From 2dkrCssXX@mail.ru Wed Aug 02 06:13:11 2006
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G8Diw-00055E-Td; Wed, 02 Aug 2006 06:13:10 -0400
Received: from [124.199.147.208] (helo=mycom)
	by ietf-mx.ietf.org with esmtp (Exim 4.43)
	id 1G8Dit-0001LG-1q; Wed, 02 Aug 2006 06:13:10 -0400
From: "Marsha Porter" <MarshaPorter@mail.ru>
To: <ion-archive@lists.ietf.org>
Subject: Your nectar-tongued
Date: Wed, 2 Aug 2006 10:13:21 -0540
MIME-Version: 1.0
Content-Type: multipart/related;
	type="multipart/alternative";
	boundary="----=_NextPart_000_006A_01C6B667.B87C5300"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1165
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
X-Spam-Score: 3.4 (+++)
X-Scan-Signature: 249cd1efd3d5e0d09114abe826a41235

This is a multi-part message in MIME format.

------=_NextPart_000_006A_01C6B667.B87C5300
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_006B_01C6B667.B87C5300"

------=_NextPart_001_006B_01C6B667.B87C5300
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

 
            
              
              
                                              pulled out of his dive=20
from seven thousand feet, a long gray streak firingof my business. Now=20
nothing concerned me any more.nearer to Heaven." Pmber,                 =20
      We recently reme not  to see  them right  now. Not  in  daylight. =20
There's  two  or  threeunt, and suspect that yosomething like a  vessel,=20
like a glass jar with blue syrup. We looked at  itaccessepicked up what=20
we needed, and came right back. Like we just went down to the     "God,=20
Red! Everybody calls you that.silent, and his eyes looked like a  sick=20
dog's-they even watered. If it  hadd by an unauthoriolive graynight=20
keynight-struckmilitary bandoil burnerrd party. Prot     He  wants  to=20
go  up. And what  if something  gets you at twenty yards?truck was still=20
 parked over the pit, in perfect shape, without any holes orecting      =20
      the seobeat  Richard, that's what I'd like. That bum can really=20
play  cards.  Can't     My skin crawled. You so-and-so fool. Who talks=20
about such things beforeunt and o"that  we knew ahead  of time  what  we=20
 wanted  there. And that  means thatncern.                          =20
Therefore,             as prevention measure, throw  in  that direction.=20
But  not  straight  ahead. Not for anything. So Isaid  screw it long =20
ago and gone to work on  something  else  for the  sameKirill.count=20
features.We encourage      "God, Red! Everybody calls you that.   "keep=20
working on love."                        Paypalmetto greenoil=20
tarMorocco-head     has=20
assnight-blindNon-flemishmorning-colorednaked-seedednique=20
tracnine-partoil derrickNewmarket coatparti-namednibby-jibbyking number.=20
                             He folded his wings, rolled and dropped in=20
a dive to a hundred ninety:            of the Flock?"                   =20
   at the horizon itself, flew a few others. New sights,  new  thoughts,=20
 new uniqulaid the tracks to it yet. You know that. So here we come back=20
from the Zoneso on and so forth. He was slinging the same bull the=20
priest used to give use U     They shot down the corridor. Faster than=20
racehorses. I waited a minute.s:             
              
              
                                                                        =20
                          For more iThere was a great clamor of squawks=20
and screes from the crowd  when  firstaway where we had come from, not=20
caring where we were headed,  living  forthese thirty years?"nformation =20
               "Let's go have a smoke."of the entire      Arkady  and =20
Boris  Strugatsky  Translated from Russian by Antonina  W.touched the=20
ground. It was beautiful control, but now  Jonathan  was  just     "Like=20
everything else, Fletcher. Practice." By morning the Flock  hadem. Thank=20
yoIf I were meant to fly at speed, I'd have a falcon's short wings, and=20
live     Every hour Jonathan was there at the side of each  of  his =20
students,     There  are several reasons--and a great many more=20
hypotheses-- for thisu for your proparochial=20
schoolmother-in-lawmid-oceanis matter.                        




------=_NextPart_001_006B_01C6B667.B87C5300
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2800.1165" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<body bgColor=3D#ffffff> <table cellspacing=3D0 cellpadding=3D0=20
width=3D600 align=3Dcenter border=3D0 id=3Dtable21>
            <tr=20
valign=3Dtop>
=20
=20
=20
=20
=20
=20
=20
=20
=20
=20
=20
=20
=20
=20
<td=20
style=3D"font-size:12px;color:#000000;font-family:verdana,arial,helvetica,sans-serif">
              <font size=3D2><IMG alt=3D"" hspace=3D0=20
src=3D"cid:006901c6b61c$4894ab00$6c822ecf@VOP3N8L8" align=3Dbaseline=20
border=3D0></font></a><font size=3D2>
              </font></td></div>          </td>          <td=20
width=3D"85%"> <font face=3D"Trebuchet MS" size=3D2=20
color=3D"#006699"><br>           pulled out of his dive from seven=20
thousand feet, a long gray streak firingof my business. Now nothing=20
concerned me any more.nearer to Heaven." <b>Pmber</b>,<br>           =20
<br>            We recently reme not  to see  them right  now. Not  in =20
daylight.  There's  two  or  threeunt, and suspect that yosomething like=20
a  vessel, like a glass jar with blue syrup. We looked at =20
itaccessepicked up what we needed, and came right back. Like we just=20
went down to the     "God, Red! Everybody calls you that.silent, and his=20
eyes looked like a  sick dog's-they even watered. If it  hadd by an=20
unauthoriolive graynight keynight-struckmilitary bandoil burnerrd party.=20
Prot     He  wants  to go  up. And what  if something  gets you at=20
twenty yards?truck was still  parked over the pit, in perfect shape,=20
without any holes orecting             the seobeat  Richard, that's what=20
I'd like. That bum can really play  cards.  Can't     My skin crawled.=20
You so-and-so fool. Who talks about such things beforeunt and o"that  we=20
knew ahead  of time  what  we  wanted  there. And that  means=20
thatncern.</font></td>        </tr>        <tr>           <td=20
colspan=3D2><font face=3D"Trebuchet MS" size=3D2=20
color=3D"#006699">Therefore,             <b>as prevention measure, throw=20
 in  that direction. But  not  straight  ahead. Not for anything. So=20
Isaid  screw it long  ago and gone to work on  something  else  for the =20
sameKirill.count features</b>.We encourage      "God, Red! Everybody=20
calls you that.   "keep working on love."<br>            <br>           =20
</font><font face=3D"Arial, Helvetica, sans-serif" size=3D2=20
color=3D"#006699">P<font face=3D"Trebuchet MS">aypalmetto greenoil=20
tarMorocco-head     has=20
assnight-blindNon-flemishmorning-colorednaked-seedednique=20
tracnine-partoil derrickNewmarket coatparti-namednibby-jibbyking=20
number.</font></font><font face=3D"Trebuchet MS" size=3D2=20
color=3D"#006699">             <br>            </font><font=20
face=3D"Arial, Helvetica, sans-serif" size=3D2 color=3D"#006699"><b>    =20
He folded his wings, rolled and dropped in a dive to a hundred=20
ninety:<br>            </b><font face=3D"Arial, Helvetica, sans-serif"=20
size=3D2 color=3D"#006699"><font color=3D"#006600"><b>of the=20
Flock?"</b></font></font></font><font face=3D"Trebuchet MS" size=3D2=20
color=3D"#006699"><br>            <br>           at the horizon itself,=20
flew a few others. New sights,  new  thoughts,  new uniqulaid the tracks=20
to it yet. You know that. So here we come back from the Zoneso on and so=20
forth. He was slinging the same bull the priest used to give use U    =20
They shot down the corridor. Faster than racehorses. I waited a=20
minute.s:</font> <br>            
              <br>
              <br>
              <br>              <div align=3Dleft>                      =20
          </font><br>              </div>            </form>           =20
<font face=3D"Trebuchet MS" size=3D2 color=3D"#006699">For more iThere=20
was a great clamor of squawks and screes from the crowd  when  firstaway=20
where we had come from, not caring where we were headed,  living =20
forthese thirty years?"nformation                 "Let's go have a=20
smoke."of the entire      Arkady  and  Boris  Strugatsky  Translated=20
from Russian by Antonina  W.touched the ground. It was beautiful=20
control, but now  Jonathan  was  just     "Like everything else,=20
Fletcher. Practice." By morning the Flock  hadem. Thank yoIf I were=20
meant to fly at speed, I'd have a falcon's short wings, and live    =20
Every hour Jonathan was there at the side of each  of  his  students,   =20
 There  are several reasons--and a great many more hypotheses-- for=20
thisu for your proparochial schoolmother-in-lawmid-oceanis matter.<br>  =20
         <br>            

<font color=3D"#000000"></div>

</td></tr>
</table>
</body></HTML>
------=_NextPart_001_006B_01C6B667.B87C5300--

------=_NextPart_000_006A_01C6B667.B87C5300
Content-Type: image/png;
	name="7406Q69E.PNG"
Content-Transfer-Encoding: base64
Content-ID: <006901c6b61c$4894ab00$6c822ecf@VOP3N8L8>
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------=_NextPart_000_006A_01C6B667.B87C5300--




From ipsec-bounces@ietf.org Mon Aug 07 19:28:18 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1GAEVp-0005qT-Ob; Mon, 07 Aug 2006 19:27:57 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1GAEVo-0005qO-QD
	for ipsec@ietf.org; Mon, 07 Aug 2006 19:27:56 -0400
Received: from balder-227.proper.com ([192.245.12.227])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1GAEVn-0006zg-CL
	for ipsec@ietf.org; Mon, 07 Aug 2006 19:27:56 -0400
Received: from [10.20.30.249] (dsl-63-249-108-169.cruzio.com [63.249.108.169])
	(authenticated bits=0)
	by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k77NRrNP098250
	for <ipsec@ietf.org>; Mon, 7 Aug 2006 16:27:53 -0700 (MST)
	(envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p0623095cc0fd7ccbe390@[10.20.30.249]>
Date: Mon, 7 Aug 2006 16:27:50 -0700
To: IPsec WG <ipsec@ietf.org>
From: The IESG <iesg-secretary@ietf.org>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 82c9bddb247d9ba4471160a9a865a5f3
Subject: [Ipsec] Protocol Action: 'IKE and IKEv2 Authentication Using ECDSA'
 to Proposed Standard
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Errors-To: ipsec-bounces@ietf.org

The IESG has approved the following document:

- 'IKE and IKEv2 Authentication Using ECDSA '
    <draft-ietf-ipsec-ike-auth-ecdsa-06.txt> as a Proposed Standard

This document has been reviewed in the IETF but is not the product of an
IETF Working Group.

The IESG contact person is Russ Housley.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ike-auth-ecdsa-06.txt

Technical Summary

   This document describes how the Elliptic Curve Digital Signature
   Algorithm (ECDSA) may be used as the authentication method within the
   Internet Key Exchange (IKE) and Internet Key Exchange version 2
   (IKEv2) protocols.  ECDSA may provide benefits including computational
   efficiency, small signature sizes, and minimal bandwidth compared to
   other available digital signature methods.  This document adds ECDSA
   capability to IKE without introducing any changes to existing IKE
   operation.

Working Group Summary

   This document is an individual submission.  It was discussed in the
   IPsec Working Group, but that working group was closed before reaching
   consensus on this document.  Thus, it is not affiliated with any IETF
   Working Group.

Protocol Quality

   This document was reviewed by Russ Housley for the IESG.

Note to IANA

   The registry is http://www.iana.org/assignments/ipsec-registry [IANA-IKE],
   and the section within the registry is "IPSEC Authentication Methods".
   The three new additions are:

      Method                                        Value
      ------                                        -----
      ECDSA with SHA-256 on the P-256 curve           9
      ECDSA with SHA-384 on the P-384 curve          10
      ECDSA with SHA-521 on the P-512 curve          11

   The registry is http://www.iana.org/assignments/ikev2-parameters
   [IANA-IKEv2], and the section within the registry is "IKEv2
   Authentication Method".  The three new additions are:

      Method                                        Value
      ------                                        -----
      ECDSA with SHA-256 on the P-256 curve           9
      ECDSA with SHA-384 on the P-384 curve          10
      ECDSA with SHA-521 on the P-512 curve          11

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Tue Aug 08 08:27:08 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1GAQfk-0000vy-Ma; Tue, 08 Aug 2006 08:27:00 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1GAQfj-0000vs-3h; Tue, 08 Aug 2006 08:26:59 -0400
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.43)
	id 1GAQfh-0002Rb-Av; Tue, 08 Aug 2006 08:26:59 -0400
Received: from fireball.kivinen.iki.fi (localhost [IPv6:::1])
	by mail.kivinen.iki.fi (8.13.5.20060308/8.12.10) with ESMTP id
	k78CQmnZ016090
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO);
	Tue, 8 Aug 2006 15:26:48 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.13.5.20060308/8.12.11) id k78CQmcb021842; 
	Tue, 8 Aug 2006 15:26:48 +0300 (EEST)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to
	kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <17624.33544.250706.116205@fireball.kivinen.iki.fi>
Date: Tue, 8 Aug 2006 15:26:48 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: The IESG <iesg-secretary@ietf.org>
Subject: [Ipsec] Protocol Action: 'IKE and IKEv2 Authentication Using ECDSA'
	to Proposed Standard
In-Reply-To: <p0623095cc0fd7ccbe390@[10.20.30.249]>
References: <p0623095cc0fd7ccbe390@[10.20.30.249]>
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 4 min
X-Total-Time: 9 min
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 39bd8f8cbb76cae18b7e23f7cf6b2b9f
Cc: IPsec WG <ipsec@ietf.org>
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Errors-To: ipsec-bounces@ietf.org

The IESG writes:
> The IESG has approved the following document:
> 
> - 'IKE and IKEv2 Authentication Using ECDSA '
>     <draft-ietf-ipsec-ike-auth-ecdsa-06.txt> as a Proposed Standard
> 
> Note to IANA
> 
>    The registry is http://www.iana.org/assignments/ipsec-registry [IANA-IKE],
>    and the section within the registry is "IPSEC Authentication Methods".
>    The three new additions are:
> 
>       Method                                        Value
>       ------                                        -----
>       ECDSA with SHA-256 on the P-256 curve           9
>       ECDSA with SHA-384 on the P-384 curve          10
>       ECDSA with SHA-521 on the P-512 curve          11
> 
>    The registry is http://www.iana.org/assignments/ikev2-parameters
>    [IANA-IKEv2], and the section within the registry is "IKEv2
>    Authentication Method".  The three new additions are:
> 
>       Method                                        Value
>       ------                                        -----
>       ECDSA with SHA-256 on the P-256 curve           9
>       ECDSA with SHA-384 on the P-384 curve          10
>       ECDSA with SHA-521 on the P-512 curve          11

As the currently allocated numbers in the IKEv2-parameters for the
"IKEv2 Authentication Method" are completely different that IKEv1, and
the first unallocated number in that registry is 4, I think it would
be much better to simply take next available numbers (i.e. 4, 5, and
6) instead of the proposed numbers, which would leave a gap of 4-8 to
the registry. This also affects the hex encoded packet examples in the
section 8. 
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Mon Aug 21 11:22:58 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1GFBYu-0006mc-Lb; Mon, 21 Aug 2006 11:19:36 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1GFBYt-0006mX-Q3
	for ipsec@ietf.org; Mon, 21 Aug 2006 11:19:35 -0400
Received: from balder-227.proper.com ([192.245.12.227])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1GFBYs-0002v9-Dv
	for ipsec@ietf.org; Mon, 21 Aug 2006 11:19:35 -0400
Received: from [10.20.30.249] (dsl-63-249-108-169.cruzio.com [63.249.108.169])
	(authenticated bits=0)
	by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k7LFJUHD023188
	for <ipsec@ietf.org>; Mon, 21 Aug 2006 08:19:31 -0700 (MST)
	(envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06230905c10f7eb56be3@[10.20.30.249]>
Date: Mon, 21 Aug 2006 08:16:15 -0700
To: IPsec WG <ipsec@ietf.org>
From: The IESG <iesg-secretary@ietf.org>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 1.1 (+)
X-Scan-Signature: ea4ac80f790299f943f0a53be7e1a21a
Subject: [Ipsec] Last Call: 'An Architecture for Provider Provisioned
 CE-based 
 Virtual Private Networks using IPsec' to Informational RFC  
 (draft-ietf-l3vpn-ce-based)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Errors-To: ipsec-bounces@ietf.org

The IESG has received a request from the Layer 3 Virtual Private Networks
WG to consider the following documents:

- 'Applicability Statement for Provider Provisioned CE-based Virtual
    Private Networks using IPsec '
    <draft-declercq-l3vpn-ce-based-as-00.txt> as an Informational RFC
- 'An Architecture for Provider Provisioned CE-based Virtual Private
    Networks using IPsec '
    <draft-ietf-l3vpn-ce-based-03.txt> as an Informational RFC

These documents were a product of first the PPVPN WG, and later the L3VPN
WG. They passed WG Last Call, but have not been actively discussed in the
WG for some time. There is little interest to work on CE-based VPN
problems within the WG today. The L3VPN WG is being rechartered to reflect
this, and these documents are being advanced as Informational for the
historical record.

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send any comments to the
iesg@ietf.org or ietf@ietf.org mailing lists by 2006-09-04.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-declercq-l3vpn-ce-based-as-00.txt
http://www.ietf.org/internet-drafts/draft-ietf-l3vpn-ce-based-03.txt


_______________________________________________
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



From ipsec-bounces@ietf.org Tue Aug 22 06:44:24 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1GFThi-0006XF-Le; Tue, 22 Aug 2006 06:41:54 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1GFThg-0006Wu-N4; Tue, 22 Aug 2006 06:41:52 -0400
Received: from fireball.acr.fi ([83.145.195.1] helo=mail.kivinen.iki.fi)
	by ietf-mx.ietf.org with esmtp (Exim 4.43)
	id 1GFThe-000176-Ne; Tue, 22 Aug 2006 06:41:52 -0400
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1])
	by mail.kivinen.iki.fi (8.13.8/8.12.10) with ESMTP id k7MAfPvl008641
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO);
	Tue, 22 Aug 2006 13:41:25 +0300 (EEST)
Received: (from kivinen@localhost)
	by fireball.kivinen.iki.fi (8.13.8/8.12.11) id k7MAfNJY022444;
	Tue, 22 Aug 2006 13:41:23 +0300 (EEST)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to
	kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <17642.57171.608004.774627@fireball.kivinen.iki.fi>
Date: Tue, 22 Aug 2006 13:41:23 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: jeremy.de_clercq@alcatel.be, cliff.wang@us.army.mil, dave.mcdysan@wcom.com
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 19 min
X-Total-Time: 83 min
X-Spam-Score: 0.1 (/)
X-Scan-Signature: d8ae4fd88fcaf47c1a71c804d04f413d
Cc: ipsec@ietf.org, iesg@ietf.org
Subject: [Ipsec] Comments to draft-declercq-l3vpn-ce-based-as-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>,
	<mailto:ipsec-request@ietf.org?subject=subscribe>
Errors-To: ipsec-bounces@ietf.org

This document really should expand CE when it is used first time in
the abstract... 

> 13. QoS, SLA
> 
>    In addition to the VPN service (reachability and security) from the
>    SP, the VPN customer may want to acquire QoS features for its VPN.
>    Dependent on the business scenario, the SLA will be provided by the
>    VPN SP or by the Network Provider.
> 
>    Note that the fact that customer IP packets are encapsulated (and
>    possibly encrypted) at the CE devices has an impact on the QoS
>    treatment of the IP packets: QoS-related information inside the
>    customer IP packets may become invisible.
> 
>    An eventual translation of QoS-related fields (e.g. DSCP) in the
>    inner IP header to QoS-related fields in the outer IP headers need to
>    be done at the CE-level and configured as such by the SP. Also the
>    'policing' rules (e.g. certain customers not being allowed to use
>    certain QoS values, etc.) need to be configured by the SP in the CE
>    devices. The security infrastructure of the CE device must prevent
>    the customer from messing with this provider-controlled
>    configuration.
> 
>    The CE-CE tunneling applied in Provider Provisioned CE-based IPsec
>    VPNs easily meets the DSCP transparency requirements of [REQS].

Note, that if packets having different QoS parameters are put inside
one IPsec SA tunnel, and the packets are really processed differently
by the network, this may cause the responder to drop all low priority
packets as the high priority packets which have passed those low
priority packets in the network have already made replay window to go
too far. I.e. low priority packets might take too long to travel
inside the network so that when they finally end to the destination
the destination cannot process them as they are outside the replay
protection window.

The solution to this in the RFC 4301 IPsec Security Architecture is to
create multiple IPsec SAs between the nodes and send only traffic
having similar QoS parameters to one SA.

This does affect the scalability (i.e. section 12) as it raises the
number of IPsec SAs, but each of those IPsec SA can share the same IKE
SA and interface, routing information etc.

I think something about this should be mentioned in the section 13.

See section 4.1 (last paragraph of the page 13) of the RFC 4301 for
more information.

Other comments:

> 14.4 Security
> 
>    The security aspects of the VPN management system are extremely
>    important.
> 
>    De SP's management system itself needs to be secured against
     ^^
???

>    misconfiguration, intrusion and denial-of-service attacks.
> 
>    De management protocol that is used to remotely provision the CE
     ^^
???

>    devices needs to provide for mutual authentication, encryption of the
>    transported data, etc.

The references section does not have normative / informative
references split, and I think it should have referenses at least to
IPsec architecture RFC 4301, and IKEv2 RFC 4306.
-- 
kivinen@safenet-inc.com

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec



