informational exchange as they were not reliable. > o The message IDs of IKE_SA_INIT messages is unclear if there are > cookies followed by INVALID_KE_PAYLOAD. See "Question about > N(COOKIE) and N(INVALID_KE_PAYLOAD) combination" thread, Oct 2004. > This definitely needs to be clarified. I do not think this is unclear. When you create state in the responder you allocate IKE SPI and start using message IDs. If you return N(COOKIE), you do not allocate anything, thus you do not allocate IKE SA SPI, and as message ID is property of IKE SA, you do not use it yet. If you return N(INVALID_KE_PAYLOAD) that is fatal error, and again you do not need to allocate IKE SA nor the SPI, thus no message ID can be stored. When the initiator retries with both N(COOKIE) and with proper group, then you finally allocate IKE SA and the SPI, and start using message IDs. Thus message id of IKE_SA_INIT should always be zero. -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Tue Apr 5 09:38:20 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA20405 for ; Tue, 5 Apr 2005 09:38:20 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DIoAD-0002Nb-Gx; Tue, 05 Apr 2005 09:32:17 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DIoAB-0002KN-Pg for ipsec@megatron.ietf.org; Tue, 05 Apr 2005 09:32:15 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA19958 for ; Tue, 5 Apr 2005 09:32:13 -0400 (EDT) Received: from ip-66-80-10-146.dsl.sca.megapath.net ([66.80.10.146] helo=smtp.intoto.com) by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DIoIK-0001Y2-Cl for ipsec@ietf.org; Tue, 05 Apr 2005 09:40:41 -0400 Received: from brahma.intotoind.com ([172.16.1.10]) by smtp.intoto.com (SMSSMTP 4.0.0.59) with SMTP id M2005040506313209848 for ; Tue, 05 Apr 2005 06:31:32 -0700 Received: from SriRam.intoto.com (2mc54.intotoind.com [172.16.2.54]) by brahma.intotoind.com (8.12.11/8.12.8) with ESMTP id j35DW1fO020015 for ; Tue, 5 Apr 2005 19:02:01 +0530 Message-Id: <5.1.0.14.0.20050405190205.02bb8b48@172.16.1.10> X-Sender: tosri@172.16.1.10 X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Tue, 05 Apr 2005 19:08:48 +0530 To: ipsec@ietf.org From: Tatineni SriRama Kumar Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed X-Scanned-By: MIMEDefang 2.41 X-Spam-Score: 0.0 (/) X-Scan-Signature: 7a6398bf8aaeabc7a7bb696b6b0a2aad Subject: [Ipsec] Blocking traffic using opaque X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Hi All, As per point C and D in section 4.4.1.3 of 2401bis, traffic will be passed in only one direction. Based on this I have following questions. 1. How configuration specified in point B of same section allows traffic in both directions. 2. If configuration specified in points B,C and D allows traffic in one direction only, what should be the configuration to allow traffic in both directions. --SriRam/Vineet _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Tue Apr 5 09:55:01 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA21690 for ; Tue, 5 Apr 2005 09:55:01 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DIoUz-0005N1-2t; Tue, 05 Apr 2005 09:53:45 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DIoUw-0005JT-Dl for ipsec@megatron.ietf.org; Tue, 05 Apr 2005 09:53:42 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA21534 for ; Tue, 5 Apr 2005 09:53:40 -0400 (EDT) Received: from nav2.lgsoftindia.com ([203.200.13.13] helo=nav2) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DIod4-0002DH-4x for ipsec@ietf.org; Tue, 05 Apr 2005 10:02:08 -0400 Received: from appolo.lgdomain.com ([192.168.1.22]) by nav2 with InterScan Messaging Security Suite; Tue, 05 Apr 2005 19:26:22 +0530 x-mimeole: Produced By Microsoft Exchange V6.5.6944.0 Content-class: urn:content-classes:message MIME-Version: 1.0 Date: Tue, 5 Apr 2005 19:28:02 +0530 Message-ID: Thread-Topic: doubts about IKEv2 implementation Thread-Index: AcU553uwqd1f/s/VQICX+aTqZs+V+w== From: "Soumya Sen" To: X-Spam-Score: 0.5 (/) X-Scan-Signature: 2b428fb4265163ba7f2ac2af0ebfcf00 Subject: [Ipsec] doubts about IKEv2 implementation X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============0820247764==" Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org This is a multi-part message in MIME format. --===============0820247764== Content-class: urn:content-classes:message Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C539E7.7B9E4388" This is a multi-part message in MIME format. ------_=_NextPart_001_01C539E7.7B9E4388 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hello, =0D I am a senior undergraduate student, presently undergoing industrial project training. I am trying to understand the IKEv2 protocol and went through the draft. However, I got certain doubts and interpreted certain things in my own way, but I am not sure whether the understanding is correct or flawed. I will be very grateful if you kindly take out some time to clear the doubts that I have listed below. Please explain the relevant concepts if my interpretation is wrong. Thanking you very much in advance, Best regards,=0D Soumya Sen. India. =0D =0D NOTE: Here the SA payload contents have been shown in "(...)" and the contents are separated by ";", while the payloads are separated by "," and proposal structures are separated by "[" or "]". =0D IKE_INIT_SA request: HDR("A",0), SAi1([proposal#1; protocol ID:1 (for IKE); SPI size:0; ..., ], [proposal #2; protocol ID:1; SPI size:0; ..., ]), KEi, Ni. =0D Let the IKE is assigned the SPI of value "A" from the sender's side. Let us assume only two proposals were made initially. No SPI field is present within the proposal substructures.=0D =0D IKE_INIT_SA response: HDR("A", "B"), SAr1([proposal#1; protocol ID:1; SPI size:0; ...; <1 transforms chosen from each transform type requested >]), KEr, Nr. =0D Proposal number 1 was chosen and one transform of each transform type under that proposal is returned. No SPI field is present within the proposal substructures.=0D =0D Q1: Am I correct to believe that *always* in the response *only one* chosen proposal is present i.e. the chosen proposal mentioning one transforms of each transform type required?=0D =0D Q2: In the case, that the responder chooses a proposal that had the proposal number #3, will the Proposal number mentioned in the responder's SA payload be 3(i.e. mention the chosen proposal number) or mentions the proposal no. as #1 always (*because only one proposal can be selected*). =0D IKE_AUTH request: HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,],AUTH, SAi2([proposal#1; protocol ID:2 (for AH); SPI size:4; ...,SPI value: "C"; ], [proposal #2; protocol ID:3 (for ESP); SPI size:4; ...,SPI value: "D"; ]), TSi, TSr} =0D SPIs for the SAs are proposed in the SPI fields in the Proposal Substructure. The initiator chooses the SPI values of "C" and "D" for the two proposals.=0D Q3: Is it that the values chosen for "C" and "D" *must* be different always?=0D =0D Q4: In the case where we want to propose that both AH and ESP are to be used for the traffic stream, we mark both the proposals as #1. In this case will the SPI value mentioned in the proposal substructure be different for the two proposals even though the Proposal no. is 1 for both the substructure?=0D =0D =0D IKE_AUTH response: HDR, SK {IDr, [CERT,] AUTH, SAr2([proposal#1; protocol ID:2 (for AH); SPI size:4; ...,SPI value: "E"; <1 transforms chosen from each transform type requested>]), TSi, TSr} =0D Proposal no.1 was chosen, the SPI value associated by the responder is "E" for this SA chosen from the offered set of SAs. =0D =0D Q5: Am I correct to believe that the SPI value chosen by the responder for the chosen proposal is randomly chosen to be "E". Can it also happen to choose the same value "C"?=0D =0D Q6: Am I correct to believe that the values chosen for this SA (here "C" on sender's side and "E" on receiver's side) are different and two distinct SA are existing in the two directions with *same* keys and *same* agreed upon set of algorithms?=0D =0D Q7: To REKEY this SA, will the sender send a CREATE_CHILD_SA request mentioning the SPI value as "E"(its inbound value) in the 'N' payload and the if successful both of them delete the SA corresponding to "C" on sender's side and "E" on responder's side?=0D =0D Q8: This CHILD created from the initial exchange may follow the protocol types of ESP, AH, both ESP & AH etc. But they can never support the option for a DH group transform type in the proposal since no KE payload can be sent along with the AUTH exchange messages.=0D So Perfect forward secrecy(PSF) cannot be supported in this child created through initial exchange? =0D Q9: While "Rekeying" it is being said that the CHILD_SA creates an equivalent SA to the one to be replaced. Does it mean that in the SA payload we send the *only* the same proposal which is the *presently existing* suite for the SA?=0D =0D Q10: Am I correct to think that the outer header(HDR) in the CREATE_CHILD_SA has the SPIs corresponding to the parent IKE? =0D Q11: When we Rekey an existing IKE_SA, in the CREATE_CHILD_SA do we need to mark the protocol ID as 3 (corresponding to IKE protocol value)? If we are creating an IKE then there should be no SPI value field mentioned in the SA structure, but again it is said that "the new initiator and responder SPIs are supplied in the SPI fields in the Proposal structure in the SA payload". I am getting confused here. Does it mean that the SA that is being created to rplace the parent IKE by using CREATE_CHILD_SA has to be AH or ESP and not an IKE protocol?=0D =0D =0D I will be glad to have your response to my doubts. Thanking you in advance, Soumya. =0D =0D =0D ***************************************************************************= ***************************************************************************= **** This email message is for the sole use of the intended recipient(s)and may= contain CONFIDENTIAL and PRIVILEGED information. LG Soft India will not be responsible for any viruses or defects or any= forwarded attachments emanating either from within=0D LG Soft India or outside. Any unauthorized review, use, disclosure or= distribution is prohibited. If you are not the intended=0D recipient, please contact the sender By reply email and destroy all copies= of the original message. ***************************************************************************= ***************************************************************************= **** ------_=_NextPart_001_01C539E7.7B9E4388 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hello,

 

I am a senior undergraduate student, presently undergoing= industrial project training. I am trying to understand the IKEv2 protocol and went= through the draft. However, I got certain doubts and interpreted certain things in= my own way, but I am not sure whether the understanding is correct or flawed.= I will be very grateful if you kindly take out some time to clear the doubts= that I have listed below. Please explain the relevant concepts if my= interpretation is wrong. Thanking you very much in advance,

Best regards,

Soumya Sen.

India<= font size=3D2>.

 

 

NOTE: Here the SA payload contents have been shown in “(…)” and the contents are separated by “;”, while the payloads are separated by “,” and proposal structures= are separated by “[“ or= “]”.

 

IKE_INIT_SA= request:

HDR(“A”,0), SAi1([proposal#1; protocol ID:1 (for IKE);= SPI size:0; …, <transforms>], [proposal #2; protocol ID:1; SPI= size:0; …, <transforms>]), KEi, Ni.

 

Let the IKE is assigned the SPI of value “A” from the sender’s side. Let us assume only two proposals were made initially.= No SPI field is present within the proposal substructures.=

 

IKE_INIT_SA= response:

HDR(“A”, “B”), SAr1([proposal#1; protocol= ID:1; SPI size:0; …; <1 transforms chosen from each transform type= requested >]), KEr, Nr.

 

Proposal number 1 was chosen and one transform of each transform= type under that proposal is returned. No SPI field is present within the= proposal substructures.

 

Q1: Am I correct to believe that *always* in the response *only= one* chosen proposal is present i.e. the chosen proposal mentioning one= transforms of each transform type required?

 

Q2: In the case, that the responder chooses a proposal that had the proposal number #3, will the Proposal number mentioned in the= responder’s SA payload be 3(i.e. mention the chosen proposal number) or mentions the proposal no. as #1 always (*because only one proposal can be= selected*).

 

IKE_AUTH=
 request:
HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,],AUTH, SAi2([proposal#1;=
 protocol ID:2 (for AH); SPI size:4; …,SPI value: “C”;=
 <transforms>], [proposal #2; protocol ID:3 (for ESP); SPI size:4;=
 …,SPI value: “D”; <transforms>]), TSi,=
 TSr}
 
SPIs for the SAs are=
 proposed in the SPI fields in the Proposal Substructure. The initiator=
 chooses the SPI values of “C” and “D” for the two=
 proposals. 
Q3: Is it that the=
 values chosen for “C” and “D” *must* be different=
 always? 
 
Q4: In the case where=
 we want to propose that both AH and ESP are to be used for the traffic=
 stream, we mark both the proposals as #1. In this case will the SPI value=
 mentioned in the proposal substructure be different for the two proposals=
 even though the Proposal no. is 1 for both the substructure?=
 
 

 

IKE_AUTH=
 response:
HDR, SK {IDr, [CERT,] AUTH, SAr2([proposal#1; protocol ID:2 (for AH);=
 SPI size:4; …,SPI value: “E”; <1 transforms chosen=
 from each transform type requested>]), TSi,=
 TSr}
 
Proposal no.1 was=
 chosen, the SPI value associated by the responder is “E” for=
 this SA chosen from the offered set of SAs.=
  
 
Q5: Am I correct to=
 believe that the SPI value chosen by the responder for the chosen proposal=
 is randomly chosen to be “E”. Can it also happen to choose the=
 same value “C”? 
 
Q6: Am I correct to=
 believe that the values chosen for this SA (here “C” on=
 sender’s side and “E” on receiver’s side) are=
 different and two distinct SA are existing in the two directions with=
 *same* keys and *same* agreed upon set of algorithms?=
 
 
Q7: To REKEY this SA,=
 will the sender send a CREATE_CHILD_SA request mentioning the SPI value as=
 “E”(its inbound value) in the ‘N’ payload and the=
 if successful both of them delete the SA corresponding to “C”=
 on sender’s side and “E” on responder’s side?=
 
 
Q8: This CHILD created=
 from the initial exchange may follow the protocol types of ESP, AH, both=
 ESP & AH etc. But they can never support the option for a DH group=
 transform type in the proposal since no KE payload can be sent along with=
 the AUTH exchange messages. 
So Perfect forward=
 secrecy(PSF) cannot be supported in this child created through initial=
 exchange?
 
Q9: While=
 “Rekeying” it is being said that the CHILD_SA creates an=
 equivalent SA to the one to be replaced. Does it mean that in the SA=
 payload we send the *only* the same proposal which is the *presently=
 existing* suite for the SA? 
 
Q10: Am I correct to=
 think that the outer header(HDR) in the CREATE_CHILD_SA has the SPIs=
 corresponding to the parent IKE?
 
Q11: When we Rekey an=
 existing IKE_SA, in the CREATE_CHILD_SA do we need to mark the protocol ID=
 as 3 (corresponding to IKE protocol value)? If we are creating an IKE then=
 there should be no SPI value field mentioned in the SA structure, but=
 again it is said that “the new initiator and responder SPIs are=
 supplied in the SPI fields in the Proposal structure in the SA=
 payload”. I am getting confused here. Does it mean that the SA that=
 is being created to rplace the parent IKE by using CREATE_CHILD_SA has to=
 be AH or ESP and not an IKE protocol? 

 

 

I will be glad to have your response to my= doubts.

Thanking you in advance,

Soumya.

 

 

 

****************************************************************= ***************************************************************************= ***************

This email message is for the sole use of the= intended recipient(s)and may contain CONFIDENTIAL and PRIVILEGED= information.
LG Soft India will not be responsible for any viruses or= defects or any forwarded attachments emanating either from within
LG= Soft India or outside. Any unauthorized review, use, disclosure or= distribution is prohibited. If you are not the intended
recipient,= please contact the sender By reply email and destroy all copies of the= original= message.

**********************************************************= ***************************************************************************= *********************
------_=_NextPart_001_01C539E7.7B9E4388-- --===============0820247764== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline Content-Transfer-Encoding: 7bit _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec --===============0820247764==-- From ipsec-bounces@ietf.org Tue Apr 5 20:56:50 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA06855 for ; Tue, 5 Apr 2005 20:56:50 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DIypR-0005rU-Lm; Tue, 05 Apr 2005 20:55:33 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DIypP-0005rN-CJ for ipsec@megatron.ietf.org; Tue, 05 Apr 2005 20:55:31 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA06747 for ; Tue, 5 Apr 2005 20:55:29 -0400 (EDT) Received: from mail1.microsoft.com ([131.107.3.125]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DIyxb-0006ES-Uf for ipsec@ietf.org; Tue, 05 Apr 2005 21:04:03 -0400 Received: from mailout2.microsoft.com ([157.54.1.120]) by mail1.microsoft.com with Microsoft SMTPSVC(6.0.3790.1802); Tue, 5 Apr 2005 17:55:16 -0700 Received: from RED-MSG-51.redmond.corp.microsoft.com ([157.54.12.11]) by mailout2.microsoft.com with Microsoft SMTPSVC(6.0.3790.1824); Tue, 5 Apr 2005 17:55:17 -0700 X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0 Content-class: urn:content-classes:message MIME-Version: 1.0 Subject: RE: [Ipsec] doubts about IKEv2 implementation Date: Tue, 5 Apr 2005 17:55:17 -0700 Message-ID: Thread-Topic: RE: [Ipsec] doubts about IKEv2 implementation thread-index: AcU5257WT/ttHH7YRciiy/YnXZqKaQAJ1+SQAA/xiaA= From: "Charlie Kaufman" To: X-OriginalArrivalTime: 06 Apr 2005 00:55:17.0729 (UTC) FILETIME=[4CE60510:01C53A43] X-Spam-Score: 1.7 (+) X-Scan-Signature: 9a0a5b57b7540919633bb8f7cd3cb4bd X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============1043468027==" Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org This is a multi-part message in MIME format. --===============1043468027== Content-class: urn:content-classes:message Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C53A43.48DBCDE6" This is a multi-part message in MIME format. ------_=_NextPart_001_01C53A43.48DBCDE6 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable I got this same question privately, and responded (see below). I'm forwarding this to the list to make sure no one else takes the time to respond. (Unless of course they have a different answer, in which case that should be on the list too!). =20 --Charlie =20 ________________________________ From: Charlie Kaufman=20 Sent: Tuesday, April 05, 2005 5:48 PM To: 'Soumya Sen' Subject: RE: doubts about the IKEv2 implementation =20 I've embedded comments below... Charlie =20 ________________________________ From: Soumya Sen [mailto:soumya.sen@lgsoftindia.com]=20 Sent: Tuesday, April 05, 2005 5:33 AM To: Charlie Kaufman Subject: doubts about the IKEv2 implementation =20 Dear Sir, =20 I am a senior undergraduate student, presently undergoing industrial project training. I am trying to understand the IKEv2 protocol and went through the draft. However, I got certain doubts and interpreted certain things in my own way, but I am not sure whether the understanding is correct or flawed. I will be very grateful if you kindly take out some time to clear the doubts that I have listed below. Please explain the relevant concepts if my interpretation is wrong. Thanking you very much in advance, Best regards,=20 Soumya Sen. India. =20 =20 NOTE: Here the SA payload contents have been shown in "(...)" and the contents are separated by ";", while the payloads are separated by "," and proposal structures are separated by "[" or "]". =20 IKE_INIT_SA request: HDR("A",0), SAi1([proposal#1; protocol ID:1 (for IKE); SPI size:0; ..., ], [proposal #2; protocol ID:1; SPI size:0; ..., ]), KEi, Ni. =20 Let the IKE is assigned the SPI of value "A" from the sender's side. Let us assume only two proposals were made initially. No SPI field is present within the proposal substructures.=20 =20 IKE_INIT_SA response: HDR("A", "B"), SAr1([proposal#1; protocol ID:1; SPI size:0; ...; <1 transforms chosen from each transform type requested >]), KEr, Nr. =20 Proposal number 1 was chosen and one transform of each transform type under that proposal is returned. No SPI field is present within the proposal substructures.=20 =20 Q1: Am I correct to believe that *always* in the response *only one* chosen proposal is present i.e. the chosen proposal mentioning one transforms of each transform type required?=20 > Yes. =20 Q2: In the case, that the responder chooses a proposal that had the proposal number #3, will the Proposal number mentioned in the responder's SA payload be 3(i.e. mention the chosen proposal number) or mentions the proposal no. as #1 always (*because only one proposal can be selected*). > In your example, the responder's SA proposal number would be 3. It is used to help the initiator > figure out which of his proposals was accepted. IKE_AUTH request: HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,],AUTH, SAi2([proposal#1; protocol ID:2 (for AH); SPI size:4; ...,SPI value: "C"; ], [proposal #2; protocol ID:3 (for ESP); SPI size:4; ...,SPI value: "D"; ]), TSi, TSr} =20 SPIs for the SAs are proposed in the SPI fields in the Proposal Substructure. The initiator chooses the SPI values of "C" and "D" for the two proposals.=20 Q3: Is it that the values chosen for "C" and "D" *must* be different always?=20 > No. I would expect that in most cases C and D would not be different. > The purpose of this SPI is to allow the initiator to identify the SA in the > processing of incoming ESP or AH packets, so if the initiator sets up > multiple SAs to the same IP address it would need for the SPIs to be > different. In expected implementations, a node would use different SPIs > for each of its open SAs even to different IP addresses. The only time > the initiator would put different SPIs in proposals for the same SA would > be if it wanted to use different SPIs depending on which of the proposals > the responder accepted. =20 Q4: In the case where we want to propose that both AH and ESP are to be used for the traffic stream, we mark both the proposals as #1. In this case will the SPI value mentioned in the proposal substructure be different for the two proposals even though the Proposal no. is 1 for both the substructure?=20 > Probably. When using both ESP and AH, the data packets have an ESP header > encapsulated in the AH data, so there are two SPIs. I would expect these two > SPIs would be different, though IKEv2 does not require that they be. =20 IKE_AUTH response: HDR, SK {IDr, [CERT,] AUTH, SAr2([proposal#1; protocol ID:2 (for AH); SPI size:4; ...,SPI value: "E"; <1 transforms chosen from each transform type requested>]), TSi, TSr} =20 Proposal no.1 was chosen, the SPI value associated by the responder is "E" for this SA chosen from the offered set of SAs. =20 =20 Q5: Am I correct to believe that the SPI value chosen by the responder for the chosen proposal is randomly chosen to be "E". Can it also happen to choose the same value "C"?=20 > The responder may choose E randomly or may choose it to index > some table in the responder's memory. E could be the same as C. =20 Q6: Am I correct to believe that the values chosen for this SA (here "C" on sender's side and "E" on receiver's side) are different and two distinct SA are existing in the two directions with *same* keys and *same* agreed upon set of algorithms?=20 > Almost. The specification is awkward because ESP and AH insist on considering > the two directions of communication to be separate SAs, but the IKE SA is > bidirectional. So IKEv2 always creates and deletes ESP and AH SAs in pairs, > and I would expect implementations to treat them as a single entity, but the > spec has to say that they are separate SAs. The algorithms must be the same > in both directions, but the keys are different. The keys for both directions are > derived from a common base key as specified in the spec. Q7: To REKEY this SA, will the sender send a CREATE_CHILD_SA request mentioning the SPI value as "E"(its inbound value) in the 'N' payload and the if successful both of them delete the SA corresponding to "C" on sender's side and "E" on responder's side? > Yes, except that technically it's a pair of SAs being rekeyed, so your sentence > should say "...deleted the SAs corresponding...". =20 =20 Q8: This CHILD created from the initial exchange may follow the protocol types of ESP, AH, both ESP & AH etc. But they can never support the option for a DH group transform type in the proposal since no KE payload can be sent along with the AUTH exchange messages.=20 So Perfect forward secrecy(PSF) cannot be supported in this child created through initial exchange? > Perfect forward secrecy comes from forgetting the DH private key (and SK_d) no later > than when the child SA is closed. To get PFS for the initial pair of child SAs, it is > necessary to first rekey the IKE SA, forget the keying material associated with it, > and then rekey the child SA. By design, PFS does not require an additional DH > exchange, though it is allowed because some crypto people don't believe it. =20 Q9: While "Rekeying" it is being said that the CHILD_SA creates an equivalent SA to the one to be replaced. Does it mean that in the SA payload we send the *only* the same proposal which is the *presently existing* suite for the SA? > People have debated what the phrase means. What you describe is the normal case. > Some people read the spec as saying that you can't change cryptographic algorithms > or traffic selectors, while others think you can. This may be clarified in a future > revision of the spec. A conservative implementation would only propose the > presently existing suite but would accept changes if requested from the other side > (because then they would interoperate with anyone). =20 =20 Q10: Am I correct to think that the outer header(HDR) in the CREATE_CHILD_SA has the SPIs corresponding to the parent IKE? > Yes. All IKE messages have the SPIs corresponding to the outer IKE. =20 Q11: When we Rekey an existing IKE_SA, in the CREATE_CHILD_SA do we need to mark the protocol ID as 3 (corresponding to IKE protocol value)? If we are creating an IKE then there should be no SPI value field mentioned in the SA structure, but again it is said that "the new initiator and responder SPIs are supplied in the SPI fields in the Proposal structure in the SA payload". I am getting confused here. Does it mean that the SA that is being created to rplace the parent IKE by using CREATE_CHILD_SA has to be AH or ESP and not an IKE protocol?=20 > In the initial exchange setting up an IKE_SA, the proposals contain no SPIs > because the SPIs implicitly are the values in the header of the messages > negotiating the IKE_SA. When a new IKE_SA is created within a > CREATE_CHILD_SA exchange, the eight byte SPIs are included in the > SA payloads. The new SPIs will be used in messages that are cryptographically > protected with the new keys (so an implementation can know which key to use > by looking at the SPI). =20 =20 I will be glad to have your response to my doubts. Thanking you in advance, Soumya. =20 ************************************************************************ ************************************************************************ ********** This email message is for the sole use of the intended recipient(s)and may contain CONFIDENTIAL and PRIVILEGED information. LG Soft India will not be responsible for any viruses or defects or any forwarded attachments emanating either from within=20 LG Soft India or outside. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended=20 recipient, please contact the sender By reply email and destroy all copies of the original message. ************************************************************************ ************************************************************************ ********** =09 ------_=_NextPart_001_01C53A43.48DBCDE6 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

I got this same question privately, = and responded (see below). I’m forwarding this to the list to make = sure no one else takes the time to respond. (Unless of course they have a = different answer, in which case that should be on the list = too!).

 

      =       --Charlie

 


From: = Charlie Kaufman
Sent: Tuesday, April 05, = 2005 5:48 PM
To: 'Soumya Sen'
Subject: RE: doubts about = the IKEv2 implementation

 

I’ve embedded comments = below… Charlie

 


From: = Soumya Sen [mailto:soumya.sen@lgsoftindia.com]
Sent: Tuesday, April 05, = 2005 5:33 AM
To: Charlie Kaufman
Subject: doubts about the = IKEv2 implementation

 

Dear Sir,

 

I am a senior undergraduate student, presently undergoing = industrial project training. I am trying to understand the IKEv2 protocol and went = through the draft. However, I got certain doubts and interpreted certain things = in my own way, but I am not sure whether the understanding is correct or = flawed. I will be very grateful if you kindly take out some time to clear the = doubts that I have listed below. Please explain the relevant concepts if my = interpretation is wrong. Thanking you very much in advance,

Best regards,

Soumya Sen.

India.

 

 

NOTE: Here the SA payload contents have been shown in “(…)” and the contents are separated by = “;”, while the payloads are separated by “,” and proposal = structures are separated by “[“ or “]”.

 

IKE_INIT_SA request:

HDR(“A”,0), SAi1([proposal#1; protocol ID:1 (for = IKE); SPI size:0; …, <transforms>], [proposal #2; protocol ID:1; SPI = size:0; …, <transforms>]), KEi, Ni.

 

Let the IKE is assigned the SPI of value “A” from = the sender’s side. Let us assume only two proposals were made initially. No SPI field = is present within the proposal substructures.

 

IKE_INIT_SA response:

HDR(“A”, “B”), SAr1([proposal#1; = protocol ID:1; SPI size:0; …; <1 transforms chosen from each transform type = requested >]), KEr, Nr.

 

Proposal number 1 was chosen and one transform of each transform = type under that proposal is returned. No SPI field is present within the = proposal substructures.

 

Q1: Am I correct to believe that *always* in the response *only = one* chosen proposal is present i.e. the chosen proposal mentioning one = transforms of each transform type required?

> Yes.

 

Q2: In the case, that the responder chooses a proposal that had = the proposal number #3, will the Proposal number mentioned in the = responder’s SA payload be 3(i.e. mention the chosen proposal number) or mentions the proposal no. as #1 always (*because only one proposal can be = selected*).

> In your example, the = responder’s SA proposal number would be 3. It is used to help the = initiator

> figure out which of his = proposals was accepted.

IKE_AUTH =
request:
HDR, =
SK {IDi, [CERT,] [CERTREQ,] [IDr,],AUTH, =
SAi2([proposal#1; protocol ID:2 (for AH); SPI size:4; …,SPI value: =
“C”; <transforms>], [proposal #2; protocol ID:3 (for =
ESP); SPI size:4; …,SPI value: “D”; =
<transforms>]), TSi, TSr}
 
SPIs for the =
SAs are proposed in the SPI fields in the Proposal Substructure. The =
initiator chooses the SPI values of “C” and “D” =
for the two proposals. 
Q3: Is it that =
the values chosen for “C” and “D” *must* be =
different always? 
> No. I would expect that in most cases C and D would not =
be different.
> The purpose of this SPI is to allow the initiator to =
identify the SA in the
> processing of incoming ESP or AH packets, so if the =
initiator sets up
> multiple SAs to the same IP address it would need for =
the SPIs to be
> different. In expected implementations, a node would =
use different SPIs
> for each of its open SAs even to different IP =
addresses. The only time
> the initiator would put different SPIs in proposals for =
the same SA would
> be if it wanted to use different SPIs depending on =
which of the proposals
> the responder accepted.
 
Q4: In the case =
where we want to propose that both AH and ESP are to be used for the =
traffic stream, we mark both the proposals as #1. In this case will the =
SPI value mentioned in the proposal substructure be different for the =
two proposals even though the Proposal no. is 1 for both the =
substructure? 
> Probably. When using both =
ESP and AH, the data packets have an ESP =
header
> encapsulated in the AH =
data, so there are two SPIs. I would expect these =
two
> SPIs would be different, =
though IKEv2 does not require that they be.

 

IKE_AUTH =
response:
HDR, =
SK {IDr, [CERT,] AUTH, SAr2([proposal#1; =
protocol ID:2 (for AH); SPI size:4; …,SPI value: “E”; =
<1 transforms chosen from each transform type requested>]), TSi, =
TSr}
 
Proposal no.1 =
was chosen, the SPI value associated by the responder is “E” =
for this SA chosen from the offered set of SAs. =
 
 
Q5: Am I =
correct to believe that the SPI value chosen by the responder for the =
chosen proposal is randomly chosen to be “E”. Can it also =
happen to choose the same value “C”? =
> The responder may choose =
E randomly or may choose it to index
> some table in the =
responder’s memory. E could be the same as =
C.
 
Q6: Am I =
correct to believe that the values chosen for this SA (here =
“C” on sender’s side and “E” on =
receiver’s side) are different and two distinct SA are existing in =
the two directions with *same* keys and *same* agreed upon set of =
algorithms? 
> Almost. The specification =
is awkward because ESP and AH insist on =
considering
> the two directions of =
communication to be separate SAs, but the IKE SA =
is
> bidirectional. So IKEv2 always creates and deletes ESP =
and AH SAs in pairs,
> and I would expect implementations to treat them as a =
single entity, but the
> spec has to say that they are separate SAs. The =
algorithms must be the same
> in both directions, but the keys are different. The =
keys for both directions are
> derived from a common base key as specified in the =
spec.
Q7: To REKEY =
this SA, will the sender send a CREATE_CHILD_SA request mentioning the =
SPI value as “E”(its inbound value) in the ‘N’ =
payload and the if successful both of them delete the SA corresponding =
to “C” on sender’s side and “E” on =
responder’s side?
> Yes, except that technically it’s a pair of SAs =
being rekeyed, so your sentence
> should say “…deleted the SAs =
corresponding…”.
 =
 
Q8: This CHILD =
created from the initial exchange may follow the protocol types of ESP, =
AH, both ESP & AH etc. But they can never support the option for a =
DH group transform type in the proposal since no KE payload can be sent =
along with the AUTH exchange messages. 
So Perfect =
forward secrecy(PSF) cannot be supported in this child created through =
initial exchange?
> Perfect forward secrecy comes from forgetting the DH =
private key (and SK_d) no later
> than when the child SA is closed. To get PFS for the =
initial pair of child SAs, it is
> necessary to first rekey the IKE SA, forget the keying =
material associated with it,
> and then rekey the child SA. By design, PFS does not =
require an additional DH
> exchange, though it is allowed because some crypto =
people don’t believe it.
 
Q9: While =
“Rekeying” it is being said that the CHILD_SA creates an =
equivalent SA to the one to be replaced. Does it mean that in the SA =
payload we send the *only* the same proposal which is the *presently =
existing* suite for the SA?
> People have debated what the phrase means. What you =
describe is the normal case.
> Some people read the spec as saying that you =
can’t change cryptographic =
algorithms
> or traffic selectors, while others think you can. This =
may be clarified in a future
> revision of the spec. A conservative implementation =
would only propose the
> presently existing suite but would accept changes if =
requested from the other side
> (because then they would interoperate with =
anyone).
 =
 
Q10: Am I =
correct to think that the outer header(HDR) in the CREATE_CHILD_SA has =
the SPIs corresponding to the parent IKE?
> Yes. All IKE messages have the SPIs corresponding to =
the outer IKE.
 
Q11: When we =
Rekey an existing IKE_SA, in the CREATE_CHILD_SA do we need to mark the =
protocol ID as 3 (corresponding to IKE protocol value)? If we are =
creating an IKE then there should be no SPI value field mentioned in the =
SA structure, but again it is said that “the new initiator and =
responder SPIs are supplied in the SPI fields in the Proposal structure =
in the SA payload”. I am getting confused here. Does it mean that =
the SA that is being created to rplace the parent IKE by using =
CREATE_CHILD_SA has to be AH or ESP and not an IKE protocol? =
> In the initial exchange setting up an IKE_SA, the =
proposals contain no SPIs
> because the SPIs implicitly are the values in the =
header of the messages
> negotiating the IKE_SA. When a new IKE_SA is created =
within a
> CREATE_CHILD_SA exchange, the eight byte SPIs are =
included in the
> SA payloads. The new SPIs will be used in messages that =
are cryptographically
> protected with the new keys (so an implementation can =
know which key to use
> by looking at the SPI).

 

 

I will be glad to have your response to my = doubts.

Thanking you in advance,

Soumya.

 

*********************************************************= *************************************************************************= ************************

This email message is for the sole use = of the intended recipient(s)and may contain CONFIDENTIAL and PRIVILEGED = information.
LG Soft India will not be responsible for any viruses or = defects or any forwarded attachments emanating either from within
LG = Soft India or outside. Any unauthorized review, use, disclosure or = distribution is prohibited. If you are not the intended
recipient, = please contact the sender By reply email and destroy all copies of the = original = message.

*********************************************************= *************************************************************************= ************************
------_=_NextPart_001_01C53A43.48DBCDE6-- --===============1043468027== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline Content-Transfer-Encoding: 7bit _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec --===============1043468027==-- From ipsec-bounces@ietf.org Wed Apr 6 05:36:51 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA19586 for ; Wed, 6 Apr 2005 05:36:51 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJ6wa-0005kt-Ov; Wed, 06 Apr 2005 05:35:28 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJ6wZ-0005ko-4w for ipsec@megatron.ietf.org; Wed, 06 Apr 2005 05:35:27 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA19503 for ; Wed, 6 Apr 2005 05:35:24 -0400 (EDT) Received: from aragorn.bbn.com ([128.33.0.62]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJ74t-0006fl-C7 for ipsec@ietf.org; Wed, 06 Apr 2005 05:44:03 -0400 Received: from [192.168.50.62] (ramblo.bbn.com [128.33.0.51]) by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j369ZDvF024519; Wed, 6 Apr 2005 05:35:15 -0400 (EDT) Mime-Version: 1.0 Message-Id: In-Reply-To: <015701c5371b$f3885510$4205010a@subha> References: <00e801c536f8$531e4850$4205010a@subha> <015701c5371b$f3885510$4205010a@subha> Date: Wed, 6 Apr 2005 04:44:52 -0400 To: "Subha" From: Stephen Kent Subject: Re: [Ipsec] Number of SPD Policies X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41 X-Virus-Status: Clean X-Spam-Score: 0.8 (/) X-Scan-Signature: 287c806b254c6353fcb09ee0e53bbc5e Cc: ipsec@ietf.org X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============1807409259==" Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org --===============1807409259== Content-Type: multipart/alternative; boundary="============_-1099342371==_ma============" --============_-1099342371==_ma============ Content-Type: text/plain; charset="us-ascii" ; format="flowed" At 4:35 PM -0800 4/1/05, Subha wrote: >Hi Steve, > >I have some follow-up questions. > >In the following questions I have assumed that 3 IPsec Protocols >shall be applied >on a given traffic stream. > >1) When IKEv2 is used with RFC2401 compliant implementation, can a >single IKEv2 >CREATE_CHILD_SA negotiate IPcomp, ESP and AH SAs for the given traffic >selector? yes, but as Tero noted, it would be a mistake, in general, to use IKEv2 with 2401. >2) When IKEv2 is used with RFC2401-bis compliant implementation, there has to >be theee IKEv2 CREATE_CHILD_SA Exchanges. > >(1) Plain Traffic selectors for IPcomp SA >(2) Same Source IP, Destination IP and IPComp for Protocol - >Traffic Selectors for ESP SA >(3) Tunnel Outer Header Source IP, Tunnel Outer Header Destination >IP and Protocol=ESP > for AH SA. yes, one needs to negotiate all three, if you did all three. Again, there seems to be very little motivation for using BOTH AH and ESP, vs. just using ESP with an appropriate integrity algorithm. > 3) An implementation needs to know through some other means, >whether the peer supports RFC2401 or 2401-bis. I would generally expect an implementation that supports IKEv2 to implement 2401-bis, given certain defaults adopted by IKEv2, e.g., ESN for AH or ESP. Steve --============_-1099342371==_ma============ Content-Type: text/html; charset="us-ascii" Re: [Ipsec] Number of SPD Policies
At 4:35 PM -0800 4/1/05, Subha wrote:
Hi  Steve,
 
I have some follow-up questions.
 
In the following questions I have assumed that 3 IPsec Protocols shall be applied
on a given traffic stream.
 
1) When IKEv2 is used with RFC2401 compliant implementation, can a single IKEv2
CREATE_CHILD_SA negotiate IPcomp, ESP and AH SAs for the given traffic
selector?

yes, but as Tero noted, it would be a mistake, in general, to use IKEv2 with 2401.

2) When IKEv2 is used with RFC2401-bis compliant implementation, there has to
be theee IKEv2 CREATE_CHILD_SA Exchanges.
 
(1) Plain Traffic selectors for IPcomp SA
(2) Same Source IP, Destination IP and IPComp for Protocol  - Traffic Selectors for ESP SA
(3) Tunnel Outer Header Source IP, Tunnel Outer Header Destination IP and Protocol=ESP
 for AH SA.

yes, one needs to negotiate all three, if you did all three. Again, there seems to be very little motivation for using BOTH AH and ESP, vs. just using ESP with an appropriate integrity algorithm.

 3) An implementation needs to know through some other means,
whether the peer supports RFC2401 or 2401-bis.

I would generally expect an implementation that supports IKEv2 to implement 2401-bis, given certain defaults adopted by IKEv2, e.g., ESN for AH or ESP.

Steve
--============_-1099342371==_ma============-- --===============1807409259== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline Content-Transfer-Encoding: 7bit _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec --===============1807409259==-- From ipsec-bounces@ietf.org Wed Apr 6 08:42:43 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA07130 for ; Wed, 6 Apr 2005 08:42:36 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJ9nH-0000pT-S6; Wed, 06 Apr 2005 08:38:03 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJ9nG-0000p7-98 for ipsec@megatron.ietf.org; Wed, 06 Apr 2005 08:38:02 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA06712 for ; Wed, 6 Apr 2005 08:38:00 -0400 (EDT) Received: from aragorn.bbn.com ([128.33.0.62]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJ9va-000673-JS for ipsec@ietf.org; Wed, 06 Apr 2005 08:46:39 -0400 Received: from [192.168.50.62] (ramblo.bbn.com [128.33.0.51]) by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j36CblvF029790; Wed, 6 Apr 2005 08:37:49 -0400 (EDT) Mime-Version: 1.0 Message-Id: In-Reply-To: <5.1.0.14.0.20050405190205.02bb8b48@172.16.1.10> References: <5.1.0.14.0.20050405190205.02bb8b48@172.16.1.10> Date: Wed, 6 Apr 2005 08:25:35 -0400 To: Tatineni SriRama Kumar From: Stephen Kent Subject: Re: [Ipsec] Blocking traffic using opaque Content-Type: text/plain; charset="us-ascii" ; format="flowed" X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41 X-Virus-Status: Clean X-Spam-Score: 0.0 (/) X-Scan-Signature: 0bc60ec82efc80c84b8d02f4b0e4de22 Cc: ipsec@ietf.org X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org At 7:08 PM +0530 4/5/05, Tatineni SriRama Kumar wrote: >Hi All, > As per point C and D in section 4.4.1.3 of 2401bis, traffic will >be passed in only one direction. Based on this I have following >questions. > >1. How configuration specified in point B of same section allows >traffic in both directions. Item B in 4.4.1.3 addresses the case where there is only 1 selector corresponding to the port field. Te use of OPAQUE here is just a convention for IKE negotiation re such protocols. This does not affect the S/D address aspect of SPD entry symmetry. So, an entry of the sort described in B enables bidirectional traffic flows for a protocol such as the Mobility Header, IF there are corresponding SPD entries at each end. >2. If configuration specified in points B,C and D allows traffic in >one direction only, what should be the configuration to allow >traffic in both directions. Items C + D in 4.4.1.3 explicitly are intended to NOT allow bidirectional traffic flow for a protocol that is NOT bidirectional, so your question is not meaningful in these cases. If you did not use the conventions described here, then bidirectional flows will be enabled, by default. Steve _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Wed Apr 6 10:58:34 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA20159 for ; Wed, 6 Apr 2005 10:58:34 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJBxu-0007kn-BG; Wed, 06 Apr 2005 10:57:10 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJBxs-0007kd-Rq for ipsec@megatron.ietf.org; Wed, 06 Apr 2005 10:57:09 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA20013 for ; Wed, 6 Apr 2005 10:57:06 -0400 (EDT) Received: from thunk.org ([69.25.196.29] helo=thunker.thunk.org) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJC6D-0001sY-LZ for ipsec@ietf.org; Wed, 06 Apr 2005 11:05:47 -0400 Received: from root (helo=thunk.org) by thunker.thunk.org with local-esmtp (Exim 3.35 #1 (Debian)) id 1DJBxk-0005ql-00; Wed, 06 Apr 2005 10:57:00 -0400 Received: from tytso by thunk.org with local (Exim 4.50) id 1DJBxj-0005GM-Gb; Wed, 06 Apr 2005 10:56:59 -0400 Date: Wed, 6 Apr 2005 10:56:59 -0400 From: "Theodore Ts'o" To: Russ Housley Message-ID: <20050406145659.GA20093@thunk.org> References: <6.2.0.14.2.20050315100106.0624c8e0@mail.binhost.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <6.2.0.14.2.20050315100106.0624c8e0@mail.binhost.com> User-Agent: Mutt/1.5.8i X-Spam-Score: 0.0 (/) X-Scan-Signature: 6e922792024732fb1bb6f346e63517e4 Cc: ipsec@ietf.org, Charlie Kaufman , Barbara Fraser Subject: [Ipsec] Re: Results of straw poll regarding: IKEv2 interoperability issue X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Hi Russ, My apologies for not getting back to you earlier. A combination of killer travel commitments, fairly nasty bouts of the flu (for both Barbara and myself, at different times), and the desire to touch base with all of the members of the ipsec wg management team slowed down my response. We agree that the relatively few number of people who responded to the straw poll was certainly not ideal. However, it is it is true the number of people who have been actively participating in the ipsec has been declining over time, and the people who responded were people who have had a history of participating in the ipsec working group. So we feel that we should consider the approach of changing IKEv2 to make transform type 5 (extended sequence number) working group consensus. As far as the technical aspect of the decision, the fact that many people at the interop meeting failed to achieve interoperability simply by reading the document troubles us, and trying to fix this in a clarification document that will be published separately, and later, seems to be simply asking for interoperability problems. Changing transform type 5 to be mandatory does not require a significant change to the document, nor to existing implementations that have already implemented extended sequence numbers. Furthermore, requiring implementations to support ESN does not appear to be overly burdensome. - Ted On Tue, Mar 15, 2005 at 10:13:27AM -0500, Russ Housley wrote: > Ted: > > The fact that so few people responded to the straw poll causes alarm. The > issue was raised at a bake-off, and some of the implementations represented > at the bake-off are not represented in the straw poll responses. > > I have a question: Do you believe that this response represents WG > consensus? If so, then please prepare an RFC Editor note that describes > the change that needs to be made, send it to me, and I will work with the > IESG to get it approved. If not, then we should not make any changes. > > The WG chairs must judge consensus. In this case, it is a subjective > decision, and you may want to consult with WG participants that did not > respond to the straw poll to figure it out. At least one person that was > at the bake-off has told me that they had come up with a way to achieve > interoperability without making changes. I think Paul Hoffman made a > posting to the mail list about that approach half way through the straw > poll. This is just one more dimension of your consensus decision. > > Russ > > > At 07:50 PM 3/14/2005, Theodore Ts'o wrote: > > >Two weeks ago, there was a discussion about an interoperability problem > >in IKEv2 that was turned up during interoperability testing. A week > >ago, I called for a straw poll; based on the fact that the number of > >responses was a little sparse, and last week was the Minneapolis IETF, I > >let the straw poll go on all last week. > > > >The straw poll indicated a majority (although certainly not unanimity) > >preference for proposal C: > > > > PROPOSAL C: > > ----------- > > > > Change the places that says Transform Type 5 is optional to say > > it is mandatory. > > > >This choice unfortunately would require making changes to the IKEv2 RFC > >before it is published, and since it has already been through the IESG > >approval process and almost through the entire RFC editor process, > >presumably we would need to make a new I-D and then take it through most > >of this process all over again --- although hopefully it would take much > >less time the second time around. > > > >Russ, would you comment if there is anything special we need to do at > >this point? Many thanks, > > > > - Ted > > > > > >Proposal A: > > Kevin Li > > Timothy Liu > > > >Proposal C: > > Srinivasa Rao Addepalli > > Geoffrey Huang > > Michael Roe > > Grubmair Peter > > Tero Kivinen > > Geoffrey Huang > > > >Proposal D: > > Paul Hoffman > > Pasi.Eronen@nokia.com > > Yoav Nir > _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Wed Apr 6 11:44:59 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA28167 for ; Wed, 6 Apr 2005 11:44:59 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJCg1-0005AO-FI; Wed, 06 Apr 2005 11:42:45 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJCfz-00055l-9B for ipsec@megatron.ietf.org; Wed, 06 Apr 2005 11:42:43 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA27863 for ; Wed, 6 Apr 2005 11:42:40 -0400 (EDT) Received: from woodstock.binhost.com ([144.202.243.4]) by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DJCoM-0004Fr-Fx for ipsec@ietf.org; Wed, 06 Apr 2005 11:51:23 -0400 Received: (qmail 4120 invoked by uid 0); 6 Apr 2005 15:31:24 -0000 Received: from unknown (HELO Russ-Laptop.vigilsec.com) (138.88.42.55) by woodstock.binhost.com with SMTP; 6 Apr 2005 15:31:24 -0000 Message-Id: <6.2.0.14.2.20050406112358.04690910@mail.binhost.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.0.14 Date: Wed, 06 Apr 2005 11:31:13 -0400 To: "Theodore Ts'o" From: Russ Housley In-Reply-To: <20050406145659.GA20093@thunk.org> References: <6.2.0.14.2.20050315100106.0624c8e0@mail.binhost.com> <20050406145659.GA20093@thunk.org> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed X-Spam-Score: 0.2 (/) X-Scan-Signature: 67c1ea29f88502ef6a32ccec927970f0 Cc: ipsec@ietf.org, Charlie Kaufman , Barbara Fraser Subject: [Ipsec] Re: Results of straw poll regarding: IKEv2 interoperability issue X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Ted: I know about travel schedules, mine has been hectic too. I hope you and Barbara are well. As WG chair, the consensus call is yours to make. If the change is small, I suggest that we do it with an RFC Editor note. First, the content of the note needs to be approved by the WG and then by the IESG. However, we do need to hurry. ESP v3 is now in the RFC Editor queue, and 2401bis only has one open IESG issue. Once 2401bis gets to the RFC Editor queue, the updated document series will be complete. Russ At 10:56 AM 4/6/2005, Theodore Ts'o wrote: >Hi Russ, > >My apologies for not getting back to you earlier. A combination of >killer travel commitments, fairly nasty bouts of the flu (for both >Barbara and myself, at different times), and the desire to touch base >with all of the members of the ipsec wg management team slowed down my >response. > >We agree that the relatively few number of people who responded to the >straw poll was certainly not ideal. However, it is it is true the >number of people who have been actively participating in the ipsec has >been declining over time, and the people who responded were people who >have had a history of participating in the ipsec working group. So we >feel that we should consider the approach of changing IKEv2 to make >transform type 5 (extended sequence number) working group consensus. > >As far as the technical aspect of the decision, the fact that many >people at the interop meeting failed to achieve interoperability >simply by reading the document troubles us, and trying to fix this in >a clarification document that will be published separately, and later, >seems to be simply asking for interoperability problems. > >Changing transform type 5 to be mandatory does not require a >significant change to the document, nor to existing implementations >that have already implemented extended sequence numbers. Furthermore, >requiring implementations to support ESN does not appear to be overly >burdensome. > > - Ted > > >On Tue, Mar 15, 2005 at 10:13:27AM -0500, Russ Housley wrote: > > Ted: > > > > The fact that so few people responded to the straw poll causes alarm. The > > issue was raised at a bake-off, and some of the implementations > represented > > at the bake-off are not represented in the straw poll responses. > > > > I have a question: Do you believe that this response represents WG > > consensus? If so, then please prepare an RFC Editor note that describes > > the change that needs to be made, send it to me, and I will work with the > > IESG to get it approved. If not, then we should not make any changes. > > > > The WG chairs must judge consensus. In this case, it is a subjective > > decision, and you may want to consult with WG participants that did not > > respond to the straw poll to figure it out. At least one person that was > > at the bake-off has told me that they had come up with a way to achieve > > interoperability without making changes. I think Paul Hoffman made a > > posting to the mail list about that approach half way through the straw > > poll. This is just one more dimension of your consensus decision. > > > > Russ > > > > > > At 07:50 PM 3/14/2005, Theodore Ts'o wrote: > > > > >Two weeks ago, there was a discussion about an interoperability problem > > >in IKEv2 that was turned up during interoperability testing. A week > > >ago, I called for a straw poll; based on the fact that the number of > > >responses was a little sparse, and last week was the Minneapolis IETF, I > > >let the straw poll go on all last week. > > > > > >The straw poll indicated a majority (although certainly not unanimity) > > >preference for proposal C: > > > > > > PROPOSAL C: > > > ----------- > > > > > > Change the places that says Transform Type 5 is optional to say > > > it is mandatory. > > > > > >This choice unfortunately would require making changes to the IKEv2 RFC > > >before it is published, and since it has already been through the IESG > > >approval process and almost through the entire RFC editor process, > > >presumably we would need to make a new I-D and then take it through most > > >of this process all over again --- although hopefully it would take much > > >less time the second time around. > > > > > >Russ, would you comment if there is anything special we need to do at > > >this point? Many thanks, > > > > > > - Ted > > > > > > > > >Proposal A: > > > Kevin Li > > > Timothy Liu > > > > > >Proposal C: > > > Srinivasa Rao Addepalli > > > Geoffrey Huang > > > Michael Roe > > > Grubmair Peter > > > Tero Kivinen > > > Geoffrey Huang > > > > > >Proposal D: > > > Paul Hoffman > > > Pasi.Eronen@nokia.com > > > Yoav Nir > > _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Wed Apr 6 13:10:11 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA06322 for ; Wed, 6 Apr 2005 13:10:11 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJE1g-0005eB-Ju; Wed, 06 Apr 2005 13:09:12 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJE1e-0005Zu-RH for ipsec@megatron.ietf.org; Wed, 06 Apr 2005 13:09:10 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA06199 for ; Wed, 6 Apr 2005 13:09:07 -0400 (EDT) Received: from mail2.microsoft.com ([131.107.3.124]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJEA2-0006ar-2n for ipsec@ietf.org; Wed, 06 Apr 2005 13:17:51 -0400 Received: from mailout1.microsoft.com ([157.54.1.117]) by mail2.microsoft.com with Microsoft SMTPSVC(6.0.3790.211); Wed, 6 Apr 2005 10:09:00 -0700 Received: from RED-MSG-51.redmond.corp.microsoft.com ([157.54.12.11]) by mailout1.microsoft.com with Microsoft SMTPSVC(6.0.3790.1824); Wed, 6 Apr 2005 10:09:00 -0700 X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Subject: RE: [Ipsec] doubts about IKEv2 implementation Date: Wed, 6 Apr 2005 10:08:58 -0700 Message-ID: Thread-Topic: [Ipsec] doubts about IKEv2 implementation thread-index: AcU5257WT/ttHH7YRciiy/YnXZqKaQAJ1+SQAA/xiaAAIZlV8A== From: "Charlie Kaufman" To: "Charlie Kaufman" , X-OriginalArrivalTime: 06 Apr 2005 17:09:00.0613 (UTC) FILETIME=[53A6A750:01C53ACB] X-Spam-Score: 0.0 (/) X-Scan-Signature: 39bd8f8cbb76cae18b7e23f7cf6b2b9f Content-Transfer-Encoding: quoted-printable X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: quoted-printable Hilarie Orman pointed out to me that part of my posting was tantalizingly glib (my characterization, not hers). What I said was: > Perfect forward secrecy comes from forgetting the DH private key (and > SK_d) no later > than when the child SA is closed. To get PFS for the initial pair of > child SAs, it is necessary to first rekey the IKE SA, forget the keying > material associated with it, and then rekey the child SA. By design, > PFS does not require an additional DH exchange, though it is allowed > because some crypto people don't believe it. What I meant was that there is disagreement over the exact definition of perfect forward secrecy. IKEv2 key rollover meets some definitions even without additional D-H exchanges, but some people don't believe those definitions are sufficiently constraining. I define PFS as the property that once a session has ended neither endpoint holds any information that would be helpful in decrypting a recorded conversation. The process of rekeying an IKE SA generates new keying material by taking what is effectively a one way hash of the previous keying material (and the previous keying material cannot be derived from any long lived state), so by my definition that exchange provides PFS even without an additional D-H exchange. A tighter definition of PFS is that no information stored on either endpoint before a conversation begins is useful in decrypting a subsequent conversation except by means of a man-in-the-middle attack. The process of rekeying an IKE SA without D-H does not meet that bar. I claim that tighter constraint provides no practical additional security, but this would be a philosophical debate rather than a technical one. --Charlie _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Wed Apr 6 16:51:00 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA03081 for ; Wed, 6 Apr 2005 16:51:00 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJHPG-0002TI-Ey; Wed, 06 Apr 2005 16:45:46 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJHP8-0002T9-Ho for ipsec@megatron.ietf.org; Wed, 06 Apr 2005 16:45:38 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA02612 for ; Wed, 6 Apr 2005 16:45:35 -0400 (EDT) Received: from fmr13.intel.com ([192.55.52.67] helo=fmsfmr001.fm.intel.com) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJHXX-0006LU-A8 for ipsec@ietf.org; Wed, 06 Apr 2005 16:54:20 -0400 Received: from fmsfmr100.fm.intel.com (fmsfmr100.fm.intel.com [10.1.192.58]) by fmsfmr001.fm.intel.com (8.12.10/8.12.10/d: major-outer.mc, v 1.1 2004/09/17 17:50:56 root Exp $) with ESMTP id j36KjRxv022899 for ; Wed, 6 Apr 2005 20:45:27 GMT Received: from fmsmsxvs042.fm.intel.com (fmsmsxvs042.fm.intel.com [132.233.42.128]) by fmsfmr100.fm.intel.com (8.12.10/8.12.10/d: major-inner.mc, v 1.2 2004/09/17 18:05:01 root Exp $) with SMTP id j36KjI2o026962 for ; Wed, 6 Apr 2005 20:45:27 GMT Received: from fmsmsx332.amr.corp.intel.com ([132.233.42.148]) by fmsmsxvs042.fm.intel.com (SAVSMTP 3.1.7.47) with SMTP id M2005040613302530271 for ; Wed, 06 Apr 2005 13:30:25 -0700 Received: from fmsmsx407.amr.corp.intel.com ([132.233.42.217]) by fmsmsx332.amr.corp.intel.com with Microsoft SMTPSVC(6.0.3790.211); Wed, 6 Apr 2005 13:30:25 -0700 X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Date: Wed, 6 Apr 2005 13:30:24 -0700 Message-ID: Thread-Topic: CCM: AAD construction Thread-Index: AcU653YNjZEox9K1QzSLw6pl2tD1FA== From: "Bansal, Yogesh" To: X-OriginalArrivalTime: 06 Apr 2005 20:30:25.0448 (UTC) FILETIME=[76C62280:01C53AE7] X-Scanned-By: MIMEDefang 2.44 X-Spam-Score: 0.0 (/) X-Scan-Signature: f607d15ccc2bc4eaf3ade8ffa8af02a0 Content-Transfer-Encoding: quoted-printable Cc: "Raghunandan, Makaram" Subject: [Ipsec] CCM: AAD construction X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: quoted-printable Group -=20 I have few questions on CCM & it's use in IPSec ESP mode. The questions are related to construction of AAD blocks required for authentication purposes. 1) Construction of AAD blocks in CCM in general RFC 3610 specifies construction of B_0, B_1 blocks=20 The construction of B_0 has been clearly defined. This block is followed by length encoding of "a" followed by "a" itself, as per the following paragraph in the spec: =20 Blocks encoding a are formed by concatenating this string that encodes l(a) with a itself, and splitting the result into 16-octet blocks, and then padding the last block with zeros if necessary. These blocks are appended to the first block B_0. Does this mean the following: B_1 =3D encoding(l(a)) || a || pad (to the next 16 octet block ) Hence, the AAD block stream then consists of=20 B_0 || B_1 || m_0 || m_1 ... || m_n (padding, if required)=20 [Q] Please confirm whether the interpretation of B_1 construction is correct.=20 2) Construction of AAD blocks in IPSec ESP mode=20 Does B_1 definition mean the following in IPSec ESP mode=20 AAD_IPSec =3D SPI || SEQ_Num B_1 =3D encoding (l (AAD_IPSec)) || AAD_IPsec || pad (to the next 16 octet block)=20 [Q] Please confirm construction of B_1 block in IPSec mode is correct. 3) Computing CBC-MAC in CCM Mode With IPsec ESP CCM spec (RFC 3610) implies that authentication is done on the plain text (and not the cipher text).=20 However, IPSec ESP mode states that encryption is done prior to authentication. Does this order change in the draft-ietf-ipsec-ciph-aes-ccm-05.txt, meaning that authentication is done after CTR-encryption? If so, is the CBC-MAC encrypted again.=20 My interpretation is that the order still remains the same as specified in RFC 3610, i.e. authentication is on plain text and not cipher text.=20 [Q] Please indicate what is the correct order of processing on the outbound side. Thanks for your time.=20 Regards, Yogesh=20 _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Wed Apr 6 18:50:49 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA14362 for ; Wed, 6 Apr 2005 18:50:49 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJJK0-0001zO-53; Wed, 06 Apr 2005 18:48:28 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJJJy-0001xz-Bh for ipsec@megatron.ietf.org; Wed, 06 Apr 2005 18:48:26 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA14165 for ; Wed, 6 Apr 2005 18:48:23 -0400 (EDT) Received: from ip-66-80-10-146.dsl.sca.megapath.net ([66.80.10.146] helo=guri.intoto.com) by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DJJSO-0000zT-Jw for ipsec@ietf.org; Wed, 06 Apr 2005 18:57:09 -0400 Received: from not-angel.intoto.com ([10.1.5.11]) by guri.intoto.com (SMSSMTP 4.0.0.59) with SMTP id M2005040615474601331 ; Wed, 06 Apr 2005 15:47:46 -0700 Received: from subha (dhcp-66.intoto.com [10.1.5.66]) (authenticated bits=0) by not-angel.intoto.com (8.13.1/8.13.1) with ESMTP id j36MmDRJ007681; Wed, 6 Apr 2005 15:48:18 -0700 Message-ID: <011501c53afa$b91fc830$4205010a@subha> From: "Subha" To: "Tero Kivinen" References: <00e801c536f8$531e4850$4205010a@subha><015701c5371b$f3885510$4205010a@subha><16977.11042.656521.73950@fireball.kivinen.iki.fi><003701c53952$0aabf430$4205010a@subha> <16978.22280.545861.239449@fireball.kivinen.iki.fi> Subject: Re: [Ipsec] Number of SPD Policies Date: Wed, 6 Apr 2005 15:48:12 -0700 MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="iso-8859-1"; reply-type=original Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.2180 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 X-Spam-Score: 0.0 (/) X-Scan-Signature: 8b30eb7682a596edff707698f4a80f7d Content-Transfer-Encoding: 7bit Cc: ipsec@ietf.org, Stephen Kent X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Hi , If AH+ESP between the same two gateway devices is not actually providing any extra crypographic protection, why have it at all. 2401bis could have simply removed that combination. Also, my understanding is that having AH over ESP provides additional protection on the tunnel header, which is otherwise not handled by ESP with Auth. Thanks, Subha > Subha writes: >> It looks like 2401bis brings up a limitation that we cannot >> define different AH strength for ESP encrypted packets >> between the same two security gateways. > > Yes, I think you are right. > > The question is: Is there any reason to really do that? Why are you > doing AH+ESP between the local GW and Remote GW in any case, why are > you not simply using ESP with suitable auth algorithm? > > As you are using tunnel mode there AH does not offer anything more > compared to the ESP. > > The only case where I can see there would be use for AH+ESP is when > the AH and ESP are terminated by different hosts, i.e. AH goes to from > host to firewall, and the ESP goes from host through the firewall to > the other end host. > > As there EVER any valid scenario where you would need to use AH+ESP > where both of those are terminated by same peers? > -- > kivinen@safenet-inc.com > _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 04:06:44 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA25181 for ; Thu, 7 Apr 2005 04:06:44 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJRxV-0006f3-JX; Thu, 07 Apr 2005 04:01:49 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJRxQ-0006dU-GJ for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 04:01:45 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA24818 for ; Thu, 7 Apr 2005 04:01:39 -0400 (EDT) Received: from aragorn.bbn.com ([128.33.0.62]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJS5s-0007Zq-D4 for ipsec@ietf.org; Thu, 07 Apr 2005 04:10:29 -0400 Received: from [192.168.50.62] (ramblo.bbn.com [128.33.0.51]) by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j3781PvJ018178; Thu, 7 Apr 2005 04:01:29 -0400 (EDT) Mime-Version: 1.0 Message-Id: In-Reply-To: <011501c53afa$b91fc830$4205010a@subha> References: <00e801c536f8$531e4850$4205010a@subha><015701c5371b$f3885510$4205010a@subha><16977.11042.656521.73950@firebal l.kivinen.iki.fi><003701c53952$0aabf430$4205010a@subha> <16978.22280.545861.239449@fireball.kivinen.iki.fi> <011501c53afa$b91fc830$4205010a@subha> Date: Thu, 7 Apr 2005 03:58:22 -0400 To: "Subha" From: Stephen Kent Subject: Re: [Ipsec] Number of SPD Policies Content-Type: text/plain; charset="us-ascii" ; format="flowed" X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41 X-Virus-Status: Clean X-Spam-Score: 0.0 (/) X-Scan-Signature: 9182cfff02fae4f1b6e9349e01d62f32 Cc: ipsec@ietf.org, Tero Kivinen X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org At 3:48 PM -0700 4/6/05, Subha wrote: >Hi , > >If AH+ESP between the same two gateway devices is not actually >providing any extra crypographic protection, >why have it at all. it is largely a holdover from the early days. Note that we do not mandate support for AH any more, so there is no mandate to support the combination of AH+ESP. >2401bis could have simply removed that combination. we DID remove mandatory support for this combination. > Also, my understanding is that having AH over ESP provides >additional protection on the tunnel header, which is otherwise >not handled by ESP with Auth. yes, it does provide protection for the tunnel header, but as we have discussed on this list in the past, this protection is only rarely of use. Remember, in most cases, the tunnel header is discarded upon arrival, so its integrity is is little importance in most cases. Steve _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 04:14:00 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA25921 for ; Thu, 7 Apr 2005 04:14:00 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJS00-0006z8-8t; Thu, 07 Apr 2005 04:04:24 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJRzb-0006uN-0n for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 04:03:59 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA24946 for ; Thu, 7 Apr 2005 04:03:56 -0400 (EDT) Received: from michael.checkpoint.com ([194.29.32.68] helo=michael2.checkpoint.com) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJS86-0007fq-Rm for ipsec@ietf.org; Thu, 07 Apr 2005 04:12:47 -0400 Received: from [194.29.46.218] (localhost [127.0.0.1]) by michael2.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id j3783Swx002345 for ; Thu, 7 Apr 2005 11:03:28 +0300 (IDT) Mime-Version: 1.0 (Apple Message framework v619.2) In-Reply-To: References: Content-Type: text/plain; charset=US-ASCII; format=flowed Message-Id: Content-Transfer-Encoding: 7bit From: Yoav Nir Date: Thu, 7 Apr 2005 11:03:46 +0300 To: IPsec WG X-Mailer: Apple Mail (2.619.2) X-Spam-Score: 0.0 (/) X-Scan-Signature: b19722fc8d3865b147c75ae2495625f2 Content-Transfer-Encoding: 7bit Subject: [Ipsec] Questions about internal address X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Hi. I've read sections 2.19 and 4, and I still have two questions about internal addressing: 1. The initiator may send a CFG_REQUEST during the AUTH exchange. There are several cases for the responder: (A) - the responder does not support CFG (B) - the responder supports CFG, but policy says that this user does not get it. (C) - the responder supports CFG, but not only for IPv4 addresses, and the client asked for IPv6 (or vice versa) (D) - the responder supports CFG, but its pool is exhausted (or the external server is down) If my understanding is correct, in case (A) the responder will not send a CFG_REPLY. It makes sense that in case (B) the responder will do the same. The question is about cases (C) and (D). I'm assuming that internal addresses are not mandatory. Is there a way to indicate the failure to the initiator so that the initiator can decide whether to tear down the connection? Would it be appropriate to send a CFG_REPLY with the internal address equal to zero as an indication of failure, or MUST the gateway simply not send a CFG_REPLY? 2. Section 4 refers to renewal before the ADDRESS_EXPIRY elapses. How is this renewal performed? MUST it be done with a CCSA exchange even if the SA is not expired? Can it be done in an informational exchange like the APPLICATION_VERSION query? Thanks, and maybe the answers should go in the clarifications draft. Yoav _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 04:34:51 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA27501 for ; Thu, 7 Apr 2005 04:34:51 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJSQw-0005Fg-0x; Thu, 07 Apr 2005 04:32:14 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJSQu-0005FF-0H for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 04:32:12 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA27301 for ; Thu, 7 Apr 2005 04:32:09 -0400 (EDT) Received: from aragorn.bbn.com ([128.33.0.62]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJSZP-0000Hk-FC for ipsec@ietf.org; Thu, 07 Apr 2005 04:41:00 -0400 Received: from [192.168.50.62] (ramblo.bbn.com [128.33.0.51]) by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j378VwvF019124; Thu, 7 Apr 2005 04:32:00 -0400 (EDT) Mime-Version: 1.0 Message-Id: In-Reply-To: References: Date: Thu, 7 Apr 2005 04:07:33 -0400 To: "Bansal, Yogesh" From: Stephen Kent Subject: Re: [Ipsec] CCM: AAD construction Content-Type: text/plain; charset="us-ascii" ; format="flowed" X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41 X-Virus-Status: Clean X-Spam-Score: 0.0 (/) X-Scan-Signature: 08170828343bcf1325e4a0fb4584481c Cc: ipsec@ietf.org, "Raghunandan, Makaram" X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org At 1:30 PM -0700 4/6/05, Bansal, Yogesh wrote: > > >However, IPSec ESP mode states that encryption is done prior to >authentication. Does this order change in the >draft-ietf-ipsec-ciph-aes-ccm-05.txt, meaning that authentication is >done after CTR-encryption? If so, is the CBC-MAC encrypted again. look at ESP v3. drafts of this document have been around for quite a while. it has just been approved by the IESG and is now in the RFC Editor's hands. It has an explicit discussion of how to process packets when a combined mode algorithm (confidentiality and integrity) is employed. Steve _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 06:44:06 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA06857 for ; Thu, 7 Apr 2005 06:44:06 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJURQ-0007Lj-Q8; Thu, 07 Apr 2005 06:40:52 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJURP-0007Lb-2D for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 06:40:51 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA06594 for ; Thu, 7 Apr 2005 06:40:47 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJUZv-0004Kn-8d for ipsec@ietf.org; Thu, 07 Apr 2005 06:49:40 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j37AehIu003027 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Thu, 7 Apr 2005 13:40:44 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j37AegX1003024; Thu, 7 Apr 2005 13:40:42 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16981.3625.976427.270687@fireball.kivinen.iki.fi> Date: Thu, 7 Apr 2005 13:40:41 +0300 From: Tero Kivinen To: Russ Housley Subject: [Ipsec] Re: Results of straw poll regarding: IKEv2 interoperability issue In-Reply-To: <6.2.0.14.2.20050406112358.04690910@mail.binhost.com> References: <6.2.0.14.2.20050315100106.0624c8e0@mail.binhost.com> <20050406145659.GA20093@thunk.org> <6.2.0.14.2.20050406112358.04690910@mail.binhost.com> X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 6 min X-Total-Time: 5 min X-Spam-Score: 0.3 (/) X-Scan-Signature: 3002fc2e661cd7f114cb6bae92fe88f1 Content-Transfer-Encoding: 7bit Cc: ipsec@ietf.org, Barbara Fraser , Charlie Kaufman , "Theodore Ts'o" X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Russ Housley writes: > If the change is small, I suggest that we do it with an RFC Editor > note. First, the content of the note needs to be approved by the WG and The change would be (I include the whole tables so the formatting will be done correctly): ---------------------------------------------------------------------- In section 3.3.2 remove "optional in" from the ESN line, i.e. change Transform Type Values Transform Used In Type RESERVED 0 Encryption Algorithm (ENCR) 1 (IKE and ESP) Pseudo-random Function (PRF) 2 (IKE) Integrity Algorithm (INTEG) 3 (IKE, AH, optional in ESP) Diffie-Hellman Group (D-H) 4 (IKE, optional in AH & ESP) Extended Sequence Numbers (ESN) 5 (Optional in AH and ESP) RESERVED TO IANA 6-240 PRIVATE USE 241-255 to Transform Type Values Transform Used In Type RESERVED 0 Encryption Algorithm (ENCR) 1 (IKE and ESP) Pseudo-random Function (PRF) 2 (IKE) Integrity Algorithm (INTEG) 3 (IKE, AH, optional in ESP) Diffie-Hellman Group (D-H) 4 (IKE, optional in AH & ESP) Extended Sequence Numbers (ESN) 5 (AH and ESP) RESERVED TO IANA 6-240 PRIVATE USE 241-255 ---------------------------------------------------------------------- In section 3.3.2 remove last paragraph from the description of the Transform Type 5, i.e. change: For Transform Type 5 (Extended Sequence Numbers), defined Transform IDs are: Name Number No Extended Sequence Numbers 0 Extended Sequence Numbers 1 RESERVED 2 - 65535 If Transform Type 5 is not included in a proposal, use of Extended Sequence Numbers is assumed. to For Transform Type 5 (Extended Sequence Numbers), defined Transform IDs are: Name Number No Extended Sequence Numbers 0 Extended Sequence Numbers 1 RESERVED 2 - 65535 ---------------------------------------------------------------------- In section 3.3.3 move ESN to mandatory types of the ESN an AH, i.e. change: Protocol Mandatory Types Optional Types IKE ENCR, PRF, INTEG, D-H ESP ENCR INTEG, D-H, ESN AH INTEG D-H, ESN to Protocol Mandatory Types Optional Types IKE ENCR, PRF, INTEG, D-H ESP ENCR, ESN INTEG, D-H AH INTEG, ESN D-H -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 06:54:26 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA07549 for ; Thu, 7 Apr 2005 06:54:26 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJUdV-0002JL-4N; Thu, 07 Apr 2005 06:53:21 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJUdS-0002Ho-Mj for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 06:53:18 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA07504 for ; Thu, 7 Apr 2005 06:53:15 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJUm0-0004nm-06 for ipsec@ietf.org; Thu, 07 Apr 2005 07:02:08 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j37Ar8YX003101 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Thu, 7 Apr 2005 13:53:09 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j37Ar3T4003098; Thu, 7 Apr 2005 13:53:04 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16981.4367.870344.876190@fireball.kivinen.iki.fi> Date: Thu, 7 Apr 2005 13:53:03 +0300 From: Tero Kivinen To: "Subha" Subject: Re: [Ipsec] Number of SPD Policies In-Reply-To: <011501c53afa$b91fc830$4205010a@subha> References: <00e801c536f8$531e4850$4205010a@subha> <015701c5371b$f3885510$4205010a@subha> <16977.11042.656521.73950@fireball.kivinen.iki.fi> <003701c53952$0aabf430$4205010a@subha> <16978.22280.545861.239449@fireball.kivinen.iki.fi> <011501c53afa$b91fc830$4205010a@subha> X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 10 min X-Total-Time: 9 min X-Spam-Score: 0.0 (/) X-Scan-Signature: 69a74e02bbee44ab4f8eafdbcedd94a1 Content-Transfer-Encoding: 7bit Cc: ipsec@ietf.org, Stephen Kent X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Subha writes: > If AH+ESP between the same two gateway devices is not > actually providing any extra crypographic protection, > why have it at all. True. > 2401bis could have simply removed that combination. 2401bis did remove it as a single concept. The reason there is still the forwarding step is when you have following case: Host A <-------> SGW <-----> Host B and where Host A needs to authenticate all his packets with tunnel mode AH to the SGW before it can get through it (i.e. the Host A might be somewhere inside the internet, and the SGW is the corporate firewall, requiring authentication before letting any traffic in, but as all traffic is also protected by ESP end to end, AH is enough for the SGW). In addition to that Host A needs to create transport mode ESP to connect to the Host B (lets say financial server or something). Now the Host A do need to have both AH and ESP applied to the packet, and his policy would be: Host A, Host B, ESP or IKE use tunnel mode AH to SGW Host A, Host B, any traffic use transport mode ESP, reforward to IPsec > Also, my understanding is that having AH over ESP provides > additional protection on the tunnel header, which is otherwise > not handled by ESP with Auth. If the ESP is in tunnel mode the external header is thrown away, so the protection AH offers to it is not useful. -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 07:00:12 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA07994 for ; Thu, 7 Apr 2005 07:00:12 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJUh7-0003GW-6J; Thu, 07 Apr 2005 06:57:05 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJUh0-0003Eh-Kl for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 06:57:03 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA07787 for ; Thu, 7 Apr 2005 06:56:55 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJUpX-0004s2-Us for ipsec@ietf.org; Thu, 07 Apr 2005 07:05:48 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j37Ausd7003129 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Thu, 7 Apr 2005 13:56:55 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j37AumEo003126; Thu, 7 Apr 2005 13:56:48 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16981.4592.603521.64579@fireball.kivinen.iki.fi> Date: Thu, 7 Apr 2005 13:56:48 +0300 From: Tero Kivinen To: pasi.eronen@nokia.com, paul.hoffman@vpnc.org, ipsec@ietf.org Subject: [Ipsec] Comments of draft-eronen-ipsec-ikev2-clarifications-02.txt In-Reply-To: <16978.33154.351915.320602@fireball.kivinen.iki.fi> References: <16978.33154.351915.320602@fireball.kivinen.iki.fi> X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 2 min X-Total-Time: 2 min X-Spam-Score: 0.0 (/) X-Scan-Signature: 9466e0365fc95844abaf7c3f15a05c7d Content-Transfer-Encoding: 7bit X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Tero Kivinen writes: > Also if we think more about the IKE SA rekeying, I do not think there > is any reason to do that unless you also do new Diffie-Hellman there > too. Rekeying IKE SA because of the IKE message ID wrapping is not > common. The current IKEv2 text is not clear wheather the intension was > that IKE SA rekey MUST have KE payloads, but I think we should mandate > them, i.e. say in the NEW-1.3.2 that KE payloads are not optional > there. Actually it is clear from the draft-ietf-ipsec-ikev2-17.txt that Diffie-Hellman parameter is NOT optional when rekeying IKE. The 3.3.3 lists D-H as mandatory type if the protocol is IKE, and the 3.3.2 does the same in the Transform Type Values table. So KE payloads are not optional in the NEW-1.3.2. ----------------------------------------------------------------------- 3.3.2 Transform Substructure ... Transform Type Values ... Diffie-Hellman Group (D-H) 4 (IKE, optional in AH & ESP) ... 3.3.3 Valid Transform Types by Protocol ... Protocol Mandatory Types Optional Types IKE ENCR, PRF, INTEG, D-H ... -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 07:33:55 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA10862 for ; Thu, 7 Apr 2005 07:33:55 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJVAI-0001O1-NV; Thu, 07 Apr 2005 07:27:14 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJVAI-0001Nw-0h for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 07:27:14 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA09927 for ; Thu, 7 Apr 2005 07:27:10 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJVIp-0005qn-Lx for ipsec@ietf.org; Thu, 07 Apr 2005 07:36:04 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j37BR7bY003422 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Thu, 7 Apr 2005 14:27:07 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j37BR7gC003419; Thu, 7 Apr 2005 14:27:07 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16981.6410.971961.170256@fireball.kivinen.iki.fi> Date: Thu, 7 Apr 2005 14:27:06 +0300 From: Tero Kivinen To: Yoav Nir Subject: [Ipsec] Questions about internal address In-Reply-To: References: X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 1 min X-Total-Time: 1 min X-Spam-Score: 0.0 (/) X-Scan-Signature: 30ac594df0e66ffa5a93eb4c48bcb014 Content-Transfer-Encoding: 7bit Cc: IPsec WG X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Yoav Nir writes: > 2. Section 4 refers to renewal before the ADDRESS_EXPIRY elapses. How And note also that ADDRESS_EXPIRY is optional to implement for the server, server can simply refuse to give them out, and client can simply not request it. Clients MUST understand if it replied to them, but that is all. -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 07:34:47 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA11041 for ; Thu, 7 Apr 2005 07:34:47 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJV8k-00018d-CK; Thu, 07 Apr 2005 07:25:38 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJV8j-00018Y-Hz for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 07:25:37 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA09770 for ; Thu, 7 Apr 2005 07:25:34 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJVHH-0005oX-0Q for ipsec@ietf.org; Thu, 07 Apr 2005 07:34:27 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j37BPStA003406 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Thu, 7 Apr 2005 14:25:29 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j37BPR7p003403; Thu, 7 Apr 2005 14:25:27 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16981.6311.477874.783828@fireball.kivinen.iki.fi> Date: Thu, 7 Apr 2005 14:25:27 +0300 From: Tero Kivinen To: Yoav Nir Subject: [Ipsec] Questions about internal address In-Reply-To: References: X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 14 min X-Total-Time: 15 min X-Spam-Score: 0.0 (/) X-Scan-Signature: 02ec665d00de228c50c93ed6b5e4fc1a Content-Transfer-Encoding: 7bit Cc: IPsec WG X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Yoav Nir writes: > 1. The initiator may send a CFG_REQUEST during the AUTH exchange. > There are several cases for the responder: > (A) - the responder does not support CFG > (B) - the responder supports CFG, but policy says that this user > does not get it. Yes, simply do not send CFG_REPLY at all. > (C) - the responder supports CFG, but not only for IPv4 addresses, > and the client asked for IPv6 (or vice versa) > (D) - the responder supports CFG, but its pool is exhausted (or the > external server is down) Send CFG_REPLY, with other parameters, but leave out the INTERNAL_IP{4,6}_ADDRESS parameters, as you do not have address for him. This is suitable if he asked both IPv4 and IPv6 and you only had one of those addresses. Then you probably also fail the IPsec SA exchange (if this was part of the IKE_AUTH) with INTERNAL_ADDRESS_FAILURE error, as you cannot narrow down the traffic selectors if you do not have address where to narrow. You could also fail the whoe CFG_REQUEST exchange with INTERNAL_ADDRESS_FAILURE. > 2. Section 4 refers to renewal before the ADDRESS_EXPIRY elapses. How > is this renewal performed? This whole thing is leftover from the IKEv1, and I think it SHOULD NOT be used at all. The address is valid as long as the IKE SA is valid, thus if server wants to free unused addresses, he can simply delete IKE SAs to free the addresses. In the IKEv2 all information related to the IKE SA goes away when it is deleted, and I see no reason why the paramters allocated with configuration payload would be exception to this. Renewals are only needed when the communication channel is not reliable, i.e. the server does not have a way to know if the client is still there and using the address. In IKEv2 we do know when the client disappears, so we can free the addresses at that point, at the same time we delete the IKE SA and IPsec SAs tied to it (using that address). > MUST it be done with a CCSA exchange even if the SA is not expired? CREATE_CHILD_SA exchange cannot have CP payloads, so it must be done as separate informational exchange. > Can it be done in an informational exchange like the > APPLICATION_VERSION query? > > Thanks, and maybe the answers should go in the clarifications draft. The whole configuration payload thing is quite badly defined as it is taken directly from the mode config of IKEv1, and nobody wanted to modify things from there. The problem is that IKEv2 and IKEv1 do have different ways of doing that, and for example that ADDRESS_EXPIRY should have been removed completely when the text was taken to IKEv2 draft etc. -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 09:11:11 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA19692 for ; Thu, 7 Apr 2005 09:11:11 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJWkX-0003xi-QJ; Thu, 07 Apr 2005 09:08:45 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJWkU-0003vr-6T for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 09:08:43 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA19278 for ; Thu, 7 Apr 2005 09:08:39 -0400 (EDT) Received: from michael.checkpoint.com ([194.29.32.68] helo=michael2.checkpoint.com) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJWt0-0001ML-25 for ipsec@ietf.org; Thu, 07 Apr 2005 09:17:32 -0400 Received: from [194.29.46.218] (localhost [127.0.0.1]) by michael2.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id j37D89wx011564; Thu, 7 Apr 2005 16:08:09 +0300 (IDT) In-Reply-To: <16981.6311.477874.783828@fireball.kivinen.iki.fi> References: <16981.6311.477874.783828@fireball.kivinen.iki.fi> Mime-Version: 1.0 (Apple Message framework v619.2) Content-Type: text/plain; charset=US-ASCII; format=flowed Message-Id: <0d4118737c07947571b7d301dac293f3@checkpoint.com> Content-Transfer-Encoding: 7bit From: Yoav Nir Subject: Re: [Ipsec] Questions about internal address Date: Thu, 7 Apr 2005 16:08:26 +0300 To: Tero Kivinen X-Mailer: Apple Mail (2.619.2) X-Spam-Score: 0.0 (/) X-Scan-Signature: 50a516d93fd399dc60588708fd9a3002 Content-Transfer-Encoding: 7bit Cc: IPsec WG X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit On Apr 7, 2005, at 2:25 PM, Tero Kivinen wrote: >> (C) - the responder supports CFG, but not only for IPv4 addresses, >> and the client asked for IPv6 (or vice versa) >> (D) - the responder supports CFG, but its pool is exhausted (or >> the >> external server is down) > > Send CFG_REPLY, with other parameters, but leave out the > INTERNAL_IP{4,6}_ADDRESS parameters, as you do not have address for > him. This is suitable if he asked both IPv4 and IPv6 and you only had > one of those addresses. Then you probably also fail the IPsec SA > exchange (if this was part of the IKE_AUTH) with > INTERNAL_ADDRESS_FAILURE error, as you cannot narrow down the traffic > selectors if you do not have address where to narrow. > > You could also fail the whoe CFG_REQUEST exchange with > INTERNAL_ADDRESS_FAILURE. How can you ever avoid this, even with cases (A) and (B) ? Suppose the initiator sends message #3 as in section 2.19: CP(CFG_REQUEST)= INTERNAL_ADDRESS(0.0.0.0) INTERNAL_NETMASK(0.0.0.0) INTERNAL_DNS(0.0.0.0) TSi = (0, 0-65536,0.0.0.0-255.255.255.255) TSr = (0, 0-65536,0.0.0.0-255.255.255.255) If the responder is not configured to support CP it cannot narrow the selectors and will have to fail anyway. But it gets weirder still. In the description of the INTERNAL_ADDRESS_FAILURE notification it says this: INTERNAL_ADDRESS_FAILURE 36 Indicates an error assigning an internal address (i.e., INTERNAL_IP4_ADDRESS or INTERNAL_IP6_ADDRESS) during the processing of a Configuration Payload by a responder. If this error is generated within an IKE_AUTH exchange no CHILD_SA will be created. This says that no CHILD_SA is created, but it does not say that no IKE_SA is created. Does this mean that we have an exchange that creates an IKE_SA but not a CHILD_SA? If I understand this correctly, at this point the client is supposed to start a new CCSA exchange with its own IP address. _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 09:26:46 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA21728 for ; Thu, 7 Apr 2005 09:26:46 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJWlZ-00049E-9p; Thu, 07 Apr 2005 09:09:49 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJWlX-000480-6G for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 09:09:47 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA19480 for ; Thu, 7 Apr 2005 09:09:45 -0400 (EDT) Received: from michael.checkpoint.com ([194.29.32.68] helo=michael2.checkpoint.com) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJWu4-0001TT-RR for ipsec@ietf.org; Thu, 07 Apr 2005 09:18:38 -0400 Received: from [194.29.46.218] (localhost [127.0.0.1]) by michael2.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id j37D9Hwx011977; Thu, 7 Apr 2005 16:09:17 +0300 (IDT) In-Reply-To: <16981.6410.971961.170256@fireball.kivinen.iki.fi> References: <16981.6410.971961.170256@fireball.kivinen.iki.fi> Mime-Version: 1.0 (Apple Message framework v619.2) Content-Type: text/plain; charset=US-ASCII; format=flowed Message-Id: <33f25effb8f689c83ffd238a35f90555@checkpoint.com> Content-Transfer-Encoding: 7bit From: Yoav Nir Subject: Re: [Ipsec] Questions about internal address Date: Thu, 7 Apr 2005 16:09:35 +0300 To: Tero Kivinen X-Mailer: Apple Mail (2.619.2) X-Spam-Score: 0.0 (/) X-Scan-Signature: cf4fa59384e76e63313391b70cd0dd25 Content-Transfer-Encoding: 7bit Cc: IPsec WG X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit I guess this parameter originated from expecting to have the IP addresses assigned by a DHCP server and not wanting the server to have to keep track of DHCP leases. On Apr 7, 2005, at 2:27 PM, Tero Kivinen wrote: > Yoav Nir writes: >> 2. Section 4 refers to renewal before the ADDRESS_EXPIRY elapses. How > > And note also that ADDRESS_EXPIRY is optional to implement for the > server, server can simply refuse to give them out, and client can > simply not request it. Clients MUST understand if it replied to them, > but that is all. > -- > kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 09:43:13 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA23184 for ; Thu, 7 Apr 2005 09:43:13 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJXDo-0006bw-FE; Thu, 07 Apr 2005 09:39:00 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJXDn-0006br-4E for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 09:38:59 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA22770 for ; Thu, 7 Apr 2005 09:38:56 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJXML-0002jX-KI for ipsec@ietf.org; Thu, 07 Apr 2005 09:47:50 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j37DclsY004734 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Thu, 7 Apr 2005 16:38:48 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j37Dcl6O004731; Thu, 7 Apr 2005 16:38:47 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16981.14311.761760.602438@fireball.kivinen.iki.fi> Date: Thu, 7 Apr 2005 16:38:47 +0300 From: Tero Kivinen To: Yoav Nir Subject: Re: [Ipsec] Questions about internal address In-Reply-To: <0d4118737c07947571b7d301dac293f3@checkpoint.com> References: <16981.6311.477874.783828@fireball.kivinen.iki.fi> <0d4118737c07947571b7d301dac293f3@checkpoint.com> X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 7 min X-Total-Time: 6 min X-Spam-Score: 0.0 (/) X-Scan-Signature: 82c9bddb247d9ba4471160a9a865a5f3 Content-Transfer-Encoding: 7bit Cc: IPsec WG X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Yoav Nir writes: > On Apr 7, 2005, at 2:25 PM, Tero Kivinen wrote: > > >> (C) - the responder supports CFG, but not only for IPv4 addresses, > >> and the client asked for IPv6 (or vice versa) > >> (D) - the responder supports CFG, but its pool is exhausted (or > >> the > >> external server is down) > > > > Send CFG_REPLY, with other parameters, but leave out the > > INTERNAL_IP{4,6}_ADDRESS parameters, as you do not have address for > > him. This is suitable if he asked both IPv4 and IPv6 and you only had > > one of those addresses. Then you probably also fail the IPsec SA > > exchange (if this was part of the IKE_AUTH) with > > INTERNAL_ADDRESS_FAILURE error, as you cannot narrow down the traffic > > selectors if you do not have address where to narrow. > > > > You could also fail the whoe CFG_REQUEST exchange with > > INTERNAL_ADDRESS_FAILURE. > > How can you ever avoid this, even with cases (A) and (B) ? In case the traffic selectors have something else than any to any, i.e. if the client already has a IP-address, but only tries to get additional IP-address allocated from the internal pool. But, yes I agree that in most cases you simply return INTERNAL_ADDRESS_FAILURE. > This says that no CHILD_SA is created, but it does not say that no > IKE_SA is created. Yes, that is right. If there is any problems with the IPsec SA if the IKE_AUTH, you still do create the IKE SA, but simply fail the IPsec SA with error code. This applies to the NO_PROSAL_CHOSEN, SINGLE_PAIR_REQUIRED, INTERNAL_ADDRESS_FAILURE, FAILED_CP_REQUIRED, and TS_UNACCEPTALBE. The idea is that we have all the information needed to create the IKE SA, and we have already done the Diffie-Hellman, signature verification etc, so it would be wasting resources to throw all that away, just because there was something wrong with the IPsec SA. If the initiator knows how to fix the situation (add CP, change traffic selectors, modify algorithms etc) he can do that and initiate CREATE_CHILD_SA to create new SAs. If he cannot do anything, he can simply delete the IKE SA if he does not wnat to have it. > Does this mean that we have an exchange that creates an IKE_SA but > not a CHILD_SA? Yes. > If I understand this correctly, at this point the client is supposed > to start a new CCSA exchange with its own IP address. -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 10:01:26 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA25188 for ; Thu, 7 Apr 2005 10:01:26 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJXJK-0007A0-Pk; Thu, 07 Apr 2005 09:44:42 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJXJI-00079p-F5 for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 09:44:40 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA23296 for ; Thu, 7 Apr 2005 09:44:38 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJXRr-0002wc-2f for ipsec@ietf.org; Thu, 07 Apr 2005 09:53:31 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j37DiXTO004761 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Thu, 7 Apr 2005 16:44:33 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j37DiWiD004758; Thu, 7 Apr 2005 16:44:32 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16981.14656.859805.458166@fireball.kivinen.iki.fi> Date: Thu, 7 Apr 2005 16:44:32 +0300 From: Tero Kivinen To: Yoav Nir Subject: Re: [Ipsec] Questions about internal address In-Reply-To: <33f25effb8f689c83ffd238a35f90555@checkpoint.com> References: <16981.6410.971961.170256@fireball.kivinen.iki.fi> <33f25effb8f689c83ffd238a35f90555@checkpoint.com> X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 3 min X-Total-Time: 5 min X-Spam-Score: 0.0 (/) X-Scan-Signature: 7a6398bf8aaeabc7a7bb696b6b0a2aad Content-Transfer-Encoding: 7bit Cc: IPsec WG X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Yoav Nir writes: > I guess this parameter originated from expecting to have the IP > addresses assigned by a DHCP server and not wanting the server to have > to keep track of DHCP leases. Hmm.... probably true, but the server still needs to keep track of the IP-addresses assigned to each client and so on, soaddding the lease time there does not cause that much more bookkeeping. But perhaps this current way is the best, server can simply leave it out if he allocates addresses from internal pool and send it if it is using DHCP server. -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 11:17:05 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA03711 for ; Thu, 7 Apr 2005 11:17:05 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJYgt-00038K-Rl; Thu, 07 Apr 2005 11:13:07 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJYgr-00036E-Nb for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 11:13:05 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA03160 for ; Thu, 7 Apr 2005 11:13:02 -0400 (EDT) Received: from aragorn.bbn.com ([128.33.0.62]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJYpR-0006cO-HQ for ipsec@ietf.org; Thu, 07 Apr 2005 11:21:57 -0400 Received: from [192.168.50.44] (ramblo.bbn.com [128.33.0.51]) by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j37FCqvF003727; Thu, 7 Apr 2005 11:12:55 -0400 (EDT) Mime-Version: 1.0 Message-Id: In-Reply-To: <20050318023302.85893.qmail@web52604.mail.yahoo.com> References: <20050318023302.85893.qmail@web52604.mail.yahoo.com> Date: Thu, 7 Apr 2005 11:12:59 -0400 To: Subha Venkataramanan From: Stephen Kent Subject: Re: [Ipsec] Next Layer Protocol (Ref: 2401-bis draft) Content-Type: text/plain; charset="us-ascii" ; format="flowed" X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41 X-Virus-Status: Clean X-Spam-Score: 2.0 (++) X-Scan-Signature: 082a9cbf4d599f360ac7f815372a6a15 Cc: ipsec@ietf.org X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org At 6:33 PM -0800 3/17/05, Subha Venkataramanan wrote: >Hi , > >I have a follow-up question. > >If an implementation understands says hop-to-hop, >routing, fragmentation and Destination Options, it >can parse these extension headers and look for the >next protocol information. When it parses each >extension header, it knows the length of bytes it >needs to skip to reach the next extension header. > >If there are any new extension headers and the >implemenation cannot interpret these extension >headers, it cannot process the packet. In which >case, it may choose to send an ICMP Error message. > >What additional help is given to the implementation, >by configuring the extension headers that it needs >to ignore while parsing the IPv6 header. this is a feature designed to help support IPsec, in the IPv6 context. after inbound processing, IPsec access controls are applied based on the SAD entry for the SA via which the traffic arrived. thus it is important to know what constitutes the "next layer protocol" to which these access controls are to be applied. The use of a list enables a receiver to accommodate new IPv6 headers in the future. The list is configured with default entries for the header types that are defined now and that make sense to skip. similarly, for outbound processing, this list indicates where to look to find the protocol that is used for outbound access control, SA selection. This is mostly an AH issue, because there is more flexibility in where AH can be placed relative to IPv6 headers, vs. ESP. >1) Does this kind of configuration in the >implementation advise the user, that it has >capabilities skip A,B,C extension headers ? that is a local implementation issue, not dictated by the standards, but I would expect this info to be viewable as part of the configuration data. >2) Does this kind of configuration mean, that if the >implementation comes across any other extension >headers which it can interpret but is not in the >configured list, it should drop the packet ? As soon as one encounters a header that is not on the list, then that header is the one that will be examined against the SAD entry. if there is an extension header present that is not on the skip list, and it is not the one you listed in the SPD (and now in the SAD entry for the SA), then the packet will be dropped. >3) Does this kind of configuration mean, that when the >user tries to add some extension header values, that >the implementation does not support, it can throw an >error indicating the same ? If you add a header not on the list, AND if the intent was to skip the header, then the packet will be dropped. Steve _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 14:42:19 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA25272 for ; Thu, 7 Apr 2005 14:42:19 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJbwA-0005p0-I7; Thu, 07 Apr 2005 14:41:06 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJbw8-0005ov-LX for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 14:41:04 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA25192 for ; Thu, 7 Apr 2005 14:41:02 -0400 (EDT) Received: from woodstock.binhost.com ([144.202.243.4]) by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DJc4k-0006A7-AU for ipsec@ietf.org; Thu, 07 Apr 2005 14:49:58 -0400 Received: (qmail 12700 invoked by uid 0); 7 Apr 2005 18:40:11 -0000 Received: from unknown (HELO Russ-Laptop.vigilsec.com) (138.88.14.68) by woodstock.binhost.com with SMTP; 7 Apr 2005 18:40:11 -0000 Message-Id: <6.2.0.14.2.20050407140202.05092490@mail.binhost.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.0.14 Date: Thu, 07 Apr 2005 14:39:59 -0400 To: "Bansal, Yogesh" From: Russ Housley Subject: Re: [Ipsec] CCM: AAD construction In-Reply-To: References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed X-Spam-Score: 0.2 (/) X-Scan-Signature: 0fa76816851382eb71b0a882ccdc29ac Cc: ipsec@ietf.org, makaram.raghunandan@intel.com X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Yogesh: >I have few questions on CCM & it's use in IPSec ESP mode. The questions >are related to construction of AAD blocks required for authentication >purposes. > >1) Construction of AAD blocks in CCM in general > >RFC 3610 specifies construction of B_0, B_1 blocks >The construction of B_0 has been clearly defined. This block is followed >by length encoding of "a" followed by "a" itself, as per the following >paragraph in the spec: > >Blocks encoding a are formed by concatenating this string that encodes >l(a) with a itself, and splitting the result into 16-octet blocks, and >then padding the last block with zeros if necessary. These blocks are >appended to the first block B_0. > >Does this mean the following: > >B_1 = encoding(l(a)) || a || pad (to the next 16 octet block ) > >Hence, the AAD block stream then consists of >B_0 || B_1 || m_0 || m_1 ... || m_n (padding, if required) > > >[Q] Please confirm whether the interpretation of B_1 construction is >correct. Sometimes. When 0 < l(a) < (2^16 - 2^8), then B0 includes l(a). In this case, B1 begins with a. >2) Construction of AAD blocks in IPSec ESP mode > >Does B_1 definition mean the following in IPSec ESP mode >AAD_IPSec = SPI || SEQ_Num > >B_1 = encoding (l (AAD_IPSec)) || AAD_IPsec || pad (to the next 16 >octet block) > >[Q] Please confirm construction of B_1 block in IPSec mode is correct. The answer to this is found in draft-ietf-ipsec-ciph-aes-ccm-05.txt, which is in the RFC Editor queue. Section 5 shows the two cases for AAD construction. In both cases, l(a) is less than (2^16 - 2^8), so l(a) is encoded as part of B0. Thus, B1 contains only the SPI and the sequence number. The two cases are the traditional sequence number, which is 32 bits, and the extended sequence number, which is 64 bits. In either case, the total length of the AAD is less than one block, and padding is needed. >3) Computing CBC-MAC in CCM Mode With IPsec ESP >CCM spec (RFC 3610) implies that authentication is done on the plain >text (and not the cipher text). > >However, IPSec ESP mode states that encryption is done prior to >authentication. Does this order change in the >draft-ietf-ipsec-ciph-aes-ccm-05.txt, meaning that authentication is >done after CTR-encryption? If so, is the CBC-MAC encrypted again. > >My interpretation is that the order still remains the same as specified >in RFC 3610, i.e. authentication is on plain text and not cipher text. > >[Q] Please indicate what is the correct order of processing on the >outbound side. Authentication is done first. Please make sure that you are following draft-ietf-ipsec-esp-v3-10.txt, which is also in the RFC Editor queue. This document includes support for authenticated encryption modes like CCM. This support is not available in ESP v2 (RFC 2406). Russ _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 15:08:09 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA28097 for ; Thu, 7 Apr 2005 15:08:09 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJcLD-0002Vx-Jr; Thu, 07 Apr 2005 15:06:59 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJcLB-0002Vn-I2 for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 15:06:57 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA27986 for ; Thu, 7 Apr 2005 15:06:55 -0400 (EDT) Received: from woodstock.binhost.com ([144.202.243.4]) by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DJcTl-00073k-RW for ipsec@ietf.org; Thu, 07 Apr 2005 15:15:51 -0400 Received: (qmail 2987 invoked by uid 0); 7 Apr 2005 19:06:48 -0000 Received: from unknown (HELO Russ-Laptop.vigilsec.com) (141.156.167.14) by woodstock.binhost.com with SMTP; 7 Apr 2005 19:06:48 -0000 Message-Id: <6.2.0.14.2.20050407150511.06108900@mail.binhost.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.0.14 Date: Thu, 07 Apr 2005 15:06:49 -0400 To: Tero Kivinen From: Russ Housley Subject: Re: [Ipsec] Re: Results of straw poll regarding: IKEv2 interoperability issue In-Reply-To: <16981.3625.976427.270687@fireball.kivinen.iki.fi> References: <6.2.0.14.2.20050315100106.0624c8e0@mail.binhost.com> <20050406145659.GA20093@thunk.org> <6.2.0.14.2.20050406112358.04690910@mail.binhost.com> <16981.3625.976427.270687@fireball.kivinen.iki.fi> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed X-Spam-Score: 0.2 (/) X-Scan-Signature: 1a1bf7677bfe77d8af1ebe0e91045c5b Cc: ipsec@ietf.org, Barbara Fraser , Charlie Kaufman , "Theodore Ts'o" X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org All: This is sufficiently small. Ted & Barbara: Now, I need to confirm that this is the WG consensus. Once you have done so, please send me a formal request, formatted like AUTH 48 input to the RFC Editor. Russ At 06:40 AM 4/7/2005, Tero Kivinen wrote: >Russ Housley writes: > > If the change is small, I suggest that we do it with an RFC Editor > > note. First, the content of the note needs to be approved by the WG and > >The change would be (I include the whole tables so the formatting will >be done correctly): >---------------------------------------------------------------------- >In section 3.3.2 remove "optional in" from the ESN line, i.e. change > > > Transform Type Values > > Transform Used In > Type > RESERVED 0 > Encryption Algorithm (ENCR) 1 (IKE and ESP) > Pseudo-random Function (PRF) 2 (IKE) > Integrity Algorithm (INTEG) 3 (IKE, AH, optional in ESP) > Diffie-Hellman Group (D-H) 4 (IKE, optional in AH & ESP) > Extended Sequence Numbers (ESN) 5 (Optional in AH and ESP) > RESERVED TO IANA 6-240 > PRIVATE USE 241-255 > > >to > > > Transform Type Values > > Transform Used In > Type > RESERVED 0 > Encryption Algorithm (ENCR) 1 (IKE and ESP) > Pseudo-random Function (PRF) 2 (IKE) > Integrity Algorithm (INTEG) 3 (IKE, AH, optional in ESP) > Diffie-Hellman Group (D-H) 4 (IKE, optional in AH & ESP) > Extended Sequence Numbers (ESN) 5 (AH and ESP) > RESERVED TO IANA 6-240 > PRIVATE USE 241-255 >---------------------------------------------------------------------- >In section 3.3.2 remove last paragraph from the description of the >Transform Type 5, i.e. change: > > For Transform Type 5 (Extended Sequence Numbers), defined Transform > IDs are: > > Name Number > No Extended Sequence Numbers 0 > Extended Sequence Numbers 1 > RESERVED 2 - 65535 > > If Transform Type 5 is not included in a proposal, use of > Extended Sequence Numbers is assumed. > > >to > > > For Transform Type 5 (Extended Sequence Numbers), defined Transform > IDs are: > > Name Number > No Extended Sequence Numbers 0 > Extended Sequence Numbers 1 > RESERVED 2 - 65535 > >---------------------------------------------------------------------- >In section 3.3.3 move ESN to mandatory types of the ESN an AH, i.e. >change: > > Protocol Mandatory Types Optional Types > IKE ENCR, PRF, INTEG, D-H > ESP ENCR INTEG, D-H, ESN > AH INTEG D-H, ESN > > >to > > > Protocol Mandatory Types Optional Types > IKE ENCR, PRF, INTEG, D-H > ESP ENCR, ESN INTEG, D-H > AH INTEG, ESN D-H >-- >kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 7 15:23:08 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA29770 for ; Thu, 7 Apr 2005 15:23:08 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJcZE-0007Yd-T0; Thu, 07 Apr 2005 15:21:28 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJcZD-0007YY-NV for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 15:21:27 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA29663 for ; Thu, 7 Apr 2005 15:21:25 -0400 (EDT) Received: from sj-iport-1-in.cisco.com ([171.71.176.70] helo=sj-iport-1.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJcho-0007T0-Qu for ipsec@ietf.org; Thu, 07 Apr 2005 15:30:22 -0400 Received: from sj-core-2.cisco.com (171.71.177.254) by sj-iport-1.cisco.com with ESMTP; 07 Apr 2005 12:20:45 -0700 X-IronPort-AV: i="3.92,84,1112598000"; d="scan'208"; a="626651031:sNHT732737070" Received: from mira-sjc5-b.cisco.com (IDENT:mirapoint@mira-sjc5-b.cisco.com [171.71.163.14]) by sj-core-2.cisco.com (8.12.10/8.12.6) with ESMTP id j37JKbgE029842 for ; Thu, 7 Apr 2005 12:20:38 -0700 (PDT) Received: from [171.71.49.252] (dhcp-171-71-49-252.cisco.com [171.71.49.252]) by mira-sjc5-b.cisco.com (MOS 3.4.5-GR) with ESMTP id BDT23126; Thu, 7 Apr 2005 12:20:42 -0700 (PDT) Message-ID: <4255880A.4050404@cisco.com> Date: Thu, 07 Apr 2005 12:20:42 -0700 From: Kevin Li User-Agent: Mozilla Thunderbird 1.0 (Windows/20041206) X-Accept-Language: en-us, en MIME-Version: 1.0 To: ipsec@ietf.org Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Score: 0.0 (/) X-Scan-Signature: 97adf591118a232206bdb5a27b217034 Content-Transfer-Encoding: 7bit Subject: [Ipsec] ID and subject/subject-alt in certificate, match or not to match? X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Hi, IKEv2 doesn't require ID in ID payload to match that subject/subject-alt in certificate. This flexiblity is great in switch/router/multi-home-host environment where there may be many interfaces/ip-addresses. In that case, we may choose using a global certificate of switch/router, don't need to create individual certificate for each interface/ipaddress/fqdn. IKEv2-17 =============================================== 3.5 Identification Payloads The Identification Payloads, denoted IDi and IDr in this memo, allow peers to assert an identity to one another. This identity may be used for policy lookup, but does not necessarily have to match anything in the CERT payload; both fields may be used by an implementation to perform access control decisions. ======================================================= I don't see IKEv1 have such requirement (match) either from protocol perspective. But certain implementation (say racoon) may insist such a match. Does it mean that: In reality, we have to ensure our id payload matched with subject/alt in certificate in order to interop? What's the general concensus on this (match or not to match)? I think this should be configurable instead of hardcoding the match if people really want it. Thanks. Kevin _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Fri Apr 8 02:16:48 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA02599 for ; Fri, 8 Apr 2005 02:16:48 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJmmB-00030t-Tz; Fri, 08 Apr 2005 02:15:32 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJmmA-00030S-IC for ipsec@megatron.ietf.org; Fri, 08 Apr 2005 02:15:30 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA01300 for ; Fri, 8 Apr 2005 02:15:29 -0400 (EDT) Received: from nav2.lgsoftindia.com ([203.200.13.13] helo=nav2) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJmup-0002vF-Te for ipsec@ietf.org; Fri, 08 Apr 2005 02:24:30 -0400 Received: from appolo.lgdomain.com ([192.168.1.21]) by nav2 with InterScan Messaging Security Suite; Fri, 08 Apr 2005 11:02:33 +0530 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: quoted-printable Subject: RE: [Ipsec] Questions about internal address X-MimeOLE: Produced By Microsoft Exchange V6.5.6944.0 Date: Fri, 8 Apr 2005 11:04:19 +0530 Message-ID: Thread-Topic: [Ipsec] Questions about internal address Thread-Index: AcU7SfrPvObnfGGRSxqRnD/goy7wqQAr3r1w From: "Soumya Sen" To: "Yoav Nir" X-Spam-Score: 0.0 (/) X-Scan-Signature: 3e15cc4fdc61d7bce84032741d11c8e5 Content-Transfer-Encoding: quoted-printable Cc: ipsec@ietf.org, kivinen@safenet-inc.com X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: quoted-printable Hello, The section 3.15 of the draft mentions the actions to be taken in the cases Yoav mentioned in his mail. The paragraph in page 78 says: "If the data type requested in a CFG_REQUEST is not recognized or not supported, the responder MUST NOT return an error type but rather MUST either send a CFG_REPLY which MAY be empty or a reply not containing a CFG_REPLY payload at all. Error returns are reserved for cases where the request is recognized but cannot be performed as requested or the request is badly formatted." Yoav mentions a case where: "(B) - the responder supports CFG, but policy says that this user does not get it." In this case, the CFG_REQUEST that is coming to the responder will be recognized by him, but he will not be able to perform the request due to some policy.=0D So going by the sentence of the draft "Error returns are reserved for cases where the request is recognized but cannot be performed as requested", wouldn't it mean that an error will be returned, and not a reply without CFG_REPLY payload or empty CFG_REPLY? Moreover, Tero mentioned that in case (B) we simply do not send CFG_REPLY at all. Isn't there may be another option too i.e. the Responder sends a reply not containing a CFG_REPLY payload at all? Please let me know about these points. Regards, Soumya. (Sorry for the attached Disclaimer, please ignore it. That is a company policy so I can't remove it. Please bear with it ;-)) ***************************************************************************= ***************************************************************************= **** This email message is for the sole use of the intended recipient(s)and may= contain CONFIDENTIAL and PRIVILEGED information. LG Soft India will not be responsible for any viruses or defects or any= forwarded attachments emanating either from within=0D LG Soft India or outside. Any unauthorized review, use, disclosure or= distribution is prohibited. If you are not the intended=0D recipient, please contact the sender By reply email and destroy all copies= of the original message. ***************************************************************************= ***************************************************************************= **** _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Fri Apr 8 03:38:36 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA14238 for ; Fri, 8 Apr 2005 03:38:36 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJo1u-0000c0-V4; Fri, 08 Apr 2005 03:35:50 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJo1r-0000bv-Pf for ipsec@megatron.ietf.org; Fri, 08 Apr 2005 03:35:47 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA14040 for ; Fri, 8 Apr 2005 03:35:46 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJoAZ-0005Tr-8l for ipsec@ietf.org; Fri, 08 Apr 2005 03:44:48 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j387ZTWD013656 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Fri, 8 Apr 2005 10:35:29 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j387ZSv8013653; Fri, 8 Apr 2005 10:35:29 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16982.13376.821491.607540@fireball.kivinen.iki.fi> Date: Fri, 8 Apr 2005 10:35:28 +0300 From: Tero Kivinen To: Kevin Li Subject: [Ipsec] ID and subject/subject-alt in certificate, match or not to match? In-Reply-To: <4255880A.4050404@cisco.com> References: <4255880A.4050404@cisco.com> X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 6 min X-Total-Time: 6 min X-Spam-Score: 0.0 (/) X-Scan-Signature: ea4ac80f790299f943f0a53be7e1a21a Content-Transfer-Encoding: 7bit Cc: ipsec@ietf.org X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Kevin Li writes: > I don't see IKEv1 have such requirement (match) either from protocol > perspective. But certain implementation (say racoon) may insist such a > match. Yes. That is true, for some reason lots of people required them to match exactly, and didn't allow configuring any function or lookup table between them. > Does it mean that: > In reality, we have to ensure our id payload matched with subject/alt in > certificate in order to interop? In the RFC2401bis we now have PAD that will provide mapping from IKE ID to the authentication data, including instructions how to find the certificate. That PAD entry can also say that ID MUST match the certificate, or it can say there can be some more complicated matching done i.e. lookup from table to convert ID to name to search from certificate, or subtree match etc... > What's the general concensus on this (match or not to match)? > I think this should be configurable instead of hardcoding the match if > people really want it. It should be configurable, and one of the options MUST be to do exact match. Other options are left more or less open, i.e. implementations can implement other means of doing matching, depending what they want and need. -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Fri Apr 8 04:05:32 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA16354 for ; Fri, 8 Apr 2005 04:05:32 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJoNu-0003n8-2f; Fri, 08 Apr 2005 03:58:34 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DJoNp-0003mq-Qa for ipsec@megatron.ietf.org; Fri, 08 Apr 2005 03:58:30 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA15804 for ; Fri, 8 Apr 2005 03:58:28 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJoWY-0006On-2A for ipsec@ietf.org; Fri, 08 Apr 2005 04:07:30 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j387wJhV013816 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Fri, 8 Apr 2005 10:58:19 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j387wH9D013812; Fri, 8 Apr 2005 10:58:17 +0300 (EEST) MIME-Version: 1.0 Message-ID: <16982.14745.711102.208353@fireball.kivinen.iki.fi> Date: Fri, 8 Apr 2005 10:58:17 +0300 From: Tero Kivinen To: "Soumya Sen" Subject: RE: [Ipsec] Questions about internal address In-Reply-To: References: X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 4 min X-Total-Time: 3 min X-Spam-Score: 2.2 (++) X-Scan-Signature: 9182cfff02fae4f1b6e9349e01d62f32 Cc: ipsec@ietf.org, Yoav Nir X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============0329683097==" Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org --===============0329683097== Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: base64 U291bXlhIFNlbiB3cml0ZXM6DQo+IFlvYXYgbWVudGlvbnMgYSBjYXNlIHdoZXJlOiAiKEIpIC0g dGhlIHJlc3BvbmRlciBzdXBwb3J0cyBDRkcsIGJ1dA0KPiBwb2xpY3kgc2F5cyB0aGF0IHRoaXMg dXNlciBkb2VzIG5vdCBnZXQgaXQuIg0KPiANCj4gSW4gdGhpcyBjYXNlLCB0aGUgQ0ZHX1JFUVVF U1QgdGhhdCBpcyBjb21pbmcgdG8gdGhlIHJlc3BvbmRlciB3aWxsIGJlDQo+IHJlY29nbml6ZWQg YnkgaGltLCBidXQgaGUgd2lsbCBub3QgYmUgYWJsZSB0byBwZXJmb3JtIHRoZSByZXF1ZXN0IGR1 ZSB0bw0KPiBzb21lIHBvbGljeS4NDQo+IFNvIGdvaW5nIGJ5IHRoZSBzZW50ZW5jZSBvZiB0aGUg ZHJhZnQgIkVycm9yIHJldHVybnMgYXJlIHJlc2VydmVkIGZvcg0KPiBjYXNlcyB3aGVyZSB0aGUg cmVxdWVzdCBpcyByZWNvZ25pemVkIGJ1dCBjYW5ub3QgYmUgcGVyZm9ybWVkIGFzDQo+IHJlcXVl c3RlZCIsIHdvdWxkbid0IGl0IG1lYW4gdGhhdCBhbiBlcnJvciB3aWxsIGJlIHJldHVybmVkLCBh bmQgbm90IGENCj4gcmVwbHkgd2l0aG91dCBDRkdfUkVQTFkgcGF5bG9hZCBvciBlbXB0eSBDRkdf UkVQTFk/DQoNCkl0IGRlcGVuZHMuIElmIHRoZSB0cmFmZmljIHNlbGVjdG9ycyBhcmUgc3VjaCwg dGhhdCB0aGV5IGRvIHJlcXVpcmUNCklQLWFkZHJlc3MsIGkuZS4gc2VydmVyIHNob3VsZCBuYXJy b3cgdGhlbSBkb3duLCB0aGVuIEkgdGhpbmsgaXQNCnNob3VsZCByZXR1cm4gZXJyb3IuIEluIGNh c2UgdGhlIFNBIGNhbiBiZSBwcm9jZXNzZWQgd2l0aG91dA0KcHJvY2Vzc2luZyB0aGUgY29uZmln dXJhdGlvbiBwYXlsb2FkIHJlcXVlc3QsIHRoZW4gU0Egc2hvdWxkIGJlDQpjcmVhdGVkLCBhbmQg bm8gY29uZmlndXJhdGlvbiBwYXlsb2FkIGlzIHNlbnQgYXMgYSByZXBseS4NCg0KVGhlIGV4YW1w bGUgb2YgZmlyc3QgY2FzZSBpcyB3aGVuIGNsaWVudCB3YW50cyB0byBhbGxvY2F0ZSBJUC1hZGRy ZXNzLA0KYW5kIGdpdmVzIGFueSB0byBhbnkgdHJhZmZpYyBzZWxlY3RvcnMuDQoNClRoZSBleGFt cGxlIG9mIHRoZSBzZWNvbmQgY2FzZSBpcyB3aGVuIHRoZSBjbGllbnQgYWxyZWFkeSBoYXMgYW4N CmlwLWFkZHJlc3MsIGFuZCBpcyB1c2luZyB0aGF0IGluIHRoZSB0cmFmZmljIHNlbGVjdG9ycywg YnV0IHdhbnRzIHRvDQphc2sgc2VydmVyIGZvciB0aGUgRE5TIHNlcnZlciwgYnV0IHRoZSBzZXJ2 ZXIgZG9lcyBub3QgaGF2ZSBhbnkgRE5TDQpzZXJ2ZXJzIGNvbmZpZ3VyZWQgdG8gYmUgc2VudCB0 byB0aGUgY2xpZW50LiANCg0KU28sIEkgd291bGQgc2F5IGJvdGggb3B0aW9ucyBhcmUgdmFsaWQg ZGVwZW5kaW5nIG9mIHRoZSBvdGhlciBwb2xpY3kNCmFuZCBvZiB0aGUgcmVxdWVzdC4NCi0tIA0K a2l2aW5lbkBzYWZlbmV0LWluYy5jb20= --===============0329683097== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Disposition: inline Content-Transfer-Encoding: 7bit _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec --===============0329683097==-- From ipsec-bounces@ietf.org Sun Apr 10 12:11:54 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA29510 for ; Sun, 10 Apr 2005 12:11:54 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DKeqU-0001ZU-NI; Sun, 10 Apr 2005 11:59:34 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DKeqT-0001ZL-2P for ipsec@megatron.ietf.org; Sun, 10 Apr 2005 11:59:33 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA28665 for ; Sun, 10 Apr 2005 11:59:30 -0400 (EDT) Received: from above.proper.com ([208.184.76.39]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DKezd-0003xD-7k for ipsec@ietf.org; Sun, 10 Apr 2005 12:09:03 -0400 Received: from [10.20.30.249] (dsl2-63-249-109-245.cruzio.com [63.249.109.245]) (authenticated bits=0) by above.proper.com (8.12.11/8.12.9) with ESMTP id j3AFxQVm024978; Sun, 10 Apr 2005 08:59:28 -0700 (PDT) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: <16981.6410.971961.170256@fireball.kivinen.iki.fi> References: <16981.6410.971961.170256@fireball.kivinen.iki.fi> Date: Sun, 10 Apr 2005 08:59:24 -0700 To: Tero Kivinen From: Paul Hoffman Subject: Re: [Ipsec] Questions about internal address Content-Type: text/plain; charset="us-ascii" ; format="flowed" X-Spam-Score: 0.0 (/) X-Scan-Signature: 9182cfff02fae4f1b6e9349e01d62f32 Cc: IPsec WG X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org At 2:27 PM +0300 4/7/05, Tero Kivinen wrote: >Yoav Nir writes: >> 2. Section 4 refers to renewal before the ADDRESS_EXPIRY elapses. How > >And note also that ADDRESS_EXPIRY is optional to implement for the >server, server can simply refuse to give them out, and client can >simply not request it. Clients MUST understand if it replied to them, >but that is all. I'm not sure what you mean by "optional to implement for the server". The IKEv2 document says: A minimal IPv4 initiator will generate a CP payload containing only an INTERNAL_IP4_ADDRESS attribute and will parse the response ignoring attributes it does not know how to use. The only attribute it MUST be able to process is INTERNAL_ADDRESS_EXPIRY, which it must use to bound the lifetime of the SA unless it successfully renews the lease before it expires. Minimal initiators need not be able to request lease renewals and minimal responders need not respond to them. That doesn't sound optional to me. --Paul Hoffman, Director --VPN Consortium _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Sun Apr 10 13:58:00 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA06499 for ; Sun, 10 Apr 2005 13:58:00 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DKgcq-00077T-3h; Sun, 10 Apr 2005 13:53:36 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DKgcm-00077O-BX for ipsec@megatron.ietf.org; Sun, 10 Apr 2005 13:53:33 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA06175 for ; Sun, 10 Apr 2005 13:53:28 -0400 (EDT) Received: from above.proper.com ([208.184.76.39]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DKglw-0007dS-Fy for ipsec@ietf.org; Sun, 10 Apr 2005 14:03:01 -0400 Received: from [10.20.30.249] (dsl2-63-249-109-245.cruzio.com [63.249.109.245]) (authenticated bits=0) by above.proper.com (8.12.11/8.12.9) with ESMTP id j3AHrOAj035219 for ; Sun, 10 Apr 2005 10:53:26 -0700 (PDT) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: <16978.33154.351915.320602@fireball.kivinen.iki.fi> References: <16978.33154.351915.320602@fireball.kivinen.iki.fi> Date: Sun, 10 Apr 2005 10:53:20 -0700 To: ipsec@ietf.org From: Paul Hoffman Content-Type: text/plain; charset="us-ascii" ; format="flowed" X-Spam-Score: 0.0 (/) X-Scan-Signature: 769a46790fb42fbb0b0cc700c82f7081 Subject: [Ipsec] Clarifying the use of INITIAL_CONTACT in IKEv2 X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Greetings again. In the IKEv2 clarifications document, Pasi and I say: 6.12 Which message should contain INITIAL_CONTACT The description of the INITIAL_CONTACT notification in Section 3.10.1 says that "This notification asserts that this IKE_SA is the only IKE_SA currently active between the authenticated identities". However, neither Section 2.4 nor 3.10.1 says in which message this payload should be placed. The text does talk about authenticated identities, so it seems the notification cannot be sent before both endpoints have been authenticated. Thus, the possible places are the last IKE_AUTH response message and a separate Informational exchange. Based on how this was implemented in IKEv1, it seems the intent was to use a separate Informational exchange. Tero responded: >Initiator usually knows to whom is is supposed to talk to and he knows >weather he has SA with him before or not (if he had IKE SA he would >have used it, or he had some other reason not to use it). > >So it means that initiator can send INITIAL_CONTACT in IKE_AUTH and >responder can respond to that in the same packet. I would actually >prefer that instead of using separate informational exchange. > >> Based on how this was implemented in IKEv1, it seems the intent was >> to use a separate Informational exchange. > >In IKEv1 it was supposed to be sent inside the main mode, but as the >extra payloads are not authenticated there, some implementations use >separate informational exchange for it. For IKEv1 it was actually very >bad idea to use separate informational exchange as they were not >reliable. I tend to agree with Tero: the INITIAL_CONTACT dance is probably best done during IKE_AUTH, not afterwards. We can ignore what was done, or supposed to be done, in IKEv1, since this part of the exchanges in IKEv2 is structured quite differently. Does anyone have a problem with us suggesting that INITIAL_CONTACT should be communicated during IKE_AUTH, not as a separate exchange after the IKE_SA (and probably the CHILD_SA) is set up? --Paul Hoffman, Director --VPN Consortium _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Mon Apr 11 00:21:12 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA18459 for ; Mon, 11 Apr 2005 00:21:11 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DKqLz-0006JU-9i; Mon, 11 Apr 2005 00:16:51 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DKqLv-0006JO-Ec for ipsec@megatron.ietf.org; Mon, 11 Apr 2005 00:16:49 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA18011 for ; Mon, 11 Apr 2005 00:16:44 -0400 (EDT) Received: from michael.checkpoint.com ([194.29.32.68] helo=michael2.checkpoint.com) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DKqVD-0002uK-1l for ipsec@ietf.org; Mon, 11 Apr 2005 00:26:24 -0400 Received: from [194.29.46.218] (localhost [127.0.0.1]) by michael2.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id j3B4G9wx028807; Mon, 11 Apr 2005 07:16:09 +0300 (IDT) In-Reply-To: References: <16981.6410.971961.170256@fireball.kivinen.iki.fi> Mime-Version: 1.0 (Apple Message framework v619.2) Content-Type: text/plain; charset=US-ASCII; format=flowed Message-Id: <71212b742ecf7f72e4392b87c311341e@checkpoint.com> Content-Transfer-Encoding: 7bit From: Yoav Nir Subject: Re: [Ipsec] Questions about internal address Date: Mon, 11 Apr 2005 07:16:34 +0300 To: Paul Hoffman X-Mailer: Apple Mail (2.619.2) X-Spam-Score: 0.0 (/) X-Scan-Signature: ea4ac80f790299f943f0a53be7e1a21a Content-Transfer-Encoding: 7bit Cc: IPsec WG , Tero Kivinen X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit On Apr 10, 2005, at 6:59 PM, Paul Hoffman wrote: > At 2:27 PM +0300 4/7/05, Tero Kivinen wrote: >> Yoav Nir writes: >>> 2. Section 4 refers to renewal before the ADDRESS_EXPIRY elapses. >>> How >> >> And note also that ADDRESS_EXPIRY is optional to implement for the >> server, server can simply refuse to give them out, and client can >> simply not request it. Clients MUST understand if it replied to them, >> but that is all. > > I'm not sure what you mean by "optional to implement for the server". > The IKEv2 document says: > > A minimal IPv4 initiator will generate a CP payload containing only > an INTERNAL_IP4_ADDRESS attribute and will parse the response > ignoring attributes it does not know how to use. The only attribute > it MUST be able to process is INTERNAL_ADDRESS_EXPIRY, which it must > use to bound the lifetime of the SA unless it successfully renews > the > lease before it expires. Minimal initiators need not be able to > request lease renewals and minimal responders need not respond to > them. > > That doesn't sound optional to me. It is not optional for the initiator (=client), but it is optional for the responder (=server) _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Mon Apr 11 06:25:08 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA29353 for ; Mon, 11 Apr 2005 06:25:08 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DKvel-0004an-Oz; Mon, 11 Apr 2005 05:56:35 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DKvek-0004Yi-0b for ipsec@megatron.ietf.org; Mon, 11 Apr 2005 05:56:34 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA27603 for ; Mon, 11 Apr 2005 05:56:25 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DKvo0-0002a2-Ik for ipsec@ietf.org; Mon, 11 Apr 2005 06:06:09 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j3B9uL5F021748 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Mon, 11 Apr 2005 12:56:22 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j3B9uKRZ021745; Mon, 11 Apr 2005 12:56:20 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16986.18884.429516.592143@fireball.kivinen.iki.fi> Date: Mon, 11 Apr 2005 12:56:20 +0300 From: Tero Kivinen To: Paul Hoffman Subject: Re: [Ipsec] Questions about internal address In-Reply-To: References: <16981.6410.971961.170256@fireball.kivinen.iki.fi> X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 3 min X-Total-Time: 3 min X-Spam-Score: 0.0 (/) X-Scan-Signature: ffa9dfbbe7cc58b3fa6b8ae3e57b0aa3 Content-Transfer-Encoding: 7bit Cc: IPsec WG X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Paul Hoffman writes: > I'm not sure what you mean by "optional to implement for the server". > The IKEv2 document says: > > A minimal IPv4 initiator will generate a CP payload containing only > an INTERNAL_IP4_ADDRESS attribute and will parse the response > ignoring attributes it does not know how to use. The only attribute > it MUST be able to process is INTERNAL_ADDRESS_EXPIRY, which it must > use to bound the lifetime of the SA unless it successfully renews the > lease before it expires. Minimal initiators need not be able to > request lease renewals and minimal responders need not respond to > them. > > That doesn't sound optional to me. It is not optional to initiator (client). Client must process it if server sends it. Server can ignore requests to it, and it can simply never send it. So for server it is optional, as can be seen from here: A minimal IPv4 responder implementation will ignore the contents of the CP payload except to determine that it includes an INTERNAL_IP4_ADDRESS attribute and will respond with the address and other related attributes regardless of whether the initiator requested them. -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Mon Apr 11 12:54:35 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA29164 for ; Mon, 11 Apr 2005 12:54:35 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DL1vH-0002xq-5y; Mon, 11 Apr 2005 12:38:03 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DL1vG-0002pH-8G for ipsec@megatron.ietf.org; Mon, 11 Apr 2005 12:38:02 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA22522 for ; Mon, 11 Apr 2005 11:36:14 -0400 (EDT) Received: from above.proper.com ([208.184.76.39]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DL13a-0003G6-3E for ipsec@ietf.org; Mon, 11 Apr 2005 11:42:35 -0400 Received: from [10.20.30.249] (dsl2-63-249-109-245.cruzio.com [63.249.109.245]) (authenticated bits=0) by above.proper.com (8.12.11/8.12.9) with ESMTP id j3BFWm97015590; Mon, 11 Apr 2005 08:32:49 -0700 (PDT) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: <16986.18884.429516.592143@fireball.kivinen.iki.fi> References: <16981.6410.971961.170256@fireball.kivinen.iki.fi> <16986.18884.429516.592143@fireball.kivinen.iki.fi> Date: Mon, 11 Apr 2005 08:32:44 -0700 To: Tero Kivinen From: Paul Hoffman Subject: Re: [Ipsec] Questions about internal address Content-Type: text/plain; charset="us-ascii" ; format="flowed" X-Spam-Score: 0.0 (/) X-Scan-Signature: ea4ac80f790299f943f0a53be7e1a21a Cc: IPsec WG X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org At 12:56 PM +0300 4/11/05, Tero Kivinen wrote: >Paul Hoffman writes: >> I'm not sure what you mean by "optional to implement for the server". >> The IKEv2 document says: >> >> A minimal IPv4 initiator will generate a CP payload containing only >> an INTERNAL_IP4_ADDRESS attribute and will parse the response >> ignoring attributes it does not know how to use. The only attribute >> it MUST be able to process is INTERNAL_ADDRESS_EXPIRY, which it must >> use to bound the lifetime of the SA unless it successfully renews the >> lease before it expires. Minimal initiators need not be able to >> request lease renewals and minimal responders need not respond to >> them. >> >> That doesn't sound optional to me. > >It is not optional to initiator (client). Client must process it if >server sends it. Server can ignore requests to it, and it can simply >never send it. So for server it is optional, as can be seen from here: > > A minimal IPv4 responder implementation will ignore the contents of > the CP payload except to determine that it includes an > INTERNAL_IP4_ADDRESS attribute and will respond with the address and > other related attributes regardless of whether the initiator > requested them. Ah, got it. Thanks. --Paul Hoffman, Director --VPN Consortium _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Mon Apr 11 14:43:05 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA07811 for ; Mon, 11 Apr 2005 14:43:05 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DL3kV-0001vc-Bn; Mon, 11 Apr 2005 14:35:03 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DL3kS-0001se-NS for ipsec@megatron.ietf.org; Mon, 11 Apr 2005 14:35:01 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA07253 for ; Mon, 11 Apr 2005 14:34:50 -0400 (EDT) Received: from aragorn.bbn.com ([128.33.0.62]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DL3tj-0000lF-3D for ipsec@ietf.org; Mon, 11 Apr 2005 14:44:37 -0400 Received: from [128.89.89.106] (dhcp89-089-106.bbn.com [128.89.89.106]) by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j3BIYRvH020858; Mon, 11 Apr 2005 14:34:32 -0400 (EDT) Mime-Version: 1.0 Message-Id: In-Reply-To: <71212b742ecf7f72e4392b87c311341e@checkpoint.com> References: <16981.6410.971961.170256@fireball.kivinen.iki.fi> <71212b742ecf7f72e4392b87c311341e@checkpoint.com> Date: Mon, 11 Apr 2005 12:25:20 -0400 To: Yoav Nir From: Stephen Kent Subject: Re: [Ipsec] Questions about internal address Content-Type: text/plain; charset="us-ascii" ; format="flowed" X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41 X-Virus-Status: Clean X-Spam-Score: 0.0 (/) X-Scan-Signature: 97adf591118a232206bdb5a27b217034 Cc: IPsec WG , Paul Hoffman , Tero Kivinen X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org At 7:16 AM +0300 4/11/05, Yoav Nir wrote: >On Apr 10, 2005, at 6:59 PM, Paul Hoffman wrote: > >>At 2:27 PM +0300 4/7/05, Tero Kivinen wrote: >>>Yoav Nir writes: >>>> 2. Section 4 refers to renewal before the ADDRESS_EXPIRY elapses. How >>> >>>And note also that ADDRESS_EXPIRY is optional to implement for the >>>server, server can simply refuse to give them out, and client can >>>simply not request it. Clients MUST understand if it replied to them, >>>but that is all. >> >>I'm not sure what you mean by "optional to implement for the >>server". The IKEv2 document says: >> >> A minimal IPv4 initiator will generate a CP payload containing only >> an INTERNAL_IP4_ADDRESS attribute and will parse the response >> ignoring attributes it does not know how to use. The only attribute >> it MUST be able to process is INTERNAL_ADDRESS_EXPIRY, which it must >> use to bound the lifetime of the SA unless it successfully renews the >> lease before it expires. Minimal initiators need not be able to >> request lease renewals and minimal responders need not respond to >> them. >> >>That doesn't sound optional to me. > >It is not optional for the initiator (=client), but it is optional >for the responder (=server) Remember that IPsec is a peer protocol and thus has no clients not servers. The terms "initiator" and "responder" were chosen for use in IKE to avoid conveying any client/server model notions ala SSL/TLS. Steve _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Mon Apr 11 18:29:14 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA08406 for ; Mon, 11 Apr 2005 18:29:14 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DL7A5-0001hS-Bc; Mon, 11 Apr 2005 18:13:41 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DL7A1-0001b1-RG for ipsec@megatron.ietf.org; Mon, 11 Apr 2005 18:13:38 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA06807 for ; Mon, 11 Apr 2005 18:12:57 -0400 (EDT) Received: from zcars04e.nortelnetworks.com ([47.129.242.56] helo=zcars04e.ca.nortel.com) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DL7Is-00020k-PE for ipsec@ietf.org; Mon, 11 Apr 2005 18:22:47 -0400 Received: from zcard303.ca.nortel.com (zcard303.ca.nortel.com [47.129.242.59]) by zcars04e.ca.nortel.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id j3BMCYG16177; Mon, 11 Apr 2005 18:12:34 -0400 (EDT) Received: from nortelnetworks.com (abrw0031.ca.nortel.com [47.9.16.101]) by zcard303.ca.nortel.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13) id 2NQARCFT; Mon, 11 Apr 2005 18:12:39 -0400 Message-ID: <425AF653.358E9568@nortelnetworks.com> Date: Mon, 11 Apr 2005 18:12:35 -0400 From: "Marcus D. Leech" X-Mailer: Mozilla 4.76 [en] (X11; U; Linux 2.4.17 i686) X-Accept-Language: en MIME-Version: 1.0 To: Stephen Kent Subject: Re: [Ipsec] Questions about internal address References: <16981.6410.971961.170256@fireball.kivinen.iki.fi> <71212b742ecf7f72e4392b87c311341e@checkpoint.com> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Spam-Score: 0.0 (/) X-Scan-Signature: 9182cfff02fae4f1b6e9349e01d62f32 Content-Transfer-Encoding: 7bit Cc: IPsec WG , Yoav Nir , Paul Hoffman , Tero Kivinen X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Stephen Kent wrote: > > >It is not optional for the initiator (=client), but it is optional > >for the responder (=server) > > Remember that IPsec is a peer protocol and thus has no clients not > servers. The terms "initiator" and "responder" were chosen for use > in IKE to avoid conveying any client/server model notions ala SSL/TLS. > > Steve > In this particular case (which looks to me like the "roadwarrior" case), the semantic binding between "initiator"/"client" and "responder"/"server"/"gateway" is stronger than in most other cases, and strikes me as entirely appropriate. But maybe I'm just easily struck... -- Marcus Leech Mail: Dept W669, M/S: 04352P16 Advisor Phone: (ESN) 393-9145 +1 613 763 9145 Internet & Security Services Nortel Networks mleech@nortelnetworks.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Mon Apr 11 19:15:32 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA10724 for ; Mon, 11 Apr 2005 19:15:32 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DL85z-00030b-Dk; Mon, 11 Apr 2005 19:13:31 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DL85w-0002yd-Vw for ipsec@megatron.ietf.org; Mon, 11 Apr 2005 19:13:29 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA10624 for ; Mon, 11 Apr 2005 19:13:25 -0400 (EDT) Received: from kremlin.juniper.net ([207.17.137.120]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DL8FO-0003TE-2a for ipsec@ietf.org; Mon, 11 Apr 2005 19:23:16 -0400 Received: from unknown (HELO gamma.jnpr.net) (172.24.245.25) by kremlin.juniper.net with ESMTP; 11 Apr 2005 16:13:17 -0700 X-BrightmailFiltered: true X-Brightmail-Tracker: AAAAAA== X-IronPort-AV: i="3.92,95,1112598000"; d="scan'208"; a="288634057:sNHT21300312" Received: from hadron.jnpr.net ([172.24.15.25]) by gamma.jnpr.net with Microsoft SMTPSVC(6.0.3790.211); Mon, 11 Apr 2005 16:13:17 -0700 x-mimeole: Produced By Microsoft Exchange V6.5.7226.0 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Subject: RE: [Ipsec] Questions about internal address Date: Mon, 11 Apr 2005 16:13:15 -0700 Message-ID: Thread-Topic: [Ipsec] Questions about internal address Thread-Index: AcU7d7OI3UYUXqkaQtqq6W85XQqfIADcmgHA From: "Timothy Liu" To: "Tero Kivinen" , "Yoav Nir" X-OriginalArrivalTime: 11 Apr 2005 23:13:17.0087 (UTC) FILETIME=[0B30AAF0:01C53EEC] X-Spam-Score: 0.0 (/) X-Scan-Signature: 41c17b4b16d1eedaa8395c26e9a251c4 Content-Transfer-Encoding: quoted-printable Cc: IPsec WG X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: quoted-printable Tero, Forgive me to butt in. This was not my interpretation when reading the draft. On page 4: ... In all cases, all IKE_SA_INIT exchanges MUST complete before any other exchange type, then all IKE_AUTH exchanges MUST complete, and following that any number of CREATE_CHILD_SA and INFORMATIONAL exchanges may occur in any order.=20 My take was the IKE_AUTH has to be completed successfully and a child sa created. I can see it is possible to interpret 'complete' as long as the ceritificate and AUTH payload checked out to be OK. And rest of it can fail because of a) proposal mismatch b) traffic selector c) CP payload d) other(?). Is it too much to call IKE_AUTH complete=20 when these other payload process fail? Tim > -----Original Message----- > From: ipsec-bounces@ietf.org=20 > [mailto:ipsec-bounces@ietf.org]On Behalf Of > Tero Kivinen > Sent: Thursday, April 07, 2005 6:39 AM > To: Yoav Nir > Cc: IPsec WG > Subject: Re: [Ipsec] Questions about internal address >=20 >=20 > Yoav Nir writes: > > On Apr 7, 2005, at 2:25 PM, Tero Kivinen wrote: >=20 > > This says that no CHILD_SA is created, but it does not say that no=20 > > IKE_SA is created. >=20 > Yes, that is right. If there is any problems with the IPsec SA if the > IKE_AUTH, you still do create the IKE SA, but simply fail the IPsec SA > with error code. This applies to the NO_PROSAL_CHOSEN, > SINGLE_PAIR_REQUIRED, INTERNAL_ADDRESS_FAILURE, FAILED_CP_REQUIRED, > and TS_UNACCEPTALBE. >=20 > The idea is that we have all the information needed to create the IKE > SA, and we have already done the Diffie-Hellman, signature > verification etc, so it would be wasting resources to throw all that > away, just because there was something wrong with the IPsec SA. If the > initiator knows how to fix the situation (add CP, change traffic > selectors, modify algorithms etc) he can do that and initiate > CREATE_CHILD_SA to create new SAs. >=20 > If he cannot do anything, he can simply delete the IKE SA if he does > not wnat to have it.=20 >=20 > > Does this mean that we have an exchange that creates an IKE_SA but > > not a CHILD_SA? >=20 > Yes. >=20 > > If I understand this correctly, at this point the client is supposed > > to start a new CCSA exchange with its own IP address. > --=20 > kivinen@safenet-inc.com >=20 > _______________________________________________ > Ipsec mailing list > Ipsec@ietf.org > https://www1.ietf.org/mailman/listinfo/ipsec >=20 _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Tue Apr 12 04:47:11 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA09426 for ; Tue, 12 Apr 2005 04:47:11 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLGr8-0007U9-Nq; Tue, 12 Apr 2005 04:34:46 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLGr5-0007Ss-Qq for ipsec@megatron.ietf.org; Tue, 12 Apr 2005 04:34:44 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA08705 for ; Tue, 12 Apr 2005 04:34:33 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLH0U-00011p-Lm for ipsec@ietf.org; Tue, 12 Apr 2005 04:44:28 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j3C8YM8E005182 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Tue, 12 Apr 2005 11:34:22 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j3C8YJCg005179; Tue, 12 Apr 2005 11:34:19 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16987.34826.904414.434475@fireball.kivinen.iki.fi> Date: Tue, 12 Apr 2005 11:34:18 +0300 From: Tero Kivinen To: Stephen Kent Subject: Re: [Ipsec] Questions about internal address In-Reply-To: References: <16981.6410.971961.170256@fireball.kivinen.iki.fi> <71212b742ecf7f72e4392b87c311341e@checkpoint.com> X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 5 min X-Total-Time: 6 min X-Spam-Score: 0.0 (/) X-Scan-Signature: 798b2e660f1819ae38035ac1d8d5e3ab Content-Transfer-Encoding: 7bit Cc: IPsec WG , Yoav Nir , Paul Hoffman X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Stephen Kent writes: > >It is not optional for the initiator (=client), but it is optional > >for the responder (=server) > > Remember that IPsec is a peer protocol and thus has no clients not > servers. The terms "initiator" and "responder" were chosen for use > in IKE to avoid conveying any client/server model notions ala SSL/TLS. For configuration payloads there is client/server model to be processed. IPsec is peer protocol, configuration payload is client/server protocol (it is used in the remote access, where we have server (SGW, responder, remote access server/gateway), and client (remote access client, initiator, client etc). I think that in remote access scenario (1.1.3 scenario) it is easier to use remote access client and remote access server names, as it makes things much easier. Initiator and responder might not match client and server every time, i.e. server might initiate rekey to the client, but client must be the one initiating the configuration payload request to the server, if it wants to get configuration data. -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Tue Apr 12 05:34:04 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA12706 for ; Tue, 12 Apr 2005 05:34:04 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLHLq-0004X8-Eq; Tue, 12 Apr 2005 05:06:30 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLHLG-0004Te-Q2 for ipsec@megatron.ietf.org; Tue, 12 Apr 2005 05:05:59 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA11015 for ; Tue, 12 Apr 2005 05:05:44 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLHUg-0001yG-NQ for ipsec@ietf.org; Tue, 12 Apr 2005 05:15:39 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j3C95e9U005460 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Tue, 12 Apr 2005 12:05:41 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j3C95ebU005457; Tue, 12 Apr 2005 12:05:40 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16987.36708.273335.802340@fireball.kivinen.iki.fi> Date: Tue, 12 Apr 2005 12:05:40 +0300 From: Tero Kivinen To: "Timothy Liu" Subject: RE: [Ipsec] Questions about internal address In-Reply-To: References: X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 8 min X-Total-Time: 10 min X-Spam-Score: 0.0 (/) X-Scan-Signature: 50a516d93fd399dc60588708fd9a3002 Content-Transfer-Encoding: 7bit Cc: IPsec WG , Yoav Nir X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Timothy Liu writes: > Forgive me to butt in. This was not my interpretation when reading > the draft. On page 4: > > ... In all cases, > all IKE_SA_INIT exchanges MUST complete before any other exchange > type, then all IKE_AUTH exchanges MUST complete, and following that > any number of CREATE_CHILD_SA and INFORMATIONAL exchanges may occur > in any order. > > My take was the IKE_AUTH has to be completed successfully and a > child sa created. IKE_AUTH creates the IKE SA, so that must succeed and be finished before we can have any other exchanges. That does not say anything about the initial child SA created inside the IKE_AUTH. > I can see it is possible to interpret 'complete' as long as the > ceritificate and AUTH payload checked out to be OK. There is some text in the draft that indicates that you could do that, i.e. IKE_AUTH can succeed without creating the child SA in case there was error while creating it. It would be also pointless to destroy the IKE SA just because the first IPsec SA could not be created, as the initiator could try next soem other IPsec SA which can be created. > And rest of it can fail because of a) proposal mismatch b) traffic > selector c) CP payload d) other(?). Yes. At least NO_PROPOSAL_CHOSEN, SINGLE_PAIR_REQUIRED, INTERNAL_ADDRESS_FAILURE, FAILED_CP_REQUIRED, TS_UNACCEPTABLE are such error messages. The text in the INTERNAL_ADDRESS_FAILURE says: "If this error is generated within an IKE_AUTH exchange no CHILD_SA will be created.", i.e. it does not say that the whole negotiation fails, but only that no CHILD_SA will be created. I do remember there was other text in the draft indicating same thing, but I cannot find it now or it might be that it was the discussion on the list. > Is it too much to call IKE_AUTH complete when these other payload > process fail? I think the IKE_AUTH succeeded, the CREATE_CHILD_SA included in the same packet did fail. -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Tue Apr 12 10:48:33 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA05659 for ; Tue, 12 Apr 2005 10:48:33 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLMNZ-0001lc-Je; Tue, 12 Apr 2005 10:28:37 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLMNX-0001ks-E1 for ipsec@megatron.ietf.org; Tue, 12 Apr 2005 10:28:35 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA04120 for ; Tue, 12 Apr 2005 10:28:24 -0400 (EDT) Received: from aragorn.bbn.com ([128.33.0.62]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLMWz-0002Iy-5n for ipsec@ietf.org; Tue, 12 Apr 2005 10:38:22 -0400 Received: from [128.89.89.106] (dhcp89-089-106.bbn.com [128.89.89.106]) by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j3CES8vH000828; Tue, 12 Apr 2005 10:28:09 -0400 (EDT) Mime-Version: 1.0 Message-Id: In-Reply-To: <425AF653.358E9568@nortelnetworks.com> References: <16981.6410.971961.170256@fireball.kivinen.iki.fi> <71212b742ecf7f72e4392b87c311341e@checkpoint.com> <425AF653.358E9568@nortelnetworks.com> Date: Tue, 12 Apr 2005 10:11:44 -0400 To: "Marcus D. Leech" From: Stephen Kent Subject: Re: [Ipsec] Questions about internal address Content-Type: text/plain; charset="us-ascii" ; format="flowed" X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41 X-Virus-Status: Clean X-Spam-Score: 0.0 (/) X-Scan-Signature: 9466e0365fc95844abaf7c3f15a05c7d Cc: IPsec WG , Yoav Nir , Paul Hoffman , Tero Kivinen X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org At 6:12 PM -0400 4/11/05, Marcus D. Leech wrote: >Stephen Kent wrote: >> > >> >It is not optional for the initiator (=client), but it is optional >> >for the responder (=server) >> >> Remember that IPsec is a peer protocol and thus has no clients not >> servers. The terms "initiator" and "responder" were chosen for use >> in IKE to avoid conveying any client/server model notions ala SSL/TLS. >> >> Steve >> > >In this particular case (which looks to me like the "roadwarrior" case), the > semantic binding between "initiator"/"client" and >"responder"/"server"/"gateway" > is stronger than in most other cases, and strikes me as entirely >appropriate. > >But maybe I'm just easily struck... Maybe :-), but the point is that IPsec does not make special accommodations for client/server model interactions, unlike SSL/TLS. IPsec assumes a peer communication architecture; one is free to use it in a client/server context, but should not expect special accommodations for that more restrictive case. Steve _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Tue Apr 12 12:38:03 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA13252 for ; Tue, 12 Apr 2005 12:38:03 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLNxq-0000Lk-Mz; Tue, 12 Apr 2005 12:10:10 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLNxo-0000Le-RL for ipsec@megatron.ietf.org; Tue, 12 Apr 2005 12:10:09 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA11166 for ; Tue, 12 Apr 2005 12:10:05 -0400 (EDT) Received: from sj-iport-1-in.cisco.com ([171.71.176.70] helo=sj-iport-1.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLO7P-0005GU-Oy for ipsec@ietf.org; Tue, 12 Apr 2005 12:20:05 -0400 Received: from sj-core-2.cisco.com (171.71.177.254) by sj-iport-1.cisco.com with ESMTP; 12 Apr 2005 09:09:24 -0700 X-IronPort-AV: i="3.92,96,1112598000"; d="scan'208"; a="628115420:sNHT1682514172" Received: from mira-sjc5-b.cisco.com (IDENT:mirapoint@mira-sjc5-b.cisco.com [171.71.163.14]) by sj-core-2.cisco.com (8.12.10/8.12.6) with ESMTP id j3CG9GpT018477; Tue, 12 Apr 2005 09:09:16 -0700 (PDT) Received: from ghuangx31 (dhcp-128-107-163-169.cisco.com [128.107.163.169]) by mira-sjc5-b.cisco.com (MOS 3.4.5-GR) with ESMTP id BDW42986; Tue, 12 Apr 2005 09:09:20 -0700 (PDT) Message-Id: <200504121609.BDW42986@mira-sjc5-b.cisco.com> From: "Geoffrey Huang" To: "'Paul Hoffman'" , Subject: RE: [Ipsec] Clarifying the use of INITIAL_CONTACT in IKEv2 Date: Tue, 12 Apr 2005 09:09:19 -0700 MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Office Outlook, Build 11.0.5510 In-Reply-To: X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4942.400 Thread-Index: AcU99uTPADgeUvk3TJSigoeujpTyywBgwpVA X-Spam-Score: 0.0 (/) X-Scan-Signature: d8ae4fd88fcaf47c1a71c804d04f413d Content-Transfer-Encoding: 7bit X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Hi Paul, I agree with this proposal - I think it's much better to include IC as part of the AUTH message itself. -g > -----Original Message----- > From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] > On Behalf Of Paul Hoffman > Sent: Sunday, April 10, 2005 10:53 AM > To: ipsec@ietf.org > Subject: [Ipsec] Clarifying the use of INITIAL_CONTACT in IKEv2 > > Greetings again. In the IKEv2 clarifications document, Pasi and I say: > > 6.12 Which message should contain INITIAL_CONTACT > > The description of the INITIAL_CONTACT notification in > Section 3.10.1 > says that "This notification asserts that this IKE_SA is the only > IKE_SA currently active between the authenticated identities". > However, neither Section 2.4 nor 3.10.1 says in which message this > payload should be placed. > > The text does talk about authenticated identities, so it seems the > notification cannot be sent before both endpoints have been > authenticated. Thus, the possible places are the last IKE_AUTH > response message and a separate Informational exchange. > > Based on how this was implemented in IKEv1, it seems the > intent was > to use a separate Informational exchange. > > Tero responded: > > >Initiator usually knows to whom is is supposed to talk to > and he knows > >weather he has SA with him before or not (if he had IKE SA he would > >have used it, or he had some other reason not to use it). > > > >So it means that initiator can send INITIAL_CONTACT in IKE_AUTH and > >responder can respond to that in the same packet. I would actually > >prefer that instead of using separate informational exchange. > > > >> Based on how this was implemented in IKEv1, it seems > the intent was > >> to use a separate Informational exchange. > > > >In IKEv1 it was supposed to be sent inside the main mode, but as the > >extra payloads are not authenticated there, some implementations use > >separate informational exchange for it. For IKEv1 it was > actually very > >bad idea to use separate informational exchange as they were not > >reliable. > > I tend to agree with Tero: the INITIAL_CONTACT dance is > probably best done during IKE_AUTH, not afterwards. We can > ignore what was done, or supposed to be done, in IKEv1, since > this part of the exchanges in > IKEv2 is structured quite differently. > > Does anyone have a problem with us suggesting that > INITIAL_CONTACT should be communicated during IKE_AUTH, not > as a separate exchange after the IKE_SA (and probably the > CHILD_SA) is set up? > > --Paul Hoffman, Director > --VPN Consortium > > _______________________________________________ > Ipsec mailing list > Ipsec@ietf.org > https://www1.ietf.org/mailman/listinfo/ipsec > _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Tue Apr 12 16:21:57 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA05317 for ; Tue, 12 Apr 2005 16:21:57 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLRDp-0003kd-OJ; Tue, 12 Apr 2005 15:38:53 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLRDm-0003k7-MF; Tue, 12 Apr 2005 15:38:50 -0400 Received: from CNRI.Reston.VA.US (localhost [127.0.0.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA29412; Tue, 12 Apr 2005 15:38:48 -0400 (EDT) Message-Id: <200504121938.PAA29412@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: i-d-announce@ietf.org From: Internet-Drafts@ietf.org Date: Tue, 12 Apr 2005 15:38:48 -0400 Cc: ipsec@ietf.org Subject: [Ipsec] I-D ACTION:draft-ietf-ipsec-ike-ecc-groups-05.txt X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the IP Security Protocol Working Group of the IETF. Title : Additional ECC Groups For IKE Author(s) : P. Panjwani, et al. Filename : draft-ietf-ipsec-ike-ecc-groups-05.txt Pages : 7 Date : 2005-4-12 This document describes new ECC groups for use in IKE [IKE] in addition to the Oakley groups included therein. These groups are defined to align IKE with other ECC implementations and standards, and in addition, many of them provide higher strength than the Oakley groups. It should be noted that this document is not self-contained. It uses the notations and definitions of [IKE]. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ike-ecc-groups-05.txt To remove yourself from the I-D Announcement list, send a message to i-d-announce-request@ietf.org with the word unsubscribe in the body of the message. You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce to change your subscription settings. Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-ietf-ipsec-ike-ecc-groups-05.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-ietf-ipsec-ike-ecc-groups-05.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <2005-4-12161209.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-ietf-ipsec-ike-ecc-groups-05.txt --OtherAccess Content-Type: Message/External-body; name="draft-ietf-ipsec-ike-ecc-groups-05.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2005-4-12161209.I-D@ietf.org> --OtherAccess-- --NextPart Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline Content-Transfer-Encoding: 7bit _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec --NextPart-- From ipsec-bounces@ietf.org Wed Apr 13 00:06:31 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA14303 for ; Wed, 13 Apr 2005 00:06:31 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLZ3i-0004Di-1H; Wed, 13 Apr 2005 00:00:58 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLZ3f-0004D9-LM for ipsec@megatron.ietf.org; Wed, 13 Apr 2005 00:00:55 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA13871 for ; Wed, 13 Apr 2005 00:00:52 -0400 (EDT) Received: from michael.checkpoint.com ([194.29.32.68]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLZDM-0001rW-Gz for ipsec@ietf.org; Wed, 13 Apr 2005 00:10:58 -0400 Received: from [194.29.46.218] (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id j3D3xvnP026502; Wed, 13 Apr 2005 06:59:57 +0300 (IDT) In-Reply-To: References: <16981.6410.971961.170256@fireball.kivinen.iki.fi> <71212b742ecf7f72e4392b87c311341e@checkpoint.com> <425AF653.358E9568@nortelnetworks.com> Mime-Version: 1.0 (Apple Message framework v619.2) Content-Type: text/plain; charset=US-ASCII; format=flowed Message-Id: <5cb34e71984ca9cb4278d1825506074f@checkpoint.com> Content-Transfer-Encoding: 7bit From: Yoav Nir Subject: Re: [Ipsec] Questions about internal address Date: Wed, 13 Apr 2005 07:00:22 +0300 To: Stephen Kent X-Mailer: Apple Mail (2.619.2) X-Spam-Score: 0.0 (/) X-Scan-Signature: 769a46790fb42fbb0b0cc700c82f7081 Content-Transfer-Encoding: 7bit Cc: IPsec WG , "Marcus D. Leech" , Paul Hoffman , Tero Kivinen X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit As far as I can tell there are three things that break the symmetry between peers: 1. Only the initiator in the initial exchange can ask for CFG 2. Only the initiator in the initial exchange can be authenticated with EAP 3. Only the initiator in the initial exchange, not the responder can be behind a NAT device The first two are very specific to "roadwarrior" or "work-from-home". The third might also apply to small networks using broadband. Having these three things in IKE means that there is a difference between the peers. Perhaps we need some term to differentiate between the original initiator and the original responder. On Apr 12, 2005, at 5:11 PM, Stephen Kent wrote: > At 6:12 PM -0400 4/11/05, Marcus D. Leech wrote: >> Stephen Kent wrote: >>> >> >>> >It is not optional for the initiator (=client), but it is optional >>> >for the responder (=server) >>> >>> Remember that IPsec is a peer protocol and thus has no clients not >>> servers. The terms "initiator" and "responder" were chosen for use >>> in IKE to avoid conveying any client/server model notions ala >>> SSL/TLS. >>> >>> Steve >>> >> >> In this particular case (which looks to me like the "roadwarrior" >> case), the >> semantic binding between "initiator"/"client" and >> "responder"/"server"/"gateway" >> is stronger than in most other cases, and strikes me as entirely >> appropriate. >> >> But maybe I'm just easily struck... > > Maybe :-), but the point is that IPsec does not make special > accommodations for client/server model interactions, unlike SSL/TLS. > IPsec assumes a peer communication architecture; one is free to use it > in a client/server context, but should not expect special > accommodations for that more restrictive case. > > Steve _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Wed Apr 13 00:27:12 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA16129 for ; Wed, 13 Apr 2005 00:27:11 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLZJD-00076W-Cc; Wed, 13 Apr 2005 00:16:59 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLZJB-00075p-92 for ipsec@megatron.ietf.org; Wed, 13 Apr 2005 00:16:57 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA15051 for ; Wed, 13 Apr 2005 00:16:48 -0400 (EDT) Received: from michael.checkpoint.com ([194.29.32.68]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLZSn-0002G6-7Y for ipsec@ietf.org; Wed, 13 Apr 2005 00:26:54 -0400 Received: from [194.29.46.218] (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id j3D4GCnP000799; Wed, 13 Apr 2005 07:16:13 +0300 (IDT) In-Reply-To: <16987.36708.273335.802340@fireball.kivinen.iki.fi> References: <16987.36708.273335.802340@fireball.kivinen.iki.fi> Mime-Version: 1.0 (Apple Message framework v619.2) Content-Type: text/plain; charset=US-ASCII; format=flowed Message-Id: <1a9d8e8756c9d1c71b5388385fc6b59b@checkpoint.com> Content-Transfer-Encoding: 7bit From: Yoav Nir Subject: Re: [Ipsec] Questions about internal address Date: Wed, 13 Apr 2005 07:16:37 +0300 To: Tero Kivinen X-Mailer: Apple Mail (2.619.2) X-Spam-Score: 0.0 (/) X-Scan-Signature: 9ed51c9d1356100bce94f1ae4ec616a9 Content-Transfer-Encoding: 7bit Cc: IPsec WG , Pasi.Eronen@nokia.com X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit On Apr 12, 2005, at 12:05 PM, Tero Kivinen wrote: > > There is some text in the draft that indicates that you could do that, > i.e. IKE_AUTH can succeed without creating the child SA in case there > was error while creating it. It would be also pointless to destroy the > IKE SA just because the first IPsec SA could not be created, as the > initiator could try next soem other IPsec SA which can be created. > >> And rest of it can fail because of a) proposal mismatch b) traffic >> selector c) CP payload d) other(?). > > Yes. At least NO_PROPOSAL_CHOSEN, SINGLE_PAIR_REQUIRED, > INTERNAL_ADDRESS_FAILURE, FAILED_CP_REQUIRED, TS_UNACCEPTABLE are such > error messages. > > The text in the INTERNAL_ADDRESS_FAILURE says: "If this error is > generated within an IKE_AUTH exchange no CHILD_SA will be created.", > i.e. it does not say that the whole negotiation fails, but only that > no CHILD_SA will be created. > > I do remember there was other text in the draft indicating same thing, > but I cannot find it now or it might be that it was the discussion on > the list. This is an interesting point, and I think it should be described in the clarifications draft. Until now I assumed that since the child-SA and IKE-SA are negotiated in the same exchange, they either succeed together or fail together. So is this a valid exchange? Initiator Responder ----------- ----------- HDR, SAi1, KEi, Ni --> <-- HDR, SAr1, KEr, Nr, [CERTREQ] HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,] AUTH, SAi2, TSi, TSr} --> <-- HDR, SK {IDr, [CERT,] AUTH, N(NO_PROPOSAL_CHOSEN)} _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Wed Apr 13 07:33:49 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA16778 for ; Wed, 13 Apr 2005 07:33:49 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLfzY-0004Sg-Qp; Wed, 13 Apr 2005 07:25:08 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLfzW-0004R4-SO for ipsec@megatron.ietf.org; Wed, 13 Apr 2005 07:25:06 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA15984 for ; Wed, 13 Apr 2005 07:24:56 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLg9A-0003kf-I6 for ipsec@ietf.org; Wed, 13 Apr 2005 07:35:05 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j3DBOjcX024602 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Wed, 13 Apr 2005 14:24:45 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j3DBOgA2024599; Wed, 13 Apr 2005 14:24:42 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <16989.378.586050.717026@fireball.kivinen.iki.fi> Date: Wed, 13 Apr 2005 14:24:42 +0300 From: Tero Kivinen To: Yoav Nir Subject: Re: [Ipsec] Questions about internal address In-Reply-To: <1a9d8e8756c9d1c71b5388385fc6b59b@checkpoint.com> References: <16987.36708.273335.802340@fireball.kivinen.iki.fi> <1a9d8e8756c9d1c71b5388385fc6b59b@checkpoint.com> X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 7 min X-Total-Time: 6 min X-Spam-Score: 0.0 (/) X-Scan-Signature: a7d6aff76b15f3f56fcb94490e1052e4 Content-Transfer-Encoding: 7bit Cc: IPsec WG , Pasi.Eronen@nokia.com X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: 7bit Yoav Nir writes: > This is an interesting point, and I think it should be described in the > clarifications draft. Until now I assumed that since the child-SA and > IKE-SA are negotiated in the same exchange, they either succeed > together or fail together. So is this a valid exchange? > > Initiator Responder > ----------- ----------- > HDR, SAi1, KEi, Ni --> > > <-- HDR, SAr1, KEr, Nr, [CERTREQ] > > HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,] > AUTH, SAi2, TSi, TSr} --> > > > <-- HDR, SK {IDr, [CERT,] AUTH, > N(NO_PROPOSAL_CHOSEN)} I didn't implement this first, and then someone pointed out me that this should be accepted (don't remember who, where and how), so I added this feature just before interop meeting to our code... I do remember that I did check that myself from the draft and found out some text there that indicated that it would be acceptable, and that was the reason I added that code. I couldn't find the text now when I was searching for it... This needs to be addressed in the clarifications draft, and I think as there is cases where the first exchange fails, but later ones can succeed, it would be waste of resources to do diffie-hellman and authentication again after each failed negotiation. Valid cases could be like, the other end has policy from IP1 to IP2, and the other end has policy of TCP from IP1 to TCP from IP2. Now if the initiator initiates with the ICMP packet the responder cannot narrow down the traffic selectors, but he can create IKE SA. When the initiator tries again with some tcp traffic that will succeed (I used this as an example as this happend to be exactly the case I was checking few hours ago in our test lab). -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Wed Apr 13 12:53:18 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA13091 for ; Wed, 13 Apr 2005 12:53:18 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLknH-0007fS-D9; Wed, 13 Apr 2005 12:32:47 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLknD-0007el-4Z; Wed, 13 Apr 2005 12:32:43 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA11482; Wed, 13 Apr 2005 12:32:40 -0400 (EDT) Received: from [132.151.6.50] (helo=newodin.ietf.org) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLkx2-0003rH-3a; Wed, 13 Apr 2005 12:42:52 -0400 Received: from apache by newodin.ietf.org with local (Exim 4.43) id 1DLknB-00063t-Ks; Wed, 13 Apr 2005 12:32:41 -0400 X-test-idtracker: no From: The IESG To: IETF-Announce Message-Id: Date: Wed, 13 Apr 2005 12:32:41 -0400 X-Spam-Score: 0.0 (/) X-Scan-Signature: 93238566e09e6e262849b4f805833007 Cc: ipsec mailing list , ipsec chair , Internet Architecture Board , ipsec chair , RFC Editor Subject: [Ipsec] Protocol Action: 'Security Architecture for the Internet Protocol' to Proposed Standard X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org The IESG has approved the following document: - 'Security Architecture for the Internet Protocol ' as a Proposed Standard This document is the product of the IP Security Protocol Working Group. The IESG contact persons are Russ Housley and Sam Hartman. Technical Summary This document describes an updated version of the "Security Architecture for IP," which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). Working Group Summary The IPsec WG achieved consensus on this document. Protocol Quality This document was reviewed by Russ Housley for the IESG. _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Wed Apr 13 18:56:37 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA15928 for ; Wed, 13 Apr 2005 18:56:37 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLqXD-0001n2-2l; Wed, 13 Apr 2005 18:40:35 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DLqXA-0001mn-Vb for ipsec@megatron.ietf.org; Wed, 13 Apr 2005 18:40:33 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA14607 for ; Wed, 13 Apr 2005 18:40:22 -0400 (EDT) Received: from thunk.org ([69.25.196.29] helo=thunker.thunk.org) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLqgu-0006oO-2t for ipsec@ietf.org; Wed, 13 Apr 2005 18:50:37 -0400 Received: from root (helo=thunk.org) by thunker.thunk.org with local-esmtp (Exim 3.35 #1 (Debian)) id 1DLqWa-0002fB-00; Wed, 13 Apr 2005 18:39:57 -0400 Received: from tytso by thunk.org with local (Exim 4.50) id 1DLqWY-0001cf-BO; Wed, 13 Apr 2005 18:39:54 -0400 Date: Wed, 13 Apr 2005 18:39:54 -0400 From: "Theodore Ts'o" To: Russ Housley Subject: Re: [Ipsec] Re: Results of straw poll regarding: IKEv2 interoperability issue Message-ID: <20050413223954.GB6183@thunk.org> References: <6.2.0.14.2.20050315100106.0624c8e0@mail.binhost.com> <20050406145659.GA20093@thunk.org> <6.2.0.14.2.20050406112358.04690910@mail.binhost.com> <16981.3625.976427.270687@fireball.kivinen.iki.fi> <6.2.0.14.2.20050407150511.06108900@mail.binhost.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <6.2.0.14.2.20050407150511.06108900@mail.binhost.com> User-Agent: Mutt/1.5.8i X-Spam-Score: 0.0 (/) X-Scan-Signature: 7d33c50f3756db14428398e2bdedd581 Cc: ipsec@ietf.org, Charlie Kaufman , Barbara Fraser , Tero Kivinen X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org On Thu, Apr 07, 2005 at 03:06:49PM -0400, Russ Housley wrote: > All: > > This is sufficiently small. > > Ted & Barbara: > > Now, I need to confirm that this is the WG consensus. > > Once you have done so, please send me a formal request, formatted like AUTH > 48 input to the RFC Editor. ACK. Based on the discussion on the wg mailing list, and straw poll conducted a few weeks ago, we believe this is indeed the WG consensus. I note that 2401bis has been approved by the IESG and sent to the RFC editor, but it has not yet appeared in the RFC editor's queue. When it does appear, I will send a note to the RFC editor and cc you. Please let me know if you'd like us to follow some different process. - Ted _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 14 07:47:55 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA02969 for ; Thu, 14 Apr 2005 07:47:55 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DM2en-0008JC-3O; Thu, 14 Apr 2005 07:37:13 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DM2ek-0008Il-NL for ipsec@megatron.ietf.org; Thu, 14 Apr 2005 07:37:10 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA02173 for ; Thu, 14 Apr 2005 07:37:01 -0400 (EDT) From: Pasi.Eronen@nokia.com Received: from mgw-x4.nokia.com ([131.228.20.27]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DM2ob-0002WJ-E5 for ipsec@ietf.org; Thu, 14 Apr 2005 07:47:22 -0400 Received: from esdks001.ntc.nokia.com (esdks001.ntc.nokia.com [172.21.138.120]) by mgw-x4.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id j3EBawl23919 for ; Thu, 14 Apr 2005 14:36:59 +0300 (EET DST) X-Scanned: Thu, 14 Apr 2005 14:55:11 +0300 Nokia Message Protector V1.3.34 2004121512 - RELEASE Received: (from root@localhost) by esdks001.ntc.nokia.com (8.12.9/8.12.9) id j3EBtB45027531 for ; Thu, 14 Apr 2005 14:55:11 +0300 Received: from mgw-int1.ntc.nokia.com (172.21.143.96) by esdks001.ntc.nokia.com 00AWbl8Y; Thu, 14 Apr 2005 14:55:09 EEST Received: from esebh001.NOE.Nokia.com (esebh001.ntc.nokia.com [172.21.138.28]) by mgw-int1.ntc.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id j3EBYWM23469 for ; Thu, 14 Apr 2005 14:34:32 +0300 (EET DST) Received: from esebh005.NOE.Nokia.com ([172.21.138.86]) by esebh001.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); Thu, 14 Apr 2005 14:33:42 +0300 Received: from esebe016.NOE.Nokia.com ([172.21.138.55]) by esebh005.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); Thu, 14 Apr 2005 14:33:42 +0300 Received: from esebe105.NOE.Nokia.com ([172.21.143.53]) by esebe016.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); Thu, 14 Apr 2005 14:33:42 +0300 X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Subject: RE: [Ipsec] Comments of draft-eronen-ipsec-ikev2-clarifications-02.txt Date: Thu, 14 Apr 2005 14:33:42 +0300 Message-ID: Thread-Topic: [Ipsec] Comments of draft-eronen-ipsec-ikev2-clarifications-02.txt thread-index: AcU7YSSpn9VmBIu1QGyfwPlgL+jmhAFg1n/A To: , , X-OriginalArrivalTime: 14 Apr 2005 11:33:42.0677 (UTC) FILETIME=[CFBB3C50:01C540E5] X-Spam-Score: 0.3 (/) X-Scan-Signature: 97adf591118a232206bdb5a27b217034 Content-Transfer-Encoding: quoted-printable X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: quoted-printable Tero Kivinen writes: >=20 > Tero Kivinen writes: > > Also if we think more about the IKE SA rekeying, I do not=20 > > think there is any reason to do that unless you also do new=20 > > Diffie-Hellman there too. Rekeying IKE SA because of the IKE=20 > > message ID wrapping is not common. The current IKEv2 text is=20 > > not clear wheather the intension was that IKE SA rekey MUST=20 > > have KE payloads, but I think we should mandate them, i.e.=20 > > say in the NEW-1.3.2 that KE payloads are not optional > > there. >=20 > Actually it is clear from the draft-ietf-ipsec-ikev2-17.txt that > Diffie-Hellman parameter is NOT optional when rekeying IKE. The=20 > 3.3.3 lists D-H as mandatory type if the protocol is IKE, and=20 > the 3.3.2 does the same in the Transform Type Values table. So=20 > KE payloads are not optional in the NEW-1.3.2. I agree that including D-H transform in IKE proposals is mandatory (this is clearly said in both 3.3.2 and 3.3.3), but is it allowed=20 to have NONE as the value? If it is, including KE payload is not really mandatory... Section 2.18 says that SKEYSEED for the new IKE_SA is calculated as follows: SKEYSEED =3D prf(SK_d (old), [g^ir (new)] | Ni | Nr) The square brackets in "[g^ir (new)]" seem to imply that NONE would be allowed... but I do agree with you that it's not=20 very useful. Best regards, Pasi _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 14 14:52:38 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA11785 for ; Thu, 14 Apr 2005 14:52:38 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DM9KZ-0004Fj-UE; Thu, 14 Apr 2005 14:44:47 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DM9KX-0004DF-W7 for ipsec@megatron.ietf.org; Thu, 14 Apr 2005 14:44:46 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA11142 for ; Thu, 14 Apr 2005 14:44:43 -0400 (EDT) Received: from above.proper.com ([208.184.76.39]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DM9UY-00049q-EO for ipsec@ietf.org; Thu, 14 Apr 2005 14:55:07 -0400 Received: from [165.227.249.220] (adsl-66-125-125-65.dsl.pltn13.pacbell.net [66.125.125.65]) (authenticated bits=0) by above.proper.com (8.12.11/8.12.9) with ESMTP id j3EIifU4049562; Thu, 14 Apr 2005 11:44:41 -0700 (PDT) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: References: Date: Thu, 14 Apr 2005 11:44:39 -0700 To: Pasi.Eronen@nokia.com, , From: Paul Hoffman Subject: RE: [Ipsec] Comments of draft-eronen-ipsec-ikev2-clarifications-02.txt Content-Type: text/plain; charset="us-ascii" ; format="flowed" X-Spam-Score: 0.0 (/) X-Scan-Signature: 9466e0365fc95844abaf7c3f15a05c7d X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org At 2:33 PM +0300 4/14/05, Pasi.Eronen@nokia.com wrote: >I agree that including D-H transform in IKE proposals is mandatory >(this is clearly said in both 3.3.2 and 3.3.3), but is it allowed >to have NONE as the value? Yes. > If it is, including KE payload is not >really mandatory... Disagree: it is mandatory, but it doesn't give you any extra security. >Section 2.18 says that SKEYSEED for the new IKE_SA is calculated >as follows: > > SKEYSEED = prf(SK_d (old), [g^ir (new)] | Ni | Nr) > >The square brackets in "[g^ir (new)]" seem to imply that NONE >would be allowed... but I do agree with you that it's not >very useful. Agree on both. Do others agree with this tentative conclusion, that the KE payload is required for rekeying IKE SAs, even it is has a value of 0 (meaning NONE)? --Paul Hoffman, Director --VPN Consortium _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Fri Apr 15 04:25:09 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA05786 for ; Fri, 15 Apr 2005 04:25:09 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DMLwd-0007UL-Jx; Fri, 15 Apr 2005 04:12:55 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DMLwZ-0007SG-FR for ipsec@megatron.ietf.org; Fri, 15 Apr 2005 04:12:51 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA04778 for ; Fri, 15 Apr 2005 04:12:43 -0400 (EDT) From: Pasi.Eronen@nokia.com Received: from mgw-x4.nokia.com ([131.228.20.27]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DMM6c-0002j7-5h for ipsec@ietf.org; Fri, 15 Apr 2005 04:23:15 -0400 Received: from esdks002.ntc.nokia.com (esdks002.ntc.nokia.com [172.21.138.121]) by mgw-x4.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id j3F8Ccl01926; Fri, 15 Apr 2005 11:12:38 +0300 (EET DST) X-Scanned: Fri, 15 Apr 2005 11:11:25 +0300 Nokia Message Protector V1.3.34 2004121512 - RELEASE Received: (from root@localhost) by esdks002.ntc.nokia.com (8.12.9/8.12.9) id j3F8BPOP027221; Fri, 15 Apr 2005 11:11:25 +0300 Received: from mgw-int1.ntc.nokia.com (172.21.143.96) by esdks002.ntc.nokia.com 00xK6JaT; Fri, 15 Apr 2005 11:11:24 EEST Received: from esebh004.NOE.Nokia.com (esebh004.ntc.nokia.com [172.21.138.84]) by mgw-int1.ntc.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id j3F8BLM17152; Fri, 15 Apr 2005 11:11:21 +0300 (EET DST) Received: from esebe016.NOE.Nokia.com ([172.21.138.55]) by esebh004.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); Fri, 15 Apr 2005 11:11:00 +0300 Received: from esebe105.NOE.Nokia.com ([172.21.143.53]) by esebe016.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); Fri, 15 Apr 2005 11:10:59 +0300 X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Subject: RE: [Ipsec] Comments of draft-eronen-ipsec-ikev2-clarifications-02.txt Date: Fri, 15 Apr 2005 11:10:59 +0300 Message-ID: Thread-Topic: [Ipsec] Comments of draft-eronen-ipsec-ikev2-clarifications-02.txt thread-index: AcVBJBCB7t05z8rSSbuelXou9s8PKgAbSgcA To: , , X-OriginalArrivalTime: 15 Apr 2005 08:10:59.0839 (UTC) FILETIME=[A88730F0:01C54192] X-Spam-Score: 0.3 (/) X-Scan-Signature: 39bd8f8cbb76cae18b7e23f7cf6b2b9f Content-Transfer-Encoding: quoted-printable X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Content-Transfer-Encoding: quoted-printable Paul Hoffman wrote: >=20 > At 2:33 PM +0300 4/14/05, Pasi.Eronen@nokia.com wrote: >> I agree that including D-H transform in IKE proposals is mandatory >> (this is clearly said in both 3.3.2 and 3.3.3), but is it allowed >> to have NONE as the value? >=20 > Yes. >=20 >> If it is, including KE payload is not really mandatory... >=20 > Disagree: it is mandatory, but it doesn't give you any extra=20 > security. >=20 >> Section 2.18 says that SKEYSEED for the new IKE_SA is calculated >> as follows: >> >> SKEYSEED =3D prf(SK_d (old), [g^ir (new)] | Ni | Nr) >> >> The square brackets in "[g^ir (new)]" seem to imply that NONE >> would be allowed... but I do agree with you that it's not >> very useful. >=20 > Agree on both. >=20 > Do others agree with this tentative conclusion, that the KE payload=20 > is required for rekeying IKE SAs, even it is has a value of 0=20 > (meaning NONE)? The spec is quite clear that when you rekey CHILD_SAs without=20 doing DH (i.e., you either omit the DH transform completely, or include it with value 0), the KE payload is not included.=20 Why would including the KE payload be mandatory when rekeying=20 IKE_SAs without DH? Best regards, Pasi _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Sat Apr 16 00:06:04 2005 Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA27832 for ; Sat, 16 Apr 2005 00:06:04 -0400 (EDT) Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DMeQt-0006D5-Gr; Fri, 15 Apr 2005 23:57:23 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DMeQr-0006Ch-IG for ipsec@megatron.ietf.org; Fri, 15 Apr 2005 23:57:22 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA27313 for ; Fri, 15 Apr 2005 23:57:18 -0400 (EDT) Received: from thunk.org ([69.25.196.29] helo=thunker.thunk.org) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DMebB-0005SD-Fo for ipsec@ietf.org; Sat, 16 Apr 2005 00:08:01 -0400 Received: from root (helo=thunk.org) by thunker.thunk.org with local-esmtp (Exim 3.35 #1 (Debian)) id 1DMeQf-0003IQ-00; Fri, 15 Apr 2005 23:57:10 -0400 Received: from tytso by thunk.org with local (Exim 4.50) id 1DMeQd-0001fH-O6; Fri, 15 Apr 2005 23:57:07 -0400 Date: Fri, 15 Apr 2005 23:57:07 -0400 From: "Theodore Ts'o" To: Russ Housley Message-ID: <20050416035707.GA6348@thunk.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.8i X-Spam-Score: 0.0 (/) X-Scan-Signature: e1b0e72ff1bbd457ceef31828f216a86 Cc: ipsec@ietf.org, Charlie Kaufman , rfc-ed@rfc-editor.org, Barbara Fraser , Tero Kivinen Subject: [Ipsec] Requested edit to draft-ietf-ipsec-ikev2-17.txt X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org On Thu, Apr 07, 2005 at 03:06:49PM -0400, Russ Housley wrote: > Ted & Barbara: > > Now, I need to confirm that this is the WG consensus. Russ: Barbara and I have conferred and in our judgement, the following change is the WG consensus. > Once you have done so, please send me a formal request, formatted like AUTH > 48 input to the RFC Editor. To the RFC editor: in order to address an interoperability issue that was uncovered during a recent interoperability test, the following change is needed in order to make the ESN transform mandatory instead of optional. draft-ietf-ipsec-ikev2-17 is currently in EDIT status, and we would like the following change to be made to the draft before it is published. Many thanks, Theodore Tso and Barbara Fraser ipsec wg chairs ---------------------------------------------------- In section 3.3.2 remove "optional in" from the ESN line, i.e. change Transform Type Values Transform Used In Type RESERVED 0 Encryption Algorithm (ENCR) 1 (IKE and ESP) Pseudo-random Function (PRF) 2 (IKE) Integrity Algorithm (INTEG) 3 (IKE, AH, optional in ESP) Diffie-Hellman Group (D-H) 4 (IKE, optional in AH & ESP) Extended Sequence Numbers (ESN) 5 (Optional in AH and ESP) RESERVED TO IANA 6-240 PRIVATE USE 241-255 to Transform Type Values Transform Used In Type RESERVED 0 Encryption Algorithm (ENCR) 1 (IKE and ESP) Pseudo-random Function (PRF) 2 (IKE) Integrity Algorithm (INTEG) 3 (IKE, AH, optional in ESP) Diffie-Hellman Group (D-H) 4 (IKE, optional in AH & ESP) Extended Sequence Numbers (ESN) 5 (AH and ESP) RESERVED TO IANA 6-240 PRIVATE USE 241-255 ---------------------------------------------------------------------- In section 3.3.2 remove last paragraph from the description of the Transform Type 5, i.e. change: For Transform Type 5 (Extended Sequence Numbers), defined Transform IDs are: Name Number No Extended Sequence Numbers 0 Extended Sequence Numbers 1 RESERVED 2 - 65535 If Transform Type 5 is not included in a proposal, use of Extended Sequence Numbers is assumed. to For Transform Type 5 (Extended Sequence Numbers), defined Transform IDs are: Name Number No Extended Sequence Numbers 0 Extended Sequence Numbers 1 RESERVED 2 - 65535 ---------------------------------------------------------------------- In section 3.3.3 move ESN to mandatory types of the ESN an AH, i.e. change: Protocol Mandatory Types Optional Types IKE ENCR, PRF, INTEG, D-H ESP ENCR INTEG, D-H, ESN AH INTEG D-H, ESN to Protocol Mandatory Types Optional Types IKE ENCR, PRF, INTEG, D-H ESP ENCR, ESN INTEG, D-H AH INTEG, ESN D-H _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Sat Apr 16 21:47:56 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DMytA-0007LF-ET; Sat, 16 Apr 2005 21:47:56 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DMyt8-0007L2-FI for ipsec@megatron.ietf.org; Sat, 16 Apr 2005 21:47:54 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA24422 for ; Sat, 16 Apr 2005 21:47:52 -0400 (EDT) Received: from sj-iport-4.cisco.com ([171.68.10.86]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DMz3d-0007wp-A8 for ipsec@ietf.org; Sat, 16 Apr 2005 21:58:46 -0400 Received: from sj-core-4.cisco.com (171.68.223.138) by sj-iport-4.cisco.com with ESMTP; 16 Apr 2005 18:47:43 -0700 Received: from mira-sjc5-b.cisco.com (IDENT:mirapoint@mira-sjc5-b.cisco.com [171.71.163.14]) by sj-core-4.cisco.com (8.12.10/8.12.6) with ESMTP id j3H1ldpR022614; Sat, 16 Apr 2005 18:47:40 -0700 (PDT) Received: from ghuangx31 (sjc-vpn5-569.cisco.com [10.21.90.57]) by mira-sjc5-b.cisco.com (MOS 3.4.5-GR) with ESMTP id BEA11732; Sat, 16 Apr 2005 18:47:39 -0700 (PDT) Message-Id: <200504170147.BEA11732@mira-sjc5-b.cisco.com> From: "Geoffrey Huang" To: , , , Subject: RE: [Ipsec] Comments of draft-eronen-ipsec-ikev2-clarifications-02.txt Date: Sat, 16 Apr 2005 18:47:38 -0700 MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Office Outlook, Build 11.0.5510 In-Reply-To: X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4942.400 thread-index: AcVBJBCB7t05z8rSSbuelXou9s8PKgAbSgcAAFd9QDA= X-Spam-Score: 0.0 (/) X-Scan-Signature: 244a2fd369eaf00ce6820a760a3de2e8 Content-Transfer-Encoding: 7bit Cc: X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org > -----Original Message----- > From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] > On Behalf Of Pasi.Eronen@nokia.com > Sent: Friday, April 15, 2005 1:11 AM > To: paul.hoffman@vpnc.org; kivinen@iki.fi; ipsec@ietf.org > Subject: RE: [Ipsec] Comments of > draft-eronen-ipsec-ikev2-clarifications-02.txt > > Paul Hoffman wrote: > > > > At 2:33 PM +0300 4/14/05, Pasi.Eronen@nokia.com wrote: > >> I agree that including D-H transform in IKE proposals is mandatory > >> (this is clearly said in both 3.3.2 and 3.3.3), but is it > allowed to > >> have NONE as the value? > > > > Yes. > > > >> If it is, including KE payload is not really mandatory... > > > > Disagree: it is mandatory, but it doesn't give you any > extra security. > > > >> Section 2.18 says that SKEYSEED for the new IKE_SA is > calculated as > >> follows: > >> > >> SKEYSEED = prf(SK_d (old), [g^ir (new)] | Ni | Nr) > >> > >> The square brackets in "[g^ir (new)]" seem to imply that > NONE would > >> be allowed... but I do agree with you that it's not very useful. > > > > Agree on both. > > > > Do others agree with this tentative conclusion, that the KE > payload is > > required for rekeying IKE SAs, even it is has a value of 0 (meaning > > NONE)? > > The spec is quite clear that when you rekey CHILD_SAs without > doing DH (i.e., you either omit the DH transform completely, > or include it with value 0), the KE payload is not included. > Why would including the KE payload be mandatory when rekeying > IKE_SAs without DH? Judging by Tero's pervious mail, this is not the conclusion he came to. Nor is it the conclusion I came to, but I completely missed the square brackets around the g^ir (Paul had to point it out to me). I think the draft is clear as mud here. Making the transform mandatory and giving it a value of 0 would make it consistent with how the ESN text will be. -g > Best regards, > Pasi > > _______________________________________________ > Ipsec mailing list > Ipsec@ietf.org > https://www1.ietf.org/mailman/listinfo/ipsec > _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Mon Apr 18 14:07:34 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DNaek-0004LB-Iv; Mon, 18 Apr 2005 14:07:34 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DNaej-0004Ku-5g for ipsec@megatron.ietf.org; Mon, 18 Apr 2005 14:07:33 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA11992 for ; Mon, 18 Apr 2005 14:07:32 -0400 (EDT) Received: from woodstock.binhost.com ([144.202.243.4]) by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DNapZ-0000Qb-Dj for ipsec@ietf.org; Mon, 18 Apr 2005 14:18:46 -0400 Received: (qmail 6674 invoked by uid 0); 18 Apr 2005 18:06:36 -0000 Received: from unknown (HELO Russ-Laptop.vigilsec.com) (138.88.35.69) by woodstock.binhost.com with SMTP; 18 Apr 2005 18:06:36 -0000 Message-Id: <6.2.0.14.2.20050418140543.03ceb210@mail.binhost.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.0.14 Date: Mon, 18 Apr 2005 14:06:37 -0400 To: "Theodore Ts'o" From: Russ Housley Subject: Re: [Ipsec] Requested edit to draft-ietf-ipsec-ikev2-17.txt In-Reply-To: <20050416035707.GA6348@thunk.org> References: <20050416035707.GA6348@thunk.org> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed X-Spam-Score: 0.2 (/) X-Scan-Signature: c83ccb5cc10e751496398f1233ca9c3a Cc: ipsec@ietf.org, Charlie Kaufman , Barbara Fraser , Tero Kivinen X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org I have sent these proposed changes to the IESG for approval. I will let you know if any issues arise. Russ At 11:57 PM 4/15/2005, Theodore Ts'o wrote: >On Thu, Apr 07, 2005 at 03:06:49PM -0400, Russ Housley wrote: > > Ted & Barbara: > > > > Now, I need to confirm that this is the WG consensus. > >Russ: Barbara and I have conferred and in our judgement, the following >change is the WG consensus. > > > Once you have done so, please send me a formal request, formatted like AUTH > > 48 input to the RFC Editor. > >To the RFC editor: in order to address an interoperability issue that >was uncovered during a recent interoperability test, the following >change is needed in order to make the ESN transform mandatory instead >of optional. > >draft-ietf-ipsec-ikev2-17 is currently in EDIT status, and we would >like the following change to be made to the draft before it is >published. > >Many thanks, > > Theodore Tso and Barbara Fraser > ipsec wg chairs > > >---------------------------------------------------- > >In section 3.3.2 remove "optional in" from the ESN line, i.e. change > > Transform Type Values > > Transform Used In > Type > RESERVED 0 > Encryption Algorithm (ENCR) 1 (IKE and ESP) > Pseudo-random Function (PRF) 2 (IKE) > Integrity Algorithm (INTEG) 3 (IKE, AH, optional in ESP) > Diffie-Hellman Group (D-H) 4 (IKE, optional in AH & ESP) > Extended Sequence Numbers (ESN) 5 (Optional in AH and ESP) > RESERVED TO IANA 6-240 > PRIVATE USE 241-255 > >to > > Transform Type Values > > Transform Used In > Type > RESERVED 0 > Encryption Algorithm (ENCR) 1 (IKE and ESP) > Pseudo-random Function (PRF) 2 (IKE) > Integrity Algorithm (INTEG) 3 (IKE, AH, optional in ESP) > Diffie-Hellman Group (D-H) 4 (IKE, optional in AH & ESP) > Extended Sequence Numbers (ESN) 5 (AH and ESP) > RESERVED TO IANA 6-240 > PRIVATE USE 241-255 > >---------------------------------------------------------------------- > >In section 3.3.2 remove last paragraph from the description of the >Transform Type 5, i.e. change: > > For Transform Type 5 (Extended Sequence Numbers), defined Transform > IDs are: > > Name Number > No Extended Sequence Numbers 0 > Extended Sequence Numbers 1 > RESERVED 2 - 65535 > > If Transform Type 5 is not included in a proposal, use of > Extended Sequence Numbers is assumed. > >to > > For Transform Type 5 (Extended Sequence Numbers), defined Transform > IDs are: > > Name Number > No Extended Sequence Numbers 0 > Extended Sequence Numbers 1 > RESERVED 2 - 65535 > >---------------------------------------------------------------------- > >In section 3.3.3 move ESN to mandatory types of the ESN an AH, i.e. >change: > > Protocol Mandatory Types Optional Types > IKE ENCR, PRF, INTEG, D-H > ESP ENCR INTEG, D-H, ESN > AH INTEG D-H, ESN > >to > > Protocol Mandatory Types Optional Types > IKE ENCR, PRF, INTEG, D-H > ESP ENCR, ESN INTEG, D-H > AH INTEG, ESN D-H > >_______________________________________________ >Ipsec mailing list >Ipsec@ietf.org >https://www1.ietf.org/mailman/listinfo/ipsec _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Mon Apr 18 15:51:08 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DNcGy-0007a4-JC; Mon, 18 Apr 2005 15:51:08 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DNcGu-0007Uf-PL; Mon, 18 Apr 2005 15:51:04 -0400 Received: from CNRI.Reston.VA.US (localhost [127.0.0.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA24054; Mon, 18 Apr 2005 15:51:02 -0400 (EDT) Message-Id: <200504181951.PAA24054@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: i-d-announce@ietf.org From: Internet-Drafts@ietf.org Date: Mon, 18 Apr 2005 15:51:02 -0400 Cc: ipsec@ietf.org Subject: [Ipsec] I-D ACTION:draft-ietf-ipsec-ikev2-ecc-groups-00.txt X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the IP Security Protocol Working Group of the IETF. Title : ECC Groups For IKEv2 Author(s) : J. Solinas Filename : draft-ietf-ipsec-ikev2-ecc-groups-00.txt Pages : 6 Date : 2005-4-18 This document describes ECC groups for use as Diffie-Hellman groups in the Internet Key Exchange version 2 (IKEv2) protocol. These new groups are defined to align IKEv2 with other standards, particularly NIST standards, and with and to provide more efficient implementation than in previously defined groups. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ikev2-ecc-groups-00.txt To remove yourself from the I-D Announcement list, send a message to i-d-announce-request@ietf.org with the word unsubscribe in the body of the message. You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce to change your subscription settings. Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-ietf-ipsec-ikev2-ecc-groups-00.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-ietf-ipsec-ikev2-ecc-groups-00.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <2005-4-18161940.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-ietf-ipsec-ikev2-ecc-groups-00.txt --OtherAccess Content-Type: Message/External-body; name="draft-ietf-ipsec-ikev2-ecc-groups-00.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2005-4-18161940.I-D@ietf.org> --OtherAccess-- --NextPart Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec --NextPart-- From ipsec-bounces@ietf.org Mon Apr 18 15:51:19 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DNcH9-0007gR-Df; Mon, 18 Apr 2005 15:51:19 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DNcH4-0007bV-VG; Mon, 18 Apr 2005 15:51:15 -0400 Received: from CNRI.Reston.VA.US (localhost [127.0.0.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA24105; Mon, 18 Apr 2005 15:51:13 -0400 (EDT) Message-Id: <200504181951.PAA24105@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: i-d-announce@ietf.org From: Internet-Drafts@ietf.org Date: Mon, 18 Apr 2005 15:51:13 -0400 Cc: ipsec@ietf.org Subject: [Ipsec] I-D ACTION:draft-ietf-ipsec-ike-ecp-groups-00.txt X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the IP Security Protocol Working Group of the IETF. Title : ECP Groups For IKE Author(s) : J. Solinas Filename : draft-ietf-ipsec-ike-ecp-groups-00.txt Pages : 10 Date : 2005-4-18 This document describes new ECC groups for use in the Internet Key Exchange (IKE) protocol in addition to previously defined groups. Specifically, the new curve groups are based on modular arithmetic rather than binary arithmetic. These new groups are defined to align IKE with other ECC implementations and standards, particularly NIST standards. In addition, the curves defined here can provide more efficient implementation than previously defined ECC groups. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ike-ecp-groups-00.txt To remove yourself from the I-D Announcement list, send a message to i-d-announce-request@ietf.org with the word unsubscribe in the body of the message. You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce to change your subscription settings. Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-ietf-ipsec-ike-ecp-groups-00.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-ietf-ipsec-ike-ecp-groups-00.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <2005-4-18161946.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-ietf-ipsec-ike-ecp-groups-00.txt --OtherAccess Content-Type: Message/External-body; name="draft-ietf-ipsec-ike-ecp-groups-00.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2005-4-18161946.I-D@ietf.org> --OtherAccess-- --NextPart Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec --NextPart-- From ipsec-bounces@ietf.org Mon Apr 18 15:51:28 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DNcHI-0007qb-Ln; Mon, 18 Apr 2005 15:51:28 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DNcHF-0007pe-0B; Mon, 18 Apr 2005 15:51:25 -0400 Received: from CNRI.Reston.VA.US (localhost [127.0.0.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA24172; Mon, 18 Apr 2005 15:51:23 -0400 (EDT) Message-Id: <200504181951.PAA24172@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: i-d-announce@ietf.org From: Internet-Drafts@ietf.org Date: Mon, 18 Apr 2005 15:51:23 -0400 Cc: ipsec@ietf.org Subject: [Ipsec] I-D ACTION:draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the IP Security Protocol Working Group of the IETF. Title : IKEv2 Authentication Using ECDSA Author(s) : J. Solinas Filename : draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt Pages : 6 Date : 2005-4-18 This document describes how the Elliptic Curve Digital Signature Algorithm (ECDSA) may be used as the authentication method within the Internet Key Exchange protocol, version 2 (IKEv2). ECDSA may provide benefits including computational efficiency, small signature sizes, and minimal bandwidth, compared to other available digital signature methods. This document adds ECDSA capability to IKEv2 without introducing any changes to existing IKEv2 operation. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt To remove yourself from the I-D Announcement list, send a message to i-d-announce-request@ietf.org with the word unsubscribe in the body of the message. You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce to change your subscription settings. Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <2005-4-18161952.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt --OtherAccess Content-Type: Message/External-body; name="draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2005-4-18161952.I-D@ietf.org> --OtherAccess-- --NextPart Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec --NextPart-- From ipsec-bounces@ietf.org Tue Apr 19 06:39:28 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DNq8W-0007yE-Av; Tue, 19 Apr 2005 06:39:21 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DNq8Q-0007y1-Vd for ipsec@megatron.ietf.org; Tue, 19 Apr 2005 06:39:15 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA26470 for ; Tue, 19 Apr 2005 06:39:11 -0400 (EDT) From: Pasi.Eronen@nokia.com Received: from mgw-x3.nokia.com ([131.228.20.26]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DNqJP-0008Mf-Um for ipsec@ietf.org; Tue, 19 Apr 2005 06:50:37 -0400 Received: from esdks003.ntc.nokia.com (esdks003.ntc.nokia.com [172.21.138.158]) by mgw-x3.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id j3JAd5N24317 for ; Tue, 19 Apr 2005 13:39:06 +0300 (EET DST) X-Scanned: Tue, 19 Apr 2005 13:38:39 +0300 Nokia Message Protector V1.3.34 2004121512 - RELEASE Received: (from root@localhost) by esdks003.ntc.nokia.com (8.12.9/8.12.9) id j3JAcdbS011118 for ; Tue, 19 Apr 2005 13:38:39 +0300 Received: from mgw-int1.ntc.nokia.com (172.21.143.96) by esdks003.ntc.nokia.com 00gGyE4p; Tue, 19 Apr 2005 13:38:07 EEST Received: from esebh001.NOE.Nokia.com (esebh001.ntc.nokia.com [172.21.138.28]) by mgw-int1.ntc.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id j3JAbmM22325 for ; Tue, 19 Apr 2005 13:37:48 +0300 (EET DST) Received: from esebe016.NOE.Nokia.com ([172.21.138.55]) by esebh001.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); Tue, 19 Apr 2005 13:37:48 +0300 Received: from esebe105.NOE.Nokia.com ([172.21.143.53]) by esebe016.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); Tue, 19 Apr 2005 13:37:47 +0300 X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Date: Tue, 19 Apr 2005 13:37:47 +0300 Message-ID: Thread-Topic: Comment about 3664bis-01 thread-index: AcVEy9Qd7qBbI9V6QSWKoTzNi/7mEg== To: X-OriginalArrivalTime: 19 Apr 2005 10:37:47.0911 (UTC) FILETIME=[D4335170:01C544CB] X-Spam-Score: 0.3 (/) X-Scan-Signature: 769a46790fb42fbb0b0cc700c82f7081 Content-Transfer-Encoding: quoted-printable Subject: [Ipsec] Comment about 3664bis-01 X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org draft-hoffman-rfc3664bis-01 says: > The key for AES-XCBC-PRF-128 is created as follows: > > o If the key is exactly 128 bits long, use it as-is. > > o If the key has fewer than 128 bits, pad it on the right with=20 > zero bits until it is 128 bits long. > > o If the key is 129 bits or longer, call the first 128 bits=20 > TKEY (temporary key) and the remaining bits TDATA (temporary=20 > data). If TDATA's length is not a multiple of 128, pad TDATA=20 > on the right with enough 0 bits to make its length an exact=20 > multiple of 128. Encrypt each 128-bit block of TDATA with TKEY=20 > using AES-128-EBC as the cipher. When finished, XOR the=20 > resulting blocks in the same order as they were created. This way of using ECB mode fails horribly if, for instance,=20 the input contains contains 128 bits of entropy, but for some strange reason consists of three copies of the same 128-bit block: the output would always be zero. What we really need here is a "randomness extractor" that produces a 128-bit output with sufficient entropy (with some suitable definitions of "sufficient" and "entropy") when=20 given _any_ input with sufficient entropy, even if the input=20 contains some known/guessable bits and/or structure. IKEv2 already assumes that AES-XCBC-PRF is a reasonable randomness extractor (when the key is chosen randomly), so something like this would IMHO be better: o If the key is 129 bits or longer, call the first 128 bits TKEY (temporary key) and the remaining bits TDATA (temporary data). Calculate AES-XCBC-PRF-128(TKEY, TDATA) and use the output as the key. But the assumption made here is slightly different from normal IKEv2 (where the key is Ni/Nr), so probably we should ask some crypto experts (Hugo, are you listening? :-) about this. Also, I'm not sure if doing this step only when the key is longer than 128 bits causes some problems, or whether it would be better to do it always (but then it would not be backwards-compatible with 3664 anymore). Best regards, Pasi _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Tue Apr 19 16:50:01 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DNzfV-0006VR-30; Tue, 19 Apr 2005 16:50:01 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DNzfQ-0006SY-Ce for ipsec@megatron.ietf.org; Tue, 19 Apr 2005 16:49:56 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA25598 for ; Tue, 19 Apr 2005 16:49:53 -0400 (EDT) Received: from woodstock.binhost.com ([144.202.243.4]) by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DNzqV-0007im-J5 for ipsec@ietf.org; Tue, 19 Apr 2005 17:01:24 -0400 Received: (qmail 28102 invoked by uid 0); 19 Apr 2005 20:49:46 -0000 Received: from unknown (HELO Russ-Laptop.vigilsec.com) (138.88.135.227) by woodstock.binhost.com with SMTP; 19 Apr 2005 20:49:46 -0000 Message-Id: <6.2.0.14.2.20050419164905.05f99640@mail.binhost.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.0.14 Date: Tue, 19 Apr 2005 16:49:47 -0400 To: Pasi.Eronen@nokia.com, From: Russ Housley Subject: Re: [Ipsec] Comment about 3664bis-01 In-Reply-To: References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed X-Spam-Score: 0.2 (/) X-Scan-Signature: 02ec665d00de228c50c93ed6b5e4fc1a Cc: X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Pasi: The probability that all of the blocks are identical seems very slim to me. Russ At 06:37 AM 4/19/2005, Pasi.Eronen@nokia.com wrote: >draft-hoffman-rfc3664bis-01 says: > > > The key for AES-XCBC-PRF-128 is created as follows: > > > > o If the key is exactly 128 bits long, use it as-is. > > > > o If the key has fewer than 128 bits, pad it on the right with > > zero bits until it is 128 bits long. > > > > o If the key is 129 bits or longer, call the first 128 bits > > TKEY (temporary key) and the remaining bits TDATA (temporary > > data). If TDATA's length is not a multiple of 128, pad TDATA > > on the right with enough 0 bits to make its length an exact > > multiple of 128. Encrypt each 128-bit block of TDATA with TKEY > > using AES-128-EBC as the cipher. When finished, XOR the > > resulting blocks in the same order as they were created. > >This way of using ECB mode fails horribly if, for instance, >the input contains contains 128 bits of entropy, but for some >strange reason consists of three copies of the same 128-bit >block: the output would always be zero. > >What we really need here is a "randomness extractor" that >produces a 128-bit output with sufficient entropy (with some >suitable definitions of "sufficient" and "entropy") when >given _any_ input with sufficient entropy, even if the input >contains some known/guessable bits and/or structure. > >IKEv2 already assumes that AES-XCBC-PRF is a reasonable >randomness extractor (when the key is chosen randomly), so >something like this would IMHO be better: > > o If the key is 129 bits or longer, call the first 128 bits > TKEY (temporary key) and the remaining bits TDATA (temporary > data). Calculate AES-XCBC-PRF-128(TKEY, TDATA) and use > the output as the key. > >But the assumption made here is slightly different from normal >IKEv2 (where the key is Ni/Nr), so probably we should ask some >crypto experts (Hugo, are you listening? :-) about this. > >Also, I'm not sure if doing this step only when the key is >longer than 128 bits causes some problems, or whether it would >be better to do it always (but then it would not be >backwards-compatible with 3664 anymore). > >Best regards, >Pasi > >_______________________________________________ >Ipsec mailing list >Ipsec@ietf.org >https://www1.ietf.org/mailman/listinfo/ipsec _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Tue Apr 19 18:07:34 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DO0sY-0003tt-U3; Tue, 19 Apr 2005 18:07:34 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DO0sW-0003tn-Ip for ipsec@megatron.ietf.org; Tue, 19 Apr 2005 18:07:32 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA01143 for ; Tue, 19 Apr 2005 18:07:29 -0400 (EDT) Received: from [66.119.143.56] (helo=mail.rfburst.com) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DO13b-0001dS-Ik for ipsec@ietf.org; Tue, 19 Apr 2005 18:19:00 -0400 Received: from tobermory.localdomain ([66.119.143.202]) by mail.rfburst.com (8.12.8/8.12.8) with ESMTP id j3JM6pNX003206; Tue, 19 Apr 2005 16:06:51 -0600 Received: from tobermory.localdomain (localhost [127.0.0.1]) by tobermory.localdomain (8.12.10/8.11.6) with ESMTP id j3JM25fZ000504; Tue, 19 Apr 2005 16:02:05 -0600 Received: (from ho@localhost) by tobermory.localdomain (8.12.10/8.12.10/Submit) id j3JM25jx000500; Tue, 19 Apr 2005 16:02:05 -0600 Date: Tue, 19 Apr 2005 16:02:05 -0600 Message-Id: <200504192202.j3JM25jx000500@tobermory.localdomain> From: "The Purple Streak, Hilarie Orman" To: Pasi.Eronen@nokia.com Subject: Re: [Ipsec] Comment about 3664bis-01 X-esmartscan-MailScanner-Information: Please contact the ISP for more information X-esmartscan-MailScanner: Found to be clean X-MailScanner-From: ho@alum.mit.edu X-Spam-Score: 0.0 (/) X-Scan-Signature: 08e48e05374109708c00c6208b534009 Cc: ipsec@ietf.org X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org You are correct in observing that there are some undesirable properties in the method for deriving a 128-bit key from more than 128 bits. It would be better to use the hash itself with a zero key than to encrypt individual blocks. My preference would be to forbit the longer keys on the grounds that user who does that must have some unreasonable expectations about security. Hilarie _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Wed Apr 20 01:48:32 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DO84d-0001UR-Sv; Wed, 20 Apr 2005 01:48:31 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DO84b-0001UK-12 for ipsec@megatron.ietf.org; Wed, 20 Apr 2005 01:48:29 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA29317 for ; Wed, 20 Apr 2005 01:48:28 -0400 (EDT) From: Pasi.Eronen@nokia.com Received: from mgw-x3.nokia.com ([131.228.20.26]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DO8Fl-0005xb-0L for ipsec@ietf.org; Wed, 20 Apr 2005 02:00:01 -0400 Received: from esdks001.ntc.nokia.com (esdks001.ntc.nokia.com [172.21.138.120]) by mgw-x3.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id j3K5mON15858; Wed, 20 Apr 2005 08:48:24 +0300 (EET DST) X-Scanned: Wed, 20 Apr 2005 09:07:40 +0300 Nokia Message Protector V1.3.34 2004121512 - RELEASE Received: (from root@localhost) by esdks001.ntc.nokia.com (8.12.9/8.12.9) id j3K67ejB012433; Wed, 20 Apr 2005 09:07:40 +0300 Received: from mgw-int1.ntc.nokia.com (172.21.143.96) by esdks001.ntc.nokia.com 00I1VQBL; Wed, 20 Apr 2005 09:07:38 EEST Received: from esebh004.NOE.Nokia.com (esebh004.ntc.nokia.com [172.21.138.84]) by mgw-int1.ntc.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id j3K5mDM13702; Wed, 20 Apr 2005 08:48:13 +0300 (EET DST) Received: from esebe017.NOE.Nokia.com ([172.21.138.56]) by esebh004.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); Wed, 20 Apr 2005 08:48:07 +0300 Received: from esebe105.NOE.Nokia.com ([172.21.143.53]) by esebe017.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); Wed, 20 Apr 2005 08:48:05 +0300 X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Subject: RE: [Ipsec] Comment about 3664bis-01 Date: Wed, 20 Apr 2005 08:48:05 +0300 Message-ID: Thread-Topic: [Ipsec] Comment about 3664bis-01 thread-index: AcVFIXsr3mYwy/NfR8CiuvHHzJN56gASq0Eg To: , X-OriginalArrivalTime: 20 Apr 2005 05:48:05.0288 (UTC) FILETIME=[85C34A80:01C5456C] X-Spam-Score: 0.3 (/) X-Scan-Signature: cd26b070c2577ac175cd3a6d878c6248 Content-Transfer-Encoding: quoted-printable Cc: X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org I fully agree; that was just an example pointing out that=20 unless we use a real "randomness extractor", there will=20 be keys that are secure with all other PRFs, but not with=20 AES-XCBC-MAC.=20 Best regards, Pasi > -----Original Message----- > From: ext Russ Housley [mailto:housley@vigilsec.com] > Sent: Tuesday, April 19, 2005 11:50 PM > To: Eronen Pasi (Nokia-NRC/Helsinki); ipsec@ietf.org > Subject: Re: [Ipsec] Comment about 3664bis-01 >=20 >=20 > Pasi: >=20 > The probability that all of the blocks are identical seems=20 > very slim to me. >=20 > Russ >=20 > At 06:37 AM 4/19/2005, Pasi.Eronen@nokia.com wrote: > >draft-hoffman-rfc3664bis-01 says: > > > > > The key for AES-XCBC-PRF-128 is created as follows: > > > > > > o If the key is exactly 128 bits long, use it as-is. > > > > > > o If the key has fewer than 128 bits, pad it on the right with > > > zero bits until it is 128 bits long. > > > > > > o If the key is 129 bits or longer, call the first 128 bits > > > TKEY (temporary key) and the remaining bits TDATA (temporary > > > data). If TDATA's length is not a multiple of 128, pad TDATA > > > on the right with enough 0 bits to make its length an exact > > > multiple of 128. Encrypt each 128-bit block of TDATA with TKEY > > > using AES-128-EBC as the cipher. When finished, XOR the > > > resulting blocks in the same order as they were created. > > > >This way of using ECB mode fails horribly if, for instance, > >the input contains contains 128 bits of entropy, but for some > >strange reason consists of three copies of the same 128-bit > >block: the output would always be zero. > > > >What we really need here is a "randomness extractor" that > >produces a 128-bit output with sufficient entropy (with some > >suitable definitions of "sufficient" and "entropy") when > >given _any_ input with sufficient entropy, even if the input > >contains some known/guessable bits and/or structure. > > > >IKEv2 already assumes that AES-XCBC-PRF is a reasonable > >randomness extractor (when the key is chosen randomly), so > >something like this would IMHO be better: > > > > o If the key is 129 bits or longer, call the first 128 bits > > TKEY (temporary key) and the remaining bits TDATA (temporary > > data). Calculate AES-XCBC-PRF-128(TKEY, TDATA) and use > > the output as the key. > > > >But the assumption made here is slightly different from normal > >IKEv2 (where the key is Ni/Nr), so probably we should ask some > >crypto experts (Hugo, are you listening? :-) about this. > > > >Also, I'm not sure if doing this step only when the key is > >longer than 128 bits causes some problems, or whether it would > >be better to do it always (but then it would not be > >backwards-compatible with 3664 anymore). > > > >Best regards, > >Pasi > > > >_______________________________________________ > >Ipsec mailing list > >Ipsec@ietf.org > >https://www1.ietf.org/mailman/listinfo/ipsec >=20 >=20 _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Wed Apr 20 12:48:03 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DOIMt-0002iT-8H; Wed, 20 Apr 2005 12:48:03 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DOIMq-0002iO-QU for ipsec@megatron.ietf.org; Wed, 20 Apr 2005 12:48:00 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA26492 for ; Wed, 20 Apr 2005 12:47:58 -0400 (EDT) Received: from above.proper.com ([208.184.76.39]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DOIY5-0000bZ-MZ for ipsec@ietf.org; Wed, 20 Apr 2005 12:59:39 -0400 Received: from [165.227.249.220] (dsl2-63-249-109-245.cruzio.com [63.249.109.245]) (authenticated bits=0) by above.proper.com (8.12.11/8.12.9) with ESMTP id j3KGluHU093340 for ; Wed, 20 Apr 2005 09:47:57 -0700 (PDT) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: References: Date: Wed, 20 Apr 2005 09:47:39 -0700 To: IPsec WG From: Paul Hoffman Subject: RE: [Ipsec] Comment about 3664bis-01 Content-Type: text/plain; charset="us-ascii" ; format="flowed" X-Spam-Score: 0.0 (/) X-Scan-Signature: 7d33c50f3756db14428398e2bdedd581 X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org The (unstated, I admit) design goal was to use only one crypto algorithm in AES-XCBC-PRF-128. That is why I used AES as the mixing function. Pasi has pointed out a real problem: if the key consists of 128 bits followed by an even multiple of 128 bits, and each consecutive pair of that even multiple consists of two copies of the same 128 bits, the resulting key will be all zeros. There are two ways around this for keys longer than 128 bits: - Use a different crypto algorithm. For example, "hash the longer key with MD5 and use the result" is both easy to describe and simple to implement. However, it means adding MD5 code. - Call AES-XCBC-PRF-128 with the key being the first 128 bits of the original key. Fortunately, this is not recursive. :-) I think the latter meets the design goal fairly well. Does any have any problems with this? --Paul Hoffman, Director --VPN Consortium _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 21 12:36:28 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DOefE-0002OC-3a; Thu, 21 Apr 2005 12:36:28 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DOefC-0002NH-Kp for ipsec@megatron.ietf.org; Thu, 21 Apr 2005 12:36:26 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA14976 for ; Thu, 21 Apr 2005 12:36:23 -0400 (EDT) Received: from above.proper.com ([208.184.76.39]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DOeqe-00045I-GV for ipsec@ietf.org; Thu, 21 Apr 2005 12:48:16 -0400 Received: from [165.227.249.220] (dsl2-63-249-109-245.cruzio.com [63.249.109.245]) (authenticated bits=0) by above.proper.com (8.12.11/8.12.9) with ESMTP id j3LGaIlS092505 for ; Thu, 21 Apr 2005 09:36:19 -0700 (PDT) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: Date: Thu, 21 Apr 2005 09:36:14 -0700 To: IPsec WG From: Paul Hoffman Content-Type: text/plain; charset="us-ascii" ; format="flowed" X-Spam-Score: 0.0 (/) X-Scan-Signature: 82c9bddb247d9ba4471160a9a865a5f3 Subject: [Ipsec] "Original initiator" in IKEv2 X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Greetings again. One of the open issues in the IKEv2 clarifications document is: o When the document uses the term "original initiator" (or similar terms), it is not clear whether or not that term also applies to the side that originates an rekeying of the IKE_SA. That is, if Alice starts the first IKE_SA, but then Bob rekeys the IKE_SA, is the "original initiator" from that point on now Bob, or is it still Alice? Also, if it is Bob, at what exact point does it become Bob? This needs to be cleared up on a case-by-case basis throughout the document. ---------- The relevant text from the IKEv2 document is: Section 2.2 (sequence number for message ID): That means that after the initial exchange, each integer n may appear as the message ID in four distinct messages: The nth request from the original IKE initiator, the corresponding response, the nth request from the original IKE responder, and the corresponding response. Section 2.6 (cookies): Unlike ESP and AH where only the recipient's SPI appears in the header of a message, in IKE the sender's SPI is also sent in every message. Since the SPI chosen by the original initiator of the IKE_SA is always sent first, an endpoint with multiple IKE_SAs open that wants to find the appropriate IKE_SA using the SPI it assigned must look at the I(nitiator) Flag bit in the header to determine whether it assigned the first or the second eight octets. Section 2.14 (keying material for the IKE_SA): The two directions of traffic flow use different keys. The keys used to protect messages from the original initiator are SK_ai and SK_ei. The keys used to protect messages in the other direction are SK_ar and SK_er. Section 3.1 (generic IKE header): -- I(nitiator) (bit 3 of Flags) - This bit MUST be set in messages sent by the original initiator of the IKE_SA and MUST be cleared in messages sent by the original responder. It is used by the recipient to determine which eight octets of the SPI was generated by the recipient. ---------- Based on those four sections, I propose that "original initiator" is always the initiator of the *current* IKE_SA. This makes the spec more consistent, easier to implement (because you don't have to remember who started the first IKE_SA after you rekey it), and that definition works fine with all four sections above. Comments? --Paul Hoffman, Director --VPN Consortium _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Thu Apr 21 15:41:40 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DOhYS-00083l-Kl; Thu, 21 Apr 2005 15:41:40 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DOhYO-00082z-Oe; Thu, 21 Apr 2005 15:41:36 -0400 Received: from CNRI.Reston.VA.US (localhost [127.0.0.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA01425; Thu, 21 Apr 2005 15:41:35 -0400 (EDT) Message-Id: <200504211941.PAA01425@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: i-d-announce@ietf.org From: Internet-Drafts@ietf.org Date: Thu, 21 Apr 2005 15:41:35 -0400 Cc: ipsec@ietf.org Subject: [Ipsec] I-D ACTION:draft-ietf-ipsec-ike-auth-ecdsa-03.txt X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the IP Security Protocol Working Group of the IETF. Title : IKE Authentication Using ECDSA Author(s) : J. Solinas Filename : draft-ietf-ipsec-ike-auth-ecdsa-03.txt Pages : 6 Date : 2005-4-21 This document describes how the Elliptic Curve Digital Signature Algorithm (ECDSA) may be used as the authentication method within the Internet Key Exchange (IKE) protocol. ECDSA may provide benefits including computational efficiency, small signature sizes, and minimal bandwidth compared to other available digital signature methods. This document adds ECDSA capability to IKE without introducing any changes to existing IKE operation. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ike-auth-ecdsa-03.txt To remove yourself from the I-D Announcement list, send a message to i-d-announce-request@ietf.org with the word unsubscribe in the body of the message. You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce to change your subscription settings. Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-ietf-ipsec-ike-auth-ecdsa-03.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-ietf-ipsec-ike-auth-ecdsa-03.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <2005-4-21161253.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-ietf-ipsec-ike-auth-ecdsa-03.txt --OtherAccess Content-Type: Message/External-body; name="draft-ietf-ipsec-ike-auth-ecdsa-03.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2005-4-21161253.I-D@ietf.org> --OtherAccess-- --NextPart Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec --NextPart-- From ipsec-bounces@ietf.org Fri Apr 22 15:49:30 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DP49a-0001om-FN; Fri, 22 Apr 2005 15:49:30 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DP49Z-0001oh-4w for ipsec@megatron.ietf.org; Fri, 22 Apr 2005 15:49:29 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA17103 for ; Fri, 22 Apr 2005 15:49:27 -0400 (EDT) Received: from smtp811.mail.sc5.yahoo.com ([66.163.170.81]) by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DP4LE-0003Qn-Cn for ipsec@ietf.org; Fri, 22 Apr 2005 16:01:34 -0400 Received: from unknown (HELO adithya) (mohanp@sbcglobal.net@64.169.161.181 with login) by smtp811.mail.sc5.yahoo.com with SMTP; 22 Apr 2005 19:15:13 -0000 Message-ID: <008701c5476f$9e21bbc0$6b01a8c0@adithya> From: "Mohan Parthasarathy" To: Date: Fri, 22 Apr 2005 12:15:16 -0700 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2800.1437 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1441 X-Spam-Score: 0.1 (/) X-Scan-Signature: 9466e0365fc95844abaf7c3f15a05c7d Content-Transfer-Encoding: 7bit Subject: [Ipsec] IKEv2 SPI unique or random ? X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Hello, The IKEv2 draft require the IKEv2 SPIs (the one that appears in the IKEv2 header) to be unique so that it can be used to identify the IKE SA. But the first packet (SPIi =X, SPIr = 0) can carry the same SPIi from two different peers. For example., Peer A sends to Peer B (SPIi = 5, SPIr = 0) Peer C sends to Peer B (SPIi = 5, SPIr = 0) If you use the SPIi alone to locate the SA, when you receive the packet from Peer C, you would wrongly locate the IKE SA created by Peer A. Some implementations (though it locates the IKE SA wrongly) discard the packet later because it has already processed the IKE_SA_INIT packet. So, the packet from Peer C will be discarded. Some implementations might have a separate cache for initial packets which would continue to discard for sometime till the cache expires. If the SPIs are chosen randomly, then the probability of collision comes down and hence the above issue does not arise. The other possibility is to use the "peer" address also when locating the first packet alone which does not require the SPI to be chosen randomly. If the peer address changes (NAT, mobility etc.) and the IKE_SA_INIT packet is retransmitted, it would still not locate the wrong SA (just create another entry). How does implementations handle this case ? Perhaps the clarification document could address this issue also.. -mohan _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Sun Apr 24 13:26:38 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DPksQ-0008Mr-7p; Sun, 24 Apr 2005 13:26:38 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DPksO-0008MP-9O for ipsec@megatron.ietf.org; Sun, 24 Apr 2005 13:26:36 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA04781 for ; Sun, 24 Apr 2005 13:26:32 -0400 (EDT) Received: from above.proper.com ([208.184.76.39]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DPl4R-00053L-3H for ipsec@ietf.org; Sun, 24 Apr 2005 13:39:05 -0400 Received: from [10.20.30.249] (dsl2-63-249-109-245.cruzio.com [63.249.109.245]) (authenticated bits=0) by above.proper.com (8.12.11/8.12.9) with ESMTP id j3OHQO2a003817; Sun, 24 Apr 2005 10:26:25 -0700 (PDT) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: <008701c5476f$9e21bbc0$6b01a8c0@adithya> References: <008701c5476f$9e21bbc0$6b01a8c0@adithya> Date: Sun, 24 Apr 2005 10:26:21 -0700 To: "Mohan Parthasarathy" , From: Paul Hoffman Subject: Re: [Ipsec] IKEv2 SPI unique or random ? Content-Type: text/plain; charset="us-ascii" ; format="flowed" X-Spam-Score: 0.0 (/) X-Scan-Signature: 1ac7cc0a4cd376402b85bc1961a86ac2 Cc: X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org At 12:15 PM -0700 4/22/05, Mohan Parthasarathy wrote: >If the SPIs are chosen randomly, then the probability of collision >comes down and >hence the above issue does not arise. That is how most implementations choose them, I suspect. >How does implementations handle this case ? Perhaps the clarification document >could address this issue also.. We'll add a short bit about that. --Paul Hoffman, Director --VPN Consortium _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Mon Apr 25 06:50:58 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DQ1B4-0006OH-8J; Mon, 25 Apr 2005 06:50:58 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DQ1B2-0006OC-GG for ipsec@megatron.ietf.org; Mon, 25 Apr 2005 06:50:56 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA04449 for ; Mon, 25 Apr 2005 06:50:53 -0400 (EDT) Received: from michael.checkpoint.com ([194.29.32.68]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DQ1NF-0002XW-GJ for ipsec@ietf.org; Mon, 25 Apr 2005 07:03:35 -0400 Received: from [194.29.46.218] (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id j3PAnsnP027120 for ; Mon, 25 Apr 2005 13:49:54 +0300 (IDT) Mime-Version: 1.0 (Apple Message framework v619.2) Content-Transfer-Encoding: 7bit Message-Id: <5d8462b53fc9dfc6c23ac2e741a9590f@checkpoint.com> Content-Type: text/plain; charset=US-ASCII; format=flowed To: IPsec WG From: Yoav Nir Date: Mon, 25 Apr 2005 13:50:46 +0300 X-Mailer: Apple Mail (2.619.2) X-Spam-Score: 0.0 (/) X-Scan-Signature: d17f825e43c9aed4fd65b7edddddec89 Content-Transfer-Encoding: 7bit Subject: [Ipsec] Question about MsgID in AUTH exchange X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Hi all. This has probably been raised before. Section 2.2 says that "The IKE_SA initial setup messages will always be numbered 0 and 1" The AUTH exchange can take more than two messages (when EAP is used). In that case, will all the messages of the AUTH exchange carry the number 1, or will they use up as many message ID numbers as are needed so each message has a unique ID? _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Mon Apr 25 08:58:14 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DQ3AE-0006U2-8A; Mon, 25 Apr 2005 08:58:14 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DQ3AC-0006Tq-ES for ipsec@megatron.ietf.org; Mon, 25 Apr 2005 08:58:12 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA12979 for ; Mon, 25 Apr 2005 08:58:05 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DQ3ML-00089Z-Qd for ipsec@ietf.org; Mon, 25 Apr 2005 09:10:47 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j3PCvqIJ024787 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Mon, 25 Apr 2005 15:57:53 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j3PCvqVw024784; Mon, 25 Apr 2005 15:57:52 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <17004.59727.796954.990628@fireball.kivinen.iki.fi> Date: Mon, 25 Apr 2005 15:57:51 +0300 From: Tero Kivinen To: Yoav Nir Subject: [Ipsec] Question about MsgID in AUTH exchange In-Reply-To: <5d8462b53fc9dfc6c23ac2e741a9590f@checkpoint.com> References: <5d8462b53fc9dfc6c23ac2e741a9590f@checkpoint.com> X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 3 min X-Total-Time: 2 min X-Spam-Score: 0.0 (/) X-Scan-Signature: 7bac9cb154eb5790ae3b2913587a40de Content-Transfer-Encoding: 7bit Cc: IPsec WG X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Yoav Nir writes: > The AUTH exchange can take more than two messages (when EAP is used). > In that case, will all the messages of the AUTH exchange carry the > number 1, or will they use up as many message ID numbers as are needed > so each message has a unique ID? Yes, only the first AUTH message has message id of 1, later ones will have 2, 3 and so on... -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Tue Apr 26 04:58:32 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DQLto-0000nP-8c; Tue, 26 Apr 2005 04:58:32 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DQLtl-0000nF-Cd for ipsec@megatron.ietf.org; Tue, 26 Apr 2005 04:58:30 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA15753 for ; Tue, 26 Apr 2005 04:58:27 -0400 (EDT) Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DQM6A-0005s5-0A for ipsec@ietf.org; Tue, 26 Apr 2005 05:11:19 -0400 Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1]) by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j3Q8uHSI007202 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Tue, 26 Apr 2005 11:56:17 +0300 (EEST) Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j3Q8uFA9007199; Tue, 26 Apr 2005 11:56:15 +0300 (EEST) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <17006.559.419257.587977@fireball.kivinen.iki.fi> Date: Tue, 26 Apr 2005 11:56:15 +0300 From: Tero Kivinen To: byfraser@cisco.com, tytso@mit.edu, angelos@cs.columbia.edu Subject: [Ipsec] I-D ACTION:draft-ietf-ipsec-ikev2-ecc-groups-00.txt In-Reply-To: <200504181951.PAA24054@ietf.org> References: <200504181951.PAA24054@ietf.org> X-Mailer: VM 7.17 under Emacs 21.3.1 X-Edit-Time: 4 min X-Total-Time: 4 min X-Spam-Score: 0.0 (/) X-Scan-Signature: 8b30eb7682a596edff707698f4a80f7d Content-Transfer-Encoding: 7bit Cc: ipsec@ietf.org, hartmans-ietf@mit.edu, housley@vigilsec.com X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Internet-Drafts@ietf.org writes: > A New Internet-Draft is available from the on-line Internet-Drafts > directories. This draft is a work item of the IP Security Protocol > Working Group of the IETF. > > Title : ECC Groups For IKEv2 > Author(s) : J. Solinas > Filename : draft-ietf-ipsec-ikev2-ecc-groups-00.txt > Pages : 6 > Date : 2005-4-18 > > This document describes ECC groups for use as Diffie-Hellman groups > in the Internet Key Exchange version 2 (IKEv2) protocol. These new > groups are defined to align IKEv2 with other standards, particularly > NIST standards, and with and to provide more efficient implementation > than in previously defined groups. I have 2 problems with this document. 1) My understanding was that IPsec working group cannot take any new work items. At least it does not match the working group charter in the http://www.ietf.org/html.charters/ipsec-charter.html. The working group charter is already empty (I assume it anticipates the shutting down of the working group)... So why is this document taken as a working group document? This same question applies to the draft-ietf-ipsec-ike-ecp-groups-00.txt and draft-ietf-ipsec-ikev2-ecc-groups-00.txt 2) The second technical problem is that this document describes elliptic curve groups, but does not define how they are supposed to be used in the IKEv2. All elliptic curve text was removed from the IKEv2 document earlier, as we didn't have implementation experience of that, and the old IKEv1 text was not considered clear enough to describe what to put in the KE etc payloads. This document does not describe what format the KE payload has if the ECP group is used. -- kivinen@safenet-inc.com _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Tue Apr 26 12:01:46 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DQSVN-0008Ek-Uy; Tue, 26 Apr 2005 12:01:45 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DQSVM-0008Ec-0G for ipsec@megatron.ietf.org; Tue, 26 Apr 2005 12:01:44 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA21370 for ; Tue, 26 Apr 2005 12:01:39 -0400 (EDT) Received: from above.proper.com ([208.184.76.39]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DQShm-00008u-IO for ipsec@ietf.org; Tue, 26 Apr 2005 12:14:35 -0400 Received: from [10.20.30.249] (dsl2-63-249-109-245.cruzio.com [63.249.109.245]) (authenticated bits=0) by above.proper.com (8.12.11/8.12.9) with ESMTP id j3QG1WrA003564 for ; Tue, 26 Apr 2005 09:01:33 -0700 (PDT) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: <17006.559.419257.587977@fireball.kivinen.iki.fi> References: <200504181951.PAA24054@ietf.org> <17006.559.419257.587977@fireball.kivinen.iki.fi> Date: Tue, 26 Apr 2005 09:01:16 -0700 To: IPsec WG From: Paul Hoffman Subject: Re: [Ipsec] I-D ACTION:draft-ietf-ipsec-ikev2-ecc-groups-00.txt Content-Type: text/plain; charset="us-ascii" ; format="flowed" X-Spam-Score: 0.0 (/) X-Scan-Signature: 2409bba43e9c8d580670fda8b695204a X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org [[ ...regardless of the file name on the Internet Draft... ]] At 11:56 AM +0300 4/26/05, Tero Kivinen wrote: >2) The second technical problem is that this document describes > elliptic curve groups, but does not define how they are supposed to > be used in the IKEv2. All elliptic curve text was removed from the > IKEv2 document earlier, as we didn't have implementation experience > of that, and the old IKEv1 text was not considered clear enough to > describe what to put in the KE etc payloads. This document does not > describe what format the KE payload has if the ECP group is used. Fully agree. In specific, we need to know exactly what bits will be used in the SKEYSEED calculation for g^ir. That should be added to a revision of this document or a revision of draft-ietf-ipsec-ike-ecc-groups. A fully worked-out example in either of those two documents would also be very helpful to implementers. From the feedback I heard at the Santa Barbara IPsec bakeoffs, one of the main reasons nearly no one deployed ECC was that they couldn't find examples to test their code agains. Also, in draft-ietf-ipsec-ikev2-ecc-groups, section 2 and 5 are in full disagreement. :-) --Paul Hoffman, Director --VPN Consortium _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Fri Apr 29 04:26:38 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DRQpZ-0002Ia-Kz; Fri, 29 Apr 2005 04:26:37 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DRQpW-0002IS-MM for ipsec@megatron.ietf.org; Fri, 29 Apr 2005 04:26:35 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA03638 for ; Fri, 29 Apr 2005 04:26:32 -0400 (EDT) From: Pasi.Eronen@nokia.com Received: from mgw-x3.nokia.com ([131.228.20.26]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DRR2X-0007hB-96 for ipsec@ietf.org; Fri, 29 Apr 2005 04:40:02 -0400 Received: from esdks004.ntc.nokia.com (esdks004.ntc.nokia.com [172.21.138.159]) by mgw-x3.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id j3T8QUQ24231 for ; Fri, 29 Apr 2005 11:26:30 +0300 (EET DST) X-Scanned: Fri, 29 Apr 2005 11:26:09 +0300 Nokia Message Protector V1.3.34 2004121512 - RELEASE Received: (from root@localhost) by esdks004.ntc.nokia.com (8.12.9/8.12.9) id j3T8Q9bf010840 for ; Fri, 29 Apr 2005 11:26:09 +0300 Received: from mgw-int1.ntc.nokia.com (172.21.143.96) by esdks004.ntc.nokia.com 00c21lpL; Fri, 29 Apr 2005 11:26:08 EEST Received: from esebh004.NOE.Nokia.com (esebh004.ntc.nokia.com [172.21.138.84]) by mgw-int1.ntc.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id j3T8PiM27897 for ; Fri, 29 Apr 2005 11:25:44 +0300 (EET DST) Received: from esebh103.NOE.Nokia.com ([172.21.143.33]) by esebh004.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); Fri, 29 Apr 2005 11:25:30 +0300 Received: from esebe105.NOE.Nokia.com ([172.21.143.53]) by esebh103.NOE.Nokia.com with Microsoft SMTPSVC(6.0.3790.211); Fri, 29 Apr 2005 11:25:29 +0300 X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Date: Fri, 29 Apr 2005 11:25:29 +0300 Message-ID: Thread-Topic: Clarifications open issue: INTERNAL_IP4_SUBNET/NETMASK thread-index: AcVMlQCPuasGkZ+FRr2t2WoEBcHQnw== To: X-OriginalArrivalTime: 29 Apr 2005 08:25:29.0407 (UTC) FILETIME=[009D3CF0:01C54C95] X-Spam-Score: 0.3 (/) X-Scan-Signature: a7d6aff76b15f3f56fcb94490e1052e4 Content-Transfer-Encoding: quoted-printable Subject: [Ipsec] Clarifications open issue: INTERNAL_IP4_SUBNET/NETMASK X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Hi everyone, One of the open issues in the IKEv2 clarifications draft concerns INTERNAL_IP4_SUBNET and INTERNAL_IP4_NETMASK attributes. We already had some discussion about these on the list earlier, but I'd like to check if others think our interpretation is roughly correct: - INTERNAL_IP4_SUBNET in CFG_REPLY means roughly that "in my (responder's) opinion, you should send traffic to these addresses through me". If these addresses are not included in TSr, obviously we need to create additional SAs. And if TSr includes other addresses (e.g. is 0.0.0.0-255.255.255.255)=20 it means that the client can (but does not have to), if=20 permitted by its own policy, do "split tunneling" (only=20 send the traffic listed in INTERNAL_IP4_SUBNETs via the=20 gateway, but other traffic directly). - Including INTERNAL_IP4_SUBNET in CFG_REQUEST is not=20 absolutely necessary: if the responder has this information,=20 it can send it anyway (as shown in the example in ikev2-17=20 Section 2.19). But if INTERNAL_IP4_SUBNET is included in=20 CFG_REQUEST, other lengths than zero don't make sense. - The address blocks listed in INTERNAL_IP4_SUBNET do not have to match physical link boundaries. For instance, if the whole B class block 130.233.0.0/16 is behind the gateway, it's enough to send a single INTERNAL_IP4_SUBNET attribute (rather than listing all the /24s or whatever sized subnets that organization uses). =20 - INTERNAL_IP4_NETMASK does not make much sense, and should not be used (or it means the same thing as INTERNAL_IP4_SUBNET, and in that case, it's preferable to use INTERNAL_IP4_SUBNET). draft-eronen-draft-eronen-ipsec-ikev2-clarifications-02.txt actually has almost four pages of text about these payloads, so especially if you disagree with our current opinion (which is open to change, BTW), please check that, too! Best regards, Pasi _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Fri Apr 29 08:00:59 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DRUB0-0000Y9-WD; Fri, 29 Apr 2005 08:00:59 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DRUAw-0000Wf-Ey for ipsec@megatron.ietf.org; Fri, 29 Apr 2005 08:00:55 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA16884 for ; Fri, 29 Apr 2005 08:00:53 -0400 (EDT) Received: from michael.checkpoint.com ([194.29.32.68]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DRUNy-0008Aw-Jp for ipsec@ietf.org; Fri, 29 Apr 2005 08:14:24 -0400 Received: from MSILHLT011 (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with SMTP id j3TBxhnQ005188; Fri, 29 Apr 2005 14:59:46 +0300 (IDT) Message-ID: <000e01c54cb3$490aaae0$7d0a10ac@marvell.com> From: "Yoav Nir" To: , References: Subject: Re: [Ipsec] Clarifications open issue: INTERNAL_IP4_SUBNET/NETMASK Date: Fri, 29 Apr 2005 15:02:13 +0300 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2800.1437 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1441 X-Spam-Score: 0.0 (/) X-Scan-Signature: 5a9a1bd6c2d06a21d748b7d0070ddcb8 Content-Transfer-Encoding: 7bit Cc: X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org I can try to give you a vendor's perspective. Most vendors implement the internal addressing feature using some kind of virtual network adapter. This can be a PPP adapter (as in Microsoft's L2TP) or a TUN/TAP adapter or a virtual ethernet adapter or whatever. To the client-side operating system they look like real network adapters. When the client software brings up a network adapter (whether virtual or physical), it has to be configured in several ways: - IP address - Netmask - DNS servers associated with this interface - NBNS servers (these days it's not just for Windows) - interface-specific domain suffix - routing changes It's true that for VPN there's usually no point in the netmask attribute, and it could safely be always set to 255.255.255.255, but the netmask is always there. We had a version where the netmask was always set to 255.255.255.0 (which just seemed the most standard), and customers complained when they used different-sized networks for Cfg. We never could get them to tell us why it was needed. As for the INTERNAL_IP4_SUBNET, it just makes sense to use this as input for the routing changes. These will tell the operating system which traffic to route through the virtual interface (and thus it gets encrypted) and which traffic not to. If the SA does not cover the whole contents of the SUBNET field, then subsequent packets will trigger more Create-Child-SA exchanges. Certain small implementations of a gateway are the kind of small devices that also serve as a DHCP server. They assign IPs both to the internal network and to remote-access clients, and they assign both from the same pool. These devices later work as bridges (rather than routers) and so the NETMASK may matter. If the client sends a broadcast packet, the device will propagate it in the internal network (maybe also to all other clients?). In that case the client needs the NETMASK to properly form the broadcast packets. This may sound silly, but it can get protocols like the windows file sharing protocol to work, allowing you to map network drives from the road. It has its uses. ----- Original Message ----- - INTERNAL_IP4_NETMASK does not make much sense, and should not be used (or it means the same thing as INTERNAL_IP4_SUBNET, and in that case, it's preferable to use INTERNAL_IP4_SUBNET). draft-eronen-draft-eronen-ipsec-ikev2-clarifications-02.txt actually has almost four pages of text about these payloads, so especially if you disagree with our current opinion (which is open to change, BTW), please check that, too! Best regards, Pasi _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Fri Apr 29 08:36:06 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DRUj0-0007J5-Pi; Fri, 29 Apr 2005 08:36:06 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DRUiy-0007GI-Ku for ipsec@megatron.ietf.org; Fri, 29 Apr 2005 08:36:04 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA20623 for ; Fri, 29 Apr 2005 08:36:03 -0400 (EDT) Received: from n2.nomadiclab.com ([193.234.219.2]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DRUw1-0001YG-Os for ipsec@ietf.org; Fri, 29 Apr 2005 08:49:35 -0400 Received: from [IPv6:::1] (localhost [127.0.0.1]) by n2.nomadiclab.com (Postfix) with ESMTP id B93F0212C84; Fri, 29 Apr 2005 15:35:48 +0300 (EEST) Mime-Version: 1.0 (Apple Message framework v622) Content-Type: text/plain; charset=US-ASCII; format=flowed Message-Id: Content-Transfer-Encoding: 7bit From: Pekka Nikander Date: Fri, 29 Apr 2005 15:36:07 +0300 To: Karen Seo X-Mailer: Apple Mail (2.622) X-Spam-Score: 0.0 (/) X-Scan-Signature: 8abaac9e10c826e8252866cbe6766464 Content-Transfer-Encoding: 7bit Cc: ipsec@ietf.org Subject: [Ipsec] Small comments to rfc2401bis-06.txt X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Karen, I know rfc2401bis is quite far and that I am late in game, but some small suggestions based on my fresh reading: On page 18, Section 4.4 The Mobility Header is first time mentioned in Section 4.4., without any reference. The reference an explanation is only in Section 4.4.1.1, several pages later. I found that surprising. I would suggest adding some text wrt. Mobile IPv6 in Section 3.2, and perhaps also explicitly mention ICMP there, too. At minimum, the informative reference to [Mobip] should be normative, as it is referenced in normative contexts. On page 23, Section 4.4.1.1 In the parenthesised sentence, there is a phrase ", as noted above". However, I didn't find any explanation about how to use sockets directly before that in the document; indeed, I found a corresponding note in the beginning of page 24, and in more detail only on page 29, in the end of 4.4.1.1. There is a further note on page 49, in Section 5. Maybe these locations should be linked together better? I have a couple of other questions, but they are more to the WG and I'll send them separately. --Pekka Nikander _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Fri Apr 29 08:43:27 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DRUq7-0008P4-My; Fri, 29 Apr 2005 08:43:27 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DRUq5-0008Ox-MX for ipsec@megatron.ietf.org; Fri, 29 Apr 2005 08:43:25 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA21108 for ; Fri, 29 Apr 2005 08:43:24 -0400 (EDT) Received: from n2.nomadiclab.com ([193.234.219.2]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DRV39-0001sB-Rx for ipsec@ietf.org; Fri, 29 Apr 2005 08:56:56 -0400 Received: from [IPv6:::1] (localhost [127.0.0.1]) by n2.nomadiclab.com (Postfix) with ESMTP id 57217212D2C for ; Fri, 29 Apr 2005 15:43:16 +0300 (EEST) Mime-Version: 1.0 (Apple Message framework v622) Content-Transfer-Encoding: 7bit Message-Id: <5dfcc9adb0e5a519ab5af5dc19ad82fb@nomadiclab.com> Content-Type: text/plain; charset=US-ASCII; format=flowed To: ipsec@ietf.org From: Pekka Nikander Date: Fri, 29 Apr 2005 15:43:35 +0300 X-Mailer: Apple Mail (2.622) X-Spam-Score: 0.0 (/) X-Scan-Signature: ffa9dfbbe7cc58b3fa6b8ae3e57b0aa3 Content-Transfer-Encoding: 7bit Subject: [Ipsec] rfc2401bis-06: why ESP and AH SPIs are not considered as (potential) selectors? X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org Folks, This has probably been discussed in the death before, but I was not able to find the answer in the archives. Consequently, I'd appreciate if someone would enlighten me, perhaps by pointing out to the relevant thread of previous discussion. Please note too that this question is more due to academic/architectural curiosity rather than that I would be implementing this. Anyway, while reading rfc2401bis-06 with fresh eyes, I was left wondering why aren't the AH and ESP SPI fields considered as selectors, similar to TCP/UDP ports, ICMP types/codes, and MH message types? Such support looks trivial to me (but perhaps I am missing something), and would make supporting the (admittedly dubious) nested SAs much easier. In other words, if my 2401bis implementation would route back outgoing IPsec packets to the protected side and then again out, then how do I select the right enclosing SA for it unless I can use the SPI? Likewise, if I receive an incoming packet that contains an AH or ESP header after IPsec processing, how to I enforce anything on the SPIs before passing it again out for nested processing? So, what is the reason for the current state? --Pekka Nikander _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Fri Apr 29 08:57:51 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DRV42-0002fY-Ve; Fri, 29 Apr 2005 08:57:50 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DRV3y-0002dc-Nd for ipsec@megatron.ietf.org; Fri, 29 Apr 2005 08:57:48 -0400 Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA22102 for ; Fri, 29 Apr 2005 08:57:45 -0400 (EDT) Received: from n2.nomadiclab.com ([193.234.219.2]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DRVH1-0002YW-Mk for ipsec@ietf.org; Fri, 29 Apr 2005 09:11:17 -0400 Received: from [IPv6:::1] (localhost [127.0.0.1]) by n2.nomadiclab.com (Postfix) with ESMTP id DA853212D2C; Fri, 29 Apr 2005 15:57:35 +0300 (EEST) Mime-Version: 1.0 (Apple Message framework v622) Content-Type: text/plain; charset=US-ASCII; format=flowed Message-Id: Content-Transfer-Encoding: 7bit From: Pekka Nikander Date: Fri, 29 Apr 2005 15:57:55 +0300 To: ipsec@ietf.org X-Mailer: Apple Mail (2.622) X-Spam-Score: 0.0 (/) X-Scan-Signature: 8b431ad66d60be2d47c7bfeb879db82c Content-Transfer-Encoding: 7bit Cc: BTNS WG ML Subject: [Ipsec] rfc2401bis-06: Why there are no names in SAs? X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Pekka Nikander , ipsec@ietf.org List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org [Excuse for cross-posting; followups to ipsec only.] Folks, While reading rfc2401bis-06 for considering BTNS, I came up with one serious architectural question. At this point of time I don't know if this really relates to BTNS or not, but it seems to have some larger relevance in any case. The essence of this question boils down to the nature of IP addresses. While reading rfc2401bis, it becomes apparent that it is very much build around the model that the IP addresses used by different hosts are considered to be stable, or at least divisible into different security classes in a static manner. While that may be fine for most if not all current purposes of IPsec, I am afraid that the Internet in general is moving away from that notion. However, in addition to the selectors based on this world view, the SPD and PAD also have now support for "names", mainly meant to be used in situations where at least one of the IPsec devices is an end-host (rather than a security gateway). The support for these higher-layer, symbolic identifiers seems to be sufficient for key management and outgoing traffic. What seems to be especially good is the use of names in linking PAD and SPD entries together (end of section 4.4.3.4). What seems to be missing is support for incoming traffic. More specifically, what I am missing is either a) names embedded in (inbound) SAD entries, or b) back pointers from (inbound) SAD entries to corresponding SPD entries If either of them were in place, that would allow incoming packets to be tagged with names. Those names could then, optionally, be available to apps above. Furthermore, and probably more importantly, tagging the SAs with names would make it also easier to handle with potential stale SAs as the SPD is dynamically changed. Now, is there a specific reason why the (inbound) SAD entries are not tagged/linked with their corresponding SPD entries? --Pekka Nikander _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Fri Apr 29 16:08:42 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DRbn0-0007Ik-JX; Fri, 29 Apr 2005 16:08:42 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DRbmw-0007GX-Pr; Fri, 29 Apr 2005 16:08:38 -0400 Received: from CNRI.Reston.VA.US (localhost [127.0.0.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA07678; Fri, 29 Apr 2005 16:08:36 -0400 (EDT) Message-Id: <200504292008.QAA07678@ietf.org> From: The IESG To: IETF-Announce@ietf.org Date: Fri, 29 Apr 2005 16:08:35 -0400 Cc: ipsec@ietf.org, Theodore Ts'o , Barbara Fraser Subject: [Ipsec] WG Action: Conclusion of IP Security Protocol (ipsec) X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org The IP Security Protocol (ipsec) WG in the Security Area has concluded. The IESG contact persons are Russ Housley and Sam Hartman. +++ The IPsec WG has finished their work. It has taken a very long time, but the task is finally accomplished. Good job. There are a few remaining active documents. They deal with the addition of elliptic curve cryptography (ECC) to IKE and IKEv2. This item was abandoned by the WG several years ago, and for good reasons, there is renewed interest. Very few participants are involved in these documents. Therefore, these documents will progress as individual standards-track documents. The ownership from the remaining WG documents will be transferred to the following individuals: draft-ietf-ipsec-ike-auth-ecdsa-03.txt: Jerry Solinas draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt: Jerry Solinas draft-ietf-ipsec-ike-ecc-groups-05.txt: Simon Blake-Wilson draft-ietf-ipsec-ikev2-ecc-groups-00.txt: Jerry Solinas draft-ietf-ipsec-ike-ecp-groups-00.txt: Jerry Solinas The IPsec WG mail list will remain active. _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec From ipsec-bounces@ietf.org Sat Apr 30 23:30:34 2005 Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DS5AA-0005ze-GA; Sat, 30 Apr 2005 23:30:34 -0400 Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DS5A8-0005zZ-4I for ipsec@megatron.ietf.org; Sat, 30 Apr 2005 23:30:32 -0400 Received: from pike.sandelman.ca (pike.sandelman.ca [205.150.200.164]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA21184 for ; Sat, 30 Apr 2005 23:30:28 -0400 (EDT) Received: from sandelman.ottawa.on.ca (unknown [IPv6:2002:c08b:2e21:2:20d:60ff:fe77:9739]) by pike.sandelman.ca (Postfix) with ESMTP id 9C7086361B for ; Sat, 30 Apr 2005 23:30:30 -0400 (EDT) Received: from marajade.sandelman.ottawa.on.ca (marajade [127.0.0.1]) by sandelman.ottawa.on.ca (Postfix) with ESMTP id 303AFBD70 for ; Sat, 30 Apr 2005 23:30:30 -0400 (EDT) From: "Michael Richardson" To: ipsec@ietf.org X-Mailer: MH-E 7.82; nmh 1.0.4+dev; XEmacs 21.4 (patch 17) Date: Sat, 30 Apr 2005 23:30:30 -0400 Message-ID: <6719.1114918230@marajade.sandelman.ottawa.on.ca> Subject: [Ipsec] twofish ESP testing X-BeenThere: ipsec@ietf.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IP Security List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: ipsec-bounces@ietf.org Errors-To: ipsec-bounces@ietf.org -----BEGIN PGP SIGNED MESSAGE----- I wonder if anyone could confirm that the following packet decrypts properly with twofish, or alternatively, point me at a source of twofish/hmac-md5 encrypted ESP packets with keys. (pcap file is at: http://www.sandelman.ca/tmp/08-sunrise-sunset-twofish.pcap or: http://anoncvs.openswan.org/cgi-bin/viewcvs.cgi/openswan-2/testing/klips/inputs/08-sunrise-sunset-twofish.pcap?rev=1.1&view=auto ) If someone needs 3DES (MD5 or SHA1), or AES (128,256)+SHA1 files, they are also there, and the test cases are there with testing/klips/{east,west}-icmp-XX. The keys are: enckey=0xaaaabbbbccccdddd4043434545464649 authkey=0x8765876587658765876587658765876587658765 ipsec spi --af inet --edst 192.1.2.45 --spi 0xDED12345 --proto esp --src 192.1.2.23 --esp twofish128-sha1-96 --enckey $enckey --authkey $authkey 10:00:00:64:64:23 > 10:00:00:64:64:45, ethertype IPv4 (0x0800), length 166: IP 192.1.2.23 > 192.1.2.45: ESP(spi=0xded12345,seq=0x1) 0x0000: 1000 0064 6445 1000 0064 6423 0800 4500 ...ddE...dd#..E. 0x0010: 0098 b7a9 0000 4032 3e44 c001 0217 c001 ......@2>D...... 0x0020: 022d ded1 2345 0000 0001 4166 e0dd c326 .-..#E....Af...& 0x0030: 3ffb 9d88 266c 2893 7989 202c 4980 e5e2 ?...&l(.y..,I... 0x0040: b89f 360c 4583 a11f 37fc 1738 6626 0422 ..6.E...7..8f&." 0x0050: 1586 4aa5 533f 2063 038b d362 c91a f4ca ..J.S?.c...b.... 0x0060: d4e3 cac0 7bdb b98b f9a6 b5c9 b677 d331 ....{........w.1 0x0070: 7387 c098 64dd 91c9 0832 e7e1 e682 de52 s...d....2.....R 0x0080: 6ffa d714 31c9 4fef e9fe 9170 ab44 ef32 o...1.O....p.D.2 0x0090: 537e 1563 c171 5922 59a5 108c 03f8 b209 S~.c.qY"Y....... 0x00a0: f242 9167 d7b2 .B.g.. Result should be: 10:00:00:ab:cd:ff > 10:00:00:70:72:69, ethertype IPv4 (0x0800), length 98: IP 192.0.2.1 > 192.0.1.1: icmp 64: echo request seq 1280 0x0000: 1000 0070 7269 1000 00ab cdff 0800 4500 ...pri........E. 0x0010: 0054 0000 4000 3e01 b9a6 c000 0201 c000 .T..@.>......... 0x0020: 0101 0800 baf0 6f00 0500 239b c73b f234 ......o...#..;.4 0x0030: 0100 0809 0a0b 0c0d 0e0f 1011 1213 1415 ................ 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425 ...........!"#$% 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435 &'()*+,-./012345 0x0060: 3637 67 - -- ] Michael Richardson Xelerance Corporation, Ottawa, ON | firewalls [ ] mcr @ xelerance.com Now doing IPsec training, see |net architect[ ] http://www.sandelman.ca/mcr/ www.xelerance.com/training/ |device driver[ ] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) Comment: Finger me for keys iQCVAwUBQnRNTYqHRg3pndX9AQFM6QP+NA454J/iVRT5/TQ0sp1EqfHcBZlb/+0r tCzFQM4hDsEqSF9hY5JzkEWNqZvWebn7k3WXFvfffgrpD96XP7MUN9tztG9QrTAm d/LjoOgmD987t+SYzcWPBRJLF6mei+NJR1zfCOzOXmZ8cbm5v97mceXTeMMfnWI3 qUqv2naJh34= =aTiK -----END PGP SIGNATURE----- _______________________________________________ Ipsec mailing list Ipsec@ietf.org https://www1.ietf.org/mailman/listinfo/ipsec