From ipsec-bounces@ietf.org  Fri Apr  1 15:38:20 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA09408
	for <ipsec-archive@lists.ietf.org>; Fri, 1 Apr 2005 15:38:19 -0500 (EST)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DHSfl-0002Ds-7n; Fri, 01 Apr 2005 15:23:17 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DHSfi-0002Di-MV
	for ipsec@megatron.ietf.org; Fri, 01 Apr 2005 15:23:16 -0500
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA05616
	for <ipsec@ietf.org>; Fri, 1 Apr 2005 15:23:11 -0500 (EST)
Received: from ip-66-80-10-146.dsl.sca.megapath.net ([66.80.10.146]
	helo=smtp.intoto.com) by ietf-mx.ietf.org with smtp (Exim 4.33)
	id 1DHSn5-0001YX-0I
	for ipsec@ietf.org; Fri, 01 Apr 2005 15:30:53 -0500
Received: from not-angel.intoto.com ([10.1.5.11])
	by smtp.intoto.com (SMSSMTP 4.0.0.59) with SMTP id M2005040112223027860
	for <ipsec@ietf.org>; Fri, 01 Apr 2005 12:22:30 -0800
Received: from subha (dhcp-66.intoto.com [10.1.5.66]) (authenticated bits=0)
	by not-angel.intoto.com (8.13.1/8.13.1) with ESMTP id j31KN2M7015830
	for <ipsec@ietf.org>; Fri, 1 Apr 2005 12:23:03 -0800
Message-ID: <00e801c536f8$531e4850$4205010a@subha>
From: "Subha" <subhaav@intoto.com>
To: <ipsec@ietf.org>
Date: Fri, 1 Apr 2005 12:21:02 -0800
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.2180
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
X-Spam-Score: 0.5 (/)
X-Scan-Signature: 2857c5c041d6c02d7181d602c22822c8
Subject: [Ipsec] Number of SPD Policies
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1233530883=="
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

This is a multi-part message in MIME format.

--===============1233530883==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_00E5_01C536B5.44BACB00"

This is a multi-part message in MIME format.

------=_NextPart_000_00E5_01C536B5.44BACB00
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi List-members,

If I need to apply both ESP and AH SAs between the two=20
security gateways for a given traffic stream, do I need to=20
create two policies or one policy ?=20

Can someone indicate this with repect to the following combinations

1) IKEv1 + 2401
2) IKEv1 + 2401bis
3) IKEv2 + 2401
4) IKEv2 + 2401bis

>From IKEv1 or IKEv2 perspective, my understanding is that there are
no restrictictions posted.=20

2401bis seems to indicate that if there is nested tunneling  i.e. if
the security tunnel is going to terminate in 2 different remote =
gateways,=20
then we need to have two SPD policies. (Reference Appendix -E in =
2401-bis)

However if the terminating tunnel endpoint is the same remote gateway =
and
both ESP and AH needs to be applied to a particular traffic stream, then =

a single SPD Policy should suffice. I did not see any statement in =
2401-bis=20
restricting this.

Can someone please clarify ?

Thanks,
Subha 
------=_NextPart_000_00E5_01C536B5.44BACB00
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2900.2604" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT face=3DArial size=3D2>Hi List-members,</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>If I need to&nbsp;apply both ESP and AH =
SAs=20
between&nbsp;the two&nbsp;</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>security gateways </FONT><FONT =
face=3DArial=20
size=3D2>for a given traffic stream, </FONT><FONT face=3DArial =
size=3D2>do I need to=20
</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>create two policies or one policy ? =
</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Can someone indicate this with repect =
to the=20
following combinations</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>1) IKEv1 + 2401</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>2) IKEv1 + 2401bis</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>3) IKEv2 + 2401</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>4) IKEv2 + 2401bis</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>From IKEv1 or IKEv2 perspective, my =
understanding=20
is that there are</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>no restrictictions posted. =
</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>2401bis seems to indicate that&nbsp;if =
there is=20
nested tunneling&nbsp; i.e. if</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>the security tunnel is going to =
terminate in 2=20
different remote gateways, </FONT></DIV>
<DIV><FONT face=3DArial size=3D2>then&nbsp;we need to have two SPD =
policies.=20
</FONT><FONT face=3DArial size=3D2>(Reference Appendix -E in =
2401-bis)</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>However&nbsp;if the =
terminating&nbsp;tunnel=20
endpoint is the same remote gateway and</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>both ESP and&nbsp;AH needs to be =
applied to a=20
particular traffic stream, then </FONT></DIV>
<DIV><FONT face=3DArial size=3D2>a single SPD Policy </FONT><FONT =
face=3DArial=20
size=3D2>should suffice.&nbsp;I did not see any statement in 2401-bis=20
</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>restricting this.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Can someone please clarify =
?</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Thanks,</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>Subha</FONT>&nbsp;</DIV></BODY></HTML>

------=_NextPart_000_00E5_01C536B5.44BACB00--




--===============1233530883==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec

--===============1233530883==--





From ipsec-bounces@ietf.org  Fri Apr  1 15:46:33 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA12312
	for <ipsec-archive@lists.ietf.org>; Fri, 1 Apr 2005 15:46:33 -0500 (EST)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DHShh-0002gx-84; Fri, 01 Apr 2005 15:25:17 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DHShd-0002gG-1O; Fri, 01 Apr 2005 15:25:13 -0500
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA05941;
	Fri, 1 Apr 2005 15:25:09 -0500 (EST)
Message-Id: <200504012025.PAA05941@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: i-d-announce@ietf.org
From: Internet-Drafts@ietf.org
Date: Fri, 01 Apr 2005 15:25:09 -0500
Cc: ipsec@ietf.org
Subject: [Ipsec] I-D ACTION:draft-ietf-ipsec-rfc2401bis-06.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Security Protocol Working Group of the IETF.

	Title		: Security Architecture for the Internet Protocol
	Author(s)	: S. Kent, K. Seo
	Filename	: draft-ietf-ipsec-rfc2401bis-06.txt
	Pages		: 101
	Date		: 2005-4-1
	
This document describes an updated version of the "Security
   Architecture for IP", which is designed to provide security services
   for traffic at the IP layer. This document obsoletes RFC 2401
   (November 1998).

   Comments should be sent to Stephen Kent (kent@bbn.com).  [RFC Editor:
   Please remove this line prior to publication as an RFC.]

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsec-rfc2401bis-06.txt

To remove yourself from the I-D Announcement list, send a message to 
i-d-announce-request@ietf.org with the word unsubscribe in the body of the message.  
You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce 
to change your subscription settings.


Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ipsec-rfc2401bis-06.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ipsec-rfc2401bis-06.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body; access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID: <2005-4-1155052.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ipsec-rfc2401bis-06.txt

--OtherAccess
Content-Type: Message/External-body; name="draft-ietf-ipsec-rfc2401bis-06.txt";
	site="ftp.ietf.org"; access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2005-4-1155052.I-D@ietf.org>


--OtherAccess--

--NextPart
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec

--NextPart--





From ipsec-bounces@ietf.org  Fri Apr  1 17:36:20 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA28589
	for <ipsec-archive@lists.ietf.org>; Fri, 1 Apr 2005 17:36:20 -0500 (EST)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DHUhT-0003S7-6a; Fri, 01 Apr 2005 17:33:11 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DHUhQ-0003Rz-Kl
	for ipsec@megatron.ietf.org; Fri, 01 Apr 2005 17:33:08 -0500
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA28318
	for <ipsec@ietf.org>; Fri, 1 Apr 2005 17:33:06 -0500 (EST)
Received: from aragorn.bbn.com ([128.33.0.62])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DHUoq-0002JX-0N
	for ipsec@ietf.org; Fri, 01 Apr 2005 17:40:48 -0500
Received: from [128.89.89.106] (dhcp89-089-106.bbn.com [128.89.89.106])
	by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j31MWvvH023230;
	Fri, 1 Apr 2005 17:32:58 -0500 (EST)
Mime-Version: 1.0
Message-Id: <p0621020cbe73752e25ae@[128.89.89.106]>
In-Reply-To: <00e801c536f8$531e4850$4205010a@subha>
References: <00e801c536f8$531e4850$4205010a@subha>
Date: Fri, 1 Apr 2005 17:32:11 -0500
To: "Subha" <subhaav@intoto.com>
From: Stephen Kent <kent@bbn.com>
Subject: Re: [Ipsec] Number of SPD Policies
X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41
X-Virus-Status: Clean
X-Spam-Score: 0.8 (/)
X-Scan-Signature: 21bf7a2f1643ae0bf20c1e010766eb78
Cc: ipsec@ietf.org
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1131032227=="
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

--===============1131032227==
Content-Type: multipart/alternative;
	boundary="============_-1099727713==_ma============"

--============_-1099727713==_ma============
Content-Type: text/plain; charset="us-ascii" ; format="flowed"

At 12:21 PM -0800 4/1/05, Subha wrote:
>Hi List-members,
>
>If I need to apply both ESP and AH SAs between the two 
>security gateways for a given traffic stream, do I need to
>create two policies or one policy ?
>
>Can someone indicate this with repect to the following combinations
>
>1) IKEv1 + 2401

YES, the status quo

>2) IKEv1 + 2401bis

not a good match, because 2401bis mandates support for features 
available in IKEv2 that are not in IKE v1.

>3) IKEv2 + 2401

this combination should work.

>4) IKEv2 + 2401bis

YES, the intended match up

>
>From IKEv1 or IKEv2 perspective, my understanding is that there are
>no restrictictions posted.
>
>2401bis seems to indicate that if there is nested tunneling  i.e. if
>the security tunnel is going to terminate in 2 different remote gateways,
>then we need to have two SPD policies. (Reference Appendix -E in 2401-bis)

What 2401bis says is that to accommodate a nested SA, in general, one 
will need multiple SPD entries and coordinated entries in the 
forwarding tables on both the protected and unprotected sides of the 
IPsec boundary. It does not say this is an issue that arises when the 
endpoints for the tunnel are distinct. The example in Appendix E is 
just an example, not a comprehensive discussion of how one configures 
the SPD and forwarding tables to accommodate nesting in general.


>However if the terminating tunnel endpoint is the same remote gateway and
>both ESP and AH needs to be applied to a particular traffic stream, then
>a single SPD Policy should suffice. I did not see any statement in 2401-bis
>restricting this.


In the example you cited above, applying AH and ESP to traffic, note 
that the SPD definition in 2401bis specifies application of only one 
security protocol per SA. So I believe that more than one SPD entry 
is required to achieve even this simple nested SA example.

Steve
--============_-1099727713==_ma============
Content-Type: text/html; charset="us-ascii"

<!doctype html public "-//W3C//DTD W3 HTML//EN">
<html><head><style type="text/css"><!--
blockquote, dl, ul, ol, li { padding-top: 0 ; padding-bottom: 0 }
 --></style><title>Re: [Ipsec] Number of SPD
Policies</title></head><body>
<div>At 12:21 PM -0800 4/1/05, Subha wrote:</div>
<blockquote type="cite" cite><font face="Arial" size="-1">Hi
List-members,</font></blockquote>
<blockquote type="cite" cite>&nbsp;</blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">If I need
to&nbsp;apply both ESP and AH SAs between&nbsp;the
two&nbsp;</font></blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">security
gateways for a given traffic stream, do I need to</font></blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">create two
policies or one policy ?</font></blockquote>
<blockquote type="cite" cite>&nbsp;</blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">Can someone
indicate this with repect to the following
combinations</font></blockquote>
<blockquote type="cite" cite>&nbsp;</blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">1) IKEv1 +
2401</font></blockquote>
<div><br></div>
<div>YES, the status quo</div>
<div><br></div>
<blockquote type="cite" cite><font face="Arial" size="-1">2) IKEv1 +
2401bis</font></blockquote>
<div><br></div>
<div>not a good match, because 2401bis mandates support for features
available in IKEv2 that are not in IKE v1.</div>
<div><br></div>
<blockquote type="cite" cite><font face="Arial" size="-1">3) IKEv2 +
2401</font></blockquote>
<div><br></div>
<div>this combination should work.</div>
<div><br></div>
<blockquote type="cite" cite><font face="Arial" size="-1">4) IKEv2 +
2401bis</font></blockquote>
<div><br></div>
<div>YES, the intended match up</div>
<div><br></div>
<blockquote type="cite" cite>&nbsp;</blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">From IKEv1
or IKEv2 perspective, my understanding is that there
are</font></blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">no
restrictictions posted.</font></blockquote>
<blockquote type="cite" cite>&nbsp;</blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">2401bis
seems to indicate that&nbsp;if there is nested tunneling&nbsp; i.e.
if</font></blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">the security
tunnel is going to terminate in 2 different remote
gateways,</font></blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">then&nbsp;we
need to have two SPD policies. (Reference Appendix -E in
2401-bis)</font></blockquote>
<div><br></div>
<div>What 2401bis says is that to accommodate a nested SA, in general,
one will need multiple SPD entries and coordinated entries in the
forwarding tables on both the protected and unprotected sides of the
IPsec boundary. It does not say this is an issue that arises when the
endpoints for the tunnel are distinct. The example in Appendix E is
just an example, not a comprehensive discussion of how one configures
the SPD and forwarding tables to accommodate nesting in general.</div>
<div><br>
<br>
</div>
<blockquote type="cite" cite><font face="Arial"
size="-1">However&nbsp;if the terminating&nbsp;tunnel endpoint is the
same remote gateway and</font></blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">both ESP
and&nbsp;AH needs to be applied to a particular traffic stream,
then</font></blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">a single SPD
Policy should suffice.&nbsp;I did not see any statement in
2401-bis</font></blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">restricting
this.</font></blockquote>
<div><br></div>
<div><br></div>
<div>In the example you cited above, applying AH and ESP to traffic,
note that the SPD definition in 2401bis specifies application of only
one security protocol per SA. So I believe that more than one SPD
entry is required to achieve even this simple nested SA example.</div>
<div><br></div>
<div>Steve</div>
</body>
</html>
--============_-1099727713==_ma============--


--===============1131032227==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec

--===============1131032227==--



From ipsec-bounces@ietf.org  Fri Apr  1 19:41:03 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA07255
	for <ipsec-archive@lists.ietf.org>; Fri, 1 Apr 2005 19:41:03 -0500 (EST)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DHWeT-0000YP-CI; Fri, 01 Apr 2005 19:38:13 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DHWeR-0000YK-Dj
	for ipsec@megatron.ietf.org; Fri, 01 Apr 2005 19:38:11 -0500
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA07123
	for <ipsec@ietf.org>; Fri, 1 Apr 2005 19:38:08 -0500 (EST)
Received: from ip-66-80-10-146.dsl.sca.megapath.net ([66.80.10.146]
	helo=smtp.intoto.com) by ietf-mx.ietf.org with smtp (Exim 4.33)
	id 1DHWlr-0006OE-JK
	for ipsec@ietf.org; Fri, 01 Apr 2005 19:45:52 -0500
Received: from not-angel.intoto.com ([10.1.5.11])
	by smtp.intoto.com (SMSSMTP 4.0.0.59) with SMTP id M2005040116373228585
	; Fri, 01 Apr 2005 16:37:32 -0800
Received: from subha (dhcp-66.intoto.com [10.1.5.66]) (authenticated bits=0)
	by not-angel.intoto.com (8.13.1/8.13.1) with ESMTP id j320c0J1032335;
	Fri, 1 Apr 2005 16:38:04 -0800
Message-ID: <015701c5371b$f3885510$4205010a@subha>
From: "Subha" <subhaav@intoto.com>
To: "Stephen Kent" <kent@bbn.com>
References: <00e801c536f8$531e4850$4205010a@subha>
	<p0621020cbe73752e25ae@[128.89.89.106]>
Subject: Re: [Ipsec] Number of SPD Policies
Date: Fri, 1 Apr 2005 16:35:59 -0800
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.2180
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
X-Spam-Score: 0.5 (/)
X-Scan-Signature: 3b3709b7fb3320c78bd7b1555081f0fc
Cc: ipsec@ietf.org
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1540217239=="
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

This is a multi-part message in MIME format.

--===============1540217239==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0154_01C536D8.E2D0AE90"

This is a multi-part message in MIME format.

------=_NextPart_000_0154_01C536D8.E2D0AE90
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Re: [Ipsec] Number of SPD PoliciesHi  Steve,

I have some follow-up questions.

In the following questions I have assumed that 3 IPsec Protocols shall =
be applied
on a given traffic stream.

1) When IKEv2 is used with RFC2401 compliant implementation, can a =
single IKEv2=20
CREATE_CHILD_SA negotiate IPcomp, ESP and AH SAs for the given traffic=20
selector?=20

2) When IKEv2 is used with RFC2401-bis compliant implementation, there =
has to=20
be theee IKEv2 CREATE_CHILD_SA Exchanges.

(1) Plain Traffic selectors for IPcomp SA
(2) Same Source IP, Destination IP and IPComp for Protocol  - Traffic =
Selectors for ESP SA
(3) Tunnel Outer Header Source IP, Tunnel Outer Header Destination IP =
and Protocol=3DESP
 for AH SA.

3) An implementation needs to know through some other means,=20
whether the peer supports RFC2401 or 2401-bis.=20

Thanks,
Subha


  ----- Original Message -----=20
  From: Stephen Kent=20
  To: Subha=20
  Cc: ipsec@ietf.org=20
  Sent: Friday, April 01, 2005 2:32 PM
  Subject: Re: [Ipsec] Number of SPD Policies


  At 12:21 PM -0800 4/1/05, Subha wrote:
    Hi List-members,

    If I need to apply both ESP and AH SAs between the two=20
    security gateways for a given traffic stream, do I need to
    create two policies or one policy ?

    Can someone indicate this with repect to the following combinations

    1) IKEv1 + 2401


  YES, the status quo


    2) IKEv1 + 2401bis


  not a good match, because 2401bis mandates support for features =
available in IKEv2 that are not in IKE v1.


    3) IKEv2 + 2401


  this combination should work.


    4) IKEv2 + 2401bis


  YES, the intended match up



    From IKEv1 or IKEv2 perspective, my understanding is that there are
    no restrictictions posted.

    2401bis seems to indicate that if there is nested tunneling  i.e. if
    the security tunnel is going to terminate in 2 different remote =
gateways,
    then we need to have two SPD policies. (Reference Appendix -E in =
2401-bis)


  What 2401bis says is that to accommodate a nested SA, in general, one =
will need multiple SPD entries and coordinated entries in the forwarding =
tables on both the protected and unprotected sides of the IPsec =
boundary. It does not say this is an issue that arises when the =
endpoints for the tunnel are distinct. The example in Appendix E is just =
an example, not a comprehensive discussion of how one configures the SPD =
and forwarding tables to accommodate nesting in general.



    However if the terminating tunnel endpoint is the same remote =
gateway and
    both ESP and AH needs to be applied to a particular traffic stream, =
then
    a single SPD Policy should suffice. I did not see any statement in =
2401-bis
    restricting this.




  In the example you cited above, applying AH and ESP to traffic, note =
that the SPD definition in 2401bis specifies application of only one =
security protocol per SA. So I believe that more than one SPD entry is =
required to achieve even this simple nested SA example.


  Steve
------=_NextPart_000_0154_01C536D8.E2D0AE90
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE>Re: [Ipsec] Number of SPD Policies</TITLE>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<STYLE type=3Dtext/css>BLOCKQUOTE {
	PADDING-BOTTOM: 0px; PADDING-TOP: 0px
}
DL {
	PADDING-BOTTOM: 0px; PADDING-TOP: 0px
}
UL {
	PADDING-BOTTOM: 0px; PADDING-TOP: 0px
}
OL {
	PADDING-BOTTOM: 0px; PADDING-TOP: 0px
}
LI {
	PADDING-BOTTOM: 0px; PADDING-TOP: 0px
}
</STYLE>

<META content=3D"MSHTML 6.00.2900.2604" name=3DGENERATOR></HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT face=3DArial size=3D2>Hi&nbsp; Steve,</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>I have some follow-up =
questions.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>In the following questions I have =
assumed that 3=20
IPsec Protocols shall be applied</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>on a given traffic stream.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>1) When IKEv2 is used with RFC2401 =
compliant=20
implementation, can a single IKEv2 </FONT></DIV>
<DIV><FONT face=3DArial size=3D2>CREATE_CHILD_SA negotiate IPcomp, ESP =
and AH SAs=20
for the given traffic </FONT></DIV>
<DIV><FONT face=3DArial size=3D2>selector? </FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>2) When IKEv2 is used with RFC2401-bis =
compliant=20
implementation, there has to </FONT></DIV>
<DIV><FONT face=3DArial size=3D2>be theee IKEv2 CREATE_CHILD_SA=20
Exchanges.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>(1) Plain Traffic selectors for IPcomp=20
SA</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>(2) Same Source IP, Destination IP and =
IPComp for=20
Protocol &nbsp;- Traffic Selectors&nbsp;for ESP SA</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>(3) Tunnel Outer Header Source IP, =
Tunnel Outer=20
Header Destination IP and Protocol=3DESP</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>&nbsp;for AH SA.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>3) An implementation needs to =
know&nbsp;through=20
some other means, </FONT></DIV>
<DIV><FONT face=3DArial size=3D2>whether the peer supports </FONT><FONT =
face=3DArial=20
size=3D2>RFC2401 or 2401-bis. </FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Thanks,</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>Subha</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
  <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV>
  <DIV=20
  style=3D"BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: =
black"><B>From:</B>=20
  <A title=3Dkent@bbn.com href=3D"mailto:kent@bbn.com">Stephen Kent</A> =
</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A =
title=3Dsubhaav@intoto.com=20
  href=3D"mailto:subhaav@intoto.com">Subha</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Cc:</B> <A title=3Dipsec@ietf.org=20
  href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Friday, April 01, 2005 =
2:32=20
PM</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> Re: [Ipsec] Number of =
SPD=20
  Policies</DIV>
  <DIV><FONT face=3DArial size=3D2></FONT><FONT face=3DArial =
size=3D2></FONT><BR></DIV>
  <DIV>At 12:21 PM -0800 4/1/05, Subha wrote:</DIV>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial size=3D-1>Hi=20
    List-members,</FONT></BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial=20
  size=3D2></FONT>&nbsp;</BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial size=3D-1>If I =
need=20
    to&nbsp;apply both ESP and AH SAs between&nbsp;the=20
  two&nbsp;</FONT></BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial =
size=3D-1>security gateways=20
    for a given traffic stream, do I need to</FONT></BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial =
size=3D-1>create two policies=20
    or one policy ?</FONT></BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial=20
  size=3D2></FONT>&nbsp;</BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial size=3D-1>Can =
someone=20
    indicate this with repect to the following =
combinations</FONT></BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial=20
  size=3D2></FONT>&nbsp;</BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial size=3D-1>1) =
IKEv1 +=20
    2401</FONT></BLOCKQUOTE>
  <DIV><FONT face=3DArial size=3D2></FONT><FONT face=3DArial =
size=3D2></FONT><BR></DIV>
  <DIV>YES, the status quo</DIV>
  <DIV><FONT face=3DArial size=3D2></FONT><FONT face=3DArial =
size=3D2></FONT><FONT=20
  face=3DArial size=3D2></FONT><BR></DIV>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial size=3D-1>2) =
IKEv1 +=20
    2401bis</FONT></BLOCKQUOTE>
  <DIV><FONT face=3DArial size=3D2></FONT><FONT face=3DArial =
size=3D2></FONT><FONT=20
  face=3DArial size=3D2></FONT><BR></DIV>
  <DIV>not a good match, because 2401bis mandates support for features =
available=20
  in IKEv2 that are not in IKE v1.</DIV>
  <DIV><FONT face=3DArial size=3D2></FONT><FONT face=3DArial =
size=3D2></FONT><FONT=20
  face=3DArial size=3D2></FONT><BR></DIV>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial size=3D-1>3) =
IKEv2 +=20
    2401</FONT></BLOCKQUOTE>
  <DIV><FONT face=3DArial size=3D2></FONT><FONT face=3DArial =
size=3D2></FONT><FONT=20
  face=3DArial size=3D2></FONT><BR></DIV>
  <DIV>this combination should work.</DIV>
  <DIV><FONT face=3DArial size=3D2></FONT><FONT face=3DArial =
size=3D2></FONT><FONT=20
  face=3DArial size=3D2></FONT><BR></DIV>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial size=3D-1>4) =
IKEv2 +=20
    2401bis</FONT></BLOCKQUOTE>
  <DIV><FONT face=3DArial size=3D2></FONT><FONT face=3DArial =
size=3D2></FONT><FONT=20
  face=3DArial size=3D2></FONT><FONT face=3DArial =
size=3D2></FONT><BR></DIV>
  <DIV>YES, the intended match up</DIV>
  <DIV><FONT face=3DArial size=3D2></FONT><FONT face=3DArial =
size=3D2></FONT><FONT=20
  face=3DArial size=3D2></FONT><FONT face=3DArial =
size=3D2></FONT><BR></DIV>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial=20
  size=3D2></FONT>&nbsp;</BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial size=3D-1>From =
IKEv1 or IKEv2=20
    perspective, my understanding is that there are</FONT></BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial size=3D-1>no =
restrictictions=20
    posted.</FONT></BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial=20
  size=3D2></FONT>&nbsp;</BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial =
size=3D-1>2401bis seems to=20
    indicate that&nbsp;if there is nested tunneling&nbsp; i.e.=20
  if</FONT></BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial size=3D-1>the =
security tunnel=20
    is going to terminate in 2 different remote =
gateways,</FONT></BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial =
size=3D-1>then&nbsp;we need=20
    to have two SPD policies. (Reference Appendix -E in=20
  2401-bis)</FONT></BLOCKQUOTE>
  <DIV><FONT face=3DArial size=3D2></FONT><FONT face=3DArial =
size=3D2></FONT><BR></DIV>
  <DIV>What 2401bis says is that to accommodate a nested SA, in general, =
one=20
  will need multiple SPD entries and coordinated entries in the =
forwarding=20
  tables on both the protected and unprotected sides of the IPsec =
boundary. It=20
  does not say this is an issue that arises when the endpoints for the =
tunnel=20
  are distinct. The example in Appendix E is just an example, not a=20
  comprehensive discussion of how one configures the SPD and forwarding =
tables=20
  to accommodate nesting in general.</DIV>
  <DIV><FONT face=3DArial size=3D2></FONT><FONT face=3DArial=20
  size=3D2></FONT><BR><BR></DIV>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial =
size=3D-1>However&nbsp;if the=20
    terminating&nbsp;tunnel endpoint is the same remote gateway=20
  and</FONT></BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial size=3D-1>both =
ESP=20
    and&nbsp;AH needs to be applied to a particular traffic stream,=20
  then</FONT></BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial size=3D-1>a =
single SPD Policy=20
    should suffice.&nbsp;I did not see any statement in=20
  2401-bis</FONT></BLOCKQUOTE>
  <BLOCKQUOTE cite=3D"" type=3D"cite"><FONT face=3DArial =
size=3D-1>restricting=20
    this.</FONT></BLOCKQUOTE>
  <DIV><FONT face=3DArial size=3D2></FONT><FONT face=3DArial =
size=3D2></FONT><BR></DIV>
  <DIV><FONT face=3DArial size=3D2></FONT><FONT face=3DArial =
size=3D2></FONT><BR></DIV>
  <DIV>In the example you cited above, applying AH and ESP to traffic, =
note that=20
  the SPD definition in 2401bis specifies application of only one =
security=20
  protocol per SA. So I believe that more than one SPD entry is required =
to=20
  achieve even this simple nested SA example.</DIV>
  <DIV><FONT face=3DArial size=3D2></FONT><FONT face=3DArial =
size=3D2></FONT><BR></DIV>
  <DIV>Steve</DIV></BLOCKQUOTE></BODY></HTML>

------=_NextPart_000_0154_01C536D8.E2D0AE90--




--===============1540217239==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec

--===============1540217239==--





From ipsec-bounces@ietf.org  Mon Apr  4 07:56:54 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA22373
	for <ipsec-archive@lists.ietf.org>; Mon, 4 Apr 2005 07:56:54 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DIQB3-0002kc-Q8; Mon, 04 Apr 2005 07:55:33 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DIQB1-0002kX-JP
	for ipsec@megatron.ietf.org; Mon, 04 Apr 2005 07:55:31 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA22206
	for <ipsec@ietf.org>; Mon, 4 Apr 2005 07:55:30 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DIQIx-0008IZ-D0
	for ipsec@ietf.org; Mon, 04 Apr 2005 08:03:44 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j34BtHvP022128
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Mon, 4 Apr 2005 14:55:17 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j34BtEt0022125;
	Mon, 4 Apr 2005 14:55:14 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16977.11042.656521.73950@fireball.kivinen.iki.fi>
Date: Mon, 4 Apr 2005 14:55:14 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: "Subha" <subhaav@intoto.com>
Subject: Re: [Ipsec] Number of SPD Policies
In-Reply-To: <015701c5371b$f3885510$4205010a@subha>
References: <00e801c536f8$531e4850$4205010a@subha>
	<p0621020cbe73752e25ae@[128.89.89.106]>
	<015701c5371b$f3885510$4205010a@subha>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 14 min
X-Total-Time: 15 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 0ddefe323dd869ab027dbfff7eff0465
Content-Transfer-Encoding: 7bit
Cc: ipsec@ietf.org, Stephen Kent <kent@bbn.com>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Subha writes:
> 1) When IKEv2 is used with RFC2401 compliant implementation, can a
> single IKEv2 CREATE_CHILD_SA negotiate IPcomp, ESP and AH SAs for
> the given traffic selector?

Trying to use IKEv2 and RFC2401 is not very good idea, as some of the
features of the IKEv2 cannot be expressed in the RFC2401 policy. Also
the same thing applies to other way around, meaning that IKEv2 is
mostly matching RFC2401bis. This means that especially implementations
will only support IKEv2 for the features required for the RFC2401bis.
As RFC2401bis does NOT require ESP and AH to be negotiated
simultaenously, I guess most of the implementations WILL NOT support
it.

IPcomp can be negotiated in addition to the ESP or AH in the IKEv2
too, but the negotiation is quite different than what was for IKEv1
(or RFC2401).

Also note, that IKEv2 draft explicitly mandates RFC2401bis handling of
the ECN flag, i.e. meaning that you cannot use base RFC2401 with
IKEv2, you need to extend your RFC2401 implementation to include
RFC2401bis ECN handling if you want to use IKEv2. 

> 2) When IKEv2 is used with RFC2401-bis compliant implementation,
> there has to be theee IKEv2 CREATE_CHILD_SA Exchanges.

No. IKEv2 allows IPcomp to be negotiated only when some other child SA
is negotiated. IPComp is mostly outside the scope of IPsec,and
RFC2401bis does not really cover that at all (it just mentions that it
can be negotiated).

You do 2 CREATE_CHILD_SA exchanges.

> (1) Plain Traffic selectors for IPcomp SA

There is no way to do that in IKEv2, you MUST have either ESP or AH.

> (2) Same Source IP, Destination IP and IPComp for Protocol  -
>     Traffic Selectors for ESP SA

No, Plain traffic selectors for ESP SA, and include IPCOMP_SUPPORTED
notify to mention that you want to do ip compression. 


> (3) Tunnel Outer Header Source IP, Tunnel Outer Header Destination
>     IP and Protocol=ESP for AH SA.

Yes, this is the second one. 
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Mon Apr  4 17:05:33 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA09870
	for <ipsec-archive@lists.ietf.org>; Mon, 4 Apr 2005 17:05:33 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DIYFb-0006uy-Ex; Mon, 04 Apr 2005 16:32:47 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DIYFW-0006u1-Nx; Mon, 04 Apr 2005 16:32:42 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA01750;
	Mon, 4 Apr 2005 16:32:41 -0400 (EDT)
Received: from [132.151.6.50] (helo=newodin.ietf.org)
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DIYNX-00060r-Ep; Mon, 04 Apr 2005 16:40:59 -0400
Received: from apache by newodin.ietf.org with local (Exim 4.43)
	id 1DIYFV-0007oV-MV; Mon, 04 Apr 2005 16:32:41 -0400
X-test-idtracker: no
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Message-Id: <E1DIYFV-0007oV-MV@newodin.ietf.org>
Date: Mon, 04 Apr 2005 16:32:41 -0400
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 2409bba43e9c8d580670fda8b695204a
Cc: ipsec mailing list <ipsec@ietf.org>, ipsec chair <tytso@mit.edu>,
        Internet Architecture Board <iab@iab.org>,
        ipsec chair <byfraser@cisco.com>,
        RFC Editor <rfc-editor@rfc-editor.org>
Subject: [Ipsec] Protocol Action: 'IP Encapsulating Security Payload (ESP)'
 to Proposed Standard 
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

The IESG has approved the following document:

- 'IP Encapsulating Security Payload (ESP) '
   <draft-ietf-ipsec-esp-v3-10.txt> as a Proposed Standard

This document is the product of the IP Security Protocol Working Group. 

The IESG contact persons are Russ Housley and Sam Hartman.

Technical Summary
 
  This document describes an updated version of the Encapsulating
  Security Payload (ESP) protocol, which is designed to provide a mix
  of security services in IPv4 and IPv6.  ESP is used to provide
  confidentiality, data origin authentication, connectionless integrity,
  an anti-replay service (a form of partial sequence integrity), and
  limited traffic flow confidentiality.  This document obsoletes
  RFC 2406, published in November 1998.
 
Working Group Summary
 
  The IPsec Working Group came to consensus on this document.
 
Protocol Quality
 
  This document was reviewed by Russell Housley for the IESG.


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Mon Apr  4 17:07:14 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA10362
	for <ipsec-archive@lists.ietf.org>; Mon, 4 Apr 2005 17:07:14 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DIXs6-000871-DS; Mon, 04 Apr 2005 16:08:30 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DIXs1-0007zT-La
	for ipsec@megatron.ietf.org; Mon, 04 Apr 2005 16:08:28 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA25663
	for <ipsec@ietf.org>; Mon, 4 Apr 2005 16:08:23 -0400 (EDT)
Received: from ip-66-80-10-146.dsl.sca.megapath.net ([66.80.10.146]
	helo=smtp.intoto.com) by ietf-mx.ietf.org with smtp (Exim 4.33)
	id 1DIY00-0003kZ-Rf
	for ipsec@ietf.org; Mon, 04 Apr 2005 16:16:41 -0400
Received: from not-angel.intoto.com ([10.1.5.11])
	by smtp.intoto.com (SMSSMTP 4.0.0.59) with SMTP id M2005040413074405881
	; Mon, 04 Apr 2005 13:07:44 -0700
Received: from subha (dhcp-66.intoto.com [10.1.5.66]) (authenticated bits=0)
	by not-angel.intoto.com (8.13.1/8.13.1) with ESMTP id j34K8DGL016758;
	Mon, 4 Apr 2005 13:08:18 -0700
Message-ID: <003701c53952$0aabf430$4205010a@subha>
From: "Subha" <subhaav@intoto.com>
To: "Tero Kivinen" <kivinen@iki.fi>
References: <00e801c536f8$531e4850$4205010a@subha><p0621020cbe73752e25ae@[128.89.89.106]><015701c5371b$f3885510$4205010a@subha>
	<16977.11042.656521.73950@fireball.kivinen.iki.fi>
Subject: Re: [Ipsec] Number of SPD Policies
Date: Mon, 4 Apr 2005 13:08:13 -0700
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.2180
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
X-Spam-Score: 0.8 (/)
X-Scan-Signature: 3b3709b7fb3320c78bd7b1555081f0fc
Cc: ipsec@ietf.org, Stephen Kent <kent@bbn.com>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1033506679=="
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

This is a multi-part message in MIME format.

--===============1033506679==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_002E_01C53917.5B86A930"

This is a multi-part message in MIME format.

------=_NextPart_000_002E_01C53917.5B86A930
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi,=20

It looks like 2401bis brings up a limitation that we cannot
define different AH strength for ESP encrypted packets
between the same two security gateways.

For e.g. let us assume the following scenario.=20

Local           local            Remote     Remote
LAN              GW                GW        LAN
10.1.5.x-------66.80.90.10----66.80.10.2----192.168.1.x
10.1.6.x--------66.80.90.10----66.80.10.2----192.168.2.x

As per RFC 2401, we could define two SPD Policies for each of them,=20
especially AH strength can be different for both of them.

for 10.1.5.x to 192.168.1.x.We could define AH=3D MD5 and ESP=3DDES.
for 10.1.6.x to 192.168.2.x We could define AH=3DSHA and ESP=3D3DES.

But with 2401bis, we can define only one AH encryption strength=20
for both the policies.

i.e.for SPD1 10.1.5.x to 192.168.1.x ESP =3D DES  -ReturntoIpsec
i.e.for SPD2 10.1.6.x to 192.168.2.x ESP =3D 3DES -ReturntoIpsec
i.e for SPD3 66.80.90.10 to 66.80.10.2 AH =3D MD5 -ForwardOut

We can no longer specify service based cryptographic strength,=20
if the Service is ESP between the two tunnel endpoints.

Is this understanding correct ?=20

To overcome this limitation, a configuration can allow=20
Administrator to enter ESP and AH transform in the same policy.
If the Policy is 2401bis, the implementation can negotiate
using IKEv2 with the peer, for 2 sets of traffic selectors,
one with Plain Taffic selectors and the other with Tunnel header
IPs + ESP traffic selector.  By this mechanism, the AH Algorithm=20
applied to a given packet will depend on the selectors of the=20
clear text packet. Of-course, there may be implications on
IKEv2 also based on this. But this is one mechanism that can=20
be considered  to provide service level cryptography strength.

Also, in the above example, if the forwarding entries such=20
as ReturntoIpsec was not present for SPD1, rather=20
ForwardOut was configured, the encrypted ESP packet would=20
be directly sent out.  Is this a correct understanding ?

Thanks,
Subha


----- Original Message -----=20
From: "Tero Kivinen" <kivinen@iki.fi>
To: "Subha" <subhaav@intoto.com>
Cc: "Stephen Kent" <kent@bbn.com>; <ipsec@ietf.org>
Sent: Monday, April 04, 2005 4:55 AM
Subject: Re: [Ipsec] Number of SPD Policies


> Subha writes:
>> 1) When IKEv2 is used with RFC2401 compliant implementation, can a
>> single IKEv2 CREATE_CHILD_SA negotiate IPcomp, ESP and AH SAs for
>> the given traffic selector?
>=20
> Trying to use IKEv2 and RFC2401 is not very good idea, as some of the
> features of the IKEv2 cannot be expressed in the RFC2401 policy. Also
> the same thing applies to other way around, meaning that IKEv2 is
> mostly matching RFC2401bis. This means that especially implementations
> will only support IKEv2 for the features required for the RFC2401bis.
> As RFC2401bis does NOT require ESP and AH to be negotiated
> simultaenously, I guess most of the implementations WILL NOT support
> it.
>=20
> IPcomp can be negotiated in addition to the ESP or AH in the IKEv2
> too, but the negotiation is quite different than what was for IKEv1
> (or RFC2401).
>=20
> Also note, that IKEv2 draft explicitly mandates RFC2401bis handling of
> the ECN flag, i.e. meaning that you cannot use base RFC2401 with
> IKEv2, you need to extend your RFC2401 implementation to include
> RFC2401bis ECN handling if you want to use IKEv2.=20
>=20
>> 2) When IKEv2 is used with RFC2401-bis compliant implementation,
>> there has to be theee IKEv2 CREATE_CHILD_SA Exchanges.
>=20
> No. IKEv2 allows IPcomp to be negotiated only when some other child SA
> is negotiated. IPComp is mostly outside the scope of IPsec,and
> RFC2401bis does not really cover that at all (it just mentions that it
> can be negotiated).
>=20
> You do 2 CREATE_CHILD_SA exchanges.
>=20
>> (1) Plain Traffic selectors for IPcomp SA
>=20
> There is no way to do that in IKEv2, you MUST have either ESP or AH.
>=20
>> (2) Same Source IP, Destination IP and IPComp for Protocol  -
>>     Traffic Selectors for ESP SA
>=20
> No, Plain traffic selectors for ESP SA, and include IPCOMP_SUPPORTED
> notify to mention that you want to do ip compression.=20
>=20
>=20
>> (3) Tunnel Outer Header Source IP, Tunnel Outer Header Destination
>>     IP and Protocol=3DESP for AH SA.
>=20
> Yes, this is the second one.=20
> --=20
> kivinen@safenet-inc.com
>
------=_NextPart_000_002E_01C53917.5B86A930
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2900.2604" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY>
<DIV><FONT face=3D"Courier New" size=3D2>Hi, </FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Courier New" size=3D2>It looks like 2401bis brings up =
a=20
limitation that we cannot</FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>define different =
AH&nbsp;strength&nbsp;for=20
ESP encrypted packets</FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>between the same two security=20
gateways.</FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Courier New" size=3D2>For e.g. let us assume the =
following=20
scenario. </FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Courier New"=20
size=3D2>Local&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;=20
local&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
Remote&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Remote</FONT></DIV>
<DIV><FONT face=3D"Courier New"=20
size=3D2>LAN&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;GW&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;GW&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;LAN</FONT></DIV>
<DIV><FONT face=3D"Courier New"=20
size=3D2>10.1.5.x-------66.80.90.10----66.80.10.2----192.168.1.x</FONT></=
DIV>
<DIV><FONT face=3D"Courier New"=20
size=3D2>10.1.6.x--------66.80.90.10----66.80.10.2----192.168.2.x</FONT><=
/DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Courier New" size=3D2>As per RFC 2401, we could =
define two=20
SPD&nbsp;Policies for each of them, </FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>especially </FONT><FONT =
face=3D"Courier New"=20
size=3D2>AH strength can be different for both of them.</FONT></DIV>
<DIV><FONT face=3DArial><FONT =
size=3D2><FONT></FONT></FONT></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Courier New"><FONT><FONT size=3D2><FONT>for 10.1.5.x =
to=20
192.168.1.x.We </FONT></FONT></FONT><FONT size=3D2>could define AH=3D =
MD5 and=20
ESP=3DDES.</FONT></FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>for 10.1.6.x to 192.168.2.x We =
could define=20
AH=3DSHA and ESP=3D3DES.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Courier New" size=3D2>But with 2401bis, we can define =
only one AH=20
encryption strength </FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>for both the =
policies.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Courier New" size=3D2>i.e.for SPD1 10.1.5.x to =
192.168.1.x ESP =3D=20
DES&nbsp; -ReturntoIpsec</FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>i.e.for SPD2 10.1.6.x to =
192.168.2.x ESP =3D=20
3DES&nbsp;-ReturntoIpsec</FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>i.e&nbsp;for SPD3 66.80.90.10 =
to 66.80.10.2=20
AH =3D MD5 -ForwardOut</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Courier New" size=3D2>We can no longer specify =
service based=20
cryptographic strength, </FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>if the Service =
is&nbsp;</FONT><FONT=20
face=3D"Courier New" size=3D2>ESP between the two tunnel =
endpoints.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><FONT face=3D"Courier New">Is this =
understanding=20
correct ?</FONT> </FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Courier New" size=3D2>To overcome this limitation, a=20
configuration can allow </FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>Administrator to enter ESP and =
AH transform=20
in the same policy.</FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>If the Policy is 2401bis, the=20
implementation can negotiate</FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>using IKEv2 with the peer, for =
2 sets of=20
traffic selectors,</FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>one with Plain Taffic selectors =
and the=20
other with Tunnel header</FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>IPs + ESP traffic =
selector.&nbsp; By this=20
mechanism,&nbsp;the </FONT><FONT face=3D"Courier New" size=3D2>AH =
Algorithm=20
</FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>applied to a given packet will =
depend on=20
the&nbsp;</FONT><FONT face=3D"Courier New" size=3D2>selectors of the =
</FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>clear text =
packet.&nbsp;Of-course, there=20
may be implications on</FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>IKEv2 also based on this. But =
this is one=20
mechanism that can&nbsp;</FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>be =
considered&nbsp;</FONT>&nbsp;to=20
provide<FONT face=3D"Courier New" size=3D2>&nbsp;service level =
cryptography=20
strength.</FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2></FONT>&nbsp;</DIV>
<DIV>
<DIV><FONT face=3D"Courier New" size=3D2>Also, in the above example, if =
the=20
forwarding entries such </FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>as ReturntoIpsec was not =
</FONT><FONT=20
face=3D"Courier New" size=3D2>present for SPD1, rather </FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>ForwardOut was configured, the =
encrypted=20
</FONT><FONT face=3D"Courier New" size=3D2>ESP packet would =
</FONT></DIV>
<DIV><FONT face=3D"Courier New" size=3D2>be directly sent out.&nbsp; Is =
this a=20
correct </FONT><FONT face=3D"Courier New" size=3D2>understanding=20
?</FONT></DIV></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Thanks,</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>Subha</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>----- Original Message ----- =
</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>From: "Tero Kivinen" &lt;</FONT><A=20
href=3D"mailto:kivinen@iki.fi"><FONT face=3DArial=20
size=3D2>kivinen@iki.fi</FONT></A><FONT face=3DArial =
size=3D2>&gt;</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>To: "Subha" &lt;</FONT><A=20
href=3D"mailto:subhaav@intoto.com"><FONT face=3DArial=20
size=3D2>subhaav@intoto.com</FONT></A><FONT face=3DArial =
size=3D2>&gt;</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>Cc: "Stephen Kent" &lt;</FONT><A=20
href=3D"mailto:kent@bbn.com"><FONT face=3DArial =
size=3D2>kent@bbn.com</FONT></A><FONT=20
face=3DArial size=3D2>&gt;; &lt;</FONT><A =
href=3D"mailto:ipsec@ietf.org"><FONT=20
face=3DArial size=3D2>ipsec@ietf.org</FONT></A><FONT face=3DArial=20
size=3D2>&gt;</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>Sent: Monday, April 04, 2005 4:55 =
AM</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>Subject: Re: [Ipsec] Number of SPD=20
Policies</FONT></DIV>
<DIV><FONT face=3DArial><BR><FONT size=3D2></FONT></FONT></DIV><FONT =
face=3DArial=20
size=3D2>&gt; Subha writes:<BR>&gt;&gt; 1) When IKEv2 is used with =
RFC2401=20
compliant implementation, can a<BR>&gt;&gt; single IKEv2 CREATE_CHILD_SA =

negotiate IPcomp, ESP and AH SAs for<BR>&gt;&gt; the given traffic=20
selector?<BR>&gt; <BR>&gt; Trying to use IKEv2 and RFC2401 is not very =
good=20
idea, as some of the<BR>&gt; features of the IKEv2 cannot be expressed =
in the=20
RFC2401 policy. Also<BR>&gt; the same thing applies to other way around, =
meaning=20
that IKEv2 is<BR>&gt; mostly matching RFC2401bis. This means that =
especially=20
implementations<BR>&gt; will only support IKEv2 for the features =
required for=20
the RFC2401bis.<BR>&gt; As RFC2401bis does NOT require ESP and AH to be=20
negotiated<BR>&gt; simultaenously, I guess most of the implementations =
WILL NOT=20
support<BR>&gt; it.<BR>&gt; <BR>&gt; IPcomp can be negotiated in =
addition to the=20
ESP or AH in the IKEv2<BR>&gt; too, but the negotiation is quite =
different than=20
what was for IKEv1<BR>&gt; (or RFC2401).<BR>&gt; <BR>&gt; Also note, =
that IKEv2=20
draft explicitly mandates RFC2401bis handling of<BR>&gt; the ECN flag, =
i.e.=20
meaning that you cannot use base RFC2401 with<BR>&gt; IKEv2, you need to =
extend=20
your RFC2401 implementation to include<BR>&gt; RFC2401bis ECN handling =
if you=20
want to use IKEv2. <BR>&gt; <BR>&gt;&gt; 2) When IKEv2 is used with =
RFC2401-bis=20
compliant implementation,<BR>&gt;&gt; there has to be theee IKEv2=20
CREATE_CHILD_SA Exchanges.<BR>&gt; <BR>&gt; No. IKEv2 allows IPcomp to =
be=20
negotiated only when some other child SA<BR>&gt; is negotiated. IPComp =
is mostly=20
outside the scope of IPsec,and<BR>&gt; RFC2401bis does not really cover =
that at=20
all (it just mentions that it<BR>&gt; can be negotiated).<BR>&gt; =
<BR>&gt; You=20
do 2 CREATE_CHILD_SA exchanges.<BR>&gt; <BR>&gt;&gt; (1) Plain Traffic =
selectors=20
for IPcomp SA<BR>&gt; <BR>&gt; There is no way to do that in IKEv2, you =
MUST=20
have either ESP or AH.<BR>&gt; <BR>&gt;&gt; (2) Same Source IP, =
Destination IP=20
and IPComp for Protocol&nbsp; -<BR>&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; =
Traffic=20
Selectors for ESP SA<BR>&gt; <BR>&gt; No, Plain traffic selectors for =
ESP SA,=20
and include IPCOMP_SUPPORTED<BR>&gt; notify to mention that you want to =
do ip=20
compression. <BR>&gt; <BR>&gt; <BR>&gt;&gt; (3) Tunnel Outer Header =
Source IP,=20
Tunnel Outer Header Destination<BR>&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; IP =
and=20
Protocol=3DESP for AH SA.<BR>&gt; <BR>&gt; Yes, this is the second one. =
<BR>&gt;=20
-- <BR>&gt; </FONT><A href=3D"mailto:kivinen@safenet-inc.com"><FONT =
face=3DArial=20
size=3D2>kivinen@safenet-inc.com</FONT></A><BR><FONT face=3DArial=20
size=3D2>&gt;</FONT></BODY></HTML>

------=_NextPart_000_002E_01C53917.5B86A930--




--===============1033506679==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec

--===============1033506679==--





From ipsec-bounces@ietf.org  Tue Apr  5 05:23:08 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA27845
	for <ipsec-archive@lists.ietf.org>; Tue, 5 Apr 2005 05:23:08 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DIk9P-00068B-TI; Tue, 05 Apr 2005 05:15:12 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DIk9L-00064U-1d
	for ipsec@megatron.ietf.org; Tue, 05 Apr 2005 05:15:07 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA26591
	for <ipsec@ietf.org>; Tue, 5 Apr 2005 05:15:00 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DIkHN-0000Av-3w
	for ipsec@ietf.org; Tue, 05 Apr 2005 05:23:26 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j359EovZ006628
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Tue, 5 Apr 2005 12:14:50 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j359EmJj006625;
	Tue, 5 Apr 2005 12:14:48 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16978.22280.545861.239449@fireball.kivinen.iki.fi>
Date: Tue, 5 Apr 2005 12:14:48 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: "Subha" <subhaav@intoto.com>
Subject: Re: [Ipsec] Number of SPD Policies
In-Reply-To: <003701c53952$0aabf430$4205010a@subha>
References: <00e801c536f8$531e4850$4205010a@subha>
	<p0621020cbe73752e25ae@[128.89.89.106]>
	<015701c5371b$f3885510$4205010a@subha>
	<16977.11042.656521.73950@fireball.kivinen.iki.fi>
	<003701c53952$0aabf430$4205010a@subha>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 4 min
X-Total-Time: 4 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7655788c23eb79e336f5f8ba8bce7906
Content-Transfer-Encoding: 7bit
Cc: ipsec@ietf.org, Stephen Kent <kent@bbn.com>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Subha writes:
> It looks like 2401bis brings up a limitation that we cannot
> define different AH strength for ESP encrypted packets
> between the same two security gateways.

Yes, I think you are right.

The question is: Is there any reason to really do that? Why are you
doing AH+ESP between the local GW and Remote GW in any case, why are
you not simply using ESP with suitable auth algorithm?

As you are using tunnel mode there AH does not offer anything more
compared to the ESP.

The only case where I can see there would be use for AH+ESP is when
the AH and ESP are terminated by different hosts, i.e. AH goes to from
host to firewall, and the ESP goes from host through the firewall to
the other end host.

As there EVER any valid scenario where you would need to use AH+ESP
where both of those are terminated by same peers?
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Tue Apr  5 08:20:00 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA13638
	for <ipsec-archive@lists.ietf.org>; Tue, 5 Apr 2005 08:20:00 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DImsm-0003ya-4d; Tue, 05 Apr 2005 08:10:12 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DImsj-0003yA-PQ
	for ipsec@megatron.ietf.org; Tue, 05 Apr 2005 08:10:10 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA12079
	for <ipsec@ietf.org>; Tue, 5 Apr 2005 08:10:08 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DIn0s-0006j3-Cb
	for ipsec@ietf.org; Tue, 05 Apr 2005 08:18:34 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j35C9xZB008379
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Tue, 5 Apr 2005 15:10:00 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j35C9wN5008376;
	Tue, 5 Apr 2005 15:09:58 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16978.32790.327313.883104@fireball.kivinen.iki.fi>
Date: Tue, 5 Apr 2005 15:09:58 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Charlie Kaufman <charliek@microsoft.com>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 3 min
X-Total-Time: 3 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 79899194edc4f33a41f49410777972f8
Content-Transfer-Encoding: 7bit
Cc: ipsec@ietf.org
Subject: [Ipsec] Error in draft-ietf-ipsec-ikev2-17.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

I found error (or typo) in the draft-ietf-ipsec-ikev2-17.txt that
probably should be fixed in the author 48 hours period.

The section 2.6 still refers to the SPIr when it should say "Cookie".
I.e. CHANGE

   If it matches, the responder knows that SPIr was generated
   since the last change to <secret> and that IPi must be the same as
   the source address it saw the first time.

to

   If it matches, the responder knows that Cookie was generated
   since the last change to <secret> and that IPi must be the same as
   the source address it saw the first time.

(This typo is left over from the times we didn't have N(COOKIE)
notify, but instead generated SPIr and used it as a COOKIE). 
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Tue Apr  5 08:20:00 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA13637
	for <ipsec-archive@lists.ietf.org>; Tue, 5 Apr 2005 08:20:00 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DImyd-0005yt-HW; Tue, 05 Apr 2005 08:16:15 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DImyZ-0005yU-P1
	for ipsec@megatron.ietf.org; Tue, 05 Apr 2005 08:16:14 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA13020
	for <ipsec@ietf.org>; Tue, 5 Apr 2005 08:16:10 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DIn6h-00076g-W6
	for ipsec@ietf.org; Tue, 05 Apr 2005 08:24:37 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j35CG6PD008416
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Tue, 5 Apr 2005 15:16:06 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j35CG2oj008411;
	Tue, 5 Apr 2005 15:16:02 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16978.33154.351915.320602@fireball.kivinen.iki.fi>
Date: Tue, 5 Apr 2005 15:16:02 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: pasi.eronen@nokia.com, paul.hoffman@vpnc.org
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 2 min
X-Total-Time: 2 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 2e8fc473f5174be667965460bd5288ba
Content-Transfer-Encoding: 7bit
Cc: ipsec@ietf.org
Subject: [Ipsec] Comments of draft-eronen-ipsec-ikev2-clarifications-02.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

>        If a CREATE_CHILD_SA exchange includes a KEi payload, at
>        least one of the SA offers MUST include the Diffie-Hellman
>        group of the KEi MUST be an element of the group the
>        initiator expects the responder to accept (additional
>        Diffie-Hellman groups can be proposed).

I think the above sentece is missing some things: "... include the
Diffie-Hellman group of the KEi MUST be an ..."

Perhaps it should be:

"If a CREATE_CHILD_SA exchange includes a KEi payload, at least one of
the SA offers MUST include the Diffie-Hellman group of the KEi. The
Diffie-Hellman group of the KEi MUST be an element of the group the
initiator expects the responder to accept (additional Diffie-Hellman
groups can be proposed)."

Also if we think more about the IKE SA rekeying, I do not think there
is any reason to do that unless you also do new Diffie-Hellman there
too. Rekeying IKE SA because of the IKE message ID wrapping is not
common. The current IKEv2 text is not clear wheather the intension was
that IKE SA rekey MUST have KE payloads, but I think we should mandate
them, i.e. say in the NEW-1.3.2 that KE payloads are not optional
there.

The section 5 should also point out that INTERNAL_ADDRESS_EXPIRY is
not mandatory in the IKEv2, and in most cases it would be best not to
use it at all. Most of the clients will not tolerate the server not to
give the same address back when the address lease expires. This means
that only reason to do address expiry is to know when the client stops
using the address. In IKEv2 this time is very clear as it is also tied
to the IKE SA. If the IKE SA is deleted then the client cannot use the
address anymore, and when he recretes the IKE SA he need to get the
address again using configuration payloads (he also need to recreate
all IPsec SAs and change the traffic selectors to match new addresses
etc).

Because of that I would recommend that INTERNAL_ADDRESS_EXPIRY SHOULD
NOT be used in the IKEv2.  

> 6.1  Diffie-Hellman for first CHILD_SA
> 
>   Section 1.2 shows that IKE_AUTH messages do not contain KEi/KEr or
>   Ni/Nr payloads.  This implies that the SA payload in IKE_AUTH
>   exchange cannot contain Transform Type 4 (Diffie-Hellman Group) with
>   any other value than NONE.

And most commonly that should be coded as leaving out transform type 4
completely.

> 6.5  Reducing the window size
> 
>   In IKEv2, the window size is assumed to be a (possibly configurable)
>   property of a particular implementation, and is not related to
>   congestion control (unlike the window size in TCP, for instance).
>
>   In particular, there is no way to reduce the window size of an
>   existing IKE_SA.  However, when rekeying an IKE_SA, the new IKE_SA
>   starts with window size 1 until it is explicitly increased by sending
>   a new SET_WINDOW_SIZE notification.

More precisely, you could send SET_WINDOW_SIZE notification with
smaller window than before, but it is not defined what responder
should do in that case. He might have more request than allowed by the
new window size already out, thus he cannot reduce the window size.
Because of this the reduction of window size cannot be done before the
responder processing rules have been define, i.e. currently reducing
window size is forbidden.

> 6.9  SPI values for messages outside of an IKE_SA
>
>   The IKEv2 specification does not say what SPI values should be used
>   for Informational requests sent outside of an IKE_SA.
>
>   There seem to be two cases when such a message can be sent:
>   INVALID_IKE_SPI and INVALID_SPI notifications.  Especially in the
>   latter case, no meaningful IKE SPI values are available.
>
>   A strict interpretation of the specification would require the sender
>   to invent garbage values for the SPI fields.  However, we think this
>   was not the intention, and using zero values is acceptable.

I think whole section should be clarified. There cannot be any
informational exchanges outside the IKE SA, thus there will always be
IKE SPIs for that packet. IKEv2 DOES NOT have non-authenticated
notifications that the IKEv1 had.

The section 1.5 describes about case where the responder of packet
could send out packet looking like informational exchange as a
response to the packet it receives, but that is not part of an
informational exchange, and responder should not act based on the
received packet, except it might start DPD because of the packet (i.e.
it is treader similarly than ICMP host unreachable etc are treated).

In that case using all zero SPI fields is acceptable.

> 6.11  INVALID_IKE_SPI
...
>   Since the INVALID_IKE_SPI notification is sent outside of an IKE_SA,
>   and it is not about an existing SA, it seems that using Notification
>   Data would be the logical choice.  However, this issue needs more
>   discussion and we do not yet propose any solution in this document.

The INVALID_IKE_SPI can also be sent inside the existing IKE SA. See
section 1.5 of IKEv2 draft for more details.

As the description of the INVALID_IKE_SPI says that unrecognized
destination SPI, which would indicate that destination SPI was the one
we didn't know anything about. So my interpretation would be to use
SPI field of the notification payload (as it does not say put it in
the data field), and only put destination SPI there, with protocol ID
of IKE. On the other hand section 3.10 says sthat SPI size for the
notification concerning MUST be zero, so I agree this is not really
consistent. 

> 6.12  Which message should contain INITIAL_CONTACT
...
>   The text does talk about authenticated identities, so it seems the
>   notification cannot be sent before both endpoints have been
>   authenticated.  Thus, the possible places are the last IKE_AUTH
>   response message and a separate Informational exchange.

Initiator usually knows to whom is is supposed to talk to and he knows
weather he has SA with him before or not (if he had IKE SA he would
have used it, or he had some other reason not to use it).

So it means that initiator can send INITIAL_CONTACT in IKE_AUTH and
responder can respond to that in the same packet. I would actually
prefer that instead of using separate informational exchange.

>   Based on how this was implemented in IKEv1, it seems the intent was
>   to use a separate Informational exchange.

In IKEv1 it was supposed to be sent inside the main mode, but as the
extra payloads are not authenticated there, some implementations use
separate informational exchange for it. For IKEv1 it was actually very
bad idea to use separate informational exchange as they were not
reliable.

>   o  The message IDs of IKE_SA_INIT messages is unclear if there are
>      cookies followed by INVALID_KE_PAYLOAD.  See "Question about
>      N(COOKIE) and N(INVALID_KE_PAYLOAD) combination" thread, Oct 2004.
>      This definitely needs to be clarified.

I do not think this is unclear. When you create state in the responder
you allocate IKE SPI and start using message IDs. If you return
N(COOKIE), you do not allocate anything, thus you do not allocate IKE
SA SPI, and as message ID is property of IKE SA, you do not use it
yet.

If you return N(INVALID_KE_PAYLOAD) that is fatal error, and again you
do not need to allocate IKE SA nor the SPI, thus no message ID can be
stored. When the initiator retries with both N(COOKIE) and
with proper group, then you finally allocate IKE SA and the SPI, and
start using message IDs.

Thus message id of IKE_SA_INIT should always be zero.
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Tue Apr  5 09:38:20 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA20405
	for <ipsec-archive@lists.ietf.org>; Tue, 5 Apr 2005 09:38:20 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DIoAD-0002Nb-Gx; Tue, 05 Apr 2005 09:32:17 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DIoAB-0002KN-Pg
	for ipsec@megatron.ietf.org; Tue, 05 Apr 2005 09:32:15 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA19958
	for <ipsec@ietf.org>; Tue, 5 Apr 2005 09:32:13 -0400 (EDT)
Received: from ip-66-80-10-146.dsl.sca.megapath.net ([66.80.10.146]
	helo=smtp.intoto.com) by ietf-mx.ietf.org with smtp (Exim 4.33)
	id 1DIoIK-0001Y2-Cl
	for ipsec@ietf.org; Tue, 05 Apr 2005 09:40:41 -0400
Received: from brahma.intotoind.com ([172.16.1.10])
	by smtp.intoto.com (SMSSMTP 4.0.0.59) with SMTP id M2005040506313209848
	for <ipsec@ietf.org>; Tue, 05 Apr 2005 06:31:32 -0700
Received: from SriRam.intoto.com (2mc54.intotoind.com [172.16.2.54])
	by brahma.intotoind.com (8.12.11/8.12.8) with ESMTP id j35DW1fO020015
	for <ipsec@ietf.org>; Tue, 5 Apr 2005 19:02:01 +0530
Message-Id: <5.1.0.14.0.20050405190205.02bb8b48@172.16.1.10>
X-Sender: tosri@172.16.1.10
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Tue, 05 Apr 2005 19:08:48 +0530
To: ipsec@ietf.org
From: Tatineni SriRama Kumar <tosri@intoto.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
X-Scanned-By: MIMEDefang 2.41
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7a6398bf8aaeabc7a7bb696b6b0a2aad
Subject: [Ipsec] Blocking traffic using opaque 
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Hi All,
   As per point C and D  in section 4.4.1.3 of 2401bis, traffic will be 
passed in only one direction. Based on this I have following questions.

1. How configuration specified in point B of same section allows traffic in 
both directions.
2. If configuration specified in points B,C and D allows traffic in one 
direction only, what should be the configuration to allow traffic in both 
directions.

--SriRam/Vineet 



_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Tue Apr  5 09:55:01 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA21690
	for <ipsec-archive@lists.ietf.org>; Tue, 5 Apr 2005 09:55:01 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DIoUz-0005N1-2t; Tue, 05 Apr 2005 09:53:45 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DIoUw-0005JT-Dl
	for ipsec@megatron.ietf.org; Tue, 05 Apr 2005 09:53:42 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA21534
	for <ipsec@ietf.org>; Tue, 5 Apr 2005 09:53:40 -0400 (EDT)
Received: from nav2.lgsoftindia.com ([203.200.13.13] helo=nav2)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DIod4-0002DH-4x
	for ipsec@ietf.org; Tue, 05 Apr 2005 10:02:08 -0400
Received: from appolo.lgdomain.com ([192.168.1.22]) by nav2 with InterScan
	Messaging Security Suite; Tue, 05 Apr 2005 19:26:22 +0530
x-mimeole: Produced By Microsoft Exchange V6.5.6944.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Tue, 5 Apr 2005 19:28:02 +0530
Message-ID: <EC9E4C8E76FEF944B5C0711496A107280161E5B9@APPOLO.lgdomain.com>
Thread-Topic: doubts about IKEv2 implementation
Thread-Index: AcU553uwqd1f/s/VQICX+aTqZs+V+w==
From: "Soumya Sen" <soumya.sen@lgsoftindia.com>
To: <ipsec@ietf.org>
X-Spam-Score: 0.5 (/)
X-Scan-Signature: 2b428fb4265163ba7f2ac2af0ebfcf00
Subject: [Ipsec] doubts about IKEv2 implementation
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0820247764=="
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

This is a multi-part message in MIME format.

--===============0820247764==
Content-class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C539E7.7B9E4388"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C539E7.7B9E4388
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


Hello,

=0D

I am a senior undergraduate student, presently undergoing industrial
project training. I am trying to understand the IKEv2 protocol and went
through the draft. However, I got certain doubts and interpreted certain
things in my own way, but I am not sure whether the understanding is
correct or flawed. I will be very grateful if you kindly take out some
time to clear the doubts that I have listed below. Please explain the
relevant concepts if my interpretation is wrong. Thanking you very much
in advance,

Best regards,=0D

Soumya Sen.

India.

=0D

=0D

NOTE: Here the SA payload contents have been shown in "(...)" and the
contents are separated by ";", while the payloads are separated by ","
and proposal structures are separated by "[" or "]".

=0D

IKE_INIT_SA request:

HDR("A",0), SAi1([proposal#1; protocol ID:1 (for IKE); SPI size:0; ...,
<transforms>], [proposal #2; protocol ID:1; SPI size:0; ...,
<transforms>]), KEi, Ni.

=0D

Let the IKE is assigned the SPI of value "A" from the sender's side. Let
us assume only two proposals were made initially. No SPI field is
present within the proposal substructures.=0D

=0D

IKE_INIT_SA response:

HDR("A", "B"), SAr1([proposal#1; protocol ID:1; SPI size:0; ...; <1
transforms chosen from each transform type requested >]), KEr, Nr.

=0D

Proposal number 1 was chosen and one transform of each transform type
under that proposal is returned. No SPI field is present within the
proposal substructures.=0D

=0D

Q1: Am I correct to believe that *always* in the response *only one*
chosen proposal is present i.e. the chosen proposal mentioning one
transforms of each transform type required?=0D

=0D

Q2: In the case, that the responder chooses a proposal that had the
proposal number #3, will the Proposal number mentioned in the
responder's SA payload be 3(i.e. mention the chosen proposal number) or
mentions the proposal no. as #1 always (*because only one proposal can
be selected*).

=0D

IKE_AUTH request:
HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,],AUTH, SAi2([proposal#1; protocol
ID:2 (for AH); SPI size:4; ...,SPI value: "C"; <transforms>], [proposal
#2; protocol ID:3 (for ESP); SPI size:4; ...,SPI value: "D";
<transforms>]), TSi, TSr}
=0D
SPIs for the SAs are proposed in the SPI fields in the Proposal
Substructure. The initiator chooses the SPI values of "C" and "D" for
the two proposals.=0D
Q3: Is it that the values chosen for "C" and "D" *must* be different
always?=0D
=0D
Q4: In the case where we want to propose that both AH and ESP are to be
used for the traffic stream, we mark both the proposals as #1. In this
case will the SPI value mentioned in the proposal substructure be
different for the two proposals even though the Proposal no. is 1 for
both the substructure?=0D
=0D

=0D

IKE_AUTH response:
HDR, SK {IDr, [CERT,] AUTH, SAr2([proposal#1; protocol ID:2 (for AH);
SPI size:4; ...,SPI value: "E"; <1 transforms chosen from each transform
type requested>]), TSi, TSr}
=0D
Proposal no.1 was chosen, the SPI value associated by the responder is
"E" for this SA chosen from the offered set of SAs. =0D
=0D
Q5: Am I correct to believe that the SPI value chosen by the responder
for the chosen proposal is randomly chosen to be "E". Can it also happen
to choose the same value "C"?=0D
=0D
Q6: Am I correct to believe that the values chosen for this SA (here "C"
on sender's side and "E" on receiver's side) are different and two
distinct SA are existing in the two directions with *same* keys and
*same* agreed upon set of algorithms?=0D
=0D
Q7: To REKEY this SA, will the sender send a CREATE_CHILD_SA request
mentioning the SPI value as "E"(its inbound value) in the 'N' payload
and the if successful both of them delete the SA corresponding to "C" on
sender's side and "E" on responder's side?=0D
=0D
Q8: This CHILD created from the initial exchange may follow the protocol
types of ESP, AH, both ESP & AH etc. But they can never support the
option for a DH group transform type in the proposal since no KE payload
can be sent along with the AUTH exchange messages.=0D
So Perfect forward secrecy(PSF) cannot be supported in this child
created through initial exchange?
=0D
Q9: While "Rekeying" it is being said that the CHILD_SA creates an
equivalent SA to the one to be replaced. Does it mean that in the SA
payload we send the *only* the same proposal which is the *presently
existing* suite for the SA?=0D
=0D
Q10: Am I correct to think that the outer header(HDR) in the
CREATE_CHILD_SA has the SPIs corresponding to the parent IKE?
=0D
Q11: When we Rekey an existing IKE_SA, in the CREATE_CHILD_SA do we need
to mark the protocol ID as 3 (corresponding to IKE protocol value)? If
we are creating an IKE then there should be no SPI value field mentioned
in the SA structure, but again it is said that "the new initiator and
responder SPIs are supplied in the SPI fields in the Proposal structure
in the SA payload". I am getting confused here. Does it mean that the SA
that is being created to rplace the parent IKE by using CREATE_CHILD_SA
has to be AH or ESP and not an IKE protocol?=0D

=0D

=0D

I will be glad to have your response to my doubts.

Thanking you in advance,

Soumya.

=0D

=0D

=0D



***************************************************************************=
***************************************************************************=
****

This email message is for the sole use of the intended recipient(s)and may=
 contain CONFIDENTIAL and PRIVILEGED information.
LG Soft India will not be responsible for any viruses or defects or any=
 forwarded attachments emanating either from within=0D
LG Soft India or outside. Any unauthorized review, use, disclosure or=
 distribution is prohibited. If you are not the intended=0D
recipient, please contact the sender By reply email and destroy all copies=
 of the original message.

***************************************************************************=
***************************************************************************=
****
------_=_NextPart_001_01C539E7.7B9E4388
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:o=3D"urn:schemas-microsoft-com:office:office" xmlns:w=
=3D"urn:schemas-microsoft-com:office:word" xmlns:st1=
=3D"urn:schemas-microsoft-com:office:smarttags" xmlns=
=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; charset=
=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<o:SmartTagType namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"country-region"/>
<o:SmartTagType namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"State"/>
<o:SmartTagType namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place"/>
<o:SmartTagType namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"City"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
pre
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:Arial;
	color:windowtext;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'>Hello,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'>I am a senior undergraduate student, presently undergoing=
 industrial
project training. I am trying to understand the IKEv2 protocol and went=
 through
the draft. However, I got certain doubts and interpreted certain things in=
 my
own way, but I am not sure whether the understanding is correct or flawed.=
 I
will be very grateful if you kindly take out some time to clear the doubts=
 that
I have listed below. Please explain the relevant concepts if my=
 interpretation
is wrong. Thanking you very much in advance,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'>Best regards, <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'>Soumya Sen.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><st1:place w:st=3D"on"><st1:country-region w:st=
=3D"on"><font
  size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt'>India</span></font></st1:country-region></st1:place><=
font
size=3D2><span style=3D'font-size:11.0pt'>.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'>NOTE: Here the SA payload contents have been shown in
&#8220;(&#8230;)&#8221; and the contents are separated by &#8220;;&#8221;,
while the payloads are separated by &#8220;,&#8221; and proposal structures=
 are
separated by &#8220;[&#8220; or=
 &#8220;]&#8221;.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><u><font size=3D2 face=3D"Times New Roman"><span
style=3D'font-size:11.0pt'>IKE_INIT_SA=
 request:<o:p></o:p></span></font></u></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'>HDR(&#8220;A&#8221;,0), SAi1([proposal#1; protocol ID:1 (for IKE);=
 SPI
size:0; &#8230;, &lt;transforms&gt;], [proposal #2; protocol ID:1; SPI=
 size:0;
&#8230;, &lt;transforms&gt;]), KEi, Ni.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'>Let the IKE is assigned the SPI of value &#8220;A&#8221; from the
sender&#8217;s side. Let us assume only two proposals were made initially.=
 No
SPI field is present within the proposal substructures.=
 <o:p></o:p></span></font></p>

<p class=3DMsoNormal><u><font size=3D2 face=3D"Times New Roman"><span
style=3D'font-size:11.0pt'><o:p><span style=
=3D'text-decoration:none'>&nbsp;</span></o:p></span></font></u></p>

<p class=3DMsoNormal><u><font size=3D2 face=3D"Times New Roman"><span
style=3D'font-size:11.0pt'>IKE_INIT_SA=
 response:<o:p></o:p></span></font></u></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'>HDR(&#8220;A&#8221;, &#8220;B&#8221;), SAr1([proposal#1; protocol=
 ID:1;
SPI size:0; &#8230;; &lt;1 transforms chosen from each transform type=
 requested
&gt;]), KEr, Nr.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'>Proposal number 1 was chosen and one transform of each transform=
 type
under that proposal is returned. No SPI field is present within the=
 proposal
substructures. <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'>Q1: Am I correct to believe that *always* in the response *only=
 one*
chosen proposal is present i.e. the chosen proposal mentioning one=
 transforms
of each transform type required? <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'>Q2: In the case, that the responder chooses a proposal that had the
proposal number #3, will the Proposal number mentioned in the=
 responder&#8217;s
SA payload be 3(i.e. mention the chosen proposal number) or mentions the
proposal no. as #1 always (*because only one proposal can be=
 selected*).<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'><o:p>&nbsp;</o:p></span></font></p>

<pre><u><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;
font-family:"Times New Roman"'>IKE_AUTH=
 request:<o:p></o:p></span></font></u></pre><pre><st1:place
w:st=3D"on"><st1:City w:st=3D"on"><font size=3D2 face=3D"Times New=
 Roman"><span
  style=3D'font-size:11.0pt;font-family:"Times New=
 Roman"'>HDR</span></font></st1:City><font
 size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New Roman"'>, <st1:State
 w:st=3D"on">SK</st1:State></span></font></st1:place><font size=3D2
face=3D"Times New Roman"><span style=3D'font-size:11.0pt;font-family:"Times=
 New Roman"'> {IDi, [CERT,] [CERTREQ,] [IDr,],AUTH, SAi2([proposal#1;=
 protocol ID:2 (for AH); SPI size:4; &#8230;,SPI value: &#8220;C&#8221;;=
 &lt;transforms&gt;], [proposal #2; protocol ID:3 (for ESP); SPI size:4;=
 &#8230;,SPI value: &#8220;D&#8221;; &lt;transforms&gt;]), TSi,=
 TSr}<o:p></o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New=
 Roman"'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New Roman"'>SPIs for the SAs are=
 proposed in the SPI fields in the Proposal Substructure. The initiator=
 chooses the SPI values of &#8220;C&#8221; and &#8220;D&#8221; for the two=
 proposals. <o:p></o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q3: Is it that the=
 values chosen for &#8220;C&#8221; and &#8220;D&#8221; *must* be different=
 always? <o:p></o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New=
 Roman"'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q4: In the case where=
 we want to propose that both AH and ESP are to be used for the traffic=
 stream, we mark both the proposals as #1. In this case will the SPI value=
 mentioned in the proposal substructure be different for the two proposals=
 even though the Proposal no. is 1 for both the substructure?=
 <o:p></o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New=
 Roman"'><o:p>&nbsp;</o:p></span></font></pre>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:
11.0pt'><o:p>&nbsp;</o:p></span></font></p>

<pre><u><font size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;
font-family:"Times New Roman"'>IKE_AUTH=
 response:<o:p></o:p></span></font></u></pre><pre><st1:place
w:st=3D"on"><st1:City w:st=3D"on"><font size=3D2 face=3D"Times New=
 Roman"><span
  style=3D'font-size:11.0pt;font-family:"Times New=
 Roman"'>HDR</span></font></st1:City><font
 size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New Roman"'>, <st1:State
 w:st=3D"on">SK</st1:State></span></font></st1:place><font size=3D2
face=3D"Times New Roman"><span style=3D'font-size:11.0pt;font-family:"Times=
 New Roman"'> {IDr, [CERT,] AUTH, SAr2([proposal#1; protocol ID:2 (for AH);=
 SPI size:4; &#8230;,SPI value: &#8220;E&#8221;; &lt;1 transforms chosen=
 from each transform type requested&gt;]), TSi,=
 TSr}<o:p></o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New=
 Roman"'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New Roman"'>Proposal no.1 was=
 chosen, the SPI value associated by the responder is &#8220;E&#8221; for=
 this SA chosen from the offered set of SAs.=
 &nbsp;<o:p></o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New=
 Roman"'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q5: Am I correct to=
 believe that the SPI value chosen by the responder for the chosen proposal=
 is randomly chosen to be &#8220;E&#8221;. Can it also happen to choose the=
 same value &#8220;C&#8221;? <o:p></o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New=
 Roman"'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q6: Am I correct to=
 believe that the values chosen for this SA (here &#8220;C&#8221; on=
 sender&#8217;s side and &#8220;E&#8221; on receiver&#8217;s side) are=
 different and two distinct SA are existing in the two directions with=
 *same* keys and *same* agreed upon set of algorithms?=
 <o:p></o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New=
 Roman"'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q7: To REKEY this SA,=
 will the sender send a CREATE_CHILD_SA request mentioning the SPI value as=
 &#8220;E&#8221;(its inbound value) in the &#8216;N&#8217; payload and the=
 if successful both of them delete the SA corresponding to &#8220;C&#8221;=
 on sender&#8217;s side and &#8220;E&#8221; on responder&#8217;s side?=
 <o:p></o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New=
 Roman"'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q8: This CHILD created=
 from the initial exchange may follow the protocol types of ESP, AH, both=
 ESP &amp; AH etc. But they can never support the option for a DH group=
 transform type in the proposal since no KE payload can be sent along with=
 the AUTH exchange messages. <o:p></o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New Roman"'>So Perfect forward=
 secrecy(PSF) cannot be supported in this child created through initial=
 exchange?<o:p></o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New=
 Roman"'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q9: While=
 &#8220;Rekeying&#8221; it is being said that the CHILD_SA creates an=
 equivalent SA to the one to be replaced. Does it mean that in the SA=
 payload we send the *only* the same proposal which is the *presently=
 existing* suite for the SA? <o:p></o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New=
 Roman"'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q10: Am I correct to=
 think that the outer header(HDR) in the CREATE_CHILD_SA has the SPIs=
 corresponding to the parent IKE?<o:p></o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New=
 Roman"'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span style=
=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q11: When we Rekey an=
 existing IKE_SA, in the CREATE_CHILD_SA do we need to mark the protocol ID=
 as 3 (corresponding to IKE protocol value)? If we are creating an IKE then=
 there should be no SPI value field mentioned in the SA structure, but=
 again it is said that &#8220;the new initiator and responder SPIs are=
 supplied in the SPI fields in the Proposal structure in the SA=
 payload&#8221;. I am getting confused here. Does it mean that the SA that=
 is being created to rplace the parent IKE by using CREATE_CHILD_SA has to=
 be AH or ESP and not an IKE protocol? <o:p></o:p></span></font></pre>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=
=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=
=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=
=3D'font-size:10.0pt;
font-family:Arial'>I will be glad to have your response to my=
 doubts.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=
=3D'font-size:10.0pt;
font-family:Arial'>Thanking you in advance,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=
=3D'font-size:10.0pt;
font-family:Arial'>Soumya.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=
=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=
=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=
=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

</div>

</body>

</html>

<table><tr><td bgcolor=3D#ffffff><font color=
=3D#000000>****************************************************************=
***************************************************************************=
***************<br><br>This email message is for the sole use of the=
 intended recipient(s)and may contain CONFIDENTIAL and PRIVILEGED=
 information.<br>LG Soft India will not be responsible for any viruses or=
 defects or any forwarded attachments emanating either from within <br>LG=
 Soft India or outside. Any unauthorized review, use, disclosure or=
 distribution is prohibited. If you are not the intended <br>recipient,=
 please contact the sender By reply email and destroy all copies of the=
 original=
 message.<br><br>**********************************************************=
***************************************************************************=
*********************<br></font></td></tr></table>
------_=_NextPart_001_01C539E7.7B9E4388--


--===============0820247764==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec

--===============0820247764==--



From ipsec-bounces@ietf.org  Tue Apr  5 20:56:50 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA06855
	for <ipsec-archive@lists.ietf.org>; Tue, 5 Apr 2005 20:56:50 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DIypR-0005rU-Lm; Tue, 05 Apr 2005 20:55:33 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DIypP-0005rN-CJ
	for ipsec@megatron.ietf.org; Tue, 05 Apr 2005 20:55:31 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA06747
	for <ipsec@ietf.org>; Tue, 5 Apr 2005 20:55:29 -0400 (EDT)
Received: from mail1.microsoft.com ([131.107.3.125])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DIyxb-0006ES-Uf
	for ipsec@ietf.org; Tue, 05 Apr 2005 21:04:03 -0400
Received: from mailout2.microsoft.com ([157.54.1.120]) by mail1.microsoft.com
	with Microsoft SMTPSVC(6.0.3790.1802); 
	Tue, 5 Apr 2005 17:55:16 -0700
Received: from RED-MSG-51.redmond.corp.microsoft.com ([157.54.12.11]) by
	mailout2.microsoft.com with Microsoft SMTPSVC(6.0.3790.1824); 
	Tue, 5 Apr 2005 17:55:17 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Subject: RE: [Ipsec] doubts about IKEv2 implementation
Date: Tue, 5 Apr 2005 17:55:17 -0700
Message-ID: <F5F4EC6358916448A81370AF56F211A505C8EFE3@RED-MSG-51.redmond.corp.microsoft.com>
Thread-Topic: RE: [Ipsec] doubts about IKEv2 implementation
thread-index: AcU5257WT/ttHH7YRciiy/YnXZqKaQAJ1+SQAA/xiaA=
From: "Charlie Kaufman" <charliek@microsoft.com>
To: <ipsec@ietf.org>
X-OriginalArrivalTime: 06 Apr 2005 00:55:17.0729 (UTC)
	FILETIME=[4CE60510:01C53A43]
X-Spam-Score: 1.7 (+)
X-Scan-Signature: 9a0a5b57b7540919633bb8f7cd3cb4bd
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1043468027=="
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

This is a multi-part message in MIME format.

--===============1043468027==
Content-class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C53A43.48DBCDE6"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C53A43.48DBCDE6
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I got this same question privately, and responded (see below). I'm
forwarding this to the list to make sure no one else takes the time to
respond. (Unless of course they have a different answer, in which case
that should be on the list too!).

=20

            --Charlie

=20

________________________________

From: Charlie Kaufman=20
Sent: Tuesday, April 05, 2005 5:48 PM
To: 'Soumya Sen'
Subject: RE: doubts about the IKEv2 implementation

=20

I've embedded comments below... Charlie

=20

________________________________

From: Soumya Sen [mailto:soumya.sen@lgsoftindia.com]=20
Sent: Tuesday, April 05, 2005 5:33 AM
To: Charlie Kaufman
Subject: doubts about the IKEv2 implementation

=20

Dear Sir,

=20

I am a senior undergraduate student, presently undergoing industrial
project training. I am trying to understand the IKEv2 protocol and went
through the draft. However, I got certain doubts and interpreted certain
things in my own way, but I am not sure whether the understanding is
correct or flawed. I will be very grateful if you kindly take out some
time to clear the doubts that I have listed below. Please explain the
relevant concepts if my interpretation is wrong. Thanking you very much
in advance,

Best regards,=20

Soumya Sen.

India.

=20

=20

NOTE: Here the SA payload contents have been shown in "(...)" and the
contents are separated by ";", while the payloads are separated by ","
and proposal structures are separated by "[" or "]".

=20

IKE_INIT_SA request:

HDR("A",0), SAi1([proposal#1; protocol ID:1 (for IKE); SPI size:0; ...,
<transforms>], [proposal #2; protocol ID:1; SPI size:0; ...,
<transforms>]), KEi, Ni.

=20

Let the IKE is assigned the SPI of value "A" from the sender's side. Let
us assume only two proposals were made initially. No SPI field is
present within the proposal substructures.=20

=20

IKE_INIT_SA response:

HDR("A", "B"), SAr1([proposal#1; protocol ID:1; SPI size:0; ...; <1
transforms chosen from each transform type requested >]), KEr, Nr.

=20

Proposal number 1 was chosen and one transform of each transform type
under that proposal is returned. No SPI field is present within the
proposal substructures.=20

=20

Q1: Am I correct to believe that *always* in the response *only one*
chosen proposal is present i.e. the chosen proposal mentioning one
transforms of each transform type required?=20

> Yes.

=20

Q2: In the case, that the responder chooses a proposal that had the
proposal number #3, will the Proposal number mentioned in the
responder's SA payload be 3(i.e. mention the chosen proposal number) or
mentions the proposal no. as #1 always (*because only one proposal can
be selected*).

> In your example, the responder's SA proposal number would be 3. It is
used to help the initiator

> figure out which of his proposals was accepted.

IKE_AUTH request:
HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,],AUTH, SAi2([proposal#1; protocol
ID:2 (for AH); SPI size:4; ...,SPI value: "C"; <transforms>], [proposal
#2; protocol ID:3 (for ESP); SPI size:4; ...,SPI value: "D";
<transforms>]), TSi, TSr}
=20
SPIs for the SAs are proposed in the SPI fields in the Proposal
Substructure. The initiator chooses the SPI values of "C" and "D" for
the two proposals.=20
Q3: Is it that the values chosen for "C" and "D" *must* be different
always?=20
> No. I would expect that in most cases C and D would not be different.
> The purpose of this SPI is to allow the initiator to identify the SA
in the
> processing of incoming ESP or AH packets, so if the initiator sets up
> multiple SAs to the same IP address it would need for the SPIs to be
> different. In expected implementations, a node would use different
SPIs
> for each of its open SAs even to different IP addresses. The only time
> the initiator would put different SPIs in proposals for the same SA
would
> be if it wanted to use different SPIs depending on which of the
proposals
> the responder accepted.
=20
Q4: In the case where we want to propose that both AH and ESP are to be
used for the traffic stream, we mark both the proposals as #1. In this
case will the SPI value mentioned in the proposal substructure be
different for the two proposals even though the Proposal no. is 1 for
both the substructure?=20
> Probably. When using both ESP and AH, the data packets have an ESP
header
> encapsulated in the AH data, so there are two SPIs. I would expect
these two
> SPIs would be different, though IKEv2 does not require that they be.

=20

IKE_AUTH response:
HDR, SK {IDr, [CERT,] AUTH, SAr2([proposal#1; protocol ID:2 (for AH);
SPI size:4; ...,SPI value: "E"; <1 transforms chosen from each transform
type requested>]), TSi, TSr}
=20
Proposal no.1 was chosen, the SPI value associated by the responder is
"E" for this SA chosen from the offered set of SAs. =20
=20
Q5: Am I correct to believe that the SPI value chosen by the responder
for the chosen proposal is randomly chosen to be "E". Can it also happen
to choose the same value "C"?=20
> The responder may choose E randomly or may choose it to index
> some table in the responder's memory. E could be the same as C.
=20
Q6: Am I correct to believe that the values chosen for this SA (here "C"
on sender's side and "E" on receiver's side) are different and two
distinct SA are existing in the two directions with *same* keys and
*same* agreed upon set of algorithms?=20
> Almost. The specification is awkward because ESP and AH insist on
considering
> the two directions of communication to be separate SAs, but the IKE SA
is
> bidirectional. So IKEv2 always creates and deletes ESP and AH SAs in
pairs,
> and I would expect implementations to treat them as a single entity,
but the
> spec has to say that they are separate SAs. The algorithms must be the
same
> in both directions, but the keys are different. The keys for both
directions are
> derived from a common base key as specified in the spec.
Q7: To REKEY this SA, will the sender send a CREATE_CHILD_SA request
mentioning the SPI value as "E"(its inbound value) in the 'N' payload
and the if successful both of them delete the SA corresponding to "C" on
sender's side and "E" on responder's side?
> Yes, except that technically it's a pair of SAs being rekeyed, so your
sentence
> should say "...deleted the SAs corresponding...".
=20
=20
Q8: This CHILD created from the initial exchange may follow the protocol
types of ESP, AH, both ESP & AH etc. But they can never support the
option for a DH group transform type in the proposal since no KE payload
can be sent along with the AUTH exchange messages.=20
So Perfect forward secrecy(PSF) cannot be supported in this child
created through initial exchange?
> Perfect forward secrecy comes from forgetting the DH private key (and
SK_d) no later
> than when the child SA is closed. To get PFS for the initial pair of
child SAs, it is
> necessary to first rekey the IKE SA, forget the keying material
associated with it,
> and then rekey the child SA. By design, PFS does not require an
additional DH
> exchange, though it is allowed because some crypto people don't
believe it.
=20
Q9: While "Rekeying" it is being said that the CHILD_SA creates an
equivalent SA to the one to be replaced. Does it mean that in the SA
payload we send the *only* the same proposal which is the *presently
existing* suite for the SA?
> People have debated what the phrase means. What you describe is the
normal case.
> Some people read the spec as saying that you can't change
cryptographic algorithms
> or traffic selectors, while others think you can. This may be
clarified in a future
> revision of the spec. A conservative implementation would only propose
the
> presently existing suite but would accept changes if requested from
the other side
> (because then they would interoperate with anyone).
=20
=20
Q10: Am I correct to think that the outer header(HDR) in the
CREATE_CHILD_SA has the SPIs corresponding to the parent IKE?
> Yes. All IKE messages have the SPIs corresponding to the outer IKE.
=20
Q11: When we Rekey an existing IKE_SA, in the CREATE_CHILD_SA do we need
to mark the protocol ID as 3 (corresponding to IKE protocol value)? If
we are creating an IKE then there should be no SPI value field mentioned
in the SA structure, but again it is said that "the new initiator and
responder SPIs are supplied in the SPI fields in the Proposal structure
in the SA payload". I am getting confused here. Does it mean that the SA
that is being created to rplace the parent IKE by using CREATE_CHILD_SA
has to be AH or ESP and not an IKE protocol?=20
> In the initial exchange setting up an IKE_SA, the proposals contain no
SPIs
> because the SPIs implicitly are the values in the header of the
messages
> negotiating the IKE_SA. When a new IKE_SA is created within a
> CREATE_CHILD_SA exchange, the eight byte SPIs are included in the
> SA payloads. The new SPIs will be used in messages that are
cryptographically
> protected with the new keys (so an implementation can know which key
to use
> by looking at the SPI).

=20

=20

I will be glad to have your response to my doubts.

Thanking you in advance,

Soumya.

=20

************************************************************************
************************************************************************
**********

This email message is for the sole use of the intended recipient(s)and
may contain CONFIDENTIAL and PRIVILEGED information.
LG Soft India will not be responsible for any viruses or defects or any
forwarded attachments emanating either from within=20
LG Soft India or outside. Any unauthorized review, use, disclosure or
distribution is prohibited. If you are not the intended=20
recipient, please contact the sender By reply email and destroy all
copies of the original message.

************************************************************************
************************************************************************
**********
=09

------_=_NextPart_001_01C53A43.48DBCDE6
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered)">

<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
pre
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.emailstyle18
	{font-family:Arial;
	color:windowtext;}
span.emailstyle19
	{font-family:Arial;
	color:navy;}
span.EmailStyle20
	{font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I got this same question privately, =
and
responded (see below). I&#8217;m forwarding this to the list to make =
sure no
one else takes the time to respond. (Unless of course they have a =
different
answer, in which case that should be on the list =
too!).</span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; --Charlie</span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&nbsp;</span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D3 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> =
Charlie Kaufman <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Tuesday, April 05, =
2005 5:48
PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> 'Soumya Sen'<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> RE: doubts about =
the
IKEv2 implementation</span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I&#8217;ve embedded comments =
below&#8230;
Charlie</span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&nbsp;</span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D3 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> =
Soumya Sen
[mailto:soumya.sen@lgsoftindia.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Tuesday, April 05, =
2005 5:33
AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Charlie Kaufman<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> doubts about the =
IKEv2
implementation</span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>Dear Sir,</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>I am a senior undergraduate student, presently undergoing =
industrial
project training. I am trying to understand the IKEv2 protocol and went =
through
the draft. However, I got certain doubts and interpreted certain things =
in my
own way, but I am not sure whether the understanding is correct or =
flawed. I
will be very grateful if you kindly take out some time to clear the =
doubts that
I have listed below. Please explain the relevant concepts if my =
interpretation
is wrong. Thanking you very much in advance,</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>Best regards, </span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>Soumya Sen.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
  11.0pt'>India</span></font><font size=3D2><span =
style=3D'font-size:11.0pt'>.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>NOTE: Here the SA payload contents have been shown in
&#8220;(&#8230;)&#8221; and the contents are separated by =
&#8220;;&#8221;,
while the payloads are separated by &#8220;,&#8221; and proposal =
structures are
separated by &#8220;[&#8220; or &#8220;]&#8221;.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>&nbsp;</span></font></p>

<p class=3DMsoNormal><u><font size=3D2 face=3D"Times New Roman"><span
style=3D'font-size:11.0pt'>IKE_INIT_SA request:</span></font></u></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>HDR(&#8220;A&#8221;,0), SAi1([proposal#1; protocol ID:1 (for =
IKE); SPI
size:0; &#8230;, &lt;transforms&gt;], [proposal #2; protocol ID:1; SPI =
size:0;
&#8230;, &lt;transforms&gt;]), KEi, Ni.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>Let the IKE is assigned the SPI of value &#8220;A&#8221; from =
the sender&#8217;s
side. Let us assume only two proposals were made initially. No SPI field =
is
present within the proposal substructures. </span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>&nbsp;</span></font></p>

<p class=3DMsoNormal><u><font size=3D2 face=3D"Times New Roman"><span
style=3D'font-size:11.0pt'>IKE_INIT_SA response:</span></font></u></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>HDR(&#8220;A&#8221;, &#8220;B&#8221;), SAr1([proposal#1; =
protocol ID:1;
SPI size:0; &#8230;; &lt;1 transforms chosen from each transform type =
requested
&gt;]), KEr, Nr.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>Proposal number 1 was chosen and one transform of each transform =
type
under that proposal is returned. No SPI field is present within the =
proposal
substructures. </span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>Q1: Am I correct to believe that *always* in the response *only =
one*
chosen proposal is present i.e. the chosen proposal mentioning one =
transforms
of each transform type required? </span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:11.0pt;color:navy'>&gt; Yes.</span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:11.0pt;color:navy'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>Q2: In the case, that the responder chooses a proposal that had =
the
proposal number #3, will the Proposal number mentioned in the =
responder&#8217;s
SA payload be 3(i.e. mention the chosen proposal number) or mentions the
proposal no. as #1 always (*because only one proposal can be =
selected*).</span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:11.0pt;color:navy'>&gt; In your example, the =
responder&#8217;s
SA proposal number would be 3. It is used to help the =
initiator</span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:11.0pt;color:navy'>&gt; figure out which of his =
proposals was
accepted.</span></font></p>

<pre><u><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;
font-family:"Times New Roman"'>IKE_AUTH =
request:</span></font></u></pre><pre><font size=3D2 face=3D"Times New =
Roman"><span style=3D'font-size:11.0pt;font-family:"Times New =
Roman"'>HDR</span></font><font
 size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'>, =
SK</span></font><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;
font-family:"Times New Roman"'> {IDi, [CERT,] [CERTREQ,] [IDr,],AUTH, =
SAi2([proposal#1; protocol ID:2 (for AH); SPI size:4; &#8230;,SPI value: =
&#8220;C&#8221;; &lt;transforms&gt;], [proposal #2; protocol ID:3 (for =
ESP); SPI size:4; &#8230;,SPI value: &#8220;D&#8221;; =
&lt;transforms&gt;]), TSi, TSr}</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New =
Roman"'>&nbsp;</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'>SPIs for the =
SAs are proposed in the SPI fields in the Proposal Substructure. The =
initiator chooses the SPI values of &#8220;C&#8221; and &#8220;D&#8221; =
for the two proposals. </span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q3: Is it that =
the values chosen for &#8220;C&#8221; and &#8220;D&#8221; *must* be =
different always? </span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; No. I would expect that in most cases C and D would not =
be different.</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; The purpose of this SPI is to allow the initiator to =
identify the SA in the</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; processing of incoming ESP or AH packets, so if the =
initiator sets up</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; multiple SAs to the same IP address it would need for =
the SPIs to be</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; different. In expected implementations, a node would =
use different SPIs</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; for each of its open SAs even to different IP =
addresses. The only time</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; the initiator would put different SPIs in proposals for =
the same SA would</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; be if it wanted to use different SPIs depending on =
which of the proposals</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; the responder accepted.</span></font></pre><pre><font =
size=3D2
face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New =
Roman"'>&nbsp;</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q4: In the case =
where we want to propose that both AH and ESP are to be used for the =
traffic stream, we mark both the proposals as #1. In this case will the =
SPI value mentioned in the proposal substructure be different for the =
two proposals even though the Proposal no. is 1 for both the =
substructure? </span></font></pre><pre><font
size=3D2 color=3Dnavy face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;
font-family:"Times New Roman";color:navy'>&gt; Probably. When using both =
ESP and AH, the data packets have an ESP =
header</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;
font-family:"Times New Roman";color:navy'>&gt; encapsulated in the AH =
data, so there are two SPIs. I would expect these =
two</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;
font-family:"Times New Roman";color:navy'>&gt; SPIs would be different, =
though IKEv2 does not require that they be.</span></font></pre>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
11.0pt'>&nbsp;</span></font></p>

<pre><u><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;
font-family:"Times New Roman"'>IKE_AUTH =
response:</span></font></u></pre><pre><font size=3D2 face=3D"Times New =
Roman"><span style=3D'font-size:11.0pt;font-family:"Times New =
Roman"'>HDR</span></font><font
 size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'>, =
SK</span></font><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;
font-family:"Times New Roman"'> {IDr, [CERT,] AUTH, SAr2([proposal#1; =
protocol ID:2 (for AH); SPI size:4; &#8230;,SPI value: &#8220;E&#8221;; =
&lt;1 transforms chosen from each transform type requested&gt;]), TSi, =
TSr}</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New =
Roman"'>&nbsp;</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'>Proposal no.1 =
was chosen, the SPI value associated by the responder is &#8220;E&#8221; =
for this SA chosen from the offered set of SAs. =
&nbsp;</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New =
Roman"'>&nbsp;</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q5: Am I =
correct to believe that the SPI value chosen by the responder for the =
chosen proposal is randomly chosen to be &#8220;E&#8221;. Can it also =
happen to choose the same value &#8220;C&#8221;? =
</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;
font-family:"Times New Roman";color:navy'>&gt; The responder may choose =
E randomly or may choose it to index</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;
font-family:"Times New Roman";color:navy'>&gt; some table in the =
responder&#8217;s memory. E could be the same as =
C.</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;
font-family:"Times New =
Roman";color:navy'>&nbsp;</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q6: Am I =
correct to believe that the values chosen for this SA (here =
&#8220;C&#8221; on sender&#8217;s side and &#8220;E&#8221; on =
receiver&#8217;s side) are different and two distinct SA are existing in =
the two directions with *same* keys and *same* agreed upon set of =
algorithms? </span></font></pre><pre><font
size=3D2 color=3Dnavy face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;
font-family:"Times New Roman";color:navy'>&gt; Almost. The specification =
is awkward because ESP and AH insist on =
considering</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;
font-family:"Times New Roman";color:navy'>&gt; the two directions of =
communication to be separate SAs, but the IKE SA =
is</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; bidirectional. So IKEv2 always creates and deletes ESP =
and AH SAs in pairs,</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; and I would expect implementations to treat them as a =
single entity, but the</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; spec has to say that they are separate SAs. The =
algorithms must be the same</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; in both directions, but the keys are different. The =
keys for both directions are</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; derived from a common base key as specified in the =
spec.</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q7: To REKEY =
this SA, will the sender send a CREATE_CHILD_SA request mentioning the =
SPI value as &#8220;E&#8221;(its inbound value) in the &#8216;N&#8217; =
payload and the if successful both of them delete the SA corresponding =
to &#8220;C&#8221; on sender&#8217;s side and &#8220;E&#8221; on =
responder&#8217;s side?</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; Yes, except that technically it&#8217;s a pair of SAs =
being rekeyed, so your sentence</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; should say &#8220;&#8230;deleted the SAs =
corresponding&#8230;&#8221;.</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'> =
</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New =
Roman"'>&nbsp;</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q8: This CHILD =
created from the initial exchange may follow the protocol types of ESP, =
AH, both ESP &amp; AH etc. But they can never support the option for a =
DH group transform type in the proposal since no KE payload can be sent =
along with the AUTH exchange messages. </span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'>So Perfect =
forward secrecy(PSF) cannot be supported in this child created through =
initial exchange?</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; Perfect forward secrecy comes from forgetting the DH =
private key (and SK_d) no later</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; than when the child SA is closed. To get PFS for the =
initial pair of child SAs, it is</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; necessary to first rekey the IKE SA, forget the keying =
material associated with it,</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; and then rekey the child SA. By design, PFS does not =
require an additional DH</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; exchange, though it is allowed because some crypto =
people don&#8217;t believe it.</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New =
Roman"'>&nbsp;</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q9: While =
&#8220;Rekeying&#8221; it is being said that the CHILD_SA creates an =
equivalent SA to the one to be replaced. Does it mean that in the SA =
payload we send the *only* the same proposal which is the *presently =
existing* suite for the SA?</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; People have debated what the phrase means. What you =
describe is the normal case.</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; Some people read the spec as saying that you =
can&#8217;t change cryptographic =
algorithms</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; or traffic selectors, while others think you can. This =
may be clarified in a future</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; revision of the spec. A conservative implementation =
would only propose the</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; presently existing suite but would accept changes if =
requested from the other side</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; (because then they would interoperate with =
anyone).</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'> =
</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New =
Roman"'>&nbsp;</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q10: Am I =
correct to think that the outer header(HDR) in the CREATE_CHILD_SA has =
the SPIs corresponding to the parent IKE?</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; Yes. All IKE messages have the SPIs corresponding to =
the outer IKE.</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New =
Roman"'>&nbsp;</span></font></pre><pre><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:11.0pt;font-family:"Times New Roman"'>Q11: When we =
Rekey an existing IKE_SA, in the CREATE_CHILD_SA do we need to mark the =
protocol ID as 3 (corresponding to IKE protocol value)? If we are =
creating an IKE then there should be no SPI value field mentioned in the =
SA structure, but again it is said that &#8220;the new initiator and =
responder SPIs are supplied in the SPI fields in the Proposal structure =
in the SA payload&#8221;. I am getting confused here. Does it mean that =
the SA that is being created to rplace the parent IKE by using =
CREATE_CHILD_SA has to be AH or ESP and not an IKE protocol? =
</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; In the initial exchange setting up an IKE_SA, the =
proposals contain no SPIs</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; because the SPIs implicitly are the values in the =
header of the messages</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; negotiating the IKE_SA. When a new IKE_SA is created =
within a</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; CREATE_CHILD_SA exchange, the eight byte SPIs are =
included in the</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; SA payloads. The new SPIs will be used in messages that =
are cryptographically</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; protected with the new keys (so an implementation can =
know which key to use</span></font></pre><pre><font
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:navy'>&gt; by looking at the SPI).</span></font></pre>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>I will be glad to have your response to my =
doubts.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Thanking you in advance,</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Soumya.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

</div>

</body>

</html>
<table><tr><td bgcolor=3D#ffffff><font =
color=3D#000000>*********************************************************=
*************************************************************************=
************************<br><br>This email message is for the sole use =
of the intended recipient(s)and may contain CONFIDENTIAL and PRIVILEGED =
information.<br>LG Soft India will not be responsible for any viruses or =
defects or any forwarded attachments emanating either from within <br>LG =
Soft India or outside. Any unauthorized review, use, disclosure or =
distribution is prohibited. If you are not the intended <br>recipient, =
please contact the sender By reply email and destroy all copies of the =
original =
message.<br><br>*********************************************************=
*************************************************************************=
************************<br></font></td></tr></table>
------_=_NextPart_001_01C53A43.48DBCDE6--


--===============1043468027==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec

--===============1043468027==--



From ipsec-bounces@ietf.org  Wed Apr  6 05:36:51 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA19586
	for <ipsec-archive@lists.ietf.org>; Wed, 6 Apr 2005 05:36:51 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJ6wa-0005kt-Ov; Wed, 06 Apr 2005 05:35:28 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJ6wZ-0005ko-4w
	for ipsec@megatron.ietf.org; Wed, 06 Apr 2005 05:35:27 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA19503
	for <ipsec@ietf.org>; Wed, 6 Apr 2005 05:35:24 -0400 (EDT)
Received: from aragorn.bbn.com ([128.33.0.62])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJ74t-0006fl-C7
	for ipsec@ietf.org; Wed, 06 Apr 2005 05:44:03 -0400
Received: from [192.168.50.62] (ramblo.bbn.com [128.33.0.51])
	by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j369ZDvF024519;
	Wed, 6 Apr 2005 05:35:15 -0400 (EDT)
Mime-Version: 1.0
Message-Id: <p06210201be793e11875b@[192.168.50.62]>
In-Reply-To: <015701c5371b$f3885510$4205010a@subha>
References: <00e801c536f8$531e4850$4205010a@subha>
	<p0621020cbe73752e25ae@[128.89.89.106]>
	<015701c5371b$f3885510$4205010a@subha>
Date: Wed, 6 Apr 2005 04:44:52 -0400
To: "Subha" <subhaav@intoto.com>
From: Stephen Kent <kent@bbn.com>
Subject: Re: [Ipsec] Number of SPD Policies
X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41
X-Virus-Status: Clean
X-Spam-Score: 0.8 (/)
X-Scan-Signature: 287c806b254c6353fcb09ee0e53bbc5e
Cc: ipsec@ietf.org
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1807409259=="
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

--===============1807409259==
Content-Type: multipart/alternative;
	boundary="============_-1099342371==_ma============"

--============_-1099342371==_ma============
Content-Type: text/plain; charset="us-ascii" ; format="flowed"

At 4:35 PM -0800 4/1/05, Subha wrote:
>Hi  Steve,
>
>I have some follow-up questions.
>
>In the following questions I have assumed that 3 IPsec Protocols 
>shall be applied
>on a given traffic stream.
>
>1) When IKEv2 is used with RFC2401 compliant implementation, can a 
>single IKEv2
>CREATE_CHILD_SA negotiate IPcomp, ESP and AH SAs for the given traffic
>selector?

yes, but as Tero noted, it would be a mistake, in general, to use 
IKEv2 with 2401.

>2) When IKEv2 is used with RFC2401-bis compliant implementation, there has to
>be theee IKEv2 CREATE_CHILD_SA Exchanges.
>
>(1) Plain Traffic selectors for IPcomp SA
>(2) Same Source IP, Destination IP and IPComp for Protocol  - 
>Traffic Selectors for ESP SA
>(3) Tunnel Outer Header Source IP, Tunnel Outer Header Destination 
>IP and Protocol=ESP
>  for AH SA.

yes, one needs to negotiate all three, if you did all three. Again, 
there seems to be very little motivation for using BOTH AH and ESP, 
vs. just using ESP with an appropriate integrity algorithm.

>  3) An implementation needs to know through some other means,
>whether the peer supports RFC2401 or 2401-bis.

I would generally expect an implementation that supports IKEv2 to 
implement 2401-bis, given certain defaults adopted by IKEv2, e.g., 
ESN for AH or ESP.

Steve
--============_-1099342371==_ma============
Content-Type: text/html; charset="us-ascii"

<!doctype html public "-//W3C//DTD W3 HTML//EN">
<html><head><style type="text/css"><!--
blockquote, dl, ul, ol, li { padding-top: 0 ; padding-bottom: 0 }
 --></style><title>Re: [Ipsec] Number of SPD
Policies</title></head><body>
<div>At 4:35 PM -0800 4/1/05, Subha wrote:</div>
<blockquote type="cite" cite><font face="Arial" size="-1">Hi&nbsp;
Steve,</font></blockquote>
<blockquote type="cite" cite>&nbsp;</blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">I have some
follow-up questions.</font></blockquote>
<blockquote type="cite" cite>&nbsp;</blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">In the
following questions I have assumed that 3 IPsec Protocols shall be
applied</font></blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">on a given
traffic stream.</font></blockquote>
<blockquote type="cite" cite>&nbsp;</blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">1) When
IKEv2 is used with RFC2401 compliant implementation, can a single
IKEv2</font></blockquote>
<blockquote type="cite" cite><font face="Arial"
size="-1">CREATE_CHILD_SA negotiate IPcomp, ESP and AH SAs for the
given traffic</font></blockquote>
<blockquote type="cite" cite><font face="Arial"
size="-1">selector?</font></blockquote>
<div><br></div>
<div>yes, but as Tero noted, it would be a mistake, in general, to use
IKEv2 with 2401.</div>
<div><br></div>
<blockquote type="cite" cite><font face="Arial" size="-1">2) When
IKEv2 is used with RFC2401-bis compliant implementation, there has
to</font></blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">be theee
IKEv2 CREATE_CHILD_SA Exchanges.</font></blockquote>
<blockquote type="cite" cite>&nbsp;</blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">(1) Plain
Traffic selectors for IPcomp SA</font></blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">(2) Same
Source IP, Destination IP and IPComp for Protocol &nbsp;- Traffic
Selectors&nbsp;for ESP SA</font></blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">(3) Tunnel
Outer Header Source IP, Tunnel Outer Header Destination IP and
Protocol=ESP</font></blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">&nbsp;for AH
SA.</font></blockquote>
<div><br></div>
<div>yes, one needs to negotiate all three, if you did all three.
Again, there seems to be very little motivation for using BOTH AH and
ESP, vs. just using ESP with an appropriate integrity algorithm.</div>
<div><br></div>
<blockquote type="cite" cite>&nbsp;<font face="Arial" size="-1">3) An
implementation needs to know&nbsp;through some other
means,</font></blockquote>
<blockquote type="cite" cite><font face="Arial" size="-1">whether the
peer supports RFC2401 or 2401-bis.</font></blockquote>
<div><br></div>
<div>I would generally expect an implementation that supports IKEv2 to
implement 2401-bis, given certain defaults adopted by IKEv2, e.g., ESN
for AH or ESP.</div>
<div><br></div>
<div>Steve</div>
</body>
</html>
--============_-1099342371==_ma============--


--===============1807409259==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec

--===============1807409259==--



From ipsec-bounces@ietf.org  Wed Apr  6 08:42:43 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA07130
	for <ipsec-archive@lists.ietf.org>; Wed, 6 Apr 2005 08:42:36 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJ9nH-0000pT-S6; Wed, 06 Apr 2005 08:38:03 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJ9nG-0000p7-98
	for ipsec@megatron.ietf.org; Wed, 06 Apr 2005 08:38:02 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA06712
	for <ipsec@ietf.org>; Wed, 6 Apr 2005 08:38:00 -0400 (EDT)
Received: from aragorn.bbn.com ([128.33.0.62])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJ9va-000673-JS
	for ipsec@ietf.org; Wed, 06 Apr 2005 08:46:39 -0400
Received: from [192.168.50.62] (ramblo.bbn.com [128.33.0.51])
	by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j36CblvF029790;
	Wed, 6 Apr 2005 08:37:49 -0400 (EDT)
Mime-Version: 1.0
Message-Id: <p06210216be796af19ff9@[192.168.50.62]>
In-Reply-To: <5.1.0.14.0.20050405190205.02bb8b48@172.16.1.10>
References: <5.1.0.14.0.20050405190205.02bb8b48@172.16.1.10>
Date: Wed, 6 Apr 2005 08:25:35 -0400
To: Tatineni SriRama Kumar <tosri@intoto.com>
From: Stephen Kent <kent@bbn.com>
Subject: Re: [Ipsec] Blocking traffic using opaque
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41
X-Virus-Status: Clean
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 0bc60ec82efc80c84b8d02f4b0e4de22
Cc: ipsec@ietf.org
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

At 7:08 PM +0530 4/5/05, Tatineni SriRama Kumar wrote:
>Hi All,
>   As per point C and D  in section 4.4.1.3 of 2401bis, traffic will 
>be passed in only one direction. Based on this I have following 
>questions.
>
>1. How configuration specified in point B of same section allows 
>traffic in both directions.

Item B in 4.4.1.3 addresses the case where there is only 1 selector 
corresponding to the port field. Te use of OPAQUE here is just a 
convention for IKE negotiation re such protocols. This does not 
affect the S/D address aspect of SPD entry symmetry. So, an entry of 
the sort described in B enables bidirectional traffic flows for a 
protocol such as the Mobility Header, IF there are corresponding SPD 
entries at each end.

>2. If configuration specified in points B,C and D allows traffic in 
>one direction only, what should be the configuration to allow 
>traffic in both directions.

Items C + D in 4.4.1.3 explicitly are intended to NOT allow 
bidirectional traffic flow for a protocol that is NOT bidirectional, 
so your question is not meaningful in these cases.  If you did not 
use the conventions described here, then bidirectional flows will be 
enabled, by default.

Steve

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Wed Apr  6 10:58:34 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA20159
	for <ipsec-archive@lists.ietf.org>; Wed, 6 Apr 2005 10:58:34 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJBxu-0007kn-BG; Wed, 06 Apr 2005 10:57:10 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJBxs-0007kd-Rq
	for ipsec@megatron.ietf.org; Wed, 06 Apr 2005 10:57:09 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA20013
	for <ipsec@ietf.org>; Wed, 6 Apr 2005 10:57:06 -0400 (EDT)
Received: from thunk.org ([69.25.196.29] helo=thunker.thunk.org)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJC6D-0001sY-LZ
	for ipsec@ietf.org; Wed, 06 Apr 2005 11:05:47 -0400
Received: from root (helo=thunk.org)
	by thunker.thunk.org with local-esmtp   (Exim 3.35 #1 (Debian))
	id 1DJBxk-0005ql-00; Wed, 06 Apr 2005 10:57:00 -0400
Received: from tytso by thunk.org with local (Exim 4.50)
	id 1DJBxj-0005GM-Gb; Wed, 06 Apr 2005 10:56:59 -0400
Date: Wed, 6 Apr 2005 10:56:59 -0400
From: "Theodore Ts'o" <tytso@mit.edu>
To: Russ Housley <housley@vigilsec.com>
Message-ID: <20050406145659.GA20093@thunk.org>
References: <E1DB0GA-00040P-Ox@thunk.org>
	<6.2.0.14.2.20050315100106.0624c8e0@mail.binhost.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <6.2.0.14.2.20050315100106.0624c8e0@mail.binhost.com>
User-Agent: Mutt/1.5.8i
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 6e922792024732fb1bb6f346e63517e4
Cc: ipsec@ietf.org, Charlie Kaufman <charliek@microsoft.com>,
        Barbara Fraser <byfraser@cisco.com>
Subject: [Ipsec] Re: Results of straw poll regarding: IKEv2 interoperability
	issue
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Hi Russ,

My apologies for not getting back to you earlier.  A combination of
killer travel commitments, fairly nasty bouts of the flu (for both
Barbara and myself, at different times), and the desire to touch base
with all of the members of the ipsec wg management team slowed down my
response.

We agree that the relatively few number of people who responded to the
straw poll was certainly not ideal.  However, it is it is true the
number of people who have been actively participating in the ipsec has
been declining over time, and the people who responded were people who
have had a history of participating in the ipsec working group.  So we
feel that we should consider the approach of changing IKEv2 to make
transform type 5 (extended sequence number) working group consensus.

As far as the technical aspect of the decision, the fact that many
people at the interop meeting failed to achieve interoperability
simply by reading the document troubles us, and trying to fix this in
a clarification document that will be published separately, and later,
seems to be simply asking for interoperability problems. 

Changing transform type 5 to be mandatory does not require a
significant change to the document, nor to existing implementations
that have already implemented extended sequence numbers.  Furthermore,
requiring implementations to support ESN does not appear to be overly
burdensome.  

						- Ted


On Tue, Mar 15, 2005 at 10:13:27AM -0500, Russ Housley wrote:
> Ted:
> 
> The fact that so few people responded to the straw poll causes alarm.  The 
> issue was raised at a bake-off, and some of the implementations represented 
> at the bake-off are not represented in the straw poll responses.
> 
> I have a question: Do you believe that this response represents WG 
> consensus?  If so, then please prepare an RFC Editor note that describes 
> the change that needs to be made, send it to me, and I will work with the 
> IESG to get it approved.  If not, then we should not make any changes.
> 
> The WG chairs must judge consensus.  In this case, it is a subjective 
> decision, and you may want to consult with WG participants that did not 
> respond to the straw poll to figure it out.  At least one person that was 
> at the bake-off has told me that they had come up with a way to achieve 
> interoperability without making changes.  I think Paul Hoffman made a 
> posting to the mail list about that approach half way through the straw 
> poll.  This is just one more dimension of your consensus decision.
> 
> Russ
> 
> 
> At 07:50 PM 3/14/2005, Theodore Ts'o wrote:
> 
> >Two weeks ago, there was a discussion about an interoperability problem
> >in IKEv2 that was turned up during interoperability testing.  A week
> >ago, I called for a straw poll; based on the fact that the number of
> >responses was a little sparse, and last week was the Minneapolis IETF, I
> >let the straw poll go on all last week.
> >
> >The straw poll indicated a majority (although certainly not unanimity)
> >preference for proposal C:
> >
> >        PROPOSAL C:
> >        -----------
> >
> >        Change the places that says Transform Type 5 is optional to say
> >        it is mandatory.
> >
> >This choice unfortunately would require making changes to the IKEv2 RFC
> >before it is published, and since it has already been through the IESG
> >approval process and almost through the entire RFC editor process,
> >presumably we would need to make a new I-D and then take it through most
> >of this process all over again --- although hopefully it would take much
> >less time the second time around.
> >
> >Russ, would you comment if there is anything special we need to do at
> >this point?   Many thanks,
> >
> >                                                - Ted
> >
> >
> >Proposal A:
> >        Kevin Li <kli@cisco.com>
> >        Timothy Liu <timliu@juniper.net>
> >
> >Proposal C:
> >        Srinivasa Rao Addepalli <srao@intoto.com>
> >        Geoffrey Huang <ghuang@cisco.com>
> >        Michael Roe <mroe@microsoft.com>
> >        Grubmair Peter <peter.grubmair@siemens.com>
> >        Tero Kivinen <kivinen@iki.fi>
> >        Geoffrey Huang <ghuang@cisco.com>
> >
> >Proposal D:
> >        Paul Hoffman <paul.hoffman@vpnc.org>
> >        Pasi.Eronen@nokia.com
> >        Yoav Nir <ynir@checkpoint.com>
> 

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Wed Apr  6 11:44:59 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA28167
	for <ipsec-archive@lists.ietf.org>; Wed, 6 Apr 2005 11:44:59 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJCg1-0005AO-FI; Wed, 06 Apr 2005 11:42:45 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJCfz-00055l-9B
	for ipsec@megatron.ietf.org; Wed, 06 Apr 2005 11:42:43 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA27863
	for <ipsec@ietf.org>; Wed, 6 Apr 2005 11:42:40 -0400 (EDT)
Received: from woodstock.binhost.com ([144.202.243.4])
	by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DJCoM-0004Fr-Fx
	for ipsec@ietf.org; Wed, 06 Apr 2005 11:51:23 -0400
Received: (qmail 4120 invoked by uid 0); 6 Apr 2005 15:31:24 -0000
Received: from unknown (HELO Russ-Laptop.vigilsec.com) (138.88.42.55)
	by woodstock.binhost.com with SMTP; 6 Apr 2005 15:31:24 -0000
Message-Id: <6.2.0.14.2.20050406112358.04690910@mail.binhost.com>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.0.14
Date: Wed, 06 Apr 2005 11:31:13 -0400
To: "Theodore Ts'o" <tytso@mit.edu>
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <20050406145659.GA20093@thunk.org>
References: <E1DB0GA-00040P-Ox@thunk.org>
	<6.2.0.14.2.20050315100106.0624c8e0@mail.binhost.com>
	<20050406145659.GA20093@thunk.org>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
X-Spam-Score: 0.2 (/)
X-Scan-Signature: 67c1ea29f88502ef6a32ccec927970f0
Cc: ipsec@ietf.org, Charlie Kaufman <charliek@microsoft.com>,
        Barbara Fraser <byfraser@cisco.com>
Subject: [Ipsec] Re: Results of straw poll regarding: IKEv2 interoperability
 issue
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Ted:

I know about travel schedules, mine has been hectic too.  I hope you and 
Barbara are well.

As WG chair, the consensus call is yours to make.

If the change is small, I suggest that we do it with an RFC Editor 
note.  First, the content of the note needs to be approved by the WG and 
then by the IESG.  However, we do need to hurry.  ESP v3 is now in the RFC 
Editor queue, and 2401bis only has one open IESG issue.  Once 2401bis gets 
to the RFC Editor queue, the updated document series will be complete.

Russ

At 10:56 AM 4/6/2005, Theodore Ts'o wrote:
>Hi Russ,
>
>My apologies for not getting back to you earlier.  A combination of
>killer travel commitments, fairly nasty bouts of the flu (for both
>Barbara and myself, at different times), and the desire to touch base
>with all of the members of the ipsec wg management team slowed down my
>response.
>
>We agree that the relatively few number of people who responded to the
>straw poll was certainly not ideal.  However, it is it is true the
>number of people who have been actively participating in the ipsec has
>been declining over time, and the people who responded were people who
>have had a history of participating in the ipsec working group.  So we
>feel that we should consider the approach of changing IKEv2 to make
>transform type 5 (extended sequence number) working group consensus.
>
>As far as the technical aspect of the decision, the fact that many
>people at the interop meeting failed to achieve interoperability
>simply by reading the document troubles us, and trying to fix this in
>a clarification document that will be published separately, and later,
>seems to be simply asking for interoperability problems.
>
>Changing transform type 5 to be mandatory does not require a
>significant change to the document, nor to existing implementations
>that have already implemented extended sequence numbers.  Furthermore,
>requiring implementations to support ESN does not appear to be overly
>burdensome.
>
>                                                 - Ted
>
>
>On Tue, Mar 15, 2005 at 10:13:27AM -0500, Russ Housley wrote:
> > Ted:
> >
> > The fact that so few people responded to the straw poll causes alarm.  The
> > issue was raised at a bake-off, and some of the implementations 
> represented
> > at the bake-off are not represented in the straw poll responses.
> >
> > I have a question: Do you believe that this response represents WG
> > consensus?  If so, then please prepare an RFC Editor note that describes
> > the change that needs to be made, send it to me, and I will work with the
> > IESG to get it approved.  If not, then we should not make any changes.
> >
> > The WG chairs must judge consensus.  In this case, it is a subjective
> > decision, and you may want to consult with WG participants that did not
> > respond to the straw poll to figure it out.  At least one person that was
> > at the bake-off has told me that they had come up with a way to achieve
> > interoperability without making changes.  I think Paul Hoffman made a
> > posting to the mail list about that approach half way through the straw
> > poll.  This is just one more dimension of your consensus decision.
> >
> > Russ
> >
> >
> > At 07:50 PM 3/14/2005, Theodore Ts'o wrote:
> >
> > >Two weeks ago, there was a discussion about an interoperability problem
> > >in IKEv2 that was turned up during interoperability testing.  A week
> > >ago, I called for a straw poll; based on the fact that the number of
> > >responses was a little sparse, and last week was the Minneapolis IETF, I
> > >let the straw poll go on all last week.
> > >
> > >The straw poll indicated a majority (although certainly not unanimity)
> > >preference for proposal C:
> > >
> > >        PROPOSAL C:
> > >        -----------
> > >
> > >        Change the places that says Transform Type 5 is optional to say
> > >        it is mandatory.
> > >
> > >This choice unfortunately would require making changes to the IKEv2 RFC
> > >before it is published, and since it has already been through the IESG
> > >approval process and almost through the entire RFC editor process,
> > >presumably we would need to make a new I-D and then take it through most
> > >of this process all over again --- although hopefully it would take much
> > >less time the second time around.
> > >
> > >Russ, would you comment if there is anything special we need to do at
> > >this point?   Many thanks,
> > >
> > >                                                - Ted
> > >
> > >
> > >Proposal A:
> > >        Kevin Li <kli@cisco.com>
> > >        Timothy Liu <timliu@juniper.net>
> > >
> > >Proposal C:
> > >        Srinivasa Rao Addepalli <srao@intoto.com>
> > >        Geoffrey Huang <ghuang@cisco.com>
> > >        Michael Roe <mroe@microsoft.com>
> > >        Grubmair Peter <peter.grubmair@siemens.com>
> > >        Tero Kivinen <kivinen@iki.fi>
> > >        Geoffrey Huang <ghuang@cisco.com>
> > >
> > >Proposal D:
> > >        Paul Hoffman <paul.hoffman@vpnc.org>
> > >        Pasi.Eronen@nokia.com
> > >        Yoav Nir <ynir@checkpoint.com>
> >


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Wed Apr  6 13:10:11 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA06322
	for <ipsec-archive@lists.ietf.org>; Wed, 6 Apr 2005 13:10:11 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJE1g-0005eB-Ju; Wed, 06 Apr 2005 13:09:12 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJE1e-0005Zu-RH
	for ipsec@megatron.ietf.org; Wed, 06 Apr 2005 13:09:10 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA06199
	for <ipsec@ietf.org>; Wed, 6 Apr 2005 13:09:07 -0400 (EDT)
Received: from mail2.microsoft.com ([131.107.3.124])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJEA2-0006ar-2n
	for ipsec@ietf.org; Wed, 06 Apr 2005 13:17:51 -0400
Received: from mailout1.microsoft.com ([157.54.1.117]) by mail2.microsoft.com
	with Microsoft SMTPSVC(6.0.3790.211); Wed, 6 Apr 2005 10:09:00 -0700
Received: from RED-MSG-51.redmond.corp.microsoft.com ([157.54.12.11]) by
	mailout1.microsoft.com with Microsoft SMTPSVC(6.0.3790.1824); 
	Wed, 6 Apr 2005 10:09:00 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [Ipsec] doubts about IKEv2 implementation
Date: Wed, 6 Apr 2005 10:08:58 -0700
Message-ID: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsoft.com>
Thread-Topic: [Ipsec] doubts about IKEv2 implementation
thread-index: AcU5257WT/ttHH7YRciiy/YnXZqKaQAJ1+SQAA/xiaAAIZlV8A==
From: "Charlie Kaufman" <charliek@microsoft.com>
To: "Charlie Kaufman" <charliek@microsoft.com>, <ipsec@ietf.org>
X-OriginalArrivalTime: 06 Apr 2005 17:09:00.0613 (UTC)
	FILETIME=[53A6A750:01C53ACB]
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 39bd8f8cbb76cae18b7e23f7cf6b2b9f
Content-Transfer-Encoding: quoted-printable
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: quoted-printable

Hilarie Orman pointed out to me that part of my posting was
tantalizingly glib (my characterization, not hers).

What I said was:
> Perfect forward secrecy comes from forgetting the DH private key (and
> SK_d) no later
> than when the child SA is closed. To get PFS for the initial pair of
> child SAs, it is necessary to first rekey the IKE SA, forget the
keying
> material associated with it, and then rekey the child SA. By design,
> PFS does not require an additional DH exchange, though it is allowed
> because some crypto people don't believe it.

What I meant was that there is disagreement over the exact definition of
perfect forward secrecy. IKEv2 key rollover meets some definitions even
without additional D-H exchanges, but some people don't believe those
definitions are sufficiently constraining.

I define PFS as the property that once a session has ended neither
endpoint holds any information that would be helpful in decrypting a
recorded conversation.

The process of rekeying an IKE SA generates new keying material by
taking what is effectively a one way hash of the previous keying
material (and the previous keying material cannot be derived from any
long lived state), so by my definition that exchange provides PFS even
without an additional D-H exchange.

A tighter definition of PFS is that no information stored on either
endpoint before a conversation begins is useful in decrypting a
subsequent conversation except by means of a man-in-the-middle attack.
The process of rekeying an IKE SA without D-H does not meet that bar. I
claim that tighter constraint provides no practical additional security,
but this would be a philosophical debate rather than a technical one.

	--Charlie


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Wed Apr  6 16:51:00 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA03081
	for <ipsec-archive@lists.ietf.org>; Wed, 6 Apr 2005 16:51:00 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJHPG-0002TI-Ey; Wed, 06 Apr 2005 16:45:46 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJHP8-0002T9-Ho
	for ipsec@megatron.ietf.org; Wed, 06 Apr 2005 16:45:38 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA02612
	for <ipsec@ietf.org>; Wed, 6 Apr 2005 16:45:35 -0400 (EDT)
Received: from fmr13.intel.com ([192.55.52.67] helo=fmsfmr001.fm.intel.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJHXX-0006LU-A8
	for ipsec@ietf.org; Wed, 06 Apr 2005 16:54:20 -0400
Received: from fmsfmr100.fm.intel.com (fmsfmr100.fm.intel.com [10.1.192.58])
	by fmsfmr001.fm.intel.com (8.12.10/8.12.10/d: major-outer.mc,
	v 1.1 2004/09/17 17:50:56 root Exp $) with ESMTP id j36KjRxv022899
	for <ipsec@ietf.org>; Wed, 6 Apr 2005 20:45:27 GMT
Received: from fmsmsxvs042.fm.intel.com (fmsmsxvs042.fm.intel.com
	[132.233.42.128])
	by fmsfmr100.fm.intel.com (8.12.10/8.12.10/d: major-inner.mc,
	v 1.2 2004/09/17 18:05:01 root Exp $) with SMTP id j36KjI2o026962
	for <ipsec@ietf.org>; Wed, 6 Apr 2005 20:45:27 GMT
Received: from fmsmsx332.amr.corp.intel.com ([132.233.42.148])
	by fmsmsxvs042.fm.intel.com (SAVSMTP 3.1.7.47) with SMTP id
	M2005040613302530271
	for <ipsec@ietf.org>; Wed, 06 Apr 2005 13:30:25 -0700
Received: from fmsmsx407.amr.corp.intel.com ([132.233.42.217]) by
	fmsmsx332.amr.corp.intel.com with Microsoft SMTPSVC(6.0.3790.211); 
	Wed, 6 Apr 2005 13:30:25 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Wed, 6 Apr 2005 13:30:24 -0700
Message-ID: <E4FF889B88DF4A4EBBDDDEF6D5BF7CE40515F615@fmsmsx407.amr.corp.intel.com>
Thread-Topic: CCM: AAD construction 
Thread-Index: AcU653YNjZEox9K1QzSLw6pl2tD1FA==
From: "Bansal, Yogesh" <yogesh.bansal@intel.com>
To: <ipsec@ietf.org>
X-OriginalArrivalTime: 06 Apr 2005 20:30:25.0448 (UTC)
	FILETIME=[76C62280:01C53AE7]
X-Scanned-By: MIMEDefang 2.44
X-Spam-Score: 0.0 (/)
X-Scan-Signature: f607d15ccc2bc4eaf3ade8ffa8af02a0
Content-Transfer-Encoding: quoted-printable
Cc: "Raghunandan, Makaram" <makaram.raghunandan@intel.com>
Subject: [Ipsec] CCM: AAD construction 
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: quoted-printable

Group -=20

I have few questions on CCM & it's use in IPSec ESP mode. The questions
are related to construction of AAD blocks required for authentication
purposes.

1) Construction of AAD blocks in CCM in general

RFC 3610 specifies construction of B_0, B_1 blocks=20
The construction of B_0 has been clearly defined. This block is followed
by length encoding of "a" followed by "a" itself, as per the following
paragraph in the spec:
=20
Blocks encoding a are formed by concatenating this string that encodes
l(a) with a itself, and splitting the result into 16-octet blocks, and
then padding the last block with zeros if necessary. These blocks are
appended to the first block B_0.

Does this mean the following:

B_1 =3D encoding(l(a)) || a || pad (to the next 16 octet block )

Hence, the AAD block stream then consists of=20
B_0 || B_1 || m_0 || m_1 ... || m_n (padding, if required)=20


[Q] Please confirm whether the interpretation of B_1 construction is
correct.=20


2) Construction of AAD blocks in IPSec ESP mode=20

Does B_1 definition mean the following in IPSec ESP mode=20
AAD_IPSec =3D SPI || SEQ_Num

B_1 =3D encoding (l (AAD_IPSec)) ||  AAD_IPsec || pad (to the next 16
octet block)=20

[Q] Please confirm construction of B_1 block in IPSec mode is correct.

3) Computing CBC-MAC in CCM Mode With IPsec ESP
CCM spec (RFC 3610) implies that authentication is done on the plain
text (and not the cipher text).=20

However, IPSec ESP mode states that encryption is done prior to
authentication. Does this order change in the
draft-ietf-ipsec-ciph-aes-ccm-05.txt, meaning that authentication is
done after CTR-encryption? If so, is the CBC-MAC encrypted again.=20

My interpretation is that the order still remains the same as specified
in RFC 3610, i.e. authentication is on  plain text and not cipher text.=20

[Q] Please indicate what is the correct order of processing on the
outbound side.

Thanks for your time.=20

Regards,
Yogesh=20


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Wed Apr  6 18:50:49 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA14362
	for <ipsec-archive@lists.ietf.org>; Wed, 6 Apr 2005 18:50:49 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJJK0-0001zO-53; Wed, 06 Apr 2005 18:48:28 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJJJy-0001xz-Bh
	for ipsec@megatron.ietf.org; Wed, 06 Apr 2005 18:48:26 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA14165
	for <ipsec@ietf.org>; Wed, 6 Apr 2005 18:48:23 -0400 (EDT)
Received: from ip-66-80-10-146.dsl.sca.megapath.net ([66.80.10.146]
	helo=guri.intoto.com) by ietf-mx.ietf.org with smtp (Exim 4.33)
	id 1DJJSO-0000zT-Jw
	for ipsec@ietf.org; Wed, 06 Apr 2005 18:57:09 -0400
Received: from not-angel.intoto.com ([10.1.5.11])
	by guri.intoto.com (SMSSMTP 4.0.0.59) with SMTP id M2005040615474601331
	; Wed, 06 Apr 2005 15:47:46 -0700
Received: from subha (dhcp-66.intoto.com [10.1.5.66]) (authenticated bits=0)
	by not-angel.intoto.com (8.13.1/8.13.1) with ESMTP id j36MmDRJ007681;
	Wed, 6 Apr 2005 15:48:18 -0700
Message-ID: <011501c53afa$b91fc830$4205010a@subha>
From: "Subha" <subhaav@intoto.com>
To: "Tero Kivinen" <kivinen@iki.fi>
References: <00e801c536f8$531e4850$4205010a@subha><p0621020cbe73752e25ae@[128.89.89.106]><015701c5371b$f3885510$4205010a@subha><16977.11042.656521.73950@fireball.kivinen.iki.fi><003701c53952$0aabf430$4205010a@subha>
	<16978.22280.545861.239449@fireball.kivinen.iki.fi>
Subject: Re: [Ipsec] Number of SPD Policies
Date: Wed, 6 Apr 2005 15:48:12 -0700
MIME-Version: 1.0
Content-Type: text/plain; format=flowed; charset="iso-8859-1";
	reply-type=original
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.2180
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8b30eb7682a596edff707698f4a80f7d
Content-Transfer-Encoding: 7bit
Cc: ipsec@ietf.org, Stephen Kent <kent@bbn.com>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Hi ,

If AH+ESP between the same two gateway devices is not 
actually providing any extra crypographic protection,
why have it at all. 

2401bis could have simply removed that combination. 

Also, my understanding is that having AH over ESP provides
additional protection on the tunnel header, which is otherwise
not handled by ESP with Auth. 

Thanks,
Subha
> Subha writes:
>> It looks like 2401bis brings up a limitation that we cannot
>> define different AH strength for ESP encrypted packets
>> between the same two security gateways.
> 
> Yes, I think you are right.
> 
> The question is: Is there any reason to really do that? Why are you
> doing AH+ESP between the local GW and Remote GW in any case, why are
> you not simply using ESP with suitable auth algorithm?
> 
> As you are using tunnel mode there AH does not offer anything more
> compared to the ESP.
> 
> The only case where I can see there would be use for AH+ESP is when
> the AH and ESP are terminated by different hosts, i.e. AH goes to from
> host to firewall, and the ESP goes from host through the firewall to
> the other end host.
> 
> As there EVER any valid scenario where you would need to use AH+ESP
> where both of those are terminated by same peers?
> -- 
> kivinen@safenet-inc.com
>


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 04:06:44 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA25181
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 04:06:44 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJRxV-0006f3-JX; Thu, 07 Apr 2005 04:01:49 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJRxQ-0006dU-GJ
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 04:01:45 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA24818
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 04:01:39 -0400 (EDT)
Received: from aragorn.bbn.com ([128.33.0.62])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJS5s-0007Zq-D4
	for ipsec@ietf.org; Thu, 07 Apr 2005 04:10:29 -0400
Received: from [192.168.50.62] (ramblo.bbn.com [128.33.0.51])
	by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j3781PvJ018178;
	Thu, 7 Apr 2005 04:01:29 -0400 (EDT)
Mime-Version: 1.0
Message-Id: <p06210202be7a95cb2bfe@[192.168.50.44]>
In-Reply-To: <011501c53afa$b91fc830$4205010a@subha>
References: <00e801c536f8$531e4850$4205010a@subha><p0621020cbe73752e25ae@[128.89.89.10
	6]><015701c5371b$f3885510$4205010a@subha><16977.11042.656521.73950@firebal
	l.kivinen.iki.fi><003701c53952$0aabf430$4205010a@subha>
	<16978.22280.545861.239449@fireball.kivinen.iki.fi>
	<011501c53afa$b91fc830$4205010a@subha>
Date: Thu, 7 Apr 2005 03:58:22 -0400
To: "Subha" <subhaav@intoto.com>
From: Stephen Kent <kent@bbn.com>
Subject: Re: [Ipsec] Number of SPD Policies
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41
X-Virus-Status: Clean
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9182cfff02fae4f1b6e9349e01d62f32
Cc: ipsec@ietf.org, Tero Kivinen <kivinen@iki.fi>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

At 3:48 PM -0700 4/6/05, Subha wrote:
>Hi ,
>
>If AH+ESP between the same two gateway devices is not actually 
>providing any extra crypographic protection,
>why have it at all.

it is largely a holdover from the early days. Note that we do not 
mandate support for AH any more, so there is no mandate to support 
the combination of AH+ESP.

>2401bis could have simply removed that combination.

we DID remove mandatory support for this combination.

>  Also, my understanding is that having AH over ESP provides
>additional protection on the tunnel header, which is otherwise
>not handled by ESP with Auth.

yes, it does provide protection for the tunnel header, but as we have 
discussed on this list in the past, this protection is only rarely of 
use. Remember, in most cases, the tunnel header is discarded upon 
arrival, so its integrity is is little importance in most cases.

Steve

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 04:14:00 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA25921
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 04:14:00 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJS00-0006z8-8t; Thu, 07 Apr 2005 04:04:24 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJRzb-0006uN-0n
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 04:03:59 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA24946
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 04:03:56 -0400 (EDT)
Received: from michael.checkpoint.com ([194.29.32.68]
	helo=michael2.checkpoint.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJS86-0007fq-Rm
	for ipsec@ietf.org; Thu, 07 Apr 2005 04:12:47 -0400
Received: from [194.29.46.218] (localhost [127.0.0.1])
	by michael2.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id
	j3783Swx002345
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 11:03:28 +0300 (IDT)
Mime-Version: 1.0 (Apple Message framework v619.2)
In-Reply-To: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsoft.com>
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsoft.com>
Content-Type: text/plain; charset=US-ASCII; format=flowed
Message-Id: <d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
Content-Transfer-Encoding: 7bit
From: Yoav Nir <ynir@checkpoint.com>
Date: Thu, 7 Apr 2005 11:03:46 +0300
To: IPsec WG <ipsec@ietf.org>
X-Mailer: Apple Mail (2.619.2)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: b19722fc8d3865b147c75ae2495625f2
Content-Transfer-Encoding: 7bit
Subject: [Ipsec] Questions about internal address
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Hi.

I've read sections 2.19 and 4, and I still have two questions about 
internal addressing:

1. The initiator may send a CFG_REQUEST during the AUTH exchange.  
There are several cases for the responder:
    (A) - the responder does not support CFG
    (B) - the responder supports CFG, but policy says that this user 
does not get it.
    (C) - the responder supports CFG, but not only for IPv4 addresses, 
and the client asked for IPv6 (or vice versa)
    (D) - the responder supports CFG, but its pool is exhausted (or the 
external server is down)

If my understanding is correct, in case (A) the responder will not send 
a CFG_REPLY.  It makes sense that in case (B) the responder will do the 
same.  The question is about cases (C) and (D). I'm assuming that 
internal addresses are not mandatory.  Is there a way to indicate the 
failure to the initiator so that the initiator can decide whether to 
tear down the connection?  Would it be appropriate to send a CFG_REPLY 
with the internal address equal to zero as an indication of failure, or 
MUST the gateway simply not send a CFG_REPLY?

2. Section 4 refers to renewal before the ADDRESS_EXPIRY elapses.  How 
is this renewal performed?  MUST it be done with a CCSA exchange even 
if the SA is not expired?  Can it be done in an informational exchange 
like the APPLICATION_VERSION query?

Thanks, and maybe the answers should go in the clarifications draft.

Yoav


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 04:34:51 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA27501
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 04:34:51 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJSQw-0005Fg-0x; Thu, 07 Apr 2005 04:32:14 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJSQu-0005FF-0H
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 04:32:12 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA27301
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 04:32:09 -0400 (EDT)
Received: from aragorn.bbn.com ([128.33.0.62])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJSZP-0000Hk-FC
	for ipsec@ietf.org; Thu, 07 Apr 2005 04:41:00 -0400
Received: from [192.168.50.62] (ramblo.bbn.com [128.33.0.51])
	by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j378VwvF019124;
	Thu, 7 Apr 2005 04:32:00 -0400 (EDT)
Mime-Version: 1.0
Message-Id: <p06210205be7a99d31d92@[192.168.50.62]>
In-Reply-To: <E4FF889B88DF4A4EBBDDDEF6D5BF7CE40515F615@fmsmsx407.amr.corp.intel.com>
References: <E4FF889B88DF4A4EBBDDDEF6D5BF7CE40515F615@fmsmsx407.amr.corp.intel.com>
Date: Thu, 7 Apr 2005 04:07:33 -0400
To: "Bansal, Yogesh" <yogesh.bansal@intel.com>
From: Stephen Kent <kent@bbn.com>
Subject: Re: [Ipsec] CCM: AAD construction
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41
X-Virus-Status: Clean
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 08170828343bcf1325e4a0fb4584481c
Cc: ipsec@ietf.org, "Raghunandan, Makaram" <makaram.raghunandan@intel.com>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

At 1:30 PM -0700 4/6/05, Bansal, Yogesh wrote:
>	<SNIP>
>
>However, IPSec ESP mode states that encryption is done prior to
>authentication. Does this order change in the
>draft-ietf-ipsec-ciph-aes-ccm-05.txt, meaning that authentication is
>done after CTR-encryption? If so, is the CBC-MAC encrypted again.

look at ESP v3. drafts of this document have been around for quite a 
while. it has just been approved by the IESG and is now in the RFC 
Editor's hands. It has an explicit discussion of how to process 
packets when a combined mode algorithm (confidentiality and 
integrity) is employed.

Steve

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 06:44:06 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA06857
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 06:44:06 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJURQ-0007Lj-Q8; Thu, 07 Apr 2005 06:40:52 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJURP-0007Lb-2D
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 06:40:51 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA06594
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 06:40:47 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJUZv-0004Kn-8d
	for ipsec@ietf.org; Thu, 07 Apr 2005 06:49:40 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j37AehIu003027
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Thu, 7 Apr 2005 13:40:44 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j37AegX1003024;
	Thu, 7 Apr 2005 13:40:42 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16981.3625.976427.270687@fireball.kivinen.iki.fi>
Date: Thu, 7 Apr 2005 13:40:41 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Russ Housley <housley@vigilsec.com>
Subject: [Ipsec] Re: Results of straw poll regarding: IKEv2 interoperability
	issue
In-Reply-To: <6.2.0.14.2.20050406112358.04690910@mail.binhost.com>
References: <E1DB0GA-00040P-Ox@thunk.org>
	<6.2.0.14.2.20050315100106.0624c8e0@mail.binhost.com>
	<20050406145659.GA20093@thunk.org>
	<6.2.0.14.2.20050406112358.04690910@mail.binhost.com>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 6 min
X-Total-Time: 5 min
X-Spam-Score: 0.3 (/)
X-Scan-Signature: 3002fc2e661cd7f114cb6bae92fe88f1
Content-Transfer-Encoding: 7bit
Cc: ipsec@ietf.org, Barbara Fraser <byfraser@cisco.com>,
        Charlie Kaufman <charliek@microsoft.com>,
        "Theodore Ts'o" <tytso@mit.edu>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Russ Housley writes:
> If the change is small, I suggest that we do it with an RFC Editor 
> note.  First, the content of the note needs to be approved by the WG and 

The change would be (I include the whole tables so the formatting will
be done correctly):
----------------------------------------------------------------------
In section 3.3.2 remove "optional in" from the ESN line, i.e. change


   Transform Type Values

                                     Transform    Used In
                                        Type
          RESERVED                        0
          Encryption Algorithm (ENCR)     1  (IKE and ESP)
          Pseudo-random Function (PRF)    2  (IKE)
          Integrity Algorithm (INTEG)     3  (IKE, AH, optional in ESP)
          Diffie-Hellman Group (D-H)      4  (IKE, optional in AH & ESP)
          Extended Sequence Numbers (ESN) 5  (Optional in AH and ESP)
          RESERVED TO IANA                6-240
          PRIVATE USE                     241-255


to


   Transform Type Values

                                     Transform    Used In
                                        Type
          RESERVED                        0
          Encryption Algorithm (ENCR)     1  (IKE and ESP)
          Pseudo-random Function (PRF)    2  (IKE)
          Integrity Algorithm (INTEG)     3  (IKE, AH, optional in ESP)
          Diffie-Hellman Group (D-H)      4  (IKE, optional in AH & ESP)
          Extended Sequence Numbers (ESN) 5  (AH and ESP)
          RESERVED TO IANA                6-240
          PRIVATE USE                     241-255
----------------------------------------------------------------------
In section 3.3.2 remove last paragraph from the description of the
Transform Type 5, i.e. change:

   For Transform Type 5 (Extended Sequence Numbers), defined Transform
   IDs are:

          Name                                Number
          No Extended Sequence Numbers       0
          Extended Sequence Numbers          1
          RESERVED                           2 - 65535

          If Transform Type 5 is not included in a proposal, use of
          Extended Sequence Numbers is assumed.


to


   For Transform Type 5 (Extended Sequence Numbers), defined Transform
   IDs are:

          Name                                Number
          No Extended Sequence Numbers       0
          Extended Sequence Numbers          1
          RESERVED                           2 - 65535

----------------------------------------------------------------------
In section 3.3.3 move ESN to mandatory types of the ESN an AH, i.e.
change:

          Protocol  Mandatory Types        Optional Types
            IKE     ENCR, PRF, INTEG, D-H
            ESP     ENCR                   INTEG, D-H, ESN
            AH      INTEG                  D-H, ESN


to


          Protocol  Mandatory Types        Optional Types
            IKE     ENCR, PRF, INTEG, D-H
            ESP     ENCR, ESN              INTEG, D-H
            AH      INTEG, ESN             D-H
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 06:54:26 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA07549
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 06:54:26 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJUdV-0002JL-4N; Thu, 07 Apr 2005 06:53:21 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJUdS-0002Ho-Mj
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 06:53:18 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA07504
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 06:53:15 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJUm0-0004nm-06
	for ipsec@ietf.org; Thu, 07 Apr 2005 07:02:08 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j37Ar8YX003101
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Thu, 7 Apr 2005 13:53:09 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j37Ar3T4003098;
	Thu, 7 Apr 2005 13:53:04 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16981.4367.870344.876190@fireball.kivinen.iki.fi>
Date: Thu, 7 Apr 2005 13:53:03 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: "Subha" <subhaav@intoto.com>
Subject: Re: [Ipsec] Number of SPD Policies
In-Reply-To: <011501c53afa$b91fc830$4205010a@subha>
References: <00e801c536f8$531e4850$4205010a@subha>
	<p0621020cbe73752e25ae@[128.89.89.106]>
	<015701c5371b$f3885510$4205010a@subha>
	<16977.11042.656521.73950@fireball.kivinen.iki.fi>
	<003701c53952$0aabf430$4205010a@subha>
	<16978.22280.545861.239449@fireball.kivinen.iki.fi>
	<011501c53afa$b91fc830$4205010a@subha>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 10 min
X-Total-Time: 9 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 69a74e02bbee44ab4f8eafdbcedd94a1
Content-Transfer-Encoding: 7bit
Cc: ipsec@ietf.org, Stephen Kent <kent@bbn.com>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Subha writes:
> If AH+ESP between the same two gateway devices is not 
> actually providing any extra crypographic protection,
> why have it at all. 

True.

> 2401bis could have simply removed that combination. 

2401bis did remove it as a single concept.

The reason there is still the forwarding step is when you have
following case:

Host A <-------> SGW <-----> Host B

and where Host A needs to authenticate all his packets with tunnel
mode AH to the SGW before it can get through it (i.e. the Host A might
be somewhere inside the internet, and the SGW is the corporate
firewall, requiring authentication before letting any traffic in, but
as all traffic is also protected by ESP end to end, AH is enough for
the SGW). In addition to that Host A needs to create transport mode
ESP to connect to the Host B (lets say financial server or something).

Now the Host A do need to have both AH and ESP applied to the packet,
and his policy would be:

Host A, Host B, ESP or IKE use tunnel mode AH to SGW
Host A, Host B, any traffic use transport mode ESP, reforward to IPsec

> Also, my understanding is that having AH over ESP provides
> additional protection on the tunnel header, which is otherwise
> not handled by ESP with Auth.

If the ESP is in tunnel mode the external header is thrown away, so
the protection AH offers to it is not useful. 
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 07:00:12 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA07994
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 07:00:12 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJUh7-0003GW-6J; Thu, 07 Apr 2005 06:57:05 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJUh0-0003Eh-Kl
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 06:57:03 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA07787
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 06:56:55 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJUpX-0004s2-Us
	for ipsec@ietf.org; Thu, 07 Apr 2005 07:05:48 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j37Ausd7003129
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Thu, 7 Apr 2005 13:56:55 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j37AumEo003126;
	Thu, 7 Apr 2005 13:56:48 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16981.4592.603521.64579@fireball.kivinen.iki.fi>
Date: Thu, 7 Apr 2005 13:56:48 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: pasi.eronen@nokia.com, paul.hoffman@vpnc.org, ipsec@ietf.org
Subject: [Ipsec] Comments of draft-eronen-ipsec-ikev2-clarifications-02.txt
In-Reply-To: <16978.33154.351915.320602@fireball.kivinen.iki.fi>
References: <16978.33154.351915.320602@fireball.kivinen.iki.fi>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 2 min
X-Total-Time: 2 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9466e0365fc95844abaf7c3f15a05c7d
Content-Transfer-Encoding: 7bit
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Tero Kivinen writes:
> Also if we think more about the IKE SA rekeying, I do not think there
> is any reason to do that unless you also do new Diffie-Hellman there
> too. Rekeying IKE SA because of the IKE message ID wrapping is not
> common. The current IKEv2 text is not clear wheather the intension was
> that IKE SA rekey MUST have KE payloads, but I think we should mandate
> them, i.e. say in the NEW-1.3.2 that KE payloads are not optional
> there.

Actually it is clear from the draft-ietf-ipsec-ikev2-17.txt that
Diffie-Hellman parameter is NOT optional when rekeying IKE. The 3.3.3
lists D-H as mandatory type if the protocol is IKE, and the 3.3.2 does
the same in the Transform Type Values table. So KE payloads are not
optional in the NEW-1.3.2.

-----------------------------------------------------------------------
3.3.2 Transform Substructure
...
   Transform Type Values
...
          Diffie-Hellman Group (D-H)      4  (IKE, optional in AH & ESP)
...
3.3.3 Valid Transform Types by Protocol
...
          Protocol  Mandatory Types        Optional Types
            IKE     ENCR, PRF, INTEG, D-H
...
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 07:33:55 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA10862
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 07:33:55 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJVAI-0001O1-NV; Thu, 07 Apr 2005 07:27:14 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJVAI-0001Nw-0h
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 07:27:14 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA09927
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 07:27:10 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJVIp-0005qn-Lx
	for ipsec@ietf.org; Thu, 07 Apr 2005 07:36:04 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j37BR7bY003422
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Thu, 7 Apr 2005 14:27:07 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j37BR7gC003419;
	Thu, 7 Apr 2005 14:27:07 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16981.6410.971961.170256@fireball.kivinen.iki.fi>
Date: Thu, 7 Apr 2005 14:27:06 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Yoav Nir <ynir@checkpoint.com>
Subject: [Ipsec] Questions about internal address
In-Reply-To: <d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsoft.com>
	<d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 1 min
X-Total-Time: 1 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 30ac594df0e66ffa5a93eb4c48bcb014
Content-Transfer-Encoding: 7bit
Cc: IPsec WG <ipsec@ietf.org>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Yoav Nir writes:
> 2. Section 4 refers to renewal before the ADDRESS_EXPIRY elapses.  How 

And note also that ADDRESS_EXPIRY is optional to implement for the
server, server can simply refuse to give them out, and client can
simply not request it. Clients MUST understand if it replied to them,
but that is all.
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 07:34:47 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA11041
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 07:34:47 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJV8k-00018d-CK; Thu, 07 Apr 2005 07:25:38 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJV8j-00018Y-Hz
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 07:25:37 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA09770
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 07:25:34 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJVHH-0005oX-0Q
	for ipsec@ietf.org; Thu, 07 Apr 2005 07:34:27 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j37BPStA003406
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Thu, 7 Apr 2005 14:25:29 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j37BPR7p003403;
	Thu, 7 Apr 2005 14:25:27 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16981.6311.477874.783828@fireball.kivinen.iki.fi>
Date: Thu, 7 Apr 2005 14:25:27 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Yoav Nir <ynir@checkpoint.com>
Subject: [Ipsec] Questions about internal address
In-Reply-To: <d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsoft.com>
	<d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 14 min
X-Total-Time: 15 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 02ec665d00de228c50c93ed6b5e4fc1a
Content-Transfer-Encoding: 7bit
Cc: IPsec WG <ipsec@ietf.org>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Yoav Nir writes:
> 1. The initiator may send a CFG_REQUEST during the AUTH exchange.  
> There are several cases for the responder:
>     (A) - the responder does not support CFG
>     (B) - the responder supports CFG, but policy says that this user 
> does not get it.

Yes, simply do not send CFG_REPLY at all. 

>     (C) - the responder supports CFG, but not only for IPv4 addresses, 
> and the client asked for IPv6 (or vice versa)
>     (D) - the responder supports CFG, but its pool is exhausted (or the 
> external server is down)

Send CFG_REPLY, with other parameters, but leave out the
INTERNAL_IP{4,6}_ADDRESS parameters, as you do not have address for
him. This is suitable if he asked both IPv4 and IPv6 and you only had
one of those addresses. Then you probably also fail the IPsec SA
exchange (if this was part of the IKE_AUTH) with
INTERNAL_ADDRESS_FAILURE error, as you cannot narrow down the traffic
selectors if you do not have address where to narrow.

You could also fail the whoe CFG_REQUEST exchange with
INTERNAL_ADDRESS_FAILURE.

> 2. Section 4 refers to renewal before the ADDRESS_EXPIRY elapses.  How 
> is this renewal performed?

This whole thing is leftover from the IKEv1, and I think it SHOULD NOT
be used at all. The address is valid as long as the IKE SA is valid,
thus if server wants to free unused addresses, he can simply delete
IKE SAs to free the addresses. In the IKEv2 all information related to
the IKE SA goes away when it is deleted, and I see no reason why the
paramters allocated with configuration payload would be exception to
this.

Renewals are only needed when the communication channel is not
reliable, i.e. the server does not have a way to know if the client is
still there and using the address. In IKEv2 we do know when the client
disappears, so we can free the addresses at that point, at the same
time we delete the IKE SA and IPsec SAs tied to it (using that
address).

> MUST it be done with a CCSA exchange even if the SA is not expired?

CREATE_CHILD_SA exchange cannot have CP payloads, so it must be done
as separate informational exchange.

> Can it be done in an informational exchange like the
> APPLICATION_VERSION query?
> 
> Thanks, and maybe the answers should go in the clarifications draft.

The whole configuration payload thing is quite badly defined as it is
taken directly from the mode config of IKEv1, and nobody wanted to
modify things from there. The problem is that IKEv2 and IKEv1 do have
different ways of doing that, and for example that ADDRESS_EXPIRY
should have been removed completely when the text was taken to IKEv2
draft etc.
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 09:11:11 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA19692
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 09:11:11 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJWkX-0003xi-QJ; Thu, 07 Apr 2005 09:08:45 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJWkU-0003vr-6T
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 09:08:43 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA19278
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 09:08:39 -0400 (EDT)
Received: from michael.checkpoint.com ([194.29.32.68]
	helo=michael2.checkpoint.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJWt0-0001ML-25
	for ipsec@ietf.org; Thu, 07 Apr 2005 09:17:32 -0400
Received: from [194.29.46.218] (localhost [127.0.0.1])
	by michael2.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id
	j37D89wx011564; Thu, 7 Apr 2005 16:08:09 +0300 (IDT)
In-Reply-To: <16981.6311.477874.783828@fireball.kivinen.iki.fi>
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsoft.com>
	<d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
	<16981.6311.477874.783828@fireball.kivinen.iki.fi>
Mime-Version: 1.0 (Apple Message framework v619.2)
Content-Type: text/plain; charset=US-ASCII; format=flowed
Message-Id: <0d4118737c07947571b7d301dac293f3@checkpoint.com>
Content-Transfer-Encoding: 7bit
From: Yoav Nir <ynir@checkpoint.com>
Subject: Re: [Ipsec] Questions about internal address
Date: Thu, 7 Apr 2005 16:08:26 +0300
To: Tero Kivinen <kivinen@iki.fi>
X-Mailer: Apple Mail (2.619.2)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 50a516d93fd399dc60588708fd9a3002
Content-Transfer-Encoding: 7bit
Cc: IPsec WG <ipsec@ietf.org>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

On Apr 7, 2005, at 2:25 PM, Tero Kivinen wrote:

>>     (C) - the responder supports CFG, but not only for IPv4 addresses,
>> and the client asked for IPv6 (or vice versa)
>>     (D) - the responder supports CFG, but its pool is exhausted (or 
>> the
>> external server is down)
>
> Send CFG_REPLY, with other parameters, but leave out the
> INTERNAL_IP{4,6}_ADDRESS parameters, as you do not have address for
> him. This is suitable if he asked both IPv4 and IPv6 and you only had
> one of those addresses. Then you probably also fail the IPsec SA
> exchange (if this was part of the IKE_AUTH) with
> INTERNAL_ADDRESS_FAILURE error, as you cannot narrow down the traffic
> selectors if you do not have address where to narrow.
>
> You could also fail the whoe CFG_REQUEST exchange with
> INTERNAL_ADDRESS_FAILURE.

How can you ever avoid this, even with cases (A) and (B) ?

Suppose the initiator sends message #3 as in section 2.19:

       CP(CFG_REQUEST)=
         INTERNAL_ADDRESS(0.0.0.0)
         INTERNAL_NETMASK(0.0.0.0)
         INTERNAL_DNS(0.0.0.0)
       TSi = (0, 0-65536,0.0.0.0-255.255.255.255)
       TSr = (0, 0-65536,0.0.0.0-255.255.255.255)

If the responder is not configured to support CP it cannot narrow the 
selectors and will have to fail anyway.  But it gets weirder still.  In 
the description of the INTERNAL_ADDRESS_FAILURE notification it says 
this:
         INTERNAL_ADDRESS_FAILURE                 36

             Indicates an error assigning an internal address (i.e.,
             INTERNAL_IP4_ADDRESS or INTERNAL_IP6_ADDRESS) during the
             processing of a Configuration Payload by a responder.  If
             this error is generated within an IKE_AUTH exchange no
             CHILD_SA will be created.

This says that no CHILD_SA is created, but it does not say that no 
IKE_SA is created.  Does this mean that we have an exchange that 
creates an IKE_SA but not a CHILD_SA?  If I understand this correctly, 
at this point the client is supposed to start a new CCSA exchange with 
its own IP address.



_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 09:26:46 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA21728
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 09:26:46 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJWlZ-00049E-9p; Thu, 07 Apr 2005 09:09:49 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJWlX-000480-6G
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 09:09:47 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA19480
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 09:09:45 -0400 (EDT)
Received: from michael.checkpoint.com ([194.29.32.68]
	helo=michael2.checkpoint.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJWu4-0001TT-RR
	for ipsec@ietf.org; Thu, 07 Apr 2005 09:18:38 -0400
Received: from [194.29.46.218] (localhost [127.0.0.1])
	by michael2.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id
	j37D9Hwx011977; Thu, 7 Apr 2005 16:09:17 +0300 (IDT)
In-Reply-To: <16981.6410.971961.170256@fireball.kivinen.iki.fi>
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsoft.com>
	<d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
	<16981.6410.971961.170256@fireball.kivinen.iki.fi>
Mime-Version: 1.0 (Apple Message framework v619.2)
Content-Type: text/plain; charset=US-ASCII; format=flowed
Message-Id: <33f25effb8f689c83ffd238a35f90555@checkpoint.com>
Content-Transfer-Encoding: 7bit
From: Yoav Nir <ynir@checkpoint.com>
Subject: Re: [Ipsec] Questions about internal address
Date: Thu, 7 Apr 2005 16:09:35 +0300
To: Tero Kivinen <kivinen@iki.fi>
X-Mailer: Apple Mail (2.619.2)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: cf4fa59384e76e63313391b70cd0dd25
Content-Transfer-Encoding: 7bit
Cc: IPsec WG <ipsec@ietf.org>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

I guess this parameter originated from expecting to have the IP 
addresses assigned by a DHCP server and not wanting the server to have 
to keep track of DHCP leases.

On Apr 7, 2005, at 2:27 PM, Tero Kivinen wrote:

> Yoav Nir writes:
>> 2. Section 4 refers to renewal before the ADDRESS_EXPIRY elapses.  How
>
> And note also that ADDRESS_EXPIRY is optional to implement for the
> server, server can simply refuse to give them out, and client can
> simply not request it. Clients MUST understand if it replied to them,
> but that is all.
> -- 
> kivinen@safenet-inc.com


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 09:43:13 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA23184
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 09:43:13 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJXDo-0006bw-FE; Thu, 07 Apr 2005 09:39:00 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJXDn-0006br-4E
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 09:38:59 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA22770
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 09:38:56 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJXML-0002jX-KI
	for ipsec@ietf.org; Thu, 07 Apr 2005 09:47:50 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j37DclsY004734
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Thu, 7 Apr 2005 16:38:48 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j37Dcl6O004731;
	Thu, 7 Apr 2005 16:38:47 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16981.14311.761760.602438@fireball.kivinen.iki.fi>
Date: Thu, 7 Apr 2005 16:38:47 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Yoav Nir <ynir@checkpoint.com>
Subject: Re: [Ipsec] Questions about internal address
In-Reply-To: <0d4118737c07947571b7d301dac293f3@checkpoint.com>
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsoft.com>
	<d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
	<16981.6311.477874.783828@fireball.kivinen.iki.fi>
	<0d4118737c07947571b7d301dac293f3@checkpoint.com>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 7 min
X-Total-Time: 6 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 82c9bddb247d9ba4471160a9a865a5f3
Content-Transfer-Encoding: 7bit
Cc: IPsec WG <ipsec@ietf.org>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Yoav Nir writes:
> On Apr 7, 2005, at 2:25 PM, Tero Kivinen wrote:
> 
> >>     (C) - the responder supports CFG, but not only for IPv4 addresses,
> >> and the client asked for IPv6 (or vice versa)
> >>     (D) - the responder supports CFG, but its pool is exhausted (or 
> >> the
> >> external server is down)
> >
> > Send CFG_REPLY, with other parameters, but leave out the
> > INTERNAL_IP{4,6}_ADDRESS parameters, as you do not have address for
> > him. This is suitable if he asked both IPv4 and IPv6 and you only had
> > one of those addresses. Then you probably also fail the IPsec SA
> > exchange (if this was part of the IKE_AUTH) with
> > INTERNAL_ADDRESS_FAILURE error, as you cannot narrow down the traffic
> > selectors if you do not have address where to narrow.
> >
> > You could also fail the whoe CFG_REQUEST exchange with
> > INTERNAL_ADDRESS_FAILURE.
> 
> How can you ever avoid this, even with cases (A) and (B) ?

In case the traffic selectors have something else than any to any,
i.e. if the client already has a IP-address, but only tries to get
additional IP-address allocated from the internal pool. But, yes I
agree that in most cases you simply return INTERNAL_ADDRESS_FAILURE. 

> This says that no CHILD_SA is created, but it does not say that no 
> IKE_SA is created.

Yes, that is right. If there is any problems with the IPsec SA if the
IKE_AUTH, you still do create the IKE SA, but simply fail the IPsec SA
with error code. This applies to the NO_PROSAL_CHOSEN,
SINGLE_PAIR_REQUIRED, INTERNAL_ADDRESS_FAILURE, FAILED_CP_REQUIRED,
and TS_UNACCEPTALBE.

The idea is that we have all the information needed to create the IKE
SA, and we have already done the Diffie-Hellman, signature
verification etc, so it would be wasting resources to throw all that
away, just because there was something wrong with the IPsec SA. If the
initiator knows how to fix the situation (add CP, change traffic
selectors, modify algorithms etc) he can do that and initiate
CREATE_CHILD_SA to create new SAs.

If he cannot do anything, he can simply delete the IKE SA if he does
not wnat to have it. 

> Does this mean that we have an exchange that creates an IKE_SA but
> not a CHILD_SA?

Yes.

> If I understand this correctly, at this point the client is supposed
> to start a new CCSA exchange with its own IP address.
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 10:01:26 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA25188
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 10:01:26 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJXJK-0007A0-Pk; Thu, 07 Apr 2005 09:44:42 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJXJI-00079p-F5
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 09:44:40 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA23296
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 09:44:38 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJXRr-0002wc-2f
	for ipsec@ietf.org; Thu, 07 Apr 2005 09:53:31 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j37DiXTO004761
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Thu, 7 Apr 2005 16:44:33 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j37DiWiD004758;
	Thu, 7 Apr 2005 16:44:32 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16981.14656.859805.458166@fireball.kivinen.iki.fi>
Date: Thu, 7 Apr 2005 16:44:32 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Yoav Nir <ynir@checkpoint.com>
Subject: Re: [Ipsec] Questions about internal address
In-Reply-To: <33f25effb8f689c83ffd238a35f90555@checkpoint.com>
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsoft.com>
	<d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
	<16981.6410.971961.170256@fireball.kivinen.iki.fi>
	<33f25effb8f689c83ffd238a35f90555@checkpoint.com>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 3 min
X-Total-Time: 5 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7a6398bf8aaeabc7a7bb696b6b0a2aad
Content-Transfer-Encoding: 7bit
Cc: IPsec WG <ipsec@ietf.org>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Yoav Nir writes:
> I guess this parameter originated from expecting to have the IP 
> addresses assigned by a DHCP server and not wanting the server to have 
> to keep track of DHCP leases.

Hmm.... probably true, but the server still needs to keep track of the
IP-addresses assigned to each client and so on, soaddding the lease
time there does not cause that much more bookkeeping. But perhaps this
current way is the best, server can simply leave it out if he
allocates addresses from internal pool and send it if it is using DHCP
server. 
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 11:17:05 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA03711
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 11:17:05 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJYgt-00038K-Rl; Thu, 07 Apr 2005 11:13:07 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJYgr-00036E-Nb
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 11:13:05 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA03160
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 11:13:02 -0400 (EDT)
Received: from aragorn.bbn.com ([128.33.0.62])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJYpR-0006cO-HQ
	for ipsec@ietf.org; Thu, 07 Apr 2005 11:21:57 -0400
Received: from [192.168.50.44] (ramblo.bbn.com [128.33.0.51])
	by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j37FCqvF003727;
	Thu, 7 Apr 2005 11:12:55 -0400 (EDT)
Mime-Version: 1.0
Message-Id: <p06210202be7af5e969fb@[192.168.50.44]>
In-Reply-To: <20050318023302.85893.qmail@web52604.mail.yahoo.com>
References: <20050318023302.85893.qmail@web52604.mail.yahoo.com>
Date: Thu, 7 Apr 2005 11:12:59 -0400
To: Subha Venkataramanan <subhaav@yahoo.com>
From: Stephen Kent <kent@bbn.com>
Subject: Re: [Ipsec] Next Layer Protocol (Ref: 2401-bis draft)
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41
X-Virus-Status: Clean
X-Spam-Score: 2.0 (++)
X-Scan-Signature: 082a9cbf4d599f360ac7f815372a6a15
Cc: ipsec@ietf.org
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

At 6:33 PM -0800 3/17/05, Subha Venkataramanan wrote:
>Hi ,
>
>I have a follow-up question.
>
>If an implementation understands says hop-to-hop,
>routing, fragmentation and Destination Options, it
>can parse these extension headers and look for the
>next protocol information. When it parses each
>extension header, it knows the length of bytes it
>needs to skip to reach the next extension header.
>
>If there are any new extension headers and the
>implemenation cannot interpret these extension
>headers, it cannot process the packet. In which
>case, it may choose to send an ICMP Error message.
>
>What additional help is given to the implementation,
>by configuring the extension headers that it needs
>to ignore while parsing the IPv6 header.

this is a feature designed to help support IPsec, in the IPv6 
context. after inbound processing, IPsec access controls are applied 
based on the SAD entry for the SA via which the traffic arrived. thus 
it is important to know what constitutes the "next layer protocol" to 
which these access controls are to be applied. The use of a list 
enables a receiver to accommodate new IPv6 headers in the future. The 
list is configured with default entries for the header types that are 
defined now and that make sense to skip. similarly, for outbound 
processing, this list indicates where to look to find the protocol 
that is used for outbound access control, SA selection. This is 
mostly an AH issue, because there is more flexibility in where AH can 
be placed relative to IPv6 headers, vs. ESP.

>1) Does this kind of configuration in the
>implementation advise the user, that it has
>capabilities skip A,B,C extension headers ?

that is a local implementation issue, not dictated by the standards, 
but I would expect this info to be viewable as part of the 
configuration data.

>2) Does this kind of configuration mean, that if the
>implementation comes across any other extension
>headers which it can interpret but is not in the
>configured list, it should drop the packet ?

As soon as one encounters a header that is not on the list, then that 
header is the one that will be examined against the SAD entry. if 
there is an extension header present that is not on the skip list, 
and it is not the one you listed in the SPD (and now in the SAD entry 
for the SA), then the packet will be dropped.

>3) Does this kind of configuration mean, that when the
>user tries to add some extension header values, that
>the implementation does not support, it can throw an
>error indicating the same ?

If you add a header not on the list, AND if the intent was to skip 
the header, then the packet will be dropped.

Steve

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 14:42:19 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA25272
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 14:42:19 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJbwA-0005p0-I7; Thu, 07 Apr 2005 14:41:06 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJbw8-0005ov-LX
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 14:41:04 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA25192
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 14:41:02 -0400 (EDT)
Received: from woodstock.binhost.com ([144.202.243.4])
	by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DJc4k-0006A7-AU
	for ipsec@ietf.org; Thu, 07 Apr 2005 14:49:58 -0400
Received: (qmail 12700 invoked by uid 0); 7 Apr 2005 18:40:11 -0000
Received: from unknown (HELO Russ-Laptop.vigilsec.com) (138.88.14.68)
	by woodstock.binhost.com with SMTP; 7 Apr 2005 18:40:11 -0000
Message-Id: <6.2.0.14.2.20050407140202.05092490@mail.binhost.com>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.0.14
Date: Thu, 07 Apr 2005 14:39:59 -0400
To: "Bansal, Yogesh" <yogesh.bansal@intel.com>
From: Russ Housley <housley@vigilsec.com>
Subject: Re: [Ipsec] CCM: AAD construction 
In-Reply-To: <E4FF889B88DF4A4EBBDDDEF6D5BF7CE40515F615@fmsmsx407.amr.cor
	p.intel.com>
References: <E4FF889B88DF4A4EBBDDDEF6D5BF7CE40515F615@fmsmsx407.amr.corp.intel.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
X-Spam-Score: 0.2 (/)
X-Scan-Signature: 0fa76816851382eb71b0a882ccdc29ac
Cc: ipsec@ietf.org, makaram.raghunandan@intel.com
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Yogesh:

>I have few questions on CCM & it's use in IPSec ESP mode. The questions
>are related to construction of AAD blocks required for authentication
>purposes.
>
>1) Construction of AAD blocks in CCM in general
>
>RFC 3610 specifies construction of B_0, B_1 blocks
>The construction of B_0 has been clearly defined. This block is followed
>by length encoding of "a" followed by "a" itself, as per the following
>paragraph in the spec:
>
>Blocks encoding a are formed by concatenating this string that encodes
>l(a) with a itself, and splitting the result into 16-octet blocks, and
>then padding the last block with zeros if necessary. These blocks are
>appended to the first block B_0.
>
>Does this mean the following:
>
>B_1 = encoding(l(a)) || a || pad (to the next 16 octet block )
>
>Hence, the AAD block stream then consists of
>B_0 || B_1 || m_0 || m_1 ... || m_n (padding, if required)
>
>
>[Q] Please confirm whether the interpretation of B_1 construction is
>correct.

Sometimes.  When 0 < l(a) < (2^16 - 2^8), then B0 includes l(a).  In this 
case, B1 begins with a.


>2) Construction of AAD blocks in IPSec ESP mode
>
>Does B_1 definition mean the following in IPSec ESP mode
>AAD_IPSec = SPI || SEQ_Num
>
>B_1 = encoding (l (AAD_IPSec)) ||  AAD_IPsec || pad (to the next 16
>octet block)
>
>[Q] Please confirm construction of B_1 block in IPSec mode is correct.

The answer to this is found in draft-ietf-ipsec-ciph-aes-ccm-05.txt, which 
is in the RFC Editor queue.  Section 5 shows the two cases for AAD 
construction.  In both cases, l(a) is less than (2^16 - 2^8), so l(a) is 
encoded as part of B0.  Thus, B1 contains only the SPI and the sequence 
number.  The two cases are the traditional sequence number, which is 32 
bits, and the extended sequence number, which is 64 bits.  In either case, 
the total length of the AAD is less than one block, and padding is needed.


>3) Computing CBC-MAC in CCM Mode With IPsec ESP

>CCM spec (RFC 3610) implies that authentication is done on the plain
>text (and not the cipher text).
>
>However, IPSec ESP mode states that encryption is done prior to
>authentication. Does this order change in the
>draft-ietf-ipsec-ciph-aes-ccm-05.txt, meaning that authentication is
>done after CTR-encryption? If so, is the CBC-MAC encrypted again.
>
>My interpretation is that the order still remains the same as specified
>in RFC 3610, i.e. authentication is on  plain text and not cipher text.
>
>[Q] Please indicate what is the correct order of processing on the
>outbound side.

Authentication is done first.

Please make sure that you are following draft-ietf-ipsec-esp-v3-10.txt, 
which is also in the RFC Editor queue.  This document includes support for 
authenticated encryption modes like CCM.  This support is not available in 
ESP v2 (RFC 2406).

Russ


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 15:08:09 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA28097
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 15:08:09 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJcLD-0002Vx-Jr; Thu, 07 Apr 2005 15:06:59 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJcLB-0002Vn-I2
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 15:06:57 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA27986
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 15:06:55 -0400 (EDT)
Received: from woodstock.binhost.com ([144.202.243.4])
	by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DJcTl-00073k-RW
	for ipsec@ietf.org; Thu, 07 Apr 2005 15:15:51 -0400
Received: (qmail 2987 invoked by uid 0); 7 Apr 2005 19:06:48 -0000
Received: from unknown (HELO Russ-Laptop.vigilsec.com) (141.156.167.14)
	by woodstock.binhost.com with SMTP; 7 Apr 2005 19:06:48 -0000
Message-Id: <6.2.0.14.2.20050407150511.06108900@mail.binhost.com>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.0.14
Date: Thu, 07 Apr 2005 15:06:49 -0400
To: Tero Kivinen <kivinen@iki.fi>
From: Russ Housley <housley@vigilsec.com>
Subject: Re: [Ipsec] Re: Results of straw poll regarding: IKEv2
	interoperability issue
In-Reply-To: <16981.3625.976427.270687@fireball.kivinen.iki.fi>
References: <E1DB0GA-00040P-Ox@thunk.org>
	<6.2.0.14.2.20050315100106.0624c8e0@mail.binhost.com>
	<20050406145659.GA20093@thunk.org>
	<6.2.0.14.2.20050406112358.04690910@mail.binhost.com>
	<16981.3625.976427.270687@fireball.kivinen.iki.fi>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
X-Spam-Score: 0.2 (/)
X-Scan-Signature: 1a1bf7677bfe77d8af1ebe0e91045c5b
Cc: ipsec@ietf.org, Barbara Fraser <byfraser@cisco.com>,
        Charlie Kaufman <charliek@microsoft.com>,
        "Theodore Ts'o" <tytso@mit.edu>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

All:

This is sufficiently small.

Ted & Barbara:

Now, I need to confirm that this is the WG consensus.

Once you have done so, please send me a formal request, formatted like AUTH 
48 input to the RFC Editor.

Russ



At 06:40 AM 4/7/2005, Tero Kivinen wrote:
>Russ Housley writes:
> > If the change is small, I suggest that we do it with an RFC Editor
> > note.  First, the content of the note needs to be approved by the WG and
>
>The change would be (I include the whole tables so the formatting will
>be done correctly):
>----------------------------------------------------------------------
>In section 3.3.2 remove "optional in" from the ESN line, i.e. change
>
>
>    Transform Type Values
>
>                                      Transform    Used In
>                                         Type
>           RESERVED                        0
>           Encryption Algorithm (ENCR)     1  (IKE and ESP)
>           Pseudo-random Function (PRF)    2  (IKE)
>           Integrity Algorithm (INTEG)     3  (IKE, AH, optional in ESP)
>           Diffie-Hellman Group (D-H)      4  (IKE, optional in AH & ESP)
>           Extended Sequence Numbers (ESN) 5  (Optional in AH and ESP)
>           RESERVED TO IANA                6-240
>           PRIVATE USE                     241-255
>
>
>to
>
>
>    Transform Type Values
>
>                                      Transform    Used In
>                                         Type
>           RESERVED                        0
>           Encryption Algorithm (ENCR)     1  (IKE and ESP)
>           Pseudo-random Function (PRF)    2  (IKE)
>           Integrity Algorithm (INTEG)     3  (IKE, AH, optional in ESP)
>           Diffie-Hellman Group (D-H)      4  (IKE, optional in AH & ESP)
>           Extended Sequence Numbers (ESN) 5  (AH and ESP)
>           RESERVED TO IANA                6-240
>           PRIVATE USE                     241-255
>----------------------------------------------------------------------
>In section 3.3.2 remove last paragraph from the description of the
>Transform Type 5, i.e. change:
>
>    For Transform Type 5 (Extended Sequence Numbers), defined Transform
>    IDs are:
>
>           Name                                Number
>           No Extended Sequence Numbers       0
>           Extended Sequence Numbers          1
>           RESERVED                           2 - 65535
>
>           If Transform Type 5 is not included in a proposal, use of
>           Extended Sequence Numbers is assumed.
>
>
>to
>
>
>    For Transform Type 5 (Extended Sequence Numbers), defined Transform
>    IDs are:
>
>           Name                                Number
>           No Extended Sequence Numbers       0
>           Extended Sequence Numbers          1
>           RESERVED                           2 - 65535
>
>----------------------------------------------------------------------
>In section 3.3.3 move ESN to mandatory types of the ESN an AH, i.e.
>change:
>
>           Protocol  Mandatory Types        Optional Types
>             IKE     ENCR, PRF, INTEG, D-H
>             ESP     ENCR                   INTEG, D-H, ESN
>             AH      INTEG                  D-H, ESN
>
>
>to
>
>
>           Protocol  Mandatory Types        Optional Types
>             IKE     ENCR, PRF, INTEG, D-H
>             ESP     ENCR, ESN              INTEG, D-H
>             AH      INTEG, ESN             D-H
>--
>kivinen@safenet-inc.com


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr  7 15:23:08 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA29770
	for <ipsec-archive@lists.ietf.org>; Thu, 7 Apr 2005 15:23:08 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJcZE-0007Yd-T0; Thu, 07 Apr 2005 15:21:28 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJcZD-0007YY-NV
	for ipsec@megatron.ietf.org; Thu, 07 Apr 2005 15:21:27 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA29663
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 15:21:25 -0400 (EDT)
Received: from sj-iport-1-in.cisco.com ([171.71.176.70]
	helo=sj-iport-1.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DJcho-0007T0-Qu
	for ipsec@ietf.org; Thu, 07 Apr 2005 15:30:22 -0400
Received: from sj-core-2.cisco.com (171.71.177.254)
	by sj-iport-1.cisco.com with ESMTP; 07 Apr 2005 12:20:45 -0700
X-IronPort-AV: i="3.92,84,1112598000"; 
	d="scan'208"; a="626651031:sNHT732737070"
Received: from mira-sjc5-b.cisco.com (IDENT:mirapoint@mira-sjc5-b.cisco.com
	[171.71.163.14])
	by sj-core-2.cisco.com (8.12.10/8.12.6) with ESMTP id j37JKbgE029842
	for <ipsec@ietf.org>; Thu, 7 Apr 2005 12:20:38 -0700 (PDT)
Received: from [171.71.49.252] (dhcp-171-71-49-252.cisco.com [171.71.49.252])
	by mira-sjc5-b.cisco.com (MOS 3.4.5-GR) with ESMTP id BDT23126;
	Thu, 7 Apr 2005 12:20:42 -0700 (PDT)
Message-ID: <4255880A.4050404@cisco.com>
Date: Thu, 07 Apr 2005 12:20:42 -0700
From: Kevin Li <kli@cisco.com>
User-Agent: Mozilla Thunderbird 1.0 (Windows/20041206)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: ipsec@ietf.org
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 97adf591118a232206bdb5a27b217034
Content-Transfer-Encoding: 7bit
Subject: [Ipsec] ID and subject/subject-alt  in certificate,
	match or not to match?
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Hi,

IKEv2 doesn't require ID in ID payload to match that subject/subject-alt 
in certificate.

This flexiblity is great in switch/router/multi-home-host environment 
where there may be many interfaces/ip-addresses. In that case, we may 
choose using a global certificate of switch/router, don't need to create 
individual certificate for each interface/ipaddress/fqdn.

IKEv2-17 ===============================================
3.5 Identification Payloads

  The Identification Payloads, denoted IDi and IDr in this memo, allow
  peers to assert an identity to one another. This identity may be used
  for policy lookup, but does not necessarily have to match anything in
  the CERT payload; both fields may be used by an implementation to
  perform access control decisions.
=======================================================

I don't see IKEv1 have such requirement (match) either from protocol 
perspective. But certain implementation (say racoon)  may insist such a 
match.

Does it mean that:
In reality, we have to ensure our id payload matched with subject/alt in 
certificate in order to interop?
What's the general concensus on this (match or not to match)?
I think this should be configurable instead of hardcoding the match if 
people really want it.

Thanks.

Kevin

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Fri Apr  8 02:16:48 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA02599
	for <ipsec-archive@lists.ietf.org>; Fri, 8 Apr 2005 02:16:48 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJmmB-00030t-Tz; Fri, 08 Apr 2005 02:15:32 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJmmA-00030S-IC
	for ipsec@megatron.ietf.org; Fri, 08 Apr 2005 02:15:30 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA01300
	for <ipsec@ietf.org>; Fri, 8 Apr 2005 02:15:29 -0400 (EDT)
Received: from nav2.lgsoftindia.com ([203.200.13.13] helo=nav2)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJmup-0002vF-Te
	for ipsec@ietf.org; Fri, 08 Apr 2005 02:24:30 -0400
Received: from appolo.lgdomain.com ([192.168.1.21]) by nav2 with InterScan
	Messaging Security Suite; Fri, 08 Apr 2005 11:02:33 +0530
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [Ipsec] Questions about internal address
X-MimeOLE: Produced By Microsoft Exchange V6.5.6944.0
Date: Fri, 8 Apr 2005 11:04:19 +0530
Message-ID: <EC9E4C8E76FEF944B5C0711496A107280161E5D1@APPOLO.lgdomain.com>
Thread-Topic: [Ipsec] Questions about internal address
Thread-Index: AcU7SfrPvObnfGGRSxqRnD/goy7wqQAr3r1w
From: "Soumya Sen" <soumya.sen@lgsoftindia.com>
To: "Yoav Nir" <ynir@checkpoint.com>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 3e15cc4fdc61d7bce84032741d11c8e5
Content-Transfer-Encoding: quoted-printable
Cc: ipsec@ietf.org, kivinen@safenet-inc.com
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: quoted-printable



Hello,

The section 3.15 of the draft mentions the actions to be taken in the
cases Yoav mentioned in his mail. The paragraph in page 78 says:

   "If the data type requested in a CFG_REQUEST is not recognized or not
   supported, the responder MUST NOT return an error type but rather
   MUST either send a CFG_REPLY which MAY be empty or a reply not
   containing a CFG_REPLY payload at all. Error returns are reserved for
   cases where the request is recognized but cannot be performed as
   requested or the request is badly formatted."

Yoav mentions a case where: "(B) - the responder supports CFG, but
policy says that this user does not get it."

In this case, the CFG_REQUEST that is coming to the responder will be
recognized by him, but he will not be able to perform the request due to
some policy.=0D
So going by the sentence of the draft "Error returns are reserved for
cases where the request is recognized but cannot be performed as
requested", wouldn't it mean that an error will be returned, and not a
reply without CFG_REPLY payload or empty CFG_REPLY?

Moreover, Tero mentioned that in case (B) we simply do not send
CFG_REPLY at all. Isn't there may be another option too i.e. the
Responder sends a reply not containing a CFG_REPLY payload at all?
Please let me know about these points.

Regards,
Soumya.



(Sorry for the attached Disclaimer, please ignore it. That is a company
policy so I can't remove it. Please bear with it ;-))


***************************************************************************=
***************************************************************************=
****

This email message is for the sole use of the intended recipient(s)and may=
 contain CONFIDENTIAL and PRIVILEGED information.
LG Soft India will not be responsible for any viruses or defects or any=
 forwarded attachments emanating either from within=0D
LG Soft India or outside. Any unauthorized review, use, disclosure or=
 distribution is prohibited. If you are not the intended=0D
recipient, please contact the sender By reply email and destroy all copies=
 of the original message.

***************************************************************************=
***************************************************************************=
****

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Fri Apr  8 03:38:36 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA14238
	for <ipsec-archive@lists.ietf.org>; Fri, 8 Apr 2005 03:38:36 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJo1u-0000c0-V4; Fri, 08 Apr 2005 03:35:50 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJo1r-0000bv-Pf
	for ipsec@megatron.ietf.org; Fri, 08 Apr 2005 03:35:47 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA14040
	for <ipsec@ietf.org>; Fri, 8 Apr 2005 03:35:46 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJoAZ-0005Tr-8l
	for ipsec@ietf.org; Fri, 08 Apr 2005 03:44:48 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j387ZTWD013656
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Fri, 8 Apr 2005 10:35:29 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j387ZSv8013653;
	Fri, 8 Apr 2005 10:35:29 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16982.13376.821491.607540@fireball.kivinen.iki.fi>
Date: Fri, 8 Apr 2005 10:35:28 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Kevin Li <kli@cisco.com>
Subject: [Ipsec] ID and subject/subject-alt  in certificate,
	match or not to match?
In-Reply-To: <4255880A.4050404@cisco.com>
References: <4255880A.4050404@cisco.com>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 6 min
X-Total-Time: 6 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: ea4ac80f790299f943f0a53be7e1a21a
Content-Transfer-Encoding: 7bit
Cc: ipsec@ietf.org
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Kevin Li writes:
> I don't see IKEv1 have such requirement (match) either from protocol 
> perspective. But certain implementation (say racoon)  may insist such a 
> match.

Yes. That is true, for some reason lots of people required them to
match exactly, and didn't allow configuring any function or lookup
table between them.

> Does it mean that:
> In reality, we have to ensure our id payload matched with subject/alt in 
> certificate in order to interop?

In the RFC2401bis we now have PAD that will provide mapping from IKE
ID to the authentication data, including instructions how to find the
certificate. That PAD entry can also say that ID MUST match the
certificate, or it can say there can be some more complicated matching
done i.e. lookup from table to convert ID to name to search from
certificate, or subtree match etc...

> What's the general concensus on this (match or not to match)?
> I think this should be configurable instead of hardcoding the match if 
> people really want it.

It should be configurable, and one of the options MUST be to do exact
match. Other options are left more or less open, i.e. implementations
can implement other means of doing matching, depending what they want
and need. 
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Fri Apr  8 04:05:32 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA16354
	for <ipsec-archive@lists.ietf.org>; Fri, 8 Apr 2005 04:05:32 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DJoNu-0003n8-2f; Fri, 08 Apr 2005 03:58:34 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DJoNp-0003mq-Qa
	for ipsec@megatron.ietf.org; Fri, 08 Apr 2005 03:58:30 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA15804
	for <ipsec@ietf.org>; Fri, 8 Apr 2005 03:58:28 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DJoWY-0006On-2A
	for ipsec@ietf.org; Fri, 08 Apr 2005 04:07:30 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j387wJhV013816
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Fri, 8 Apr 2005 10:58:19 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j387wH9D013812;
	Fri, 8 Apr 2005 10:58:17 +0300 (EEST)
MIME-Version: 1.0
Message-ID: <16982.14745.711102.208353@fireball.kivinen.iki.fi>
Date: Fri, 8 Apr 2005 10:58:17 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: "Soumya Sen" <soumya.sen@lgsoftindia.com>
Subject: RE: [Ipsec] Questions about internal address
In-Reply-To: <EC9E4C8E76FEF944B5C0711496A107280161E5D1@APPOLO.lgdomain.com>
References: <EC9E4C8E76FEF944B5C0711496A107280161E5D1@APPOLO.lgdomain.com>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 4 min
X-Total-Time: 3 min
X-Spam-Score: 2.2 (++)
X-Scan-Signature: 9182cfff02fae4f1b6e9349e01d62f32
Cc: ipsec@ietf.org, Yoav Nir <ynir@checkpoint.com>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0329683097=="
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

--===============0329683097==
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: base64
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--===============0329683097==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec

--===============0329683097==--


From ipsec-bounces@ietf.org  Sun Apr 10 12:11:54 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA29510
	for <ipsec-archive@lists.ietf.org>; Sun, 10 Apr 2005 12:11:54 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DKeqU-0001ZU-NI; Sun, 10 Apr 2005 11:59:34 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DKeqT-0001ZL-2P
	for ipsec@megatron.ietf.org; Sun, 10 Apr 2005 11:59:33 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA28665
	for <ipsec@ietf.org>; Sun, 10 Apr 2005 11:59:30 -0400 (EDT)
Received: from above.proper.com ([208.184.76.39])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DKezd-0003xD-7k
	for ipsec@ietf.org; Sun, 10 Apr 2005 12:09:03 -0400
Received: from [10.20.30.249] (dsl2-63-249-109-245.cruzio.com [63.249.109.245])
	(authenticated bits=0)
	by above.proper.com (8.12.11/8.12.9) with ESMTP id j3AFxQVm024978;
	Sun, 10 Apr 2005 08:59:28 -0700 (PDT)
	(envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06210216be7efd8905ba@[10.20.30.249]>
In-Reply-To: <16981.6410.971961.170256@fireball.kivinen.iki.fi>
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsof
	t.com>	<d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
	<16981.6410.971961.170256@fireball.kivinen.iki.fi>
Date: Sun, 10 Apr 2005 08:59:24 -0700
To: Tero Kivinen <kivinen@iki.fi>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [Ipsec] Questions about internal address
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9182cfff02fae4f1b6e9349e01d62f32
Cc: IPsec WG <ipsec@ietf.org>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

At 2:27 PM +0300 4/7/05, Tero Kivinen wrote:
>Yoav Nir writes:
>>  2. Section 4 refers to renewal before the ADDRESS_EXPIRY elapses.  How
>
>And note also that ADDRESS_EXPIRY is optional to implement for the
>server, server can simply refuse to give them out, and client can
>simply not request it. Clients MUST understand if it replied to them,
>but that is all.

I'm not sure what you mean by "optional to implement for the server". 
The IKEv2 document says:

    A minimal IPv4 initiator will generate a CP payload containing only
    an INTERNAL_IP4_ADDRESS attribute and will parse the response
    ignoring attributes it does not know how to use. The only attribute
    it MUST be able to process is INTERNAL_ADDRESS_EXPIRY, which it must
    use to bound the lifetime of the SA unless it successfully renews the
    lease before it expires. Minimal initiators need not be able to
    request lease renewals and minimal responders need not respond to
    them.

That doesn't sound optional to me.

--Paul Hoffman, Director
--VPN Consortium

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Sun Apr 10 13:58:00 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA06499
	for <ipsec-archive@lists.ietf.org>; Sun, 10 Apr 2005 13:58:00 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DKgcq-00077T-3h; Sun, 10 Apr 2005 13:53:36 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DKgcm-00077O-BX
	for ipsec@megatron.ietf.org; Sun, 10 Apr 2005 13:53:33 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA06175
	for <ipsec@ietf.org>; Sun, 10 Apr 2005 13:53:28 -0400 (EDT)
Received: from above.proper.com ([208.184.76.39])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DKglw-0007dS-Fy
	for ipsec@ietf.org; Sun, 10 Apr 2005 14:03:01 -0400
Received: from [10.20.30.249] (dsl2-63-249-109-245.cruzio.com [63.249.109.245])
	(authenticated bits=0)
	by above.proper.com (8.12.11/8.12.9) with ESMTP id j3AHrOAj035219
	for <ipsec@ietf.org>; Sun, 10 Apr 2005 10:53:26 -0700 (PDT)
	(envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p0621021dbe7f16d8f46a@[10.20.30.249]>
In-Reply-To: <16978.33154.351915.320602@fireball.kivinen.iki.fi>
References: <16978.33154.351915.320602@fireball.kivinen.iki.fi>
Date: Sun, 10 Apr 2005 10:53:20 -0700
To: ipsec@ietf.org
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 769a46790fb42fbb0b0cc700c82f7081
Subject: [Ipsec] Clarifying the use of INITIAL_CONTACT in IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Greetings again. In the IKEv2 clarifications document, Pasi and I say:

6.12  Which message should contain INITIAL_CONTACT

    The description of the INITIAL_CONTACT notification in Section 3.10.1
    says that "This notification asserts that this IKE_SA is the only
    IKE_SA currently active between the authenticated identities".
    However, neither Section 2.4 nor 3.10.1 says in which message this
    payload should be placed.

    The text does talk about authenticated identities, so it seems the
    notification cannot be sent before both endpoints have been
    authenticated.  Thus, the possible places are the last IKE_AUTH
    response message and a separate Informational exchange.

    Based on how this was implemented in IKEv1, it seems the intent was
    to use a separate Informational exchange.

Tero responded:

>Initiator usually knows to whom is is supposed to talk to and he knows
>weather he has SA with him before or not (if he had IKE SA he would
>have used it, or he had some other reason not to use it).
>
>So it means that initiator can send INITIAL_CONTACT in IKE_AUTH and
>responder can respond to that in the same packet. I would actually
>prefer that instead of using separate informational exchange.
>
>>    Based on how this was implemented in IKEv1, it seems the intent was
>>    to use a separate Informational exchange.
>
>In IKEv1 it was supposed to be sent inside the main mode, but as the
>extra payloads are not authenticated there, some implementations use
>separate informational exchange for it. For IKEv1 it was actually very
>bad idea to use separate informational exchange as they were not
>reliable.

I tend to agree with Tero: the INITIAL_CONTACT dance is probably best 
done during IKE_AUTH, not afterwards. We can ignore what was done, or 
supposed to be done, in IKEv1, since this part of the exchanges in 
IKEv2 is structured quite differently.

Does anyone have a problem with us suggesting that INITIAL_CONTACT 
should be communicated during IKE_AUTH, not as a separate exchange 
after the IKE_SA (and probably the CHILD_SA) is set up?

--Paul Hoffman, Director
--VPN Consortium

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Mon Apr 11 00:21:12 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA18459
	for <ipsec-archive@lists.ietf.org>; Mon, 11 Apr 2005 00:21:11 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DKqLz-0006JU-9i; Mon, 11 Apr 2005 00:16:51 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DKqLv-0006JO-Ec
	for ipsec@megatron.ietf.org; Mon, 11 Apr 2005 00:16:49 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA18011
	for <ipsec@ietf.org>; Mon, 11 Apr 2005 00:16:44 -0400 (EDT)
Received: from michael.checkpoint.com ([194.29.32.68]
	helo=michael2.checkpoint.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DKqVD-0002uK-1l
	for ipsec@ietf.org; Mon, 11 Apr 2005 00:26:24 -0400
Received: from [194.29.46.218] (localhost [127.0.0.1])
	by michael2.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id
	j3B4G9wx028807; Mon, 11 Apr 2005 07:16:09 +0300 (IDT)
In-Reply-To: <p06210216be7efd8905ba@[10.20.30.249]>
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsof
	t.com>	<d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
	<16981.6410.971961.170256@fireball.kivinen.iki.fi>
	<p06210216be7efd8905ba@[10.20.30.249]>
Mime-Version: 1.0 (Apple Message framework v619.2)
Content-Type: text/plain; charset=US-ASCII; format=flowed
Message-Id: <71212b742ecf7f72e4392b87c311341e@checkpoint.com>
Content-Transfer-Encoding: 7bit
From: Yoav Nir <ynir@checkpoint.com>
Subject: Re: [Ipsec] Questions about internal address
Date: Mon, 11 Apr 2005 07:16:34 +0300
To: Paul Hoffman <paul.hoffman@vpnc.org>
X-Mailer: Apple Mail (2.619.2)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: ea4ac80f790299f943f0a53be7e1a21a
Content-Transfer-Encoding: 7bit
Cc: IPsec WG <ipsec@ietf.org>, Tero Kivinen <kivinen@iki.fi>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

On Apr 10, 2005, at 6:59 PM, Paul Hoffman wrote:

> At 2:27 PM +0300 4/7/05, Tero Kivinen wrote:
>> Yoav Nir writes:
>>>  2. Section 4 refers to renewal before the ADDRESS_EXPIRY elapses.  
>>> How
>>
>> And note also that ADDRESS_EXPIRY is optional to implement for the
>> server, server can simply refuse to give them out, and client can
>> simply not request it. Clients MUST understand if it replied to them,
>> but that is all.
>
> I'm not sure what you mean by "optional to implement for the server". 
> The IKEv2 document says:
>
>    A minimal IPv4 initiator will generate a CP payload containing only
>    an INTERNAL_IP4_ADDRESS attribute and will parse the response
>    ignoring attributes it does not know how to use. The only attribute
>    it MUST be able to process is INTERNAL_ADDRESS_EXPIRY, which it must
>    use to bound the lifetime of the SA unless it successfully renews 
> the
>    lease before it expires. Minimal initiators need not be able to
>    request lease renewals and minimal responders need not respond to
>    them.
>
> That doesn't sound optional to me.

It is not optional for the initiator (=client), but it is optional for 
the responder (=server)


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Mon Apr 11 06:25:08 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA29353
	for <ipsec-archive@lists.ietf.org>; Mon, 11 Apr 2005 06:25:08 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DKvel-0004an-Oz; Mon, 11 Apr 2005 05:56:35 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DKvek-0004Yi-0b
	for ipsec@megatron.ietf.org; Mon, 11 Apr 2005 05:56:34 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA27603
	for <ipsec@ietf.org>; Mon, 11 Apr 2005 05:56:25 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DKvo0-0002a2-Ik
	for ipsec@ietf.org; Mon, 11 Apr 2005 06:06:09 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j3B9uL5F021748
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Mon, 11 Apr 2005 12:56:22 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j3B9uKRZ021745;
	Mon, 11 Apr 2005 12:56:20 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16986.18884.429516.592143@fireball.kivinen.iki.fi>
Date: Mon, 11 Apr 2005 12:56:20 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [Ipsec] Questions about internal address
In-Reply-To: <p06210216be7efd8905ba@[10.20.30.249]>
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsof
	t.com> <d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
	<16981.6410.971961.170256@fireball.kivinen.iki.fi>
	<p06210216be7efd8905ba@[10.20.30.249]>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 3 min
X-Total-Time: 3 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: ffa9dfbbe7cc58b3fa6b8ae3e57b0aa3
Content-Transfer-Encoding: 7bit
Cc: IPsec WG <ipsec@ietf.org>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Paul Hoffman writes:
> I'm not sure what you mean by "optional to implement for the server". 
> The IKEv2 document says:
> 
>     A minimal IPv4 initiator will generate a CP payload containing only
>     an INTERNAL_IP4_ADDRESS attribute and will parse the response
>     ignoring attributes it does not know how to use. The only attribute
>     it MUST be able to process is INTERNAL_ADDRESS_EXPIRY, which it must
>     use to bound the lifetime of the SA unless it successfully renews the
>     lease before it expires. Minimal initiators need not be able to
>     request lease renewals and minimal responders need not respond to
>     them.
> 
> That doesn't sound optional to me.

It is not optional to initiator (client). Client must process it if
server sends it. Server can ignore requests to it, and it can simply
never send it. So for server it is optional, as can be seen from here:

   A minimal IPv4 responder implementation will ignore the contents of
   the CP payload except to determine that it includes an
   INTERNAL_IP4_ADDRESS attribute and will respond with the address and
   other related attributes regardless of whether the initiator
   requested them.
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Mon Apr 11 12:54:35 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA29164
	for <ipsec-archive@lists.ietf.org>; Mon, 11 Apr 2005 12:54:35 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DL1vH-0002xq-5y; Mon, 11 Apr 2005 12:38:03 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DL1vG-0002pH-8G
	for ipsec@megatron.ietf.org; Mon, 11 Apr 2005 12:38:02 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA22522
	for <ipsec@ietf.org>; Mon, 11 Apr 2005 11:36:14 -0400 (EDT)
Received: from above.proper.com ([208.184.76.39])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DL13a-0003G6-3E
	for ipsec@ietf.org; Mon, 11 Apr 2005 11:42:35 -0400
Received: from [10.20.30.249] (dsl2-63-249-109-245.cruzio.com [63.249.109.245])
	(authenticated bits=0)
	by above.proper.com (8.12.11/8.12.9) with ESMTP id j3BFWm97015590;
	Mon, 11 Apr 2005 08:32:49 -0700 (PDT)
	(envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p0621020bbe8048f5f7c2@[10.20.30.249]>
In-Reply-To: <16986.18884.429516.592143@fireball.kivinen.iki.fi>
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsof
	t.com> <d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
	<16981.6410.971961.170256@fireball.kivinen.iki.fi>
	<p06210216be7efd8905ba@[10.20.30.249]>
	<16986.18884.429516.592143@fireball.kivinen.iki.fi>
Date: Mon, 11 Apr 2005 08:32:44 -0700
To: Tero Kivinen <kivinen@iki.fi>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [Ipsec] Questions about internal address
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: ea4ac80f790299f943f0a53be7e1a21a
Cc: IPsec WG <ipsec@ietf.org>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

At 12:56 PM +0300 4/11/05, Tero Kivinen wrote:
>Paul Hoffman writes:
>>  I'm not sure what you mean by "optional to implement for the server".
>>  The IKEv2 document says:
>>
>>      A minimal IPv4 initiator will generate a CP payload containing only
>>      an INTERNAL_IP4_ADDRESS attribute and will parse the response
>>      ignoring attributes it does not know how to use. The only attribute
>>      it MUST be able to process is INTERNAL_ADDRESS_EXPIRY, which it must
>>      use to bound the lifetime of the SA unless it successfully renews the
>>      lease before it expires. Minimal initiators need not be able to
>>      request lease renewals and minimal responders need not respond to
>>      them.
>>
>>  That doesn't sound optional to me.
>
>It is not optional to initiator (client). Client must process it if
>server sends it. Server can ignore requests to it, and it can simply
>never send it. So for server it is optional, as can be seen from here:
>
>    A minimal IPv4 responder implementation will ignore the contents of
>    the CP payload except to determine that it includes an
>    INTERNAL_IP4_ADDRESS attribute and will respond with the address and
>    other related attributes regardless of whether the initiator
>    requested them.

Ah, got it. Thanks.

--Paul Hoffman, Director
--VPN Consortium

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Mon Apr 11 14:43:05 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA07811
	for <ipsec-archive@lists.ietf.org>; Mon, 11 Apr 2005 14:43:05 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DL3kV-0001vc-Bn; Mon, 11 Apr 2005 14:35:03 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DL3kS-0001se-NS
	for ipsec@megatron.ietf.org; Mon, 11 Apr 2005 14:35:01 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA07253
	for <ipsec@ietf.org>; Mon, 11 Apr 2005 14:34:50 -0400 (EDT)
Received: from aragorn.bbn.com ([128.33.0.62])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DL3tj-0000lF-3D
	for ipsec@ietf.org; Mon, 11 Apr 2005 14:44:37 -0400
Received: from [128.89.89.106] (dhcp89-089-106.bbn.com [128.89.89.106])
	by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j3BIYRvH020858;
	Mon, 11 Apr 2005 14:34:32 -0400 (EDT)
Mime-Version: 1.0
Message-Id: <p06210204be80551bc70e@[128.89.89.106]>
In-Reply-To: <71212b742ecf7f72e4392b87c311341e@checkpoint.com>
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsof
	t.com>	<d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
	<16981.6410.971961.170256@fireball.kivinen.iki.fi>
	<p06210216be7efd8905ba@[10.20.30.249]>
	<71212b742ecf7f72e4392b87c311341e@checkpoint.com>
Date: Mon, 11 Apr 2005 12:25:20 -0400
To: Yoav Nir <ynir@checkpoint.com>
From: Stephen Kent <kent@bbn.com>
Subject: Re: [Ipsec] Questions about internal address
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41
X-Virus-Status: Clean
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 97adf591118a232206bdb5a27b217034
Cc: IPsec WG <ipsec@ietf.org>, Paul Hoffman <paul.hoffman@vpnc.org>,
        Tero Kivinen <kivinen@iki.fi>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

At 7:16 AM +0300 4/11/05, Yoav Nir wrote:
>On Apr 10, 2005, at 6:59 PM, Paul Hoffman wrote:
>
>>At 2:27 PM +0300 4/7/05, Tero Kivinen wrote:
>>>Yoav Nir writes:
>>>>  2. Section 4 refers to renewal before the ADDRESS_EXPIRY elapses.  How
>>>
>>>And note also that ADDRESS_EXPIRY is optional to implement for the
>>>server, server can simply refuse to give them out, and client can
>>>simply not request it. Clients MUST understand if it replied to them,
>>>but that is all.
>>
>>I'm not sure what you mean by "optional to implement for the 
>>server". The IKEv2 document says:
>>
>>    A minimal IPv4 initiator will generate a CP payload containing only
>>    an INTERNAL_IP4_ADDRESS attribute and will parse the response
>>    ignoring attributes it does not know how to use. The only attribute
>>    it MUST be able to process is INTERNAL_ADDRESS_EXPIRY, which it must
>>    use to bound the lifetime of the SA unless it successfully renews the
>>    lease before it expires. Minimal initiators need not be able to
>>    request lease renewals and minimal responders need not respond to
>>    them.
>>
>>That doesn't sound optional to me.
>
>It is not optional for the initiator (=client), but it is optional 
>for the responder (=server)

Remember that IPsec is a peer protocol and thus has no clients not 
servers.  The terms "initiator" and "responder" were chosen for use 
in IKE to avoid conveying any client/server model notions ala SSL/TLS.

Steve

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Mon Apr 11 18:29:14 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA08406
	for <ipsec-archive@lists.ietf.org>; Mon, 11 Apr 2005 18:29:14 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DL7A5-0001hS-Bc; Mon, 11 Apr 2005 18:13:41 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DL7A1-0001b1-RG
	for ipsec@megatron.ietf.org; Mon, 11 Apr 2005 18:13:38 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA06807
	for <ipsec@ietf.org>; Mon, 11 Apr 2005 18:12:57 -0400 (EDT)
Received: from zcars04e.nortelnetworks.com ([47.129.242.56]
	helo=zcars04e.ca.nortel.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DL7Is-00020k-PE
	for ipsec@ietf.org; Mon, 11 Apr 2005 18:22:47 -0400
Received: from zcard303.ca.nortel.com (zcard303.ca.nortel.com [47.129.242.59])
	by zcars04e.ca.nortel.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id
	j3BMCYG16177; Mon, 11 Apr 2005 18:12:34 -0400 (EDT)
Received: from nortelnetworks.com (abrw0031.ca.nortel.com [47.9.16.101]) by
	zcard303.ca.nortel.com with SMTP (Microsoft Exchange Internet
	Mail Service Version 5.5.2653.13)
	id 2NQARCFT; Mon, 11 Apr 2005 18:12:39 -0400
Message-ID: <425AF653.358E9568@nortelnetworks.com>
Date: Mon, 11 Apr 2005 18:12:35 -0400
From: "Marcus D. Leech" <mleech@nortel.com>
X-Mailer: Mozilla 4.76 [en] (X11; U; Linux 2.4.17 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: Stephen Kent <kent@bbn.com>
Subject: Re: [Ipsec] Questions about internal address
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsof
	t.com>	<d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
	<16981.6410.971961.170256@fireball.kivinen.iki.fi>
	<p06210216be7efd8905ba@[10.20.30.249]>
	<71212b742ecf7f72e4392b87c311341e@checkpoint.com>
	<p06210204be80551bc70e@[128.89.89.106]>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9182cfff02fae4f1b6e9349e01d62f32
Content-Transfer-Encoding: 7bit
Cc: IPsec WG <ipsec@ietf.org>, Yoav Nir <ynir@checkpoint.com>,
        Paul Hoffman <paul.hoffman@vpnc.org>, Tero Kivinen <kivinen@iki.fi>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Stephen Kent wrote:
> 

> >It is not optional for the initiator (=client), but it is optional
> >for the responder (=server)
> 
> Remember that IPsec is a peer protocol and thus has no clients not
> servers.  The terms "initiator" and "responder" were chosen for use
> in IKE to avoid conveying any client/server model notions ala SSL/TLS.
> 
> Steve
> 

In this particular case (which looks to me like the "roadwarrior" case), the
  semantic binding between "initiator"/"client" and
"responder"/"server"/"gateway"
  is stronger than in most other cases, and strikes me as entirely appropriate.

But maybe I'm just easily struck...

-- 
Marcus Leech                Mail:   Dept W669, M/S: 04352P16
Advisor                     Phone: (ESN) 393-9145  +1 613 763 9145
Internet & Security Services
Nortel Networks                          mleech@nortelnetworks.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Mon Apr 11 19:15:32 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA10724
	for <ipsec-archive@lists.ietf.org>; Mon, 11 Apr 2005 19:15:32 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DL85z-00030b-Dk; Mon, 11 Apr 2005 19:13:31 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DL85w-0002yd-Vw
	for ipsec@megatron.ietf.org; Mon, 11 Apr 2005 19:13:29 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA10624
	for <ipsec@ietf.org>; Mon, 11 Apr 2005 19:13:25 -0400 (EDT)
Received: from kremlin.juniper.net ([207.17.137.120])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DL8FO-0003TE-2a
	for ipsec@ietf.org; Mon, 11 Apr 2005 19:23:16 -0400
Received: from unknown (HELO gamma.jnpr.net) (172.24.245.25)
	by kremlin.juniper.net with ESMTP; 11 Apr 2005 16:13:17 -0700
X-BrightmailFiltered: true
X-Brightmail-Tracker: AAAAAA==
X-IronPort-AV: i="3.92,95,1112598000"; 
	d="scan'208"; a="288634057:sNHT21300312"
Received: from hadron.jnpr.net ([172.24.15.25]) by gamma.jnpr.net with
	Microsoft SMTPSVC(6.0.3790.211); Mon, 11 Apr 2005 16:13:17 -0700
x-mimeole: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [Ipsec] Questions about internal address
Date: Mon, 11 Apr 2005 16:13:15 -0700
Message-ID: <F07F17B61B7FF545BC7D7E4BFBE15D2ABAE776@hadron.jnpr.net>
Thread-Topic: [Ipsec] Questions about internal address
Thread-Index: AcU7d7OI3UYUXqkaQtqq6W85XQqfIADcmgHA
From: "Timothy Liu" <timliu@juniper.net>
To: "Tero Kivinen" <kivinen@iki.fi>, "Yoav Nir" <ynir@checkpoint.com>
X-OriginalArrivalTime: 11 Apr 2005 23:13:17.0087 (UTC)
	FILETIME=[0B30AAF0:01C53EEC]
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 41c17b4b16d1eedaa8395c26e9a251c4
Content-Transfer-Encoding: quoted-printable
Cc: IPsec WG <ipsec@ietf.org>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: quoted-printable

Tero,

Forgive me to butt in. This was not my interpretation when reading
the draft. On page 4:

   ... In all cases,
   all IKE_SA_INIT exchanges MUST complete before any other exchange
   type, then all IKE_AUTH exchanges MUST complete, and following that
   any number of CREATE_CHILD_SA and INFORMATIONAL exchanges may occur
   in any order.=20

My take was the IKE_AUTH has to be completed successfully and a child sa

created. I can see it is possible to interpret 'complete' as long as
the ceritificate and AUTH payload checked out to be OK. And rest of it
can fail because of a) proposal mismatch b) traffic selector c) CP
payload d) other(?). Is it too much to call IKE_AUTH complete=20
when these other payload process fail?

Tim

> -----Original Message-----
> From: ipsec-bounces@ietf.org=20
> [mailto:ipsec-bounces@ietf.org]On Behalf Of
> Tero Kivinen
> Sent: Thursday, April 07, 2005 6:39 AM
> To: Yoav Nir
> Cc: IPsec WG
> Subject: Re: [Ipsec] Questions about internal address
>=20
>=20
> Yoav Nir writes:
> > On Apr 7, 2005, at 2:25 PM, Tero Kivinen wrote:
>=20
> > This says that no CHILD_SA is created, but it does not say that no=20
> > IKE_SA is created.
>=20
> Yes, that is right. If there is any problems with the IPsec SA if the
> IKE_AUTH, you still do create the IKE SA, but simply fail the IPsec SA
> with error code. This applies to the NO_PROSAL_CHOSEN,
> SINGLE_PAIR_REQUIRED, INTERNAL_ADDRESS_FAILURE, FAILED_CP_REQUIRED,
> and TS_UNACCEPTALBE.
>=20
> The idea is that we have all the information needed to create the IKE
> SA, and we have already done the Diffie-Hellman, signature
> verification etc, so it would be wasting resources to throw all that
> away, just because there was something wrong with the IPsec SA. If the
> initiator knows how to fix the situation (add CP, change traffic
> selectors, modify algorithms etc) he can do that and initiate
> CREATE_CHILD_SA to create new SAs.
>=20
> If he cannot do anything, he can simply delete the IKE SA if he does
> not wnat to have it.=20
>=20
> > Does this mean that we have an exchange that creates an IKE_SA but
> > not a CHILD_SA?
>=20
> Yes.
>=20
> > If I understand this correctly, at this point the client is supposed
> > to start a new CCSA exchange with its own IP address.
> --=20
> kivinen@safenet-inc.com
>=20
> _______________________________________________
> Ipsec mailing list
> Ipsec@ietf.org
> https://www1.ietf.org/mailman/listinfo/ipsec
>=20

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Tue Apr 12 04:47:11 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA09426
	for <ipsec-archive@lists.ietf.org>; Tue, 12 Apr 2005 04:47:11 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DLGr8-0007U9-Nq; Tue, 12 Apr 2005 04:34:46 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DLGr5-0007Ss-Qq
	for ipsec@megatron.ietf.org; Tue, 12 Apr 2005 04:34:44 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA08705
	for <ipsec@ietf.org>; Tue, 12 Apr 2005 04:34:33 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLH0U-00011p-Lm
	for ipsec@ietf.org; Tue, 12 Apr 2005 04:44:28 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j3C8YM8E005182
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Tue, 12 Apr 2005 11:34:22 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j3C8YJCg005179;
	Tue, 12 Apr 2005 11:34:19 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16987.34826.904414.434475@fireball.kivinen.iki.fi>
Date: Tue, 12 Apr 2005 11:34:18 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Stephen Kent <kent@bbn.com>
Subject: Re: [Ipsec] Questions about internal address
In-Reply-To: <p06210204be80551bc70e@[128.89.89.106]>
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsof
	t.com> <d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>
	<16981.6410.971961.170256@fireball.kivinen.iki.fi>
	<p06210216be7efd8905ba@[10.20.30.249]>
	<71212b742ecf7f72e4392b87c311341e@checkpoint.com>
	<p06210204be80551bc70e@[128.89.89.106]>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 5 min
X-Total-Time: 6 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 798b2e660f1819ae38035ac1d8d5e3ab
Content-Transfer-Encoding: 7bit
Cc: IPsec WG <ipsec@ietf.org>, Yoav Nir <ynir@checkpoint.com>,
        Paul Hoffman <paul.hoffman@vpnc.org>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Stephen Kent writes:
> >It is not optional for the initiator (=client), but it is optional 
> >for the responder (=server)
> 
> Remember that IPsec is a peer protocol and thus has no clients not 
> servers.  The terms "initiator" and "responder" were chosen for use 
> in IKE to avoid conveying any client/server model notions ala SSL/TLS.

For configuration payloads there is client/server model to be
processed. IPsec is peer protocol, configuration payload is
client/server protocol (it is used in the remote access, where we have
server (SGW, responder, remote access server/gateway), and client
(remote access client, initiator, client etc).

I think that in remote access scenario (1.1.3 scenario) it is easier
to use remote access client and remote access server names, as it
makes things much easier. Initiator and responder might not match
client and server every time, i.e. server might initiate rekey to the
client, but client must be the one initiating the configuration
payload request to the server, if it wants to get configuration data.
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Tue Apr 12 05:34:04 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA12706
	for <ipsec-archive@lists.ietf.org>; Tue, 12 Apr 2005 05:34:04 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DLHLq-0004X8-Eq; Tue, 12 Apr 2005 05:06:30 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DLHLG-0004Te-Q2
	for ipsec@megatron.ietf.org; Tue, 12 Apr 2005 05:05:59 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA11015
	for <ipsec@ietf.org>; Tue, 12 Apr 2005 05:05:44 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLHUg-0001yG-NQ
	for ipsec@ietf.org; Tue, 12 Apr 2005 05:15:39 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j3C95e9U005460
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Tue, 12 Apr 2005 12:05:41 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j3C95ebU005457;
	Tue, 12 Apr 2005 12:05:40 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16987.36708.273335.802340@fireball.kivinen.iki.fi>
Date: Tue, 12 Apr 2005 12:05:40 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: "Timothy Liu" <timliu@juniper.net>
Subject: RE: [Ipsec] Questions about internal address
In-Reply-To: <F07F17B61B7FF545BC7D7E4BFBE15D2ABAE776@hadron.jnpr.net>
References: <F07F17B61B7FF545BC7D7E4BFBE15D2ABAE776@hadron.jnpr.net>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 8 min
X-Total-Time: 10 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 50a516d93fd399dc60588708fd9a3002
Content-Transfer-Encoding: 7bit
Cc: IPsec WG <ipsec@ietf.org>, Yoav Nir <ynir@checkpoint.com>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Timothy Liu writes:
> Forgive me to butt in. This was not my interpretation when reading
> the draft. On page 4:
> 
>    ... In all cases,
>    all IKE_SA_INIT exchanges MUST complete before any other exchange
>    type, then all IKE_AUTH exchanges MUST complete, and following that
>    any number of CREATE_CHILD_SA and INFORMATIONAL exchanges may occur
>    in any order. 
> 
> My take was the IKE_AUTH has to be completed successfully and a
> child sa created.

IKE_AUTH creates the IKE SA, so that must succeed and be finished
before we can have any other exchanges. That does not say anything
about the initial child SA created inside the IKE_AUTH.

> I can see it is possible to interpret 'complete' as long as the
> ceritificate and AUTH payload checked out to be OK.

There is some text in the draft that indicates that you could do that,
i.e. IKE_AUTH can succeed without creating the child SA in case there
was error while creating it. It would be also pointless to destroy the
IKE SA just because the first IPsec SA could not be created, as the
initiator could try next soem other IPsec SA which can be created. 

> And rest of it can fail because of a) proposal mismatch b) traffic
> selector c) CP payload d) other(?).

Yes. At least NO_PROPOSAL_CHOSEN, SINGLE_PAIR_REQUIRED,
INTERNAL_ADDRESS_FAILURE, FAILED_CP_REQUIRED, TS_UNACCEPTABLE are such
error messages.

The text in the INTERNAL_ADDRESS_FAILURE says: "If this error is
generated within an IKE_AUTH exchange no CHILD_SA will be created.",
i.e. it does not say that the whole negotiation fails, but only that
no CHILD_SA will be created.

I do remember there was other text in the draft indicating same thing,
but I cannot find it now or it might be that it was the discussion on
the list.         

> Is it too much to call IKE_AUTH complete when these other payload
> process fail?

I think the IKE_AUTH succeeded, the CREATE_CHILD_SA included in the
same packet did fail. 
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Tue Apr 12 10:48:33 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA05659
	for <ipsec-archive@lists.ietf.org>; Tue, 12 Apr 2005 10:48:33 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DLMNZ-0001lc-Je; Tue, 12 Apr 2005 10:28:37 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DLMNX-0001ks-E1
	for ipsec@megatron.ietf.org; Tue, 12 Apr 2005 10:28:35 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA04120
	for <ipsec@ietf.org>; Tue, 12 Apr 2005 10:28:24 -0400 (EDT)
Received: from aragorn.bbn.com ([128.33.0.62])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLMWz-0002Iy-5n
	for ipsec@ietf.org; Tue, 12 Apr 2005 10:38:22 -0400
Received: from [128.89.89.106] (dhcp89-089-106.bbn.com [128.89.89.106])
	by aragorn.bbn.com (8.12.7/8.12.7) with ESMTP id j3CES8vH000828;
	Tue, 12 Apr 2005 10:28:09 -0400 (EDT)
Mime-Version: 1.0
Message-Id: <p06210201be818723e441@[128.89.89.106]>
In-Reply-To: <425AF653.358E9568@nortelnetworks.com>
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsof
	t.com>	<d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>	
	<16981.6410.971961.170256@fireball.kivinen.iki.fi>	
	<p06210216be7efd8905ba@[10.20.30.249]>	
	<71212b742ecf7f72e4392b87c311341e@checkpoint.com>
	<p06210204be80551bc70e@[128.89.89.106]>
	<425AF653.358E9568@nortelnetworks.com>
Date: Tue, 12 Apr 2005 10:11:44 -0400
To: "Marcus D. Leech" <mleech@nortel.com>
From: Stephen Kent <kent@bbn.com>
Subject: Re: [Ipsec] Questions about internal address
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Virus-Scanned: ClamAV version 0.83, clamav-milter version 0.83 on 128.33.1.41
X-Virus-Status: Clean
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9466e0365fc95844abaf7c3f15a05c7d
Cc: IPsec WG <ipsec@ietf.org>, Yoav Nir <ynir@checkpoint.com>,
        Paul Hoffman <paul.hoffman@vpnc.org>, Tero Kivinen <kivinen@iki.fi>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

At 6:12 PM -0400 4/11/05, Marcus D. Leech wrote:
>Stephen Kent wrote:
>>
>
>>  >It is not optional for the initiator (=client), but it is optional
>>  >for the responder (=server)
>>
>>  Remember that IPsec is a peer protocol and thus has no clients not
>>  servers.  The terms "initiator" and "responder" were chosen for use
>>  in IKE to avoid conveying any client/server model notions ala SSL/TLS.
>>
>>  Steve
>>
>
>In this particular case (which looks to me like the "roadwarrior" case), the
>   semantic binding between "initiator"/"client" and
>"responder"/"server"/"gateway"
>   is stronger than in most other cases, and strikes me as entirely 
>appropriate.
>
>But maybe I'm just easily struck...

Maybe :-), but the point is that IPsec does not make special 
accommodations for client/server model interactions, unlike SSL/TLS. 
IPsec assumes a peer communication architecture; one is free to use 
it in a client/server context, but should not expect special 
accommodations for that more restrictive case.

Steve

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Tue Apr 12 12:38:03 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA13252
	for <ipsec-archive@lists.ietf.org>; Tue, 12 Apr 2005 12:38:03 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DLNxq-0000Lk-Mz; Tue, 12 Apr 2005 12:10:10 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DLNxo-0000Le-RL
	for ipsec@megatron.ietf.org; Tue, 12 Apr 2005 12:10:09 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA11166
	for <ipsec@ietf.org>; Tue, 12 Apr 2005 12:10:05 -0400 (EDT)
Received: from sj-iport-1-in.cisco.com ([171.71.176.70]
	helo=sj-iport-1.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DLO7P-0005GU-Oy
	for ipsec@ietf.org; Tue, 12 Apr 2005 12:20:05 -0400
Received: from sj-core-2.cisco.com (171.71.177.254)
	by sj-iport-1.cisco.com with ESMTP; 12 Apr 2005 09:09:24 -0700
X-IronPort-AV: i="3.92,96,1112598000"; 
	d="scan'208"; a="628115420:sNHT1682514172"
Received: from mira-sjc5-b.cisco.com (IDENT:mirapoint@mira-sjc5-b.cisco.com
	[171.71.163.14])
	by sj-core-2.cisco.com (8.12.10/8.12.6) with ESMTP id j3CG9GpT018477;
	Tue, 12 Apr 2005 09:09:16 -0700 (PDT)
Received: from ghuangx31 (dhcp-128-107-163-169.cisco.com [128.107.163.169])
	by mira-sjc5-b.cisco.com (MOS 3.4.5-GR) with ESMTP id BDW42986;
	Tue, 12 Apr 2005 09:09:20 -0700 (PDT)
Message-Id: <200504121609.BDW42986@mira-sjc5-b.cisco.com>
From: "Geoffrey Huang" <ghuang@cisco.com>
To: "'Paul Hoffman'" <paul.hoffman@vpnc.org>, <ipsec@ietf.org>
Subject: RE: [Ipsec] Clarifying the use of INITIAL_CONTACT in IKEv2
Date: Tue, 12 Apr 2005 09:09:19 -0700
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook, Build 11.0.5510
In-Reply-To: <p0621021dbe7f16d8f46a@[10.20.30.249]>
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4942.400
Thread-Index: AcU99uTPADgeUvk3TJSigoeujpTyywBgwpVA
X-Spam-Score: 0.0 (/)
X-Scan-Signature: d8ae4fd88fcaf47c1a71c804d04f413d
Content-Transfer-Encoding: 7bit
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Hi Paul,

I agree with this proposal - I think it's much better to include IC as part
of the AUTH message itself.

-g

> -----Original Message-----
> From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] 
> On Behalf Of Paul Hoffman
> Sent: Sunday, April 10, 2005 10:53 AM
> To: ipsec@ietf.org
> Subject: [Ipsec] Clarifying the use of INITIAL_CONTACT in IKEv2
> 
> Greetings again. In the IKEv2 clarifications document, Pasi and I say:
> 
> 6.12  Which message should contain INITIAL_CONTACT
> 
>     The description of the INITIAL_CONTACT notification in 
> Section 3.10.1
>     says that "This notification asserts that this IKE_SA is the only
>     IKE_SA currently active between the authenticated identities".
>     However, neither Section 2.4 nor 3.10.1 says in which message this
>     payload should be placed.
> 
>     The text does talk about authenticated identities, so it seems the
>     notification cannot be sent before both endpoints have been
>     authenticated.  Thus, the possible places are the last IKE_AUTH
>     response message and a separate Informational exchange.
> 
>     Based on how this was implemented in IKEv1, it seems the 
> intent was
>     to use a separate Informational exchange.
> 
> Tero responded:
> 
> >Initiator usually knows to whom is is supposed to talk to 
> and he knows 
> >weather he has SA with him before or not (if he had IKE SA he would 
> >have used it, or he had some other reason not to use it).
> >
> >So it means that initiator can send INITIAL_CONTACT in IKE_AUTH and 
> >responder can respond to that in the same packet. I would actually 
> >prefer that instead of using separate informational exchange.
> >
> >>    Based on how this was implemented in IKEv1, it seems 
> the intent was
> >>    to use a separate Informational exchange.
> >
> >In IKEv1 it was supposed to be sent inside the main mode, but as the 
> >extra payloads are not authenticated there, some implementations use 
> >separate informational exchange for it. For IKEv1 it was 
> actually very 
> >bad idea to use separate informational exchange as they were not 
> >reliable.
> 
> I tend to agree with Tero: the INITIAL_CONTACT dance is 
> probably best done during IKE_AUTH, not afterwards. We can 
> ignore what was done, or supposed to be done, in IKEv1, since 
> this part of the exchanges in
> IKEv2 is structured quite differently.
> 
> Does anyone have a problem with us suggesting that 
> INITIAL_CONTACT should be communicated during IKE_AUTH, not 
> as a separate exchange after the IKE_SA (and probably the 
> CHILD_SA) is set up?
> 
> --Paul Hoffman, Director
> --VPN Consortium
> 
> _______________________________________________
> Ipsec mailing list
> Ipsec@ietf.org
> https://www1.ietf.org/mailman/listinfo/ipsec
> 

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Tue Apr 12 16:21:57 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA05317
	for <ipsec-archive@lists.ietf.org>; Tue, 12 Apr 2005 16:21:57 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DLRDp-0003kd-OJ; Tue, 12 Apr 2005 15:38:53 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DLRDm-0003k7-MF; Tue, 12 Apr 2005 15:38:50 -0400
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA29412;
	Tue, 12 Apr 2005 15:38:48 -0400 (EDT)
Message-Id: <200504121938.PAA29412@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: i-d-announce@ietf.org
From: Internet-Drafts@ietf.org
Date: Tue, 12 Apr 2005 15:38:48 -0400
Cc: ipsec@ietf.org
Subject: [Ipsec] I-D ACTION:draft-ietf-ipsec-ike-ecc-groups-05.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Security Protocol Working Group of the IETF.

	Title		: Additional ECC Groups For IKE
	Author(s)	: P. Panjwani, et al.
	Filename	: draft-ietf-ipsec-ike-ecc-groups-05.txt
	Pages		: 7
	Date		: 2005-4-12
	
This document describes new ECC groups for use in IKE [IKE] in
addition to the Oakley groups included therein.  These groups are
defined to align IKE with other ECC implementations and standards,
and in addition, many of them provide higher strength than the
Oakley groups. It should be noted that this document is not
self-contained.  It uses the notations and definitions of [IKE].

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ike-ecc-groups-05.txt

To remove yourself from the I-D Announcement list, send a message to 
i-d-announce-request@ietf.org with the word unsubscribe in the body of the message.  
You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce 
to change your subscription settings.


Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ipsec-ike-ecc-groups-05.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ipsec-ike-ecc-groups-05.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body; access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID: <2005-4-12161209.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ipsec-ike-ecc-groups-05.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ipsec-ike-ecc-groups-05.txt";
	site="ftp.ietf.org"; access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2005-4-12161209.I-D@ietf.org>


--OtherAccess--

--NextPart
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec

--NextPart--





From ipsec-bounces@ietf.org  Wed Apr 13 00:06:31 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA14303
	for <ipsec-archive@lists.ietf.org>; Wed, 13 Apr 2005 00:06:31 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DLZ3i-0004Di-1H; Wed, 13 Apr 2005 00:00:58 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DLZ3f-0004D9-LM
	for ipsec@megatron.ietf.org; Wed, 13 Apr 2005 00:00:55 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA13871
	for <ipsec@ietf.org>; Wed, 13 Apr 2005 00:00:52 -0400 (EDT)
Received: from michael.checkpoint.com ([194.29.32.68])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLZDM-0001rW-Gz
	for ipsec@ietf.org; Wed, 13 Apr 2005 00:10:58 -0400
Received: from [194.29.46.218] (localhost [127.0.0.1])
	by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id
	j3D3xvnP026502; Wed, 13 Apr 2005 06:59:57 +0300 (IDT)
In-Reply-To: <p06210201be818723e441@[128.89.89.106]>
References: <F5F4EC6358916448A81370AF56F211A505C8F355@RED-MSG-51.redmond.corp.microsof
	t.com>	<d129d7b55c26c6b216e66fa60601bf76@checkpoint.com>	
	<16981.6410.971961.170256@fireball.kivinen.iki.fi>	
	<p06210216be7efd8905ba@[10.20.30.249]>	
	<71212b742ecf7f72e4392b87c311341e@checkpoint.com>
	<p06210204be80551bc70e@[128.89.89.106]>
	<425AF653.358E9568@nortelnetworks.com>
	<p06210201be818723e441@[128.89.89.106]>
Mime-Version: 1.0 (Apple Message framework v619.2)
Content-Type: text/plain; charset=US-ASCII; format=flowed
Message-Id: <5cb34e71984ca9cb4278d1825506074f@checkpoint.com>
Content-Transfer-Encoding: 7bit
From: Yoav Nir <ynir@checkpoint.com>
Subject: Re: [Ipsec] Questions about internal address
Date: Wed, 13 Apr 2005 07:00:22 +0300
To: Stephen Kent <kent@bbn.com>
X-Mailer: Apple Mail (2.619.2)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 769a46790fb42fbb0b0cc700c82f7081
Content-Transfer-Encoding: 7bit
Cc: IPsec WG <ipsec@ietf.org>, "Marcus D. Leech" <mleech@nortel.com>,
        Paul Hoffman <paul.hoffman@vpnc.org>, Tero Kivinen <kivinen@iki.fi>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

As far as I can tell there are three things that break the symmetry 
between peers:
  1. Only the initiator in the initial exchange can ask for CFG
  2. Only the initiator in the initial exchange can be authenticated 
with EAP
  3. Only the initiator in the initial exchange, not the responder can 
be behind a NAT device

The first two are very specific to "roadwarrior" or "work-from-home".  
The third might also apply to small networks using broadband.  Having 
these three things in IKE means that there is a difference between the 
peers.  Perhaps we need some term to differentiate between the original 
initiator and the original responder.

On Apr 12, 2005, at 5:11 PM, Stephen Kent wrote:

> At 6:12 PM -0400 4/11/05, Marcus D. Leech wrote:
>> Stephen Kent wrote:
>>>
>>
>>>  >It is not optional for the initiator (=client), but it is optional
>>>  >for the responder (=server)
>>>
>>>  Remember that IPsec is a peer protocol and thus has no clients not
>>>  servers.  The terms "initiator" and "responder" were chosen for use
>>>  in IKE to avoid conveying any client/server model notions ala 
>>> SSL/TLS.
>>>
>>>  Steve
>>>
>>
>> In this particular case (which looks to me like the "roadwarrior" 
>> case), the
>>   semantic binding between "initiator"/"client" and
>> "responder"/"server"/"gateway"
>>   is stronger than in most other cases, and strikes me as entirely 
>> appropriate.
>>
>> But maybe I'm just easily struck...
>
> Maybe :-), but the point is that IPsec does not make special 
> accommodations for client/server model interactions, unlike SSL/TLS. 
> IPsec assumes a peer communication architecture; one is free to use it 
> in a client/server context, but should not expect special 
> accommodations for that more restrictive case.
>
> Steve


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Wed Apr 13 00:27:12 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA16129
	for <ipsec-archive@lists.ietf.org>; Wed, 13 Apr 2005 00:27:11 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DLZJD-00076W-Cc; Wed, 13 Apr 2005 00:16:59 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DLZJB-00075p-92
	for ipsec@megatron.ietf.org; Wed, 13 Apr 2005 00:16:57 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA15051
	for <ipsec@ietf.org>; Wed, 13 Apr 2005 00:16:48 -0400 (EDT)
Received: from michael.checkpoint.com ([194.29.32.68])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLZSn-0002G6-7Y
	for ipsec@ietf.org; Wed, 13 Apr 2005 00:26:54 -0400
Received: from [194.29.46.218] (localhost [127.0.0.1])
	by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id
	j3D4GCnP000799; Wed, 13 Apr 2005 07:16:13 +0300 (IDT)
In-Reply-To: <16987.36708.273335.802340@fireball.kivinen.iki.fi>
References: <F07F17B61B7FF545BC7D7E4BFBE15D2ABAE776@hadron.jnpr.net>
	<16987.36708.273335.802340@fireball.kivinen.iki.fi>
Mime-Version: 1.0 (Apple Message framework v619.2)
Content-Type: text/plain; charset=US-ASCII; format=flowed
Message-Id: <1a9d8e8756c9d1c71b5388385fc6b59b@checkpoint.com>
Content-Transfer-Encoding: 7bit
From: Yoav Nir <ynir@checkpoint.com>
Subject: Re: [Ipsec] Questions about internal address
Date: Wed, 13 Apr 2005 07:16:37 +0300
To: Tero Kivinen <kivinen@iki.fi>
X-Mailer: Apple Mail (2.619.2)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9ed51c9d1356100bce94f1ae4ec616a9
Content-Transfer-Encoding: 7bit
Cc: IPsec WG <ipsec@ietf.org>, Pasi.Eronen@nokia.com
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

On Apr 12, 2005, at 12:05 PM, Tero Kivinen wrote:
>
> There is some text in the draft that indicates that you could do that,
> i.e. IKE_AUTH can succeed without creating the child SA in case there
> was error while creating it. It would be also pointless to destroy the
> IKE SA just because the first IPsec SA could not be created, as the
> initiator could try next soem other IPsec SA which can be created.
>
>> And rest of it can fail because of a) proposal mismatch b) traffic
>> selector c) CP payload d) other(?).
>
> Yes. At least NO_PROPOSAL_CHOSEN, SINGLE_PAIR_REQUIRED,
> INTERNAL_ADDRESS_FAILURE, FAILED_CP_REQUIRED, TS_UNACCEPTABLE are such
> error messages.
>
> The text in the INTERNAL_ADDRESS_FAILURE says: "If this error is
> generated within an IKE_AUTH exchange no CHILD_SA will be created.",
> i.e. it does not say that the whole negotiation fails, but only that
> no CHILD_SA will be created.
>
> I do remember there was other text in the draft indicating same thing,
> but I cannot find it now or it might be that it was the discussion on
> the list.

This is an interesting point, and I think it should be described in the 
clarifications draft.  Until now I assumed that since the child-SA and 
IKE-SA are negotiated in the same exchange, they either succeed 
together or fail together.  So is this a valid exchange?

        Initiator                          Responder
       -----------                        -----------
        HDR, SAi1, KEi, Ni   -->

                             <--    HDR, SAr1, KEr, Nr, [CERTREQ]

        HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,]
                   AUTH, SAi2, TSi, TSr}     -->


                             <--    HDR, SK {IDr, [CERT,] AUTH,
                                          N(NO_PROPOSAL_CHOSEN)}



_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Wed Apr 13 07:33:49 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA16778
	for <ipsec-archive@lists.ietf.org>; Wed, 13 Apr 2005 07:33:49 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DLfzY-0004Sg-Qp; Wed, 13 Apr 2005 07:25:08 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DLfzW-0004R4-SO
	for ipsec@megatron.ietf.org; Wed, 13 Apr 2005 07:25:06 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA15984
	for <ipsec@ietf.org>; Wed, 13 Apr 2005 07:24:56 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLg9A-0003kf-I6
	for ipsec@ietf.org; Wed, 13 Apr 2005 07:35:05 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j3DBOjcX024602
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Wed, 13 Apr 2005 14:24:45 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j3DBOgA2024599;
	Wed, 13 Apr 2005 14:24:42 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <16989.378.586050.717026@fireball.kivinen.iki.fi>
Date: Wed, 13 Apr 2005 14:24:42 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Yoav Nir <ynir@checkpoint.com>
Subject: Re: [Ipsec] Questions about internal address
In-Reply-To: <1a9d8e8756c9d1c71b5388385fc6b59b@checkpoint.com>
References: <F07F17B61B7FF545BC7D7E4BFBE15D2ABAE776@hadron.jnpr.net>
	<16987.36708.273335.802340@fireball.kivinen.iki.fi>
	<1a9d8e8756c9d1c71b5388385fc6b59b@checkpoint.com>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 7 min
X-Total-Time: 6 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: a7d6aff76b15f3f56fcb94490e1052e4
Content-Transfer-Encoding: 7bit
Cc: IPsec WG <ipsec@ietf.org>, Pasi.Eronen@nokia.com
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Yoav Nir writes:
> This is an interesting point, and I think it should be described in the 
> clarifications draft.  Until now I assumed that since the child-SA and 
> IKE-SA are negotiated in the same exchange, they either succeed 
> together or fail together.  So is this a valid exchange?
> 
>         Initiator                          Responder
>        -----------                        -----------
>         HDR, SAi1, KEi, Ni   -->
> 
>                              <--    HDR, SAr1, KEr, Nr, [CERTREQ]
> 
>         HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,]
>                    AUTH, SAi2, TSi, TSr}     -->
> 
> 
>                              <--    HDR, SK {IDr, [CERT,] AUTH,
>                                           N(NO_PROPOSAL_CHOSEN)}

I didn't implement this first, and then someone pointed out me that
this should be accepted (don't remember who, where and how), so I
added this feature just before interop meeting to our code...

I do remember that I did check that myself from the draft and found
out some text there that indicated that it would be acceptable, and
that was the reason I added that code. I couldn't find the text now
when I was searching for it...

This needs to be addressed in the clarifications draft, and I think as
there is cases where the first exchange fails, but later ones can
succeed, it would be waste of resources to do diffie-hellman and
authentication again after each failed negotiation.

Valid cases could be like, the other end has policy from IP1 to IP2,
and the other end has policy of TCP from IP1 to TCP from IP2. Now if
the initiator initiates with the ICMP packet the responder cannot
narrow down the traffic selectors, but he can create IKE SA. When the
initiator tries again with some tcp traffic that will succeed (I used
this as an example as this happend to be exactly the case I was
checking few hours ago in our test lab).
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Wed Apr 13 12:53:18 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA13091
	for <ipsec-archive@lists.ietf.org>; Wed, 13 Apr 2005 12:53:18 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DLknH-0007fS-D9; Wed, 13 Apr 2005 12:32:47 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DLknD-0007el-4Z; Wed, 13 Apr 2005 12:32:43 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA11482;
	Wed, 13 Apr 2005 12:32:40 -0400 (EDT)
Received: from [132.151.6.50] (helo=newodin.ietf.org)
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DLkx2-0003rH-3a; Wed, 13 Apr 2005 12:42:52 -0400
Received: from apache by newodin.ietf.org with local (Exim 4.43)
	id 1DLknB-00063t-Ks; Wed, 13 Apr 2005 12:32:41 -0400
X-test-idtracker: no
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Message-Id: <E1DLknB-00063t-Ks@newodin.ietf.org>
Date: Wed, 13 Apr 2005 12:32:41 -0400
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 93238566e09e6e262849b4f805833007
Cc: ipsec mailing list <ipsec@ietf.org>, ipsec chair <tytso@mit.edu>,
        Internet Architecture Board <iab@iab.org>,
        ipsec chair <byfraser@cisco.com>,
        RFC Editor <rfc-editor@rfc-editor.org>
Subject: [Ipsec] Protocol Action: 'Security Architecture for the Internet 
 Protocol' to Proposed Standard 
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

The IESG has approved the following document:

- 'Security Architecture for the Internet Protocol '
   <draft-ietf-ipsec-rfc2401bis-06.txt> as a Proposed Standard

This document is the product of the IP Security Protocol Working Group. 

The IESG contact persons are Russ Housley and Sam Hartman.

Technical Summary

  This document describes an updated version of the "Security
  Architecture for IP," which is designed to provide security services
  for traffic at the IP layer.  This document obsoletes RFC 2401
  (November 1998).

Working Group Summary

  The IPsec WG achieved consensus on this document.

Protocol Quality

  This document was reviewed by Russ Housley for the IESG.


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Wed Apr 13 18:56:37 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA15928
	for <ipsec-archive@lists.ietf.org>; Wed, 13 Apr 2005 18:56:37 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DLqXD-0001n2-2l; Wed, 13 Apr 2005 18:40:35 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DLqXA-0001mn-Vb
	for ipsec@megatron.ietf.org; Wed, 13 Apr 2005 18:40:33 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA14607
	for <ipsec@ietf.org>; Wed, 13 Apr 2005 18:40:22 -0400 (EDT)
Received: from thunk.org ([69.25.196.29] helo=thunker.thunk.org)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLqgu-0006oO-2t
	for ipsec@ietf.org; Wed, 13 Apr 2005 18:50:37 -0400
Received: from root (helo=thunk.org)
	by thunker.thunk.org with local-esmtp   (Exim 3.35 #1 (Debian))
	id 1DLqWa-0002fB-00; Wed, 13 Apr 2005 18:39:57 -0400
Received: from tytso by thunk.org with local (Exim 4.50)
	id 1DLqWY-0001cf-BO; Wed, 13 Apr 2005 18:39:54 -0400
Date: Wed, 13 Apr 2005 18:39:54 -0400
From: "Theodore Ts'o" <tytso@mit.edu>
To: Russ Housley <housley@vigilsec.com>
Subject: Re: [Ipsec] Re: Results of straw poll regarding: IKEv2
	interoperability issue
Message-ID: <20050413223954.GB6183@thunk.org>
References: <E1DB0GA-00040P-Ox@thunk.org>
	<6.2.0.14.2.20050315100106.0624c8e0@mail.binhost.com>
	<20050406145659.GA20093@thunk.org>
	<6.2.0.14.2.20050406112358.04690910@mail.binhost.com>
	<16981.3625.976427.270687@fireball.kivinen.iki.fi>
	<6.2.0.14.2.20050407150511.06108900@mail.binhost.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <6.2.0.14.2.20050407150511.06108900@mail.binhost.com>
User-Agent: Mutt/1.5.8i
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7d33c50f3756db14428398e2bdedd581
Cc: ipsec@ietf.org, Charlie Kaufman <charliek@microsoft.com>,
        Barbara Fraser <byfraser@cisco.com>, Tero Kivinen <kivinen@iki.fi>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

On Thu, Apr 07, 2005 at 03:06:49PM -0400, Russ Housley wrote:
> All:
> 
> This is sufficiently small.
> 
> Ted & Barbara:
> 
> Now, I need to confirm that this is the WG consensus.
> 
> Once you have done so, please send me a formal request, formatted like AUTH 
> 48 input to the RFC Editor.

ACK.  Based on the discussion on the wg mailing list, and straw poll
conducted a few weeks ago, we believe this is indeed the WG consensus.

I note that 2401bis has been approved by the IESG and sent to the RFC
editor, but it has not yet appeared in the RFC editor's queue.  When
it does appear, I will send a note to the RFC editor and cc you.
Please let me know if you'd like us to follow some different process.

						- Ted

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr 14 07:47:55 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA02969
	for <ipsec-archive@lists.ietf.org>; Thu, 14 Apr 2005 07:47:55 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DM2en-0008JC-3O; Thu, 14 Apr 2005 07:37:13 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DM2ek-0008Il-NL
	for ipsec@megatron.ietf.org; Thu, 14 Apr 2005 07:37:10 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA02173
	for <ipsec@ietf.org>; Thu, 14 Apr 2005 07:37:01 -0400 (EDT)
From: Pasi.Eronen@nokia.com
Received: from mgw-x4.nokia.com ([131.228.20.27])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DM2ob-0002WJ-E5
	for ipsec@ietf.org; Thu, 14 Apr 2005 07:47:22 -0400
Received: from esdks001.ntc.nokia.com (esdks001.ntc.nokia.com [172.21.138.120])
	by mgw-x4.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id
	j3EBawl23919
	for <ipsec@ietf.org>; Thu, 14 Apr 2005 14:36:59 +0300 (EET DST)
X-Scanned: Thu, 14 Apr 2005 14:55:11 +0300 Nokia Message Protector V1.3.34
	2004121512 - RELEASE
Received: (from root@localhost)
	by esdks001.ntc.nokia.com (8.12.9/8.12.9) id j3EBtB45027531
	for <ipsec@ietf.org>; Thu, 14 Apr 2005 14:55:11 +0300
Received: from mgw-int1.ntc.nokia.com (172.21.143.96)
	by esdks001.ntc.nokia.com 00AWbl8Y; Thu, 14 Apr 2005 14:55:09 EEST
Received: from esebh001.NOE.Nokia.com (esebh001.ntc.nokia.com [172.21.138.28])
	by mgw-int1.ntc.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id
	j3EBYWM23469
	for <ipsec@ietf.org>; Thu, 14 Apr 2005 14:34:32 +0300 (EET DST)
Received: from esebh005.NOE.Nokia.com ([172.21.138.86]) by
	esebh001.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); 
	Thu, 14 Apr 2005 14:33:42 +0300
Received: from esebe016.NOE.Nokia.com ([172.21.138.55]) by
	esebh005.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); 
	Thu, 14 Apr 2005 14:33:42 +0300
Received: from esebe105.NOE.Nokia.com ([172.21.143.53]) by
	esebe016.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); 
	Thu, 14 Apr 2005 14:33:42 +0300
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [Ipsec] Comments of draft-eronen-ipsec-ikev2-clarifications-02.txt
Date: Thu, 14 Apr 2005 14:33:42 +0300
Message-ID: <B356D8F434D20B40A8CEDAEC305A1F240C5E68@esebe105.NOE.Nokia.com>
Thread-Topic: [Ipsec] Comments of
	draft-eronen-ipsec-ikev2-clarifications-02.txt
thread-index: AcU7YSSpn9VmBIu1QGyfwPlgL+jmhAFg1n/A
To: <kivinen@iki.fi>, <paul.hoffman@vpnc.org>, <ipsec@ietf.org>
X-OriginalArrivalTime: 14 Apr 2005 11:33:42.0677 (UTC)
	FILETIME=[CFBB3C50:01C540E5]
X-Spam-Score: 0.3 (/)
X-Scan-Signature: 97adf591118a232206bdb5a27b217034
Content-Transfer-Encoding: quoted-printable
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: quoted-printable

Tero Kivinen writes:
>=20
> Tero Kivinen writes:
> > Also if we think more about the IKE SA rekeying, I do not=20
> > think there is any reason to do that unless you also do new=20
> > Diffie-Hellman there too. Rekeying IKE SA because of the IKE=20
> > message ID wrapping is not common. The current IKEv2 text is=20
> > not clear wheather the intension was that IKE SA rekey MUST=20
> > have KE payloads, but I think we should mandate them, i.e.=20
> > say in the NEW-1.3.2 that KE payloads are not optional
> > there.
>=20
> Actually it is clear from the draft-ietf-ipsec-ikev2-17.txt that
> Diffie-Hellman parameter is NOT optional when rekeying IKE. The=20
> 3.3.3 lists D-H as mandatory type if the protocol is IKE, and=20
> the 3.3.2 does the same in the Transform Type Values table. So=20
> KE payloads are not optional in the NEW-1.3.2.

I agree that including D-H transform in IKE proposals is mandatory
(this is clearly said in both 3.3.2 and 3.3.3), but is it allowed=20
to have NONE as the value? If it is, including KE payload is not
really mandatory...

Section 2.18 says that SKEYSEED for the new IKE_SA is calculated
as follows:

   SKEYSEED =3D prf(SK_d (old), [g^ir (new)] | Ni | Nr)

The square brackets in "[g^ir (new)]" seem to imply that NONE
would be allowed... but I do agree with you that it's not=20
very useful.

Best regards,
Pasi

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Thu Apr 14 14:52:38 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA11785
	for <ipsec-archive@lists.ietf.org>; Thu, 14 Apr 2005 14:52:38 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DM9KZ-0004Fj-UE; Thu, 14 Apr 2005 14:44:47 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DM9KX-0004DF-W7
	for ipsec@megatron.ietf.org; Thu, 14 Apr 2005 14:44:46 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA11142
	for <ipsec@ietf.org>; Thu, 14 Apr 2005 14:44:43 -0400 (EDT)
Received: from above.proper.com ([208.184.76.39])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DM9UY-00049q-EO
	for ipsec@ietf.org; Thu, 14 Apr 2005 14:55:07 -0400
Received: from [165.227.249.220] (adsl-66-125-125-65.dsl.pltn13.pacbell.net
	[66.125.125.65]) (authenticated bits=0)
	by above.proper.com (8.12.11/8.12.9) with ESMTP id j3EIifU4049562;
	Thu, 14 Apr 2005 11:44:41 -0700 (PDT)
	(envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06210209be8469e5db8d@[165.227.249.220]>
In-Reply-To: <B356D8F434D20B40A8CEDAEC305A1F240C5E68@esebe105.NOE.Nokia.com>
References: <B356D8F434D20B40A8CEDAEC305A1F240C5E68@esebe105.NOE.Nokia.com>
Date: Thu, 14 Apr 2005 11:44:39 -0700
To: Pasi.Eronen@nokia.com, <kivinen@iki.fi>, <ipsec@ietf.org>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Subject: RE: [Ipsec] Comments of draft-eronen-ipsec-ikev2-clarifications-02.txt
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9466e0365fc95844abaf7c3f15a05c7d
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

At 2:33 PM +0300 4/14/05, Pasi.Eronen@nokia.com wrote:
>I agree that including D-H transform in IKE proposals is mandatory
>(this is clearly said in both 3.3.2 and 3.3.3), but is it allowed
>to have NONE as the value?

Yes.

>  If it is, including KE payload is not
>really mandatory...

Disagree: it is mandatory, but it doesn't give you any extra security.

>Section 2.18 says that SKEYSEED for the new IKE_SA is calculated
>as follows:
>
>    SKEYSEED = prf(SK_d (old), [g^ir (new)] | Ni | Nr)
>
>The square brackets in "[g^ir (new)]" seem to imply that NONE
>would be allowed... but I do agree with you that it's not
>very useful.

Agree on both.

Do others agree with this tentative conclusion, that the KE payload 
is required for rekeying IKE SAs, even it is has a value of 0 
(meaning NONE)?

--Paul Hoffman, Director
--VPN Consortium

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Fri Apr 15 04:25:09 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA05786
	for <ipsec-archive@lists.ietf.org>; Fri, 15 Apr 2005 04:25:09 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DMLwd-0007UL-Jx; Fri, 15 Apr 2005 04:12:55 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DMLwZ-0007SG-FR
	for ipsec@megatron.ietf.org; Fri, 15 Apr 2005 04:12:51 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA04778
	for <ipsec@ietf.org>; Fri, 15 Apr 2005 04:12:43 -0400 (EDT)
From: Pasi.Eronen@nokia.com
Received: from mgw-x4.nokia.com ([131.228.20.27])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DMM6c-0002j7-5h
	for ipsec@ietf.org; Fri, 15 Apr 2005 04:23:15 -0400
Received: from esdks002.ntc.nokia.com (esdks002.ntc.nokia.com [172.21.138.121])
	by mgw-x4.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id
	j3F8Ccl01926; Fri, 15 Apr 2005 11:12:38 +0300 (EET DST)
X-Scanned: Fri, 15 Apr 2005 11:11:25 +0300 Nokia Message Protector V1.3.34
	2004121512 - RELEASE
Received: (from root@localhost)
	by esdks002.ntc.nokia.com (8.12.9/8.12.9) id j3F8BPOP027221;
	Fri, 15 Apr 2005 11:11:25 +0300
Received: from mgw-int1.ntc.nokia.com (172.21.143.96)
	by esdks002.ntc.nokia.com 00xK6JaT; Fri, 15 Apr 2005 11:11:24 EEST
Received: from esebh004.NOE.Nokia.com (esebh004.ntc.nokia.com [172.21.138.84])
	by mgw-int1.ntc.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id
	j3F8BLM17152; Fri, 15 Apr 2005 11:11:21 +0300 (EET DST)
Received: from esebe016.NOE.Nokia.com ([172.21.138.55]) by
	esebh004.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); 
	Fri, 15 Apr 2005 11:11:00 +0300
Received: from esebe105.NOE.Nokia.com ([172.21.143.53]) by
	esebe016.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); 
	Fri, 15 Apr 2005 11:10:59 +0300
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [Ipsec] Comments of draft-eronen-ipsec-ikev2-clarifications-02.txt
Date: Fri, 15 Apr 2005 11:10:59 +0300
Message-ID: <B356D8F434D20B40A8CEDAEC305A1F240C5E70@esebe105.NOE.Nokia.com>
Thread-Topic: [Ipsec] Comments of
	draft-eronen-ipsec-ikev2-clarifications-02.txt
thread-index: AcVBJBCB7t05z8rSSbuelXou9s8PKgAbSgcA
To: <paul.hoffman@vpnc.org>, <kivinen@iki.fi>, <ipsec@ietf.org>
X-OriginalArrivalTime: 15 Apr 2005 08:10:59.0839 (UTC)
	FILETIME=[A88730F0:01C54192]
X-Spam-Score: 0.3 (/)
X-Scan-Signature: 39bd8f8cbb76cae18b7e23f7cf6b2b9f
Content-Transfer-Encoding: quoted-printable
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Content-Transfer-Encoding: quoted-printable

Paul Hoffman wrote:
>=20
> At 2:33 PM +0300 4/14/05, Pasi.Eronen@nokia.com wrote:
>> I agree that including D-H transform in IKE proposals is mandatory
>> (this is clearly said in both 3.3.2 and 3.3.3), but is it allowed
>> to have NONE as the value?
>=20
> Yes.
>=20
>> If it is, including KE payload is not really mandatory...
>=20
> Disagree: it is mandatory, but it doesn't give you any extra=20
> security.
>=20
>> Section 2.18 says that SKEYSEED for the new IKE_SA is calculated
>> as follows:
>>
>>    SKEYSEED =3D prf(SK_d (old), [g^ir (new)] | Ni | Nr)
>>
>> The square brackets in "[g^ir (new)]" seem to imply that NONE
>> would be allowed... but I do agree with you that it's not
>> very useful.
>=20
> Agree on both.
>=20
> Do others agree with this tentative conclusion, that the KE payload=20
> is required for rekeying IKE SAs, even it is has a value of 0=20
> (meaning NONE)?

The spec is quite clear that when you rekey CHILD_SAs without=20
doing DH (i.e., you either omit the DH transform completely, or
include it with value 0), the KE payload is not included.=20
Why would including the KE payload be mandatory when rekeying=20
IKE_SAs without DH?

Best regards,
Pasi

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org  Sat Apr 16 00:06:04 2005
Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA27832
	for <ipsec-archive@lists.ietf.org>; Sat, 16 Apr 2005 00:06:04 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DMeQt-0006D5-Gr; Fri, 15 Apr 2005 23:57:23 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DMeQr-0006Ch-IG
	for ipsec@megatron.ietf.org; Fri, 15 Apr 2005 23:57:22 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA27313
	for <ipsec@ietf.org>; Fri, 15 Apr 2005 23:57:18 -0400 (EDT)
Received: from thunk.org ([69.25.196.29] helo=thunker.thunk.org)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DMebB-0005SD-Fo
	for ipsec@ietf.org; Sat, 16 Apr 2005 00:08:01 -0400
Received: from root (helo=thunk.org)
	by thunker.thunk.org with local-esmtp   (Exim 3.35 #1 (Debian))
	id 1DMeQf-0003IQ-00; Fri, 15 Apr 2005 23:57:10 -0400
Received: from tytso by thunk.org with local (Exim 4.50)
	id 1DMeQd-0001fH-O6; Fri, 15 Apr 2005 23:57:07 -0400
Date: Fri, 15 Apr 2005 23:57:07 -0400
From: "Theodore Ts'o" <tytso@mit.edu>
To: Russ Housley <housley@vigilsec.com>
Message-ID: <20050416035707.GA6348@thunk.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.8i
X-Spam-Score: 0.0 (/)
X-Scan-Signature: e1b0e72ff1bbd457ceef31828f216a86
Cc: ipsec@ietf.org, Charlie Kaufman <charliek@microsoft.com>,
        rfc-ed@rfc-editor.org, Barbara Fraser <byfraser@cisco.com>,
        Tero Kivinen <kivinen@iki.fi>
Subject: [Ipsec] Requested edit to draft-ietf-ipsec-ikev2-17.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

On Thu, Apr 07, 2005 at 03:06:49PM -0400, Russ Housley wrote:
> Ted & Barbara:
> 
> Now, I need to confirm that this is the WG consensus.

Russ: Barbara and I have conferred and in our judgement, the following
change is the WG consensus.

> Once you have done so, please send me a formal request, formatted like AUTH
> 48 input to the RFC Editor.

To the RFC editor: in order to address an interoperability issue that
was uncovered during a recent interoperability test, the following
change is needed in order to make the ESN transform mandatory instead
of optional.  

draft-ietf-ipsec-ikev2-17 is currently in EDIT status, and we would
like the following change to be made to the draft before it is
published.

Many thanks,

				Theodore Tso and Barbara Fraser
				ipsec wg chairs


----------------------------------------------------

In section 3.3.2 remove "optional in" from the ESN line, i.e. change

   Transform Type Values

                                     Transform    Used In
                                        Type
          RESERVED                        0
          Encryption Algorithm (ENCR)     1  (IKE and ESP)
          Pseudo-random Function (PRF)    2  (IKE)
          Integrity Algorithm (INTEG)     3  (IKE, AH, optional in ESP)
          Diffie-Hellman Group (D-H)      4  (IKE, optional in AH & ESP)
          Extended Sequence Numbers (ESN) 5  (Optional in AH and ESP)
          RESERVED TO IANA                6-240
          PRIVATE USE                     241-255

to

   Transform Type Values

                                     Transform    Used In
                                        Type
          RESERVED                        0
          Encryption Algorithm (ENCR)     1  (IKE and ESP)
          Pseudo-random Function (PRF)    2  (IKE)
          Integrity Algorithm (INTEG)     3  (IKE, AH, optional in ESP)
          Diffie-Hellman Group (D-H)      4  (IKE, optional in AH & ESP)
          Extended Sequence Numbers (ESN) 5  (AH and ESP)
          RESERVED TO IANA                6-240
          PRIVATE USE                     241-255

----------------------------------------------------------------------

In section 3.3.2 remove last paragraph from the description of the
Transform Type 5, i.e. change:

   For Transform Type 5 (Extended Sequence Numbers), defined Transform
   IDs are:

          Name                                Number
          No Extended Sequence Numbers       0
          Extended Sequence Numbers          1
          RESERVED                           2 - 65535

          If Transform Type 5 is not included in a proposal, use of
          Extended Sequence Numbers is assumed.

to

   For Transform Type 5 (Extended Sequence Numbers), defined Transform
   IDs are:

          Name                                Number
          No Extended Sequence Numbers       0
          Extended Sequence Numbers          1
          RESERVED                           2 - 65535

----------------------------------------------------------------------

In section 3.3.3 move ESN to mandatory types of the ESN an AH, i.e.
change:

          Protocol  Mandatory Types        Optional Types
            IKE     ENCR, PRF, INTEG, D-H
            ESP     ENCR                   INTEG, D-H, ESN
            AH      INTEG                  D-H, ESN

to

          Protocol  Mandatory Types        Optional Types
            IKE     ENCR, PRF, INTEG, D-H
            ESP     ENCR, ESN              INTEG, D-H
            AH      INTEG, ESN             D-H

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


From ipsec-bounces@ietf.org Sat Apr 16 21:47:56 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DMytA-0007LF-ET; Sat, 16 Apr 2005 21:47:56 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DMyt8-0007L2-FI
	for ipsec@megatron.ietf.org; Sat, 16 Apr 2005 21:47:54 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA24422
	for <ipsec@ietf.org>; Sat, 16 Apr 2005 21:47:52 -0400 (EDT)
Received: from sj-iport-4.cisco.com ([171.68.10.86])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DMz3d-0007wp-A8
	for ipsec@ietf.org; Sat, 16 Apr 2005 21:58:46 -0400
Received: from sj-core-4.cisco.com (171.68.223.138)
	by sj-iport-4.cisco.com with ESMTP; 16 Apr 2005 18:47:43 -0700
Received: from mira-sjc5-b.cisco.com (IDENT:mirapoint@mira-sjc5-b.cisco.com
	[171.71.163.14])
	by sj-core-4.cisco.com (8.12.10/8.12.6) with ESMTP id j3H1ldpR022614;
	Sat, 16 Apr 2005 18:47:40 -0700 (PDT)
Received: from ghuangx31 (sjc-vpn5-569.cisco.com [10.21.90.57])
	by mira-sjc5-b.cisco.com (MOS 3.4.5-GR) with ESMTP id BEA11732;
	Sat, 16 Apr 2005 18:47:39 -0700 (PDT)
Message-Id: <200504170147.BEA11732@mira-sjc5-b.cisco.com>
From: "Geoffrey Huang" <ghuang@cisco.com>
To: <Pasi.Eronen@nokia.com>, <paul.hoffman@vpnc.org>, <kivinen@iki.fi>,
	<ipsec@ietf.org>
Subject: RE: [Ipsec] Comments of draft-eronen-ipsec-ikev2-clarifications-02.txt
Date: Sat, 16 Apr 2005 18:47:38 -0700
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook, Build 11.0.5510
In-Reply-To: <B356D8F434D20B40A8CEDAEC305A1F240C5E70@esebe105.NOE.Nokia.com>
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4942.400
thread-index: AcVBJBCB7t05z8rSSbuelXou9s8PKgAbSgcAAFd9QDA=
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 244a2fd369eaf00ce6820a760a3de2e8
Content-Transfer-Encoding: 7bit
Cc: 
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

> -----Original Message-----
> From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] 
> On Behalf Of Pasi.Eronen@nokia.com
> Sent: Friday, April 15, 2005 1:11 AM
> To: paul.hoffman@vpnc.org; kivinen@iki.fi; ipsec@ietf.org
> Subject: RE: [Ipsec] Comments of 
> draft-eronen-ipsec-ikev2-clarifications-02.txt
> 
> Paul Hoffman wrote:
> > 
> > At 2:33 PM +0300 4/14/05, Pasi.Eronen@nokia.com wrote:
> >> I agree that including D-H transform in IKE proposals is mandatory 
> >> (this is clearly said in both 3.3.2 and 3.3.3), but is it 
> allowed to 
> >> have NONE as the value?
> > 
> > Yes.
> > 
> >> If it is, including KE payload is not really mandatory...
> > 
> > Disagree: it is mandatory, but it doesn't give you any 
> extra security.
> > 
> >> Section 2.18 says that SKEYSEED for the new IKE_SA is 
> calculated as 
> >> follows:
> >>
> >>    SKEYSEED = prf(SK_d (old), [g^ir (new)] | Ni | Nr)
> >>
> >> The square brackets in "[g^ir (new)]" seem to imply that 
> NONE would 
> >> be allowed... but I do agree with you that it's not very useful.
> > 
> > Agree on both.
> > 
> > Do others agree with this tentative conclusion, that the KE 
> payload is 
> > required for rekeying IKE SAs, even it is has a value of 0 (meaning 
> > NONE)?
> 
> The spec is quite clear that when you rekey CHILD_SAs without 
> doing DH (i.e., you either omit the DH transform completely, 
> or include it with value 0), the KE payload is not included. 
> Why would including the KE payload be mandatory when rekeying 
> IKE_SAs without DH?

Judging by Tero's pervious mail, this is not the conclusion he came to.  Nor
is it the conclusion I came to, but I completely missed the square brackets
around the g^ir (Paul had to point it out to me).

I think the draft is clear as mud here.  Making the transform mandatory and
giving it a value of 0 would make it consistent with how the ESN text will
be.

-g

> Best regards,
> Pasi
> 
> _______________________________________________
> Ipsec mailing list
> Ipsec@ietf.org
> https://www1.ietf.org/mailman/listinfo/ipsec
> 

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Mon Apr 18 14:07:34 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DNaek-0004LB-Iv; Mon, 18 Apr 2005 14:07:34 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DNaej-0004Ku-5g
	for ipsec@megatron.ietf.org; Mon, 18 Apr 2005 14:07:33 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA11992
	for <ipsec@ietf.org>; Mon, 18 Apr 2005 14:07:32 -0400 (EDT)
Received: from woodstock.binhost.com ([144.202.243.4])
	by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DNapZ-0000Qb-Dj
	for ipsec@ietf.org; Mon, 18 Apr 2005 14:18:46 -0400
Received: (qmail 6674 invoked by uid 0); 18 Apr 2005 18:06:36 -0000
Received: from unknown (HELO Russ-Laptop.vigilsec.com) (138.88.35.69)
	by woodstock.binhost.com with SMTP; 18 Apr 2005 18:06:36 -0000
Message-Id: <6.2.0.14.2.20050418140543.03ceb210@mail.binhost.com>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.0.14
Date: Mon, 18 Apr 2005 14:06:37 -0400
To: "Theodore Ts'o" <tytso@mit.edu>
From: Russ Housley <housley@vigilsec.com>
Subject: Re: [Ipsec] Requested edit to draft-ietf-ipsec-ikev2-17.txt
In-Reply-To: <20050416035707.GA6348@thunk.org>
References: <20050416035707.GA6348@thunk.org>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
X-Spam-Score: 0.2 (/)
X-Scan-Signature: c83ccb5cc10e751496398f1233ca9c3a
Cc: ipsec@ietf.org, Charlie Kaufman <charliek@microsoft.com>,
	Barbara Fraser <byfraser@cisco.com>, Tero Kivinen <kivinen@iki.fi>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

I have sent these proposed changes to the IESG for approval.  I will let 
you know if any issues arise.

Russ

At 11:57 PM 4/15/2005, Theodore Ts'o wrote:
>On Thu, Apr 07, 2005 at 03:06:49PM -0400, Russ Housley wrote:
> > Ted & Barbara:
> >
> > Now, I need to confirm that this is the WG consensus.
>
>Russ: Barbara and I have conferred and in our judgement, the following
>change is the WG consensus.
>
> > Once you have done so, please send me a formal request, formatted like AUTH
> > 48 input to the RFC Editor.
>
>To the RFC editor: in order to address an interoperability issue that
>was uncovered during a recent interoperability test, the following
>change is needed in order to make the ESN transform mandatory instead
>of optional.
>
>draft-ietf-ipsec-ikev2-17 is currently in EDIT status, and we would
>like the following change to be made to the draft before it is
>published.
>
>Many thanks,
>
>                                 Theodore Tso and Barbara Fraser
>                                 ipsec wg chairs
>
>
>----------------------------------------------------
>
>In section 3.3.2 remove "optional in" from the ESN line, i.e. change
>
>    Transform Type Values
>
>                                      Transform    Used In
>                                         Type
>           RESERVED                        0
>           Encryption Algorithm (ENCR)     1  (IKE and ESP)
>           Pseudo-random Function (PRF)    2  (IKE)
>           Integrity Algorithm (INTEG)     3  (IKE, AH, optional in ESP)
>           Diffie-Hellman Group (D-H)      4  (IKE, optional in AH & ESP)
>           Extended Sequence Numbers (ESN) 5  (Optional in AH and ESP)
>           RESERVED TO IANA                6-240
>           PRIVATE USE                     241-255
>
>to
>
>    Transform Type Values
>
>                                      Transform    Used In
>                                         Type
>           RESERVED                        0
>           Encryption Algorithm (ENCR)     1  (IKE and ESP)
>           Pseudo-random Function (PRF)    2  (IKE)
>           Integrity Algorithm (INTEG)     3  (IKE, AH, optional in ESP)
>           Diffie-Hellman Group (D-H)      4  (IKE, optional in AH & ESP)
>           Extended Sequence Numbers (ESN) 5  (AH and ESP)
>           RESERVED TO IANA                6-240
>           PRIVATE USE                     241-255
>
>----------------------------------------------------------------------
>
>In section 3.3.2 remove last paragraph from the description of the
>Transform Type 5, i.e. change:
>
>    For Transform Type 5 (Extended Sequence Numbers), defined Transform
>    IDs are:
>
>           Name                                Number
>           No Extended Sequence Numbers       0
>           Extended Sequence Numbers          1
>           RESERVED                           2 - 65535
>
>           If Transform Type 5 is not included in a proposal, use of
>           Extended Sequence Numbers is assumed.
>
>to
>
>    For Transform Type 5 (Extended Sequence Numbers), defined Transform
>    IDs are:
>
>           Name                                Number
>           No Extended Sequence Numbers       0
>           Extended Sequence Numbers          1
>           RESERVED                           2 - 65535
>
>----------------------------------------------------------------------
>
>In section 3.3.3 move ESN to mandatory types of the ESN an AH, i.e.
>change:
>
>           Protocol  Mandatory Types        Optional Types
>             IKE     ENCR, PRF, INTEG, D-H
>             ESP     ENCR                   INTEG, D-H, ESN
>             AH      INTEG                  D-H, ESN
>
>to
>
>           Protocol  Mandatory Types        Optional Types
>             IKE     ENCR, PRF, INTEG, D-H
>             ESP     ENCR, ESN              INTEG, D-H
>             AH      INTEG, ESN             D-H
>
>_______________________________________________
>Ipsec mailing list
>Ipsec@ietf.org
>https://www1.ietf.org/mailman/listinfo/ipsec


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Mon Apr 18 15:51:08 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DNcGy-0007a4-JC; Mon, 18 Apr 2005 15:51:08 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DNcGu-0007Uf-PL; Mon, 18 Apr 2005 15:51:04 -0400
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA24054;
	Mon, 18 Apr 2005 15:51:02 -0400 (EDT)
Message-Id: <200504181951.PAA24054@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: i-d-announce@ietf.org
From: Internet-Drafts@ietf.org
Date: Mon, 18 Apr 2005 15:51:02 -0400
Cc: ipsec@ietf.org
Subject: [Ipsec] I-D ACTION:draft-ietf-ipsec-ikev2-ecc-groups-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Security Protocol Working Group of the IETF.

	Title		: ECC Groups For IKEv2
	Author(s)	: J. Solinas
	Filename	: draft-ietf-ipsec-ikev2-ecc-groups-00.txt
	Pages		: 6
	Date		: 2005-4-18
	
This document describes ECC groups for use as Diffie-Hellman groups 
   in the Internet Key Exchange version 2 (IKEv2) protocol.  These new 
   groups are defined to align IKEv2 with other standards, particularly 
   NIST standards, and with and to provide more efficient implementation
   than in previously defined groups.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ikev2-ecc-groups-00.txt

To remove yourself from the I-D Announcement list, send a message to 
i-d-announce-request@ietf.org with the word unsubscribe in the body of the message.  
You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce 
to change your subscription settings.


Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ipsec-ikev2-ecc-groups-00.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ipsec-ikev2-ecc-groups-00.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body; access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID: <2005-4-18161940.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ipsec-ikev2-ecc-groups-00.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ipsec-ikev2-ecc-groups-00.txt";
	site="ftp.ietf.org"; access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2005-4-18161940.I-D@ietf.org>


--OtherAccess--

--NextPart
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec

--NextPart--






From ipsec-bounces@ietf.org Mon Apr 18 15:51:19 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DNcH9-0007gR-Df; Mon, 18 Apr 2005 15:51:19 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DNcH4-0007bV-VG; Mon, 18 Apr 2005 15:51:15 -0400
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA24105;
	Mon, 18 Apr 2005 15:51:13 -0400 (EDT)
Message-Id: <200504181951.PAA24105@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: i-d-announce@ietf.org
From: Internet-Drafts@ietf.org
Date: Mon, 18 Apr 2005 15:51:13 -0400
Cc: ipsec@ietf.org
Subject: [Ipsec] I-D ACTION:draft-ietf-ipsec-ike-ecp-groups-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Security Protocol Working Group of the IETF.

	Title		: ECP Groups For IKE
	Author(s)	: J. Solinas
	Filename	: draft-ietf-ipsec-ike-ecp-groups-00.txt
	Pages		: 10
	Date		: 2005-4-18
	
This document describes new ECC groups for use in the Internet Key 
   Exchange (IKE) protocol in addition to previously defined groups.  
   Specifically, the new curve groups are based on modular arithmetic 
   rather than binary arithmetic.  These new groups are defined to align
   IKE with other ECC implementations and standards, particularly NIST 
   standards.  In addition, the curves defined here can provide more 
   efficient implementation than previously defined ECC groups.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ike-ecp-groups-00.txt

To remove yourself from the I-D Announcement list, send a message to 
i-d-announce-request@ietf.org with the word unsubscribe in the body of the message.  
You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce 
to change your subscription settings.


Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ipsec-ike-ecp-groups-00.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ipsec-ike-ecp-groups-00.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body; access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID: <2005-4-18161946.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ipsec-ike-ecp-groups-00.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ipsec-ike-ecp-groups-00.txt";
	site="ftp.ietf.org"; access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2005-4-18161946.I-D@ietf.org>


--OtherAccess--

--NextPart
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec

--NextPart--






From ipsec-bounces@ietf.org Mon Apr 18 15:51:28 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DNcHI-0007qb-Ln; Mon, 18 Apr 2005 15:51:28 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DNcHF-0007pe-0B; Mon, 18 Apr 2005 15:51:25 -0400
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA24172;
	Mon, 18 Apr 2005 15:51:23 -0400 (EDT)
Message-Id: <200504181951.PAA24172@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: i-d-announce@ietf.org
From: Internet-Drafts@ietf.org
Date: Mon, 18 Apr 2005 15:51:23 -0400
Cc: ipsec@ietf.org
Subject: [Ipsec] I-D ACTION:draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Security Protocol Working Group of the IETF.

	Title		: IKEv2 Authentication Using ECDSA
	Author(s)	: J. Solinas
	Filename	: draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt
	Pages		: 6
	Date		: 2005-4-18
	
This document describes how the Elliptic Curve Digital Signature
   Algorithm (ECDSA) may be used as the authentication method within
   the Internet Key Exchange protocol, version 2 (IKEv2).  ECDSA may 
   provide benefits including computational efficiency, small signature
   sizes, and minimal bandwidth, compared to other available digital 
   signature methods.  This document adds ECDSA capability to IKEv2 
   without introducing any changes to existing IKEv2 operation.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt

To remove yourself from the I-D Announcement list, send a message to 
i-d-announce-request@ietf.org with the word unsubscribe in the body of the message.  
You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce 
to change your subscription settings.


Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body; access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID: <2005-4-18161952.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt";
	site="ftp.ietf.org"; access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2005-4-18161952.I-D@ietf.org>


--OtherAccess--

--NextPart
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec

--NextPart--






From ipsec-bounces@ietf.org Tue Apr 19 06:39:28 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DNq8W-0007yE-Av; Tue, 19 Apr 2005 06:39:21 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DNq8Q-0007y1-Vd
	for ipsec@megatron.ietf.org; Tue, 19 Apr 2005 06:39:15 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA26470
	for <ipsec@ietf.org>; Tue, 19 Apr 2005 06:39:11 -0400 (EDT)
From: Pasi.Eronen@nokia.com
Received: from mgw-x3.nokia.com ([131.228.20.26])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DNqJP-0008Mf-Um
	for ipsec@ietf.org; Tue, 19 Apr 2005 06:50:37 -0400
Received: from esdks003.ntc.nokia.com (esdks003.ntc.nokia.com [172.21.138.158])
	by mgw-x3.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id
	j3JAd5N24317
	for <ipsec@ietf.org>; Tue, 19 Apr 2005 13:39:06 +0300 (EET DST)
X-Scanned: Tue, 19 Apr 2005 13:38:39 +0300 Nokia Message Protector V1.3.34
	2004121512 - RELEASE
Received: (from root@localhost)
	by esdks003.ntc.nokia.com (8.12.9/8.12.9) id j3JAcdbS011118
	for <ipsec@ietf.org>; Tue, 19 Apr 2005 13:38:39 +0300
Received: from mgw-int1.ntc.nokia.com (172.21.143.96)
	by esdks003.ntc.nokia.com 00gGyE4p; Tue, 19 Apr 2005 13:38:07 EEST
Received: from esebh001.NOE.Nokia.com (esebh001.ntc.nokia.com [172.21.138.28])
	by mgw-int1.ntc.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id
	j3JAbmM22325
	for <ipsec@ietf.org>; Tue, 19 Apr 2005 13:37:48 +0300 (EET DST)
Received: from esebe016.NOE.Nokia.com ([172.21.138.55]) by
	esebh001.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); 
	Tue, 19 Apr 2005 13:37:48 +0300
Received: from esebe105.NOE.Nokia.com ([172.21.143.53]) by
	esebe016.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); 
	Tue, 19 Apr 2005 13:37:47 +0300
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Date: Tue, 19 Apr 2005 13:37:47 +0300
Message-ID: <B356D8F434D20B40A8CEDAEC305A1F240C5E81@esebe105.NOE.Nokia.com>
Thread-Topic: Comment about 3664bis-01
thread-index: AcVEy9Qd7qBbI9V6QSWKoTzNi/7mEg==
To: <ipsec@ietf.org>
X-OriginalArrivalTime: 19 Apr 2005 10:37:47.0911 (UTC)
	FILETIME=[D4335170:01C544CB]
X-Spam-Score: 0.3 (/)
X-Scan-Signature: 769a46790fb42fbb0b0cc700c82f7081
Content-Transfer-Encoding: quoted-printable
Subject: [Ipsec] Comment about 3664bis-01
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

draft-hoffman-rfc3664bis-01 says:

> The key for AES-XCBC-PRF-128 is created as follows:
>
> o  If the key is exactly 128 bits long, use it as-is.
>
> o  If the key has fewer than 128 bits, pad it on the right with=20
>    zero bits until it is 128 bits long.
>
> o  If the key is 129 bits or longer, call the first 128 bits=20
>    TKEY (temporary key) and the remaining bits TDATA (temporary=20
>    data).  If TDATA's length is not a multiple of 128, pad TDATA=20
>    on the right with enough 0 bits to make its length an exact=20
>    multiple of 128. Encrypt each 128-bit block of TDATA with TKEY=20
>    using AES-128-EBC as the cipher.  When finished, XOR the=20
>    resulting blocks in the same order as they were created.

This way of using ECB mode fails horribly if, for instance,=20
the input contains contains 128 bits of entropy, but for some
strange reason consists of three copies of the same 128-bit
block: the output would always be zero.

What we really need here is a "randomness extractor" that
produces a 128-bit output with sufficient entropy (with some
suitable definitions of "sufficient" and "entropy") when=20
given _any_ input with sufficient entropy, even if the input=20
contains some known/guessable bits and/or structure.

IKEv2 already assumes that AES-XCBC-PRF is a reasonable
randomness extractor (when the key is chosen randomly), so
something like this would IMHO be better:

   o If the key is 129 bits or longer, call the first 128 bits
     TKEY (temporary key) and the remaining bits TDATA (temporary
     data). Calculate AES-XCBC-PRF-128(TKEY, TDATA) and use
     the output as the key.

But the assumption made here is slightly different from normal
IKEv2 (where the key is Ni/Nr), so probably we should ask some
crypto experts (Hugo, are you listening? :-) about this.

Also, I'm not sure if doing this step only when the key is
longer than 128 bits causes some problems, or whether it would
be better to do it always (but then it would not be
backwards-compatible with 3664 anymore).

Best regards,
Pasi

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Tue Apr 19 16:50:01 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DNzfV-0006VR-30; Tue, 19 Apr 2005 16:50:01 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DNzfQ-0006SY-Ce
	for ipsec@megatron.ietf.org; Tue, 19 Apr 2005 16:49:56 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA25598
	for <ipsec@ietf.org>; Tue, 19 Apr 2005 16:49:53 -0400 (EDT)
Received: from woodstock.binhost.com ([144.202.243.4])
	by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DNzqV-0007im-J5
	for ipsec@ietf.org; Tue, 19 Apr 2005 17:01:24 -0400
Received: (qmail 28102 invoked by uid 0); 19 Apr 2005 20:49:46 -0000
Received: from unknown (HELO Russ-Laptop.vigilsec.com) (138.88.135.227)
	by woodstock.binhost.com with SMTP; 19 Apr 2005 20:49:46 -0000
Message-Id: <6.2.0.14.2.20050419164905.05f99640@mail.binhost.com>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.0.14
Date: Tue, 19 Apr 2005 16:49:47 -0400
To: Pasi.Eronen@nokia.com, <ipsec@ietf.org>
From: Russ Housley <housley@vigilsec.com>
Subject: Re: [Ipsec] Comment about 3664bis-01
In-Reply-To: <B356D8F434D20B40A8CEDAEC305A1F240C5E81@esebe105.NOE.Nokia. com>
References: <B356D8F434D20B40A8CEDAEC305A1F240C5E81@esebe105.NOE.Nokia.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
X-Spam-Score: 0.2 (/)
X-Scan-Signature: 02ec665d00de228c50c93ed6b5e4fc1a
Cc: 
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Pasi:

The probability that all of the blocks are identical seems very slim to me.

Russ

At 06:37 AM 4/19/2005, Pasi.Eronen@nokia.com wrote:
>draft-hoffman-rfc3664bis-01 says:
>
> > The key for AES-XCBC-PRF-128 is created as follows:
> >
> > o  If the key is exactly 128 bits long, use it as-is.
> >
> > o  If the key has fewer than 128 bits, pad it on the right with
> >    zero bits until it is 128 bits long.
> >
> > o  If the key is 129 bits or longer, call the first 128 bits
> >    TKEY (temporary key) and the remaining bits TDATA (temporary
> >    data).  If TDATA's length is not a multiple of 128, pad TDATA
> >    on the right with enough 0 bits to make its length an exact
> >    multiple of 128. Encrypt each 128-bit block of TDATA with TKEY
> >    using AES-128-EBC as the cipher.  When finished, XOR the
> >    resulting blocks in the same order as they were created.
>
>This way of using ECB mode fails horribly if, for instance,
>the input contains contains 128 bits of entropy, but for some
>strange reason consists of three copies of the same 128-bit
>block: the output would always be zero.
>
>What we really need here is a "randomness extractor" that
>produces a 128-bit output with sufficient entropy (with some
>suitable definitions of "sufficient" and "entropy") when
>given _any_ input with sufficient entropy, even if the input
>contains some known/guessable bits and/or structure.
>
>IKEv2 already assumes that AES-XCBC-PRF is a reasonable
>randomness extractor (when the key is chosen randomly), so
>something like this would IMHO be better:
>
>    o If the key is 129 bits or longer, call the first 128 bits
>      TKEY (temporary key) and the remaining bits TDATA (temporary
>      data). Calculate AES-XCBC-PRF-128(TKEY, TDATA) and use
>      the output as the key.
>
>But the assumption made here is slightly different from normal
>IKEv2 (where the key is Ni/Nr), so probably we should ask some
>crypto experts (Hugo, are you listening? :-) about this.
>
>Also, I'm not sure if doing this step only when the key is
>longer than 128 bits causes some problems, or whether it would
>be better to do it always (but then it would not be
>backwards-compatible with 3664 anymore).
>
>Best regards,
>Pasi
>
>_______________________________________________
>Ipsec mailing list
>Ipsec@ietf.org
>https://www1.ietf.org/mailman/listinfo/ipsec


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Tue Apr 19 18:07:34 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DO0sY-0003tt-U3; Tue, 19 Apr 2005 18:07:34 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DO0sW-0003tn-Ip
	for ipsec@megatron.ietf.org; Tue, 19 Apr 2005 18:07:32 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA01143
	for <ipsec@ietf.org>; Tue, 19 Apr 2005 18:07:29 -0400 (EDT)
Received: from [66.119.143.56] (helo=mail.rfburst.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DO13b-0001dS-Ik
	for ipsec@ietf.org; Tue, 19 Apr 2005 18:19:00 -0400
Received: from tobermory.localdomain ([66.119.143.202])
	by mail.rfburst.com (8.12.8/8.12.8) with ESMTP id j3JM6pNX003206;
	Tue, 19 Apr 2005 16:06:51 -0600
Received: from tobermory.localdomain (localhost [127.0.0.1])
	by tobermory.localdomain (8.12.10/8.11.6) with ESMTP id j3JM25fZ000504; 
	Tue, 19 Apr 2005 16:02:05 -0600
Received: (from ho@localhost)
	by tobermory.localdomain (8.12.10/8.12.10/Submit) id j3JM25jx000500;
	Tue, 19 Apr 2005 16:02:05 -0600
Date: Tue, 19 Apr 2005 16:02:05 -0600
Message-Id: <200504192202.j3JM25jx000500@tobermory.localdomain>
From: "The Purple Streak, Hilarie Orman" <ho@alum.mit.edu>
To: Pasi.Eronen@nokia.com
Subject: Re: [Ipsec] Comment about 3664bis-01
X-esmartscan-MailScanner-Information: Please contact the ISP for more
	information
X-esmartscan-MailScanner: Found to be clean
X-MailScanner-From: ho@alum.mit.edu
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 08e48e05374109708c00c6208b534009
Cc: ipsec@ietf.org
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

You are correct in observing that there are some undesirable properties
in the method for deriving a 128-bit key from more than 128 bits.  It
would be better to use the hash itself with a zero key than to encrypt
individual blocks.  My preference would be to forbit the longer keys
on the grounds that user who does that must have some unreasonable
expectations about security.

Hilarie

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Wed Apr 20 01:48:32 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DO84d-0001UR-Sv; Wed, 20 Apr 2005 01:48:31 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DO84b-0001UK-12
	for ipsec@megatron.ietf.org; Wed, 20 Apr 2005 01:48:29 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA29317
	for <ipsec@ietf.org>; Wed, 20 Apr 2005 01:48:28 -0400 (EDT)
From: Pasi.Eronen@nokia.com
Received: from mgw-x3.nokia.com ([131.228.20.26])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DO8Fl-0005xb-0L
	for ipsec@ietf.org; Wed, 20 Apr 2005 02:00:01 -0400
Received: from esdks001.ntc.nokia.com (esdks001.ntc.nokia.com [172.21.138.120])
	by mgw-x3.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id
	j3K5mON15858; Wed, 20 Apr 2005 08:48:24 +0300 (EET DST)
X-Scanned: Wed, 20 Apr 2005 09:07:40 +0300 Nokia Message Protector V1.3.34
	2004121512 - RELEASE
Received: (from root@localhost)
	by esdks001.ntc.nokia.com (8.12.9/8.12.9) id j3K67ejB012433;
	Wed, 20 Apr 2005 09:07:40 +0300
Received: from mgw-int1.ntc.nokia.com (172.21.143.96)
	by esdks001.ntc.nokia.com 00I1VQBL; Wed, 20 Apr 2005 09:07:38 EEST
Received: from esebh004.NOE.Nokia.com (esebh004.ntc.nokia.com [172.21.138.84])
	by mgw-int1.ntc.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id
	j3K5mDM13702; Wed, 20 Apr 2005 08:48:13 +0300 (EET DST)
Received: from esebe017.NOE.Nokia.com ([172.21.138.56]) by
	esebh004.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); 
	Wed, 20 Apr 2005 08:48:07 +0300
Received: from esebe105.NOE.Nokia.com ([172.21.143.53]) by
	esebe017.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); 
	Wed, 20 Apr 2005 08:48:05 +0300
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [Ipsec] Comment about 3664bis-01
Date: Wed, 20 Apr 2005 08:48:05 +0300
Message-ID: <B356D8F434D20B40A8CEDAEC305A1F240C5E8A@esebe105.NOE.Nokia.com>
Thread-Topic: [Ipsec] Comment about 3664bis-01
thread-index: AcVFIXsr3mYwy/NfR8CiuvHHzJN56gASq0Eg
To: <housley@vigilsec.com>, <ipsec@ietf.org>
X-OriginalArrivalTime: 20 Apr 2005 05:48:05.0288 (UTC)
	FILETIME=[85C34A80:01C5456C]
X-Spam-Score: 0.3 (/)
X-Scan-Signature: cd26b070c2577ac175cd3a6d878c6248
Content-Transfer-Encoding: quoted-printable
Cc: 
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org


I fully agree; that was just an example pointing out that=20
unless we use a real "randomness extractor", there will=20
be keys that are secure with all other PRFs, but not with=20
AES-XCBC-MAC.=20

Best regards,
Pasi

> -----Original Message-----
> From: ext Russ Housley [mailto:housley@vigilsec.com]
> Sent: Tuesday, April 19, 2005 11:50 PM
> To: Eronen Pasi (Nokia-NRC/Helsinki); ipsec@ietf.org
> Subject: Re: [Ipsec] Comment about 3664bis-01
>=20
>=20
> Pasi:
>=20
> The probability that all of the blocks are identical seems=20
> very slim to me.
>=20
> Russ
>=20
> At 06:37 AM 4/19/2005, Pasi.Eronen@nokia.com wrote:
> >draft-hoffman-rfc3664bis-01 says:
> >
> > > The key for AES-XCBC-PRF-128 is created as follows:
> > >
> > > o  If the key is exactly 128 bits long, use it as-is.
> > >
> > > o  If the key has fewer than 128 bits, pad it on the right with
> > >    zero bits until it is 128 bits long.
> > >
> > > o  If the key is 129 bits or longer, call the first 128 bits
> > >    TKEY (temporary key) and the remaining bits TDATA (temporary
> > >    data).  If TDATA's length is not a multiple of 128, pad TDATA
> > >    on the right with enough 0 bits to make its length an exact
> > >    multiple of 128. Encrypt each 128-bit block of TDATA with TKEY
> > >    using AES-128-EBC as the cipher.  When finished, XOR the
> > >    resulting blocks in the same order as they were created.
> >
> >This way of using ECB mode fails horribly if, for instance,
> >the input contains contains 128 bits of entropy, but for some
> >strange reason consists of three copies of the same 128-bit
> >block: the output would always be zero.
> >
> >What we really need here is a "randomness extractor" that
> >produces a 128-bit output with sufficient entropy (with some
> >suitable definitions of "sufficient" and "entropy") when
> >given _any_ input with sufficient entropy, even if the input
> >contains some known/guessable bits and/or structure.
> >
> >IKEv2 already assumes that AES-XCBC-PRF is a reasonable
> >randomness extractor (when the key is chosen randomly), so
> >something like this would IMHO be better:
> >
> >    o If the key is 129 bits or longer, call the first 128 bits
> >      TKEY (temporary key) and the remaining bits TDATA (temporary
> >      data). Calculate AES-XCBC-PRF-128(TKEY, TDATA) and use
> >      the output as the key.
> >
> >But the assumption made here is slightly different from normal
> >IKEv2 (where the key is Ni/Nr), so probably we should ask some
> >crypto experts (Hugo, are you listening? :-) about this.
> >
> >Also, I'm not sure if doing this step only when the key is
> >longer than 128 bits causes some problems, or whether it would
> >be better to do it always (but then it would not be
> >backwards-compatible with 3664 anymore).
> >
> >Best regards,
> >Pasi
> >
> >_______________________________________________
> >Ipsec mailing list
> >Ipsec@ietf.org
> >https://www1.ietf.org/mailman/listinfo/ipsec
>=20
>=20

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Wed Apr 20 12:48:03 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOIMt-0002iT-8H; Wed, 20 Apr 2005 12:48:03 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DOIMq-0002iO-QU
	for ipsec@megatron.ietf.org; Wed, 20 Apr 2005 12:48:00 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA26492
	for <ipsec@ietf.org>; Wed, 20 Apr 2005 12:47:58 -0400 (EDT)
Received: from above.proper.com ([208.184.76.39])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DOIY5-0000bZ-MZ
	for ipsec@ietf.org; Wed, 20 Apr 2005 12:59:39 -0400
Received: from [165.227.249.220] (dsl2-63-249-109-245.cruzio.com
	[63.249.109.245]) (authenticated bits=0)
	by above.proper.com (8.12.11/8.12.9) with ESMTP id j3KGluHU093340
	for <ipsec@ietf.org>; Wed, 20 Apr 2005 09:47:57 -0700 (PDT)
	(envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06210237be8c363fce88@[165.227.249.220]>
In-Reply-To: <B356D8F434D20B40A8CEDAEC305A1F240C5E8A@esebe105.NOE.Nokia.com>
References: <B356D8F434D20B40A8CEDAEC305A1F240C5E8A@esebe105.NOE.Nokia.com>
Date: Wed, 20 Apr 2005 09:47:39 -0700
To: IPsec WG <ipsec@ietf.org>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Subject: RE: [Ipsec] Comment about 3664bis-01
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7d33c50f3756db14428398e2bdedd581
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

The (unstated, I admit) design goal was to use only one crypto 
algorithm in AES-XCBC-PRF-128. That is why I used AES as the mixing 
function. Pasi has pointed out a real problem: if the key consists of 
128 bits followed by an even multiple of 128 bits, and each 
consecutive pair of that even multiple consists of two copies of the 
same 128 bits, the resulting key will be all zeros.

There are two ways around this for keys longer than 128 bits:

- Use a different crypto algorithm. For example, "hash the longer key 
with MD5 and use the result" is both easy to describe and simple to 
implement. However, it means adding MD5 code.

- Call AES-XCBC-PRF-128 with the key being the first 128 bits of the 
original key. Fortunately, this is not recursive. :-)

I think the latter meets the design goal fairly well. Does any have 
any problems with this?

--Paul Hoffman, Director
--VPN Consortium

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Thu Apr 21 12:36:28 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOefE-0002OC-3a; Thu, 21 Apr 2005 12:36:28 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DOefC-0002NH-Kp
	for ipsec@megatron.ietf.org; Thu, 21 Apr 2005 12:36:26 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA14976
	for <ipsec@ietf.org>; Thu, 21 Apr 2005 12:36:23 -0400 (EDT)
Received: from above.proper.com ([208.184.76.39])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DOeqe-00045I-GV
	for ipsec@ietf.org; Thu, 21 Apr 2005 12:48:16 -0400
Received: from [165.227.249.220] (dsl2-63-249-109-245.cruzio.com
	[63.249.109.245]) (authenticated bits=0)
	by above.proper.com (8.12.11/8.12.9) with ESMTP id j3LGaIlS092505
	for <ipsec@ietf.org>; Thu, 21 Apr 2005 09:36:19 -0700 (PDT)
	(envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06210277be8d856ae5be@[165.227.249.220]>
Date: Thu, 21 Apr 2005 09:36:14 -0700
To: IPsec WG <ipsec@ietf.org>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 82c9bddb247d9ba4471160a9a865a5f3
Subject: [Ipsec] "Original initiator" in IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Greetings again. One of the open issues in the IKEv2 clarifications 
document is:
    o  When the document uses the term "original initiator" (or similar
       terms), it is not clear whether or not that term also applies to
       the side that originates an rekeying of the IKE_SA.  That is, if
       Alice starts the first IKE_SA, but then Bob rekeys the IKE_SA, is
       the "original initiator" from that point on now Bob, or is it
       still Alice? Also, if it is Bob, at what exact point does it
       become Bob? This needs to be cleared up on a case-by-case basis
       throughout the document.
----------

The relevant text from the IKEv2 document is:

Section 2.2 (sequence number for message ID):
    That means that after the initial
    exchange, each integer n may appear as the message ID in four
    distinct messages: The nth request from the original IKE initiator,
    the corresponding response, the nth request from the original IKE
    responder, and the corresponding response.

Section 2.6 (cookies):
    Unlike ESP and AH where only the recipient's SPI appears in the
    header of a message, in IKE the sender's SPI is also sent in every
    message. Since the SPI chosen by the original initiator of the IKE_SA
    is always sent first, an endpoint with multiple IKE_SAs open that
    wants to find the appropriate IKE_SA using the SPI it assigned must
    look at the I(nitiator) Flag bit in the header to determine whether
    it assigned the first or the second eight octets.

Section 2.14 (keying material for the IKE_SA):
    The two directions of traffic flow use different keys. The keys used
    to protect messages from the original initiator are SK_ai and SK_ei.
    The keys used to protect messages in the other direction are SK_ar
    and SK_er.

Section 3.1 (generic IKE header):
        --  I(nitiator) (bit 3 of Flags) - This bit MUST be set in
            messages sent by the original initiator of the IKE_SA
            and MUST be cleared in messages sent by the original
            responder. It is used by the recipient to determine
            which eight octets of the SPI was generated by the
            recipient.

----------

Based on those four sections, I propose that "original initiator" is 
always the initiator of the *current* IKE_SA. This makes the spec 
more consistent, easier to implement (because you don't have to 
remember who started the first IKE_SA after you rekey it), and that 
definition works fine with all four sections above.

Comments?

--Paul Hoffman, Director
--VPN Consortium

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Thu Apr 21 15:41:40 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOhYS-00083l-Kl; Thu, 21 Apr 2005 15:41:40 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOhYO-00082z-Oe; Thu, 21 Apr 2005 15:41:36 -0400
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA01425;
	Thu, 21 Apr 2005 15:41:35 -0400 (EDT)
Message-Id: <200504211941.PAA01425@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: i-d-announce@ietf.org
From: Internet-Drafts@ietf.org
Date: Thu, 21 Apr 2005 15:41:35 -0400
Cc: ipsec@ietf.org
Subject: [Ipsec] I-D ACTION:draft-ietf-ipsec-ike-auth-ecdsa-03.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Security Protocol Working Group of the IETF.

	Title		: IKE Authentication Using ECDSA
	Author(s)	: J. Solinas
	Filename	: draft-ietf-ipsec-ike-auth-ecdsa-03.txt
	Pages		: 6
	Date		: 2005-4-21
	
This document describes how the Elliptic Curve Digital Signature
   Algorithm (ECDSA) may be used as the authentication method within
   the Internet Key Exchange (IKE) protocol.  ECDSA may provide benefits
   including computational efficiency, small signature sizes, and 
   minimal bandwidth compared to other available digital signature 
   methods.  This document adds ECDSA capability to IKE without 
   introducing any changes to existing IKE operation.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ike-auth-ecdsa-03.txt

To remove yourself from the I-D Announcement list, send a message to 
i-d-announce-request@ietf.org with the word unsubscribe in the body of the message.  
You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce 
to change your subscription settings.


Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ipsec-ike-auth-ecdsa-03.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ipsec-ike-auth-ecdsa-03.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body; access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID: <2005-4-21161253.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ipsec-ike-auth-ecdsa-03.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ipsec-ike-auth-ecdsa-03.txt";
	site="ftp.ietf.org"; access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2005-4-21161253.I-D@ietf.org>


--OtherAccess--

--NextPart
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec

--NextPart--






From ipsec-bounces@ietf.org Fri Apr 22 15:49:30 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DP49a-0001om-FN; Fri, 22 Apr 2005 15:49:30 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DP49Z-0001oh-4w
	for ipsec@megatron.ietf.org; Fri, 22 Apr 2005 15:49:29 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA17103
	for <ipsec@ietf.org>; Fri, 22 Apr 2005 15:49:27 -0400 (EDT)
Received: from smtp811.mail.sc5.yahoo.com ([66.163.170.81])
	by ietf-mx.ietf.org with smtp (Exim 4.33) id 1DP4LE-0003Qn-Cn
	for ipsec@ietf.org; Fri, 22 Apr 2005 16:01:34 -0400
Received: from unknown (HELO adithya) (mohanp@sbcglobal.net@64.169.161.181
	with login)
	by smtp811.mail.sc5.yahoo.com with SMTP; 22 Apr 2005 19:15:13 -0000
Message-ID: <008701c5476f$9e21bbc0$6b01a8c0@adithya>
From: "Mohan Parthasarathy" <mohanp@sbcglobal.net>
To: <ipsec@ietf.org>
Date: Fri, 22 Apr 2005 12:15:16 -0700
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1437
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1441
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 9466e0365fc95844abaf7c3f15a05c7d
Content-Transfer-Encoding: 7bit
Subject: [Ipsec] IKEv2 SPI unique or random ?
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Hello,

The IKEv2 draft require the IKEv2 SPIs (the one that appears in the IKEv2 header) to be
unique so that it can be used to identify the IKE SA. But the first packet 
(SPIi =X, SPIr = 0) can carry the same SPIi from two different peers. For
example.,

Peer A sends to Peer B (SPIi = 5, SPIr = 0)
Peer C sends to Peer B (SPIi = 5, SPIr = 0)

If you use the SPIi alone to locate the SA, when you receive the packet from Peer C,
you would wrongly locate the IKE SA created by Peer A. Some implementations 
(though it locates the IKE SA wrongly) discard the packet later because it has
already processed the IKE_SA_INIT packet. So, the packet from Peer C will
be discarded. Some implementations might have a separate cache for initial packets
which would continue to discard for sometime till the cache expires.

If the SPIs are chosen randomly, then the probability of collision comes down and
hence the above issue does not arise. The other possibility is to use the "peer" address
also when locating the first packet alone which does not require the SPI to be chosen
randomly. If the peer address changes (NAT, mobility etc.) and the IKE_SA_INIT
packet is retransmitted, it would still not locate the wrong SA (just create another
entry).

How does implementations handle this case ? Perhaps the clarification document
could address this issue also..

-mohan


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Sun Apr 24 13:26:38 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DPksQ-0008Mr-7p; Sun, 24 Apr 2005 13:26:38 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DPksO-0008MP-9O
	for ipsec@megatron.ietf.org; Sun, 24 Apr 2005 13:26:36 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA04781
	for <ipsec@ietf.org>; Sun, 24 Apr 2005 13:26:32 -0400 (EDT)
Received: from above.proper.com ([208.184.76.39])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DPl4R-00053L-3H
	for ipsec@ietf.org; Sun, 24 Apr 2005 13:39:05 -0400
Received: from [10.20.30.249] (dsl2-63-249-109-245.cruzio.com [63.249.109.245])
	(authenticated bits=0)
	by above.proper.com (8.12.11/8.12.9) with ESMTP id j3OHQO2a003817;
	Sun, 24 Apr 2005 10:26:25 -0700 (PDT)
	(envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06210206be9183d5edd2@[10.20.30.249]>
In-Reply-To: <008701c5476f$9e21bbc0$6b01a8c0@adithya>
References: <008701c5476f$9e21bbc0$6b01a8c0@adithya>
Date: Sun, 24 Apr 2005 10:26:21 -0700
To: "Mohan Parthasarathy" <mohanp@sbcglobal.net>, <ipsec@ietf.org>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [Ipsec] IKEv2 SPI unique or random ?
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 1ac7cc0a4cd376402b85bc1961a86ac2
Cc: 
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

At 12:15 PM -0700 4/22/05, Mohan Parthasarathy wrote:
>If the SPIs are chosen randomly, then the probability of collision 
>comes down and
>hence the above issue does not arise.

That is how most implementations choose them, I suspect.

>How does implementations handle this case ? Perhaps the clarification document
>could address this issue also..

We'll add a short bit about that.

--Paul Hoffman, Director
--VPN Consortium

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Mon Apr 25 06:50:58 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DQ1B4-0006OH-8J; Mon, 25 Apr 2005 06:50:58 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DQ1B2-0006OC-GG
	for ipsec@megatron.ietf.org; Mon, 25 Apr 2005 06:50:56 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA04449
	for <ipsec@ietf.org>; Mon, 25 Apr 2005 06:50:53 -0400 (EDT)
Received: from michael.checkpoint.com ([194.29.32.68])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DQ1NF-0002XW-GJ
	for ipsec@ietf.org; Mon, 25 Apr 2005 07:03:35 -0400
Received: from [194.29.46.218] (localhost [127.0.0.1])
	by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id
	j3PAnsnP027120
	for <ipsec@ietf.org>; Mon, 25 Apr 2005 13:49:54 +0300 (IDT)
Mime-Version: 1.0 (Apple Message framework v619.2)
Content-Transfer-Encoding: 7bit
Message-Id: <5d8462b53fc9dfc6c23ac2e741a9590f@checkpoint.com>
Content-Type: text/plain; charset=US-ASCII; format=flowed
To: IPsec WG <ipsec@ietf.org>
From: Yoav Nir <ynir@checkpoint.com>
Date: Mon, 25 Apr 2005 13:50:46 +0300
X-Mailer: Apple Mail (2.619.2)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: d17f825e43c9aed4fd65b7edddddec89
Content-Transfer-Encoding: 7bit
Subject: [Ipsec] Question about MsgID in AUTH exchange
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Hi all.

This has probably been raised before.  Section 2.2 says that "The 
IKE_SA initial setup messages will always be numbered 0 and 1"

The AUTH exchange can take more than two messages (when EAP is used).  
In that case, will all the messages of the AUTH exchange carry the 
number 1, or will they use up as many message ID numbers as are needed 
so each message has a unique ID?



_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Mon Apr 25 08:58:14 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DQ3AE-0006U2-8A; Mon, 25 Apr 2005 08:58:14 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DQ3AC-0006Tq-ES
	for ipsec@megatron.ietf.org; Mon, 25 Apr 2005 08:58:12 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA12979
	for <ipsec@ietf.org>; Mon, 25 Apr 2005 08:58:05 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DQ3ML-00089Z-Qd
	for ipsec@ietf.org; Mon, 25 Apr 2005 09:10:47 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j3PCvqIJ024787
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Mon, 25 Apr 2005 15:57:53 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j3PCvqVw024784;
	Mon, 25 Apr 2005 15:57:52 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <17004.59727.796954.990628@fireball.kivinen.iki.fi>
Date: Mon, 25 Apr 2005 15:57:51 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Yoav Nir <ynir@checkpoint.com>
Subject: [Ipsec] Question about MsgID in AUTH exchange
In-Reply-To: <5d8462b53fc9dfc6c23ac2e741a9590f@checkpoint.com>
References: <5d8462b53fc9dfc6c23ac2e741a9590f@checkpoint.com>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 3 min
X-Total-Time: 2 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7bac9cb154eb5790ae3b2913587a40de
Content-Transfer-Encoding: 7bit
Cc: IPsec WG <ipsec@ietf.org>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Yoav Nir writes:
> The AUTH exchange can take more than two messages (when EAP is used).  
> In that case, will all the messages of the AUTH exchange carry the 
> number 1, or will they use up as many message ID numbers as are needed 
> so each message has a unique ID?

Yes, only the first AUTH message has message id of 1, later ones will
have 2, 3 and so on...
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Tue Apr 26 04:58:32 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DQLto-0000nP-8c; Tue, 26 Apr 2005 04:58:32 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DQLtl-0000nF-Cd
	for ipsec@megatron.ietf.org; Tue, 26 Apr 2005 04:58:30 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA15753
	for <ipsec@ietf.org>; Tue, 26 Apr 2005 04:58:27 -0400 (EDT)
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DQM6A-0005s5-0A
	for ipsec@ietf.org; Tue, 26 Apr 2005 05:11:19 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.12.11/8.12.10) with ESMTP id j3Q8uHSI007202
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO);
	Tue, 26 Apr 2005 11:56:17 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.12.11/8.12.6/Submit) id j3Q8uFA9007199;
	Tue, 26 Apr 2005 11:56:15 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <17006.559.419257.587977@fireball.kivinen.iki.fi>
Date: Tue, 26 Apr 2005 11:56:15 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: byfraser@cisco.com, tytso@mit.edu, angelos@cs.columbia.edu
Subject: [Ipsec] I-D ACTION:draft-ietf-ipsec-ikev2-ecc-groups-00.txt
In-Reply-To: <200504181951.PAA24054@ietf.org>
References: <200504181951.PAA24054@ietf.org>
X-Mailer: VM 7.17 under Emacs 21.3.1
X-Edit-Time: 4 min
X-Total-Time: 4 min
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8b30eb7682a596edff707698f4a80f7d
Content-Transfer-Encoding: 7bit
Cc: ipsec@ietf.org, hartmans-ietf@mit.edu, housley@vigilsec.com
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Internet-Drafts@ietf.org writes:
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories. This draft is a work item of the IP Security Protocol
> Working Group of the IETF.
> 
> 	Title		: ECC Groups For IKEv2
> 	Author(s)	: J. Solinas
> 	Filename	: draft-ietf-ipsec-ikev2-ecc-groups-00.txt
> 	Pages		: 6
> 	Date		: 2005-4-18
> 	
> This document describes ECC groups for use as Diffie-Hellman groups 
>    in the Internet Key Exchange version 2 (IKEv2) protocol.  These new 
>    groups are defined to align IKEv2 with other standards, particularly 
>    NIST standards, and with and to provide more efficient implementation
>    than in previously defined groups.

I have 2 problems with this document.

1) My understanding was that IPsec working group cannot take any new
   work items. At least it does not match the working group charter in
   the http://www.ietf.org/html.charters/ipsec-charter.html. The
   working group charter is already empty (I assume it anticipates the
   shutting down of the working group)...

   So why is this document taken as a working group document? This
   same question applies to the draft-ietf-ipsec-ike-ecp-groups-00.txt
   and draft-ietf-ipsec-ikev2-ecc-groups-00.txt


2) The second technical problem is that this document describes
   elliptic curve groups, but does not define how they are supposed to
   be used in the IKEv2. All elliptic curve text was removed from the
   IKEv2 document earlier, as we didn't have implementation experience
   of that, and the old IKEv1 text was not considered clear enough to
   describe what to put in the KE etc payloads. This document does not
   describe what format the KE payload has if the ECP group is used. 
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Tue Apr 26 12:01:46 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DQSVN-0008Ek-Uy; Tue, 26 Apr 2005 12:01:45 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DQSVM-0008Ec-0G
	for ipsec@megatron.ietf.org; Tue, 26 Apr 2005 12:01:44 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA21370
	for <ipsec@ietf.org>; Tue, 26 Apr 2005 12:01:39 -0400 (EDT)
Received: from above.proper.com ([208.184.76.39])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DQShm-00008u-IO
	for ipsec@ietf.org; Tue, 26 Apr 2005 12:14:35 -0400
Received: from [10.20.30.249] (dsl2-63-249-109-245.cruzio.com [63.249.109.245])
	(authenticated bits=0)
	by above.proper.com (8.12.11/8.12.9) with ESMTP id j3QG1WrA003564
	for <ipsec@ietf.org>; Tue, 26 Apr 2005 09:01:33 -0700 (PDT)
	(envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06210240be9413b293d4@[10.20.30.249]>
In-Reply-To: <17006.559.419257.587977@fireball.kivinen.iki.fi>
References: <200504181951.PAA24054@ietf.org>
	<17006.559.419257.587977@fireball.kivinen.iki.fi>
Date: Tue, 26 Apr 2005 09:01:16 -0700
To: IPsec WG <ipsec@ietf.org>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [Ipsec] I-D ACTION:draft-ietf-ipsec-ikev2-ecc-groups-00.txt
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 2409bba43e9c8d580670fda8b695204a
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

[[ ...regardless of the file name on the Internet Draft... ]]

At 11:56 AM +0300 4/26/05, Tero Kivinen wrote:
>2) The second technical problem is that this document describes
>    elliptic curve groups, but does not define how they are supposed to
>    be used in the IKEv2. All elliptic curve text was removed from the
>    IKEv2 document earlier, as we didn't have implementation experience
>    of that, and the old IKEv1 text was not considered clear enough to
>    describe what to put in the KE etc payloads. This document does not
>    describe what format the KE payload has if the ECP group is used.

Fully agree. In specific, we need to know exactly what bits will be 
used in the SKEYSEED calculation for g^ir. That should be added to a 
revision of this document or a revision of 
draft-ietf-ipsec-ike-ecc-groups.

A fully worked-out example in either of those two documents would 
also be very helpful to implementers. From the feedback I heard at 
the Santa Barbara IPsec bakeoffs, one of the main reasons nearly no 
one deployed ECC was that they couldn't find examples to test their 
code agains.

Also, in draft-ietf-ipsec-ikev2-ecc-groups, section 2 and 5 are in 
full disagreement. :-)

--Paul Hoffman, Director
--VPN Consortium

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Fri Apr 29 04:26:38 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DRQpZ-0002Ia-Kz; Fri, 29 Apr 2005 04:26:37 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DRQpW-0002IS-MM
	for ipsec@megatron.ietf.org; Fri, 29 Apr 2005 04:26:35 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA03638
	for <ipsec@ietf.org>; Fri, 29 Apr 2005 04:26:32 -0400 (EDT)
From: Pasi.Eronen@nokia.com
Received: from mgw-x3.nokia.com ([131.228.20.26])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DRR2X-0007hB-96
	for ipsec@ietf.org; Fri, 29 Apr 2005 04:40:02 -0400
Received: from esdks004.ntc.nokia.com (esdks004.ntc.nokia.com [172.21.138.159])
	by mgw-x3.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id
	j3T8QUQ24231
	for <ipsec@ietf.org>; Fri, 29 Apr 2005 11:26:30 +0300 (EET DST)
X-Scanned: Fri, 29 Apr 2005 11:26:09 +0300 Nokia Message Protector V1.3.34
	2004121512 - RELEASE
Received: (from root@localhost)
	by esdks004.ntc.nokia.com (8.12.9/8.12.9) id j3T8Q9bf010840
	for <ipsec@ietf.org>; Fri, 29 Apr 2005 11:26:09 +0300
Received: from mgw-int1.ntc.nokia.com (172.21.143.96)
	by esdks004.ntc.nokia.com 00c21lpL; Fri, 29 Apr 2005 11:26:08 EEST
Received: from esebh004.NOE.Nokia.com (esebh004.ntc.nokia.com [172.21.138.84])
	by mgw-int1.ntc.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id
	j3T8PiM27897
	for <ipsec@ietf.org>; Fri, 29 Apr 2005 11:25:44 +0300 (EET DST)
Received: from esebh103.NOE.Nokia.com ([172.21.143.33]) by
	esebh004.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6881); 
	Fri, 29 Apr 2005 11:25:30 +0300
Received: from esebe105.NOE.Nokia.com ([172.21.143.53]) by
	esebh103.NOE.Nokia.com with Microsoft SMTPSVC(6.0.3790.211); 
	Fri, 29 Apr 2005 11:25:29 +0300
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Date: Fri, 29 Apr 2005 11:25:29 +0300
Message-ID: <B356D8F434D20B40A8CEDAEC305A1F240C5EBD@esebe105.NOE.Nokia.com>
Thread-Topic: Clarifications open issue: INTERNAL_IP4_SUBNET/NETMASK
thread-index: AcVMlQCPuasGkZ+FRr2t2WoEBcHQnw==
To: <ipsec@ietf.org>
X-OriginalArrivalTime: 29 Apr 2005 08:25:29.0407 (UTC)
	FILETIME=[009D3CF0:01C54C95]
X-Spam-Score: 0.3 (/)
X-Scan-Signature: a7d6aff76b15f3f56fcb94490e1052e4
Content-Transfer-Encoding: quoted-printable
Subject: [Ipsec] Clarifications open issue: INTERNAL_IP4_SUBNET/NETMASK
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Hi everyone,

One of the open issues in the IKEv2 clarifications draft
concerns INTERNAL_IP4_SUBNET and INTERNAL_IP4_NETMASK
attributes. We already had some discussion about these on the
list earlier, but I'd like to check if others think our
interpretation is roughly correct:

- INTERNAL_IP4_SUBNET in CFG_REPLY means roughly that "in
  my (responder's) opinion, you should send traffic to these
  addresses through me".  If these addresses are not included in
  TSr, obviously we need to create additional SAs.  And if TSr
  includes other addresses (e.g. is 0.0.0.0-255.255.255.255)=20
  it means that the client can (but does not have to), if=20
  permitted by its own policy, do "split tunneling" (only=20
  send the traffic listed in INTERNAL_IP4_SUBNETs via the=20
  gateway, but other traffic directly).

- Including INTERNAL_IP4_SUBNET in CFG_REQUEST is not=20
  absolutely necessary: if the responder has this information,=20
  it can send it anyway (as shown in the example in ikev2-17=20
  Section 2.19). But if INTERNAL_IP4_SUBNET is included in=20
  CFG_REQUEST, other lengths than zero don't make sense.

- The address blocks listed in INTERNAL_IP4_SUBNET do not have
  to match physical link boundaries. For instance, if the whole
  B class block 130.233.0.0/16 is behind the gateway, it's
  enough to send a single INTERNAL_IP4_SUBNET attribute (rather
  than listing all the /24s or whatever sized subnets that
  organization uses).
 =20
- INTERNAL_IP4_NETMASK does not make much sense, and should not
  be used (or it means the same thing as INTERNAL_IP4_SUBNET,
  and in that case, it's preferable to use INTERNAL_IP4_SUBNET).

draft-eronen-draft-eronen-ipsec-ikev2-clarifications-02.txt
actually has almost four pages of text about these payloads,
so especially if you disagree with our current opinion (which
is open to change, BTW), please check that, too!

Best regards,
Pasi

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Fri Apr 29 08:00:59 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DRUB0-0000Y9-WD; Fri, 29 Apr 2005 08:00:59 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DRUAw-0000Wf-Ey
	for ipsec@megatron.ietf.org; Fri, 29 Apr 2005 08:00:55 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA16884
	for <ipsec@ietf.org>; Fri, 29 Apr 2005 08:00:53 -0400 (EDT)
Received: from michael.checkpoint.com ([194.29.32.68])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DRUNy-0008Aw-Jp
	for ipsec@ietf.org; Fri, 29 Apr 2005 08:14:24 -0400
Received: from MSILHLT011 (localhost [127.0.0.1])
	by michael.checkpoint.com (8.12.10+Sun/8.12.10) with SMTP id
	j3TBxhnQ005188; Fri, 29 Apr 2005 14:59:46 +0300 (IDT)
Message-ID: <000e01c54cb3$490aaae0$7d0a10ac@marvell.com>
From: "Yoav Nir" <ynir@checkpoint.com>
To: <Pasi.Eronen@nokia.com>, <ipsec@ietf.org>
References: <B356D8F434D20B40A8CEDAEC305A1F240C5EBD@esebe105.NOE.Nokia.com>
Subject: Re: [Ipsec] Clarifications open issue: INTERNAL_IP4_SUBNET/NETMASK
Date: Fri, 29 Apr 2005 15:02:13 +0300
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1437
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1441
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 5a9a1bd6c2d06a21d748b7d0070ddcb8
Content-Transfer-Encoding: 7bit
Cc: 
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

I can try to give you a vendor's perspective. Most vendors implement the
internal addressing feature using some kind of virtual network adapter. This
can be a PPP adapter (as in Microsoft's L2TP) or a TUN/TAP adapter or a
virtual ethernet adapter or whatever. To the client-side operating system
they look like real network adapters.

When the client software brings up a network adapter (whether virtual or
physical), it has to be configured in several ways:
- IP address
- Netmask
- DNS servers associated with this interface
- NBNS servers (these days it's not just for Windows)
- interface-specific domain suffix
- routing changes

It's true that for VPN there's usually no point in the netmask attribute,
and it could safely be always set to 255.255.255.255, but the netmask is
always there.  We had a version where the netmask was always set to
255.255.255.0 (which just seemed the most standard), and customers
complained when they used different-sized networks for Cfg. We never could
get them to tell us why it was needed.

As for the INTERNAL_IP4_SUBNET, it just makes sense to use this as input for
the routing changes.  These will tell the operating system which traffic to
route through the virtual interface (and thus it gets encrypted) and which
traffic not to. If the SA does not cover the whole contents of the SUBNET
field, then subsequent packets will trigger more Create-Child-SA exchanges.

Certain small implementations of a gateway are the kind of small devices
that also serve as a DHCP server.  They assign IPs both to the internal
network and to remote-access clients, and they assign both from the same
pool.  These devices later work as bridges (rather than routers) and so the
NETMASK may matter.  If the client sends a broadcast packet, the device will
propagate it in the internal network (maybe also to all other clients?).  In
that case the client needs the NETMASK to properly form the broadcast
packets.  This may sound silly, but it can get protocols like the windows
file sharing protocol to work, allowing you to map network drives from the
road.  It has its uses.

----- Original Message ----- 

<snip>

- INTERNAL_IP4_NETMASK does not make much sense, and should not
  be used (or it means the same thing as INTERNAL_IP4_SUBNET,
  and in that case, it's preferable to use INTERNAL_IP4_SUBNET).

draft-eronen-draft-eronen-ipsec-ikev2-clarifications-02.txt
actually has almost four pages of text about these payloads,
so especially if you disagree with our current opinion (which
is open to change, BTW), please check that, too!

Best regards,
Pasi




_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Fri Apr 29 08:36:06 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DRUj0-0007J5-Pi; Fri, 29 Apr 2005 08:36:06 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DRUiy-0007GI-Ku
	for ipsec@megatron.ietf.org; Fri, 29 Apr 2005 08:36:04 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA20623
	for <ipsec@ietf.org>; Fri, 29 Apr 2005 08:36:03 -0400 (EDT)
Received: from n2.nomadiclab.com ([193.234.219.2])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DRUw1-0001YG-Os
	for ipsec@ietf.org; Fri, 29 Apr 2005 08:49:35 -0400
Received: from [IPv6:::1] (localhost [127.0.0.1])
	by n2.nomadiclab.com (Postfix) with ESMTP id B93F0212C84;
	Fri, 29 Apr 2005 15:35:48 +0300 (EEST)
Mime-Version: 1.0 (Apple Message framework v622)
Content-Type: text/plain; charset=US-ASCII; format=flowed
Message-Id: <c604b4798b6bd1b1bd4fe10bc712a966@nomadiclab.com>
Content-Transfer-Encoding: 7bit
From: Pekka Nikander <pekka.nikander@nomadiclab.com>
Date: Fri, 29 Apr 2005 15:36:07 +0300
To: Karen Seo <kseo@bbn.com>
X-Mailer: Apple Mail (2.622)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8abaac9e10c826e8252866cbe6766464
Content-Transfer-Encoding: 7bit
Cc: ipsec@ietf.org
Subject: [Ipsec] Small comments to rfc2401bis-06.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Karen,

I know rfc2401bis is quite far and that I am late in game,
but some small suggestions based on my fresh reading:

On page 18, Section 4.4

   The Mobility Header is first time mentioned in Section 4.4.,
   without any reference.   The reference an explanation is only
   in Section 4.4.1.1, several pages later.

   I found that surprising.   I would suggest adding
   some text wrt. Mobile IPv6 in Section 3.2, and perhaps also
   explicitly mention ICMP there, too.  At minimum, the informative
   reference to [Mobip] should be normative, as it is referenced
   in normative contexts.

On page 23, Section 4.4.1.1

   In the parenthesised sentence, there is a phrase ", as noted above".
   However, I didn't find any explanation about how to use sockets
   directly before that in the document; indeed, I found a corresponding
   note in the beginning of page 24, and in more detail only on page 29,
   in the end of 4.4.1.1.  There is a further note on page 49, in 
Section 5.
   Maybe these locations should be linked together better?

I have a couple of other questions, but they are more to the WG
and I'll send them separately.

--Pekka Nikander


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Fri Apr 29 08:43:27 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DRUq7-0008P4-My; Fri, 29 Apr 2005 08:43:27 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DRUq5-0008Ox-MX
	for ipsec@megatron.ietf.org; Fri, 29 Apr 2005 08:43:25 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA21108
	for <ipsec@ietf.org>; Fri, 29 Apr 2005 08:43:24 -0400 (EDT)
Received: from n2.nomadiclab.com ([193.234.219.2])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DRV39-0001sB-Rx
	for ipsec@ietf.org; Fri, 29 Apr 2005 08:56:56 -0400
Received: from [IPv6:::1] (localhost [127.0.0.1])
	by n2.nomadiclab.com (Postfix) with ESMTP id 57217212D2C
	for <ipsec@ietf.org>; Fri, 29 Apr 2005 15:43:16 +0300 (EEST)
Mime-Version: 1.0 (Apple Message framework v622)
Content-Transfer-Encoding: 7bit
Message-Id: <5dfcc9adb0e5a519ab5af5dc19ad82fb@nomadiclab.com>
Content-Type: text/plain; charset=US-ASCII; format=flowed
To: ipsec@ietf.org
From: Pekka Nikander <pekka.nikander@nomadiclab.com>
Date: Fri, 29 Apr 2005 15:43:35 +0300
X-Mailer: Apple Mail (2.622)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: ffa9dfbbe7cc58b3fa6b8ae3e57b0aa3
Content-Transfer-Encoding: 7bit
Subject: [Ipsec] rfc2401bis-06: why ESP and AH SPIs are not considered as
	(potential) selectors?
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Folks,

This has probably been discussed in the death before, but I was
not able to find the answer in the archives.  Consequently, I'd
appreciate if someone would enlighten me, perhaps by pointing out
to the relevant thread of previous discussion.  Please note too
that this question is more due to academic/architectural curiosity
rather than that I would be implementing this.

Anyway, while reading rfc2401bis-06 with fresh eyes, I was left
wondering why aren't the AH and ESP SPI fields considered as
selectors, similar to TCP/UDP ports, ICMP types/codes, and MH
message types?  Such support looks trivial to me (but perhaps
I am missing something), and would make supporting the (admittedly
dubious) nested SAs much easier.  In other words, if my 2401bis
implementation would route back outgoing IPsec packets to the protected
side and then again out, then how do I select the right enclosing
SA for it unless I can use the SPI?  Likewise, if I receive an
incoming packet that contains an AH or ESP header after IPsec
processing, how to I enforce anything on the SPIs before passing
it again out for nested processing?

So, what is the reason for the current state?

--Pekka Nikander


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Fri Apr 29 08:57:51 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DRV42-0002fY-Ve; Fri, 29 Apr 2005 08:57:50 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DRV3y-0002dc-Nd
	for ipsec@megatron.ietf.org; Fri, 29 Apr 2005 08:57:48 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA22102
	for <ipsec@ietf.org>; Fri, 29 Apr 2005 08:57:45 -0400 (EDT)
Received: from n2.nomadiclab.com ([193.234.219.2])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DRVH1-0002YW-Mk
	for ipsec@ietf.org; Fri, 29 Apr 2005 09:11:17 -0400
Received: from [IPv6:::1] (localhost [127.0.0.1])
	by n2.nomadiclab.com (Postfix) with ESMTP id DA853212D2C;
	Fri, 29 Apr 2005 15:57:35 +0300 (EEST)
Mime-Version: 1.0 (Apple Message framework v622)
Content-Type: text/plain; charset=US-ASCII; format=flowed
Message-Id: <c65e5e4ee96325e358b142e41291c8e1@nomadiclab.com>
Content-Transfer-Encoding: 7bit
From: Pekka Nikander <pekka.nikander@nomadiclab.com>
Date: Fri, 29 Apr 2005 15:57:55 +0300
To: ipsec@ietf.org
X-Mailer: Apple Mail (2.622)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8b431ad66d60be2d47c7bfeb879db82c
Content-Transfer-Encoding: 7bit
Cc: BTNS WG ML <anonsec@postel.org>
Subject: [Ipsec] rfc2401bis-06: Why there are no names in SAs?
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Pekka Nikander <pekka.nikander@nomadiclab.com>, ipsec@ietf.org
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

[Excuse for cross-posting; followups to ipsec only.]

Folks,

While reading rfc2401bis-06 for considering BTNS, I came up
with one serious architectural question.  At this point of time
I don't know if this really relates to BTNS or not, but it seems
to have some larger relevance in any case.

The essence of this question boils down to the nature of IP
addresses.  While reading rfc2401bis, it becomes apparent that
it is very much build around the model that the IP addresses
used by different hosts are considered to be stable, or at least
divisible into different security classes in a static manner.
While that may be fine for most if not all current purposes of
IPsec, I am afraid that the Internet in general is moving away
from that notion.

However, in addition to the selectors based on this world view,
the SPD and PAD also have now support for "names", mainly
meant to be used in situations where at least one of the IPsec
devices is an end-host (rather than a security gateway).  The
support for these higher-layer, symbolic identifiers seems to
be sufficient for key management and outgoing traffic.  What
seems to be especially good is the use of names in linking PAD
and SPD entries together (end of section 4.4.3.4).

What seems to be missing is support for incoming traffic.
More specifically, what I am missing is either

   a) names embedded in (inbound) SAD entries, or
   b) back pointers from (inbound) SAD entries to
      corresponding SPD entries

If either of them were in place, that would allow incoming
packets to be tagged with names.  Those names could then,
optionally, be available to apps above.

Furthermore, and probably more importantly, tagging
the SAs with names would make it also easier to handle
with potential stale SAs as the SPD is dynamically
changed.

Now, is there a specific reason why the (inbound) SAD
entries are not tagged/linked with their corresponding
SPD entries?

--Pekka Nikander
  
  


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Fri Apr 29 16:08:42 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DRbn0-0007Ik-JX; Fri, 29 Apr 2005 16:08:42 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DRbmw-0007GX-Pr; Fri, 29 Apr 2005 16:08:38 -0400
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA07678;
	Fri, 29 Apr 2005 16:08:36 -0400 (EDT)
Message-Id: <200504292008.QAA07678@ietf.org>
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce@ietf.org
Date: Fri, 29 Apr 2005 16:08:35 -0400
Cc: ipsec@ietf.org, Theodore Ts'o <tytso@mit.edu>,
	Barbara Fraser <byfraser@cisco.com>
Subject: [Ipsec] WG Action: Conclusion of IP Security Protocol (ipsec)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

The IP Security Protocol (ipsec) WG in the Security Area has concluded.

The IESG contact persons are Russ Housley and Sam Hartman. 

+++

The IPsec WG has finished their work. It has taken a very long time,
but the task is finally accomplished. Good job.

There are a few remaining active documents. They deal with the addition of
elliptic curve cryptography (ECC) to IKE and IKEv2. This item was
abandoned by the WG several years ago, and for good reasons, there is renewed
interest. Very few participants are involved in these documents. Therefore, these
documents will progress as individual standards-track documents.

The ownership from the remaining WG documents will be transferred to the
following individuals:

draft-ietf-ipsec-ike-auth-ecdsa-03.txt:
Jerry Solinas <jsolinas@orion.ncsc.mil>

draft-ietf-ipsec-ikev2-auth-ecdsa-00.txt:
Jerry Solinas <jsolinas@orion.ncsc.mil>

draft-ietf-ipsec-ike-ecc-groups-05.txt:
Simon Blake-Wilson <sblakewilson@bcisse.com>

draft-ietf-ipsec-ikev2-ecc-groups-00.txt:
Jerry Solinas <jsolinas@orion.ncsc.mil>

draft-ietf-ipsec-ike-ecp-groups-00.txt:
Jerry Solinas <jsolinas@orion.ncsc.mil>

The IPsec WG mail list will remain active.



_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Sat Apr 30 23:30:34 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DS5AA-0005ze-GA; Sat, 30 Apr 2005 23:30:34 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DS5A8-0005zZ-4I
	for ipsec@megatron.ietf.org; Sat, 30 Apr 2005 23:30:32 -0400
Received: from pike.sandelman.ca (pike.sandelman.ca [205.150.200.164])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA21184
	for <ipsec@lists.ietf.org>; Sat, 30 Apr 2005 23:30:28 -0400 (EDT)
Received: from sandelman.ottawa.on.ca (unknown
	[IPv6:2002:c08b:2e21:2:20d:60ff:fe77:9739])
	by pike.sandelman.ca (Postfix) with ESMTP id 9C7086361B
	for <ipsec@lists.ietf.org>; Sat, 30 Apr 2005 23:30:30 -0400 (EDT)
Received: from marajade.sandelman.ottawa.on.ca (marajade [127.0.0.1])
	by sandelman.ottawa.on.ca (Postfix) with ESMTP id 303AFBD70
	for <ipsec@lists.ietf.org>; Sat, 30 Apr 2005 23:30:30 -0400 (EDT)
From: "Michael Richardson" <mcr@sandelman.ottawa.on.ca>
To: ipsec@ietf.org
X-Mailer: MH-E 7.82; nmh 1.0.4+dev; XEmacs 21.4 (patch 17)
Date: Sat, 30 Apr 2005 23:30:30 -0400
Message-ID: <6719.1114918230@marajade.sandelman.ottawa.on.ca>
Subject: [Ipsec] twofish ESP testing
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

-----BEGIN PGP SIGNED MESSAGE-----


I wonder if anyone could confirm that the following packet decrypts
properly with twofish, or alternatively, point me at a source of 
twofish/hmac-md5 encrypted ESP packets with keys.

(pcap file is at: http://www.sandelman.ca/tmp/08-sunrise-sunset-twofish.pcap
or: http://anoncvs.openswan.org/cgi-bin/viewcvs.cgi/openswan-2/testing/klips/inputs/08-sunrise-sunset-twofish.pcap?rev=1.1&view=auto
)

If someone needs 3DES (MD5 or SHA1), or AES (128,256)+SHA1 files, they
are also there, and the test cases are there with
testing/klips/{east,west}-icmp-XX.

The keys are:

enckey=0xaaaabbbbccccdddd4043434545464649 
authkey=0x8765876587658765876587658765876587658765

ipsec spi --af inet --edst 192.1.2.45 --spi 0xDED12345 --proto esp --src 192.1.2.23 --esp twofish128-sha1-96 --enckey $enckey --authkey $authkey

10:00:00:64:64:23 > 10:00:00:64:64:45, ethertype IPv4 (0x0800), length 166: IP 192.1.2.23 > 192.1.2.45: ESP(spi=0xded12345,seq=0x1)
        0x0000:  1000 0064 6445 1000 0064 6423 0800 4500  ...ddE...dd#..E.
        0x0010:  0098 b7a9 0000 4032 3e44 c001 0217 c001  ......@2>D......
        0x0020:  022d ded1 2345 0000 0001 4166 e0dd c326  .-..#E....Af...&
        0x0030:  3ffb 9d88 266c 2893 7989 202c 4980 e5e2  ?...&l(.y..,I...
        0x0040:  b89f 360c 4583 a11f 37fc 1738 6626 0422  ..6.E...7..8f&."
        0x0050:  1586 4aa5 533f 2063 038b d362 c91a f4ca  ..J.S?.c...b....
        0x0060:  d4e3 cac0 7bdb b98b f9a6 b5c9 b677 d331  ....{........w.1
        0x0070:  7387 c098 64dd 91c9 0832 e7e1 e682 de52  s...d....2.....R
        0x0080:  6ffa d714 31c9 4fef e9fe 9170 ab44 ef32  o...1.O....p.D.2
        0x0090:  537e 1563 c171 5922 59a5 108c 03f8 b209  S~.c.qY"Y.......
        0x00a0:  f242 9167 d7b2                           .B.g..

Result should be:

10:00:00:ab:cd:ff > 10:00:00:70:72:69, ethertype IPv4 (0x0800), length 98: IP 192.0.2.1 > 192.0.1.1: icmp 64: echo request seq 1280
        0x0000:  1000 0070 7269 1000 00ab cdff 0800 4500  ...pri........E.
        0x0010:  0054 0000 4000 3e01 b9a6 c000 0201 c000  .T..@.>.........
        0x0020:  0101 0800 baf0 6f00 0500 239b c73b f234  ......o...#..;.4
        0x0030:  0100 0809 0a0b 0c0d 0e0f 1011 1213 1415  ................
        0x0040:  1617 1819 1a1b 1c1d 1e1f 2021 2223 2425  ...........!"#$%
        0x0050:  2627 2829 2a2b 2c2d 2e2f 3031 3233 3435  &'()*+,-./012345
        0x0060:  3637                                     67

- -- 
] Michael Richardson          Xelerance Corporation, Ottawa, ON |  firewalls  [
] mcr @ xelerance.com           Now doing IPsec training, see   |net architect[
] http://www.sandelman.ca/mcr/    www.xelerance.com/training/   |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Finger me for keys

iQCVAwUBQnRNTYqHRg3pndX9AQFM6QP+NA454J/iVRT5/TQ0sp1EqfHcBZlb/+0r
tCzFQM4hDsEqSF9hY5JzkEWNqZvWebn7k3WXFvfffgrpD96XP7MUN9tztG9QrTAm
d/LjoOgmD987t+SYzcWPBRJLF6mei+NJR1zfCOzOXmZ8cbm5v97mceXTeMMfnWI3
qUqv2naJh34=
=aTiK
-----END PGP SIGNATURE-----

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



