
From paav.cisco@gmail.com  Wed Jul  1 03:54:33 2009
Return-Path: <paav.cisco@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B3DE328C4DE; Wed,  1 Jul 2009 03:54:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q5+pdnNWseVu; Wed,  1 Jul 2009 03:54:32 -0700 (PDT)
Received: from ey-out-2122.google.com (ey-out-2122.google.com [74.125.78.27]) by core3.amsl.com (Postfix) with ESMTP id 3D49428C479; Wed,  1 Jul 2009 03:54:32 -0700 (PDT)
Received: by ey-out-2122.google.com with SMTP id 22so188184eye.65 for <multiple recipients>; Wed, 01 Jul 2009 03:54:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=r1573c1oPx7DES33FpF5JNRiyTFPcDF5x3J9znkjBYU=; b=jLSmyvQjtaKIe1tSwWbWHkY2Qg/MjLXmWrdHw9i5l3oYK/HsvAMzjmb/Dw6GXv96GU 2d37QUPt7ktDqsagPuBX24gCsxkijPPqIOIfQOxkwnG3LaOtj3VXI27PYS24l82mFcQW g4Rqj7CJ39+IX52XLKESYHSq+MzlbFMpDFsIE=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=HZOo2Vt17TYlE+DU+BSC7vYHnKVKDzTmYq0JtRN+AzWuLAicZr4IttxXAVvBSc3WwN G6dGdb1oOM7FMlbJK5v/5r+RZ14ujO/A8qKO2I6Hc4rjdcLIE2M6wM0MEr8RSYoEKgkq t4HEuZ8AyMNwbY0gTYKrIh6h6svJm4ww+k01w=
MIME-Version: 1.0
Received: by 10.210.54.15 with SMTP id c15mr5150eba.39.1246445689154; Wed, 01  Jul 2009 03:54:49 -0700 (PDT)
In-Reply-To: <20090616181501.A67583A6969@core3.amsl.com>
References: <20090616181501.A67583A6969@core3.amsl.com>
Date: Wed, 1 Jul 2009 16:24:49 +0530
Message-ID: <40e68ca20907010354k747e75fmea3394803acdbd98@mail.gmail.com>
From: Padmakumar AV <paav.cisco@gmail.com>
To: Internet-Drafts@ietf.org, vijay@wichorus.com, ipsec@ietf.org
Content-Type: multipart/alternative; boundary=0015174beb3a88abc1046da2c02a
Cc: paav@cisco.com
Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-ikev2-redirect-11.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jul 2009 10:54:33 -0000

--0015174beb3a88abc1046da2c02a
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

Hi Vijay,

I have a doubt regarding the usage of redirect during INIT exchange.

An attacker in between spoke and hub spoofs the init exchange to anycast
address and then redirects it to another FAKE-HUB1 by specifying unicast
address of the FAKE-HUB1. FAKE-HUB1 subsequently redirects it to FAKE-HUB2
and FAKE-HUB2 to FAKE-HUB3 and go on...

Is that possible.



Thanks

Padmakumar

On Tue, Jun 16, 2009 at 11:45 PM, <Internet-Drafts@ietf.org> wrote:

> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the IP Security Maintenance and Extensions
> Working Group of the IETF.
>
>
>        Title           : Redirect Mechanism for IKEv2
>        Author(s)       : V. Devarapalli, K. Weniger
>        Filename        : draft-ietf-ipsecme-ikev2-redirect-11.txt
>        Pages           : 16
>        Date            : 2009-06-16
>
> IKEv2 is a protocol for setting up VPN tunnels from a remote location
> to a gateway so that the VPN client can access services in the
> network behind the gateway.  Currently there is no standard mechanism
> specified that allows an overloaded VPN gateway or a VPN gateway that
> is being shut down for maintenance to redirect the VPN client to
> attach to another gateway.  This document proposes a redirect
> mechanism for IKEv2.  The proposed mechanism can also be used in
> Mobile IPv6 to enable the home agent to redirect the mobile node to
> another home agent.
>
> A URL for this Internet-Draft is:
>
> http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-ikev2-redirect-11.txt
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> Below is the data which will enable a MIME compliant mail reader
> implementation to automatically retrieve the ASCII version of the
> Internet-Draft.
>
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
>

--0015174beb3a88abc1046da2c02a
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi Vijay,<div><br></div><div><p class=3D"MsoNormal">I have a doubt regardin=
g the usage of redirect during INIT
exchange.</p>

<p class=3D"MsoNormal">An attacker in between spoke and hub spoofs the init
exchange to anycast address and then redirects it to another FAKE-HUB1 by
specifying unicast address of the FAKE-HUB1. FAKE-HUB1 subsequently redirec=
ts
it to FAKE-HUB2 and FAKE-HUB2 to FAKE-HUB3 and go on...</p>

<p class=3D"MsoNormal">Is that possible.</p>

<p class=3D"MsoNormal">=A0</p>

<p class=3D"MsoNormal">Thanks</p>

<p class=3D"MsoNormal">Padmakumar</p><br><div class=3D"gmail_quote">On Tue,=
 Jun 16, 2009 at 11:45 PM,  <span dir=3D"ltr">&lt;<a href=3D"mailto:Interne=
t-Drafts@ietf.org">Internet-Drafts@ietf.org</a>&gt;</span> wrote:<br><block=
quote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc=
 solid;padding-left:1ex;">
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the IP Security Maintenance and Extensions Wor=
king Group of the IETF.<br>
<br>
<br>
 =A0 =A0 =A0 =A0Title =A0 =A0 =A0 =A0 =A0 : Redirect Mechanism for IKEv2<br=
>
 =A0 =A0 =A0 =A0Author(s) =A0 =A0 =A0 : V. Devarapalli, K. Weniger<br>
 =A0 =A0 =A0 =A0Filename =A0 =A0 =A0 =A0: draft-ietf-ipsecme-ikev2-redirect=
-11.txt<br>
 =A0 =A0 =A0 =A0Pages =A0 =A0 =A0 =A0 =A0 : 16<br>
 =A0 =A0 =A0 =A0Date =A0 =A0 =A0 =A0 =A0 =A0: 2009-06-16<br>
<br>
IKEv2 is a protocol for setting up VPN tunnels from a remote location<br>
to a gateway so that the VPN client can access services in the<br>
network behind the gateway. =A0Currently there is no standard mechanism<br>
specified that allows an overloaded VPN gateway or a VPN gateway that<br>
is being shut down for maintenance to redirect the VPN client to<br>
attach to another gateway. =A0This document proposes a redirect<br>
mechanism for IKEv2. =A0The proposed mechanism can also be used in<br>
Mobile IPv6 to enable the home agent to redirect the mobile node to<br>
another home agent.<br>
<br>
A URL for this Internet-Draft is:<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-ikev2-red=
irect-11.txt" target=3D"_blank">http://www.ietf.org/internet-drafts/draft-i=
etf-ipsecme-ikev2-redirect-11.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br><br>_______________________________________________<br>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/ipsec</a><br>
<br></blockquote></div><br></div>

--0015174beb3a88abc1046da2c02a--

From rsjenwar@gmail.com  Wed Jul  1 06:28:44 2009
Return-Path: <rsjenwar@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 20A3C28C537; Wed,  1 Jul 2009 06:28:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.273
X-Spam-Level: 
X-Spam-Status: No, score=-2.273 tagged_above=-999 required=5 tests=[AWL=0.325,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o5fMWMEjbZ9r; Wed,  1 Jul 2009 06:28:42 -0700 (PDT)
Received: from mail-pz0-f198.google.com (mail-pz0-f198.google.com [209.85.222.198]) by core3.amsl.com (Postfix) with ESMTP id 99F5A28C533; Wed,  1 Jul 2009 06:28:42 -0700 (PDT)
Received: by pzk36 with SMTP id 36so1005238pzk.29 for <multiple recipients>; Wed, 01 Jul 2009 06:28:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=aYaDxwNVkeG13BPiNutNiXot7CLSiFrayvXpVRHWc1U=; b=cVJ4t9H3AfyfIaGMrK0BGlBX5n1CNoM36s+w4EepACEuhUKJb/bNijDu+lsWnxfuTz gmh1VxieGmJX4TFImKGwUyylZqZrY3y4+2j+YPrHM8rP8A8bNDf/z4PkepcM3Gr2Z81w hZg5AnNlwxu0BQWT9mkaUenXD6a6/0IgG6hW4=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=ZALEiWYLfiBvE3bIpgYtsRYeNWWXxtgsvITwpaRxZSTAsKBUzdXEOybqzRRuNXfZ5s 6xFGQZt2W2nqbGtRkrJzwLGzTf7FmiIITwEYLG1VlB7PLcXH04q32IAYk5ZhNsygZMmO mt2+3+iLYUh73UUCANWH5ZJBarkzMdBivr2hc=
MIME-Version: 1.0
Received: by 10.142.174.8 with SMTP id w8mr1015385wfe.210.1246454887884; Wed,  01 Jul 2009 06:28:07 -0700 (PDT)
In-Reply-To: <40e68ca20907010354k747e75fmea3394803acdbd98@mail.gmail.com>
References: <20090616181501.A67583A6969@core3.amsl.com> <40e68ca20907010354k747e75fmea3394803acdbd98@mail.gmail.com>
Date: Wed, 1 Jul 2009 18:58:07 +0530
Message-ID: <7ccecf670907010628p77e30c5ah7d7850a6afcad001@mail.gmail.com>
From: Raj Singh <rsjenwar@gmail.com>
To: Padmakumar AV <paav.cisco@gmail.com>
Content-Type: multipart/alternative; boundary=000e0cd22d52d22b54046da4e4be
Cc: ipsec@ietf.org, vijay@wichorus.com, Internet-Drafts@ietf.org, paav@cisco.com
Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-ikev2-redirect-11.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jul 2009 13:28:44 -0000

--000e0cd22d52d22b54046da4e4be
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Padam,

It possible and avoidable by configuring a policy on client for MAX no. of
REDIRECTs.
Draft has a mention of this scenario in Section 10.

With Regards,
Raj

On Wed, Jul 1, 2009 at 4:24 PM, Padmakumar AV <paav.cisco@gmail.com> wrote:

> Hi Vijay,
>
> I have a doubt regarding the usage of redirect during INIT exchange.
>
> An attacker in between spoke and hub spoofs the init exchange to anycast
> address and then redirects it to another FAKE-HUB1 by specifying unicast
> address of the FAKE-HUB1. FAKE-HUB1 subsequently redirects it to FAKE-HUB2
> and FAKE-HUB2 to FAKE-HUB3 and go on...
>
> Is that possible.
>
>
>
> Thanks
>
> Padmakumar
>
> On Tue, Jun 16, 2009 at 11:45 PM, <Internet-Drafts@ietf.org> wrote:
>
>> A New Internet-Draft is available from the on-line Internet-Drafts
>> directories.
>> This draft is a work item of the IP Security Maintenance and Extensions
>> Working Group of the IETF.
>>
>>
>>        Title           : Redirect Mechanism for IKEv2
>>        Author(s)       : V. Devarapalli, K. Weniger
>>        Filename        : draft-ietf-ipsecme-ikev2-redirect-11.txt
>>        Pages           : 16
>>        Date            : 2009-06-16
>>
>> IKEv2 is a protocol for setting up VPN tunnels from a remote location
>> to a gateway so that the VPN client can access services in the
>> network behind the gateway.  Currently there is no standard mechanism
>> specified that allows an overloaded VPN gateway or a VPN gateway that
>> is being shut down for maintenance to redirect the VPN client to
>> attach to another gateway.  This document proposes a redirect
>> mechanism for IKEv2.  The proposed mechanism can also be used in
>> Mobile IPv6 to enable the home agent to redirect the mobile node to
>> another home agent.
>>
>> A URL for this Internet-Draft is:
>>
>> http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-ikev2-redirect-11.txt
>>
>> Internet-Drafts are also available by anonymous FTP at:
>> ftp://ftp.ietf.org/internet-drafts/
>>
>> Below is the data which will enable a MIME compliant mail reader
>> implementation to automatically retrieve the ASCII version of the
>> Internet-Draft.
>>
>>
>> _______________________________________________
>> IPsec mailing list
>> IPsec@ietf.org
>> https://www.ietf.org/mailman/listinfo/ipsec
>>
>>
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
>

--000e0cd22d52d22b54046da4e4be
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Padam,<br><br>It possible and avoidable by configuring a policy on clien=
t for MAX no. of REDIRECTs.<br>Draft has a mention of this scenario in Sect=
ion 10.<br><br>With Regards,<br>Raj<br><br><div class=3D"gmail_quote">On We=
d, Jul 1, 2009 at 4:24 PM, Padmakumar AV <span dir=3D"ltr">&lt;<a href=3D"m=
ailto:paav.cisco@gmail.com">paav.cisco@gmail.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"border-left: 1px solid rgb(204, =
204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">Hi Vijay,<div><br=
></div><div><p>I have a doubt regarding the usage of redirect during INIT
exchange.</p>

<p>An attacker in between spoke and hub spoofs the init
exchange to anycast address and then redirects it to another FAKE-HUB1 by
specifying unicast address of the FAKE-HUB1. FAKE-HUB1 subsequently redirec=
ts
it to FAKE-HUB2 and FAKE-HUB2 to FAKE-HUB3 and go on...</p>

<p>Is that possible.</p>

<p>=C2=A0</p>

<p>Thanks</p>

<p>Padmakumar</p><font color=3D"#888888"><br></font><div class=3D"gmail_quo=
te"><div><div></div><div class=3D"h5">On Tue, Jun 16, 2009 at 11:45 PM,  <s=
pan dir=3D"ltr">&lt;<a href=3D"mailto:Internet-Drafts@ietf.org" target=3D"_=
blank">Internet-Drafts@ietf.org</a>&gt;</span> wrote:<br>
</div></div><blockquote class=3D"gmail_quote" style=3D"border-left: 1px sol=
id rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;"><div>=
<div></div><div class=3D"h5">
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the IP Security Maintenance and Extensions Wor=
king Group of the IETF.<br>
<br>
<br>
 =C2=A0 =C2=A0 =C2=A0 =C2=A0Title =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : Redi=
rect Mechanism for IKEv2<br>
 =C2=A0 =C2=A0 =C2=A0 =C2=A0Author(s) =C2=A0 =C2=A0 =C2=A0 : V. Devarapalli=
, K. Weniger<br>
 =C2=A0 =C2=A0 =C2=A0 =C2=A0Filename =C2=A0 =C2=A0 =C2=A0 =C2=A0: draft-iet=
f-ipsecme-ikev2-redirect-11.txt<br>
 =C2=A0 =C2=A0 =C2=A0 =C2=A0Pages =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 16<b=
r>
 =C2=A0 =C2=A0 =C2=A0 =C2=A0Date =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 2009-06-16<br>
<br>
IKEv2 is a protocol for setting up VPN tunnels from a remote location<br>
to a gateway so that the VPN client can access services in the<br>
network behind the gateway. =C2=A0Currently there is no standard mechanism<=
br>
specified that allows an overloaded VPN gateway or a VPN gateway that<br>
is being shut down for maintenance to redirect the VPN client to<br>
attach to another gateway. =C2=A0This document proposes a redirect<br>
mechanism for IKEv2. =C2=A0The proposed mechanism can also be used in<br>
Mobile IPv6 to enable the home agent to redirect the mobile node to<br>
another home agent.<br>
<br>
A URL for this Internet-Draft is:<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-ikev2-red=
irect-11.txt" target=3D"_blank">http://www.ietf.org/internet-drafts/draft-i=
etf-ipsecme-ikev2-redirect-11.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br><br></div></div><div class=3D"im">_____________________________________=
__________<br>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org" target=3D"_blank">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/ipsec</a><br>
<br></div></blockquote></div><br></div>
<br>_______________________________________________<br>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/ipsec</a><br>
<br></blockquote></div><br>

--000e0cd22d52d22b54046da4e4be--

From yaronf@checkpoint.com  Wed Jul  1 10:03:29 2009
Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7503228C54A for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 10:03:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j-KnT76QKBkd for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 10:03:28 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id F0EF928C562 for <ipsec@ietf.org>; Wed,  1 Jul 2009 10:03:27 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id DDE9A29C005; Wed,  1 Jul 2009 19:37:05 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id AC00029C002 for <ipsec@ietf.org>; Wed,  1 Jul 2009 19:37:05 +0300 (IDT)
X-CheckPoint: {4A4B8DA8-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n61Gar3d004549 for <ipsec@ietf.org>; Wed, 1 Jul 2009 19:36:54 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Wed, 1 Jul 2009 19:36:53 +0300
From: Yaron Sheffer <yaronf@checkpoint.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Date: Wed, 1 Jul 2009 19:36:50 +0300
Thread-Topic: IKEv2 bis section order
Thread-Index: Acn6aiIkOiBJZA2OQ0y05Er3GbAXLQ==
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD5933A@il-ex01.ad.checkpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_005B_01C9FA83.479C86B0"
MIME-Version: 1.0
Subject: [IPsec] IKEv2 bis section order
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jul 2009 17:03:29 -0000

------=_NextPart_000_005B_01C9FA83.479C86B0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi,

RFC 4306 has an extremely long introductory section, which basically
contains a normative description of the main protocol exchanges. In v2bis,
we tried to stick to the original section order, but I think that making a
change here would make the document much more understandable, especially to
newcomers. I suggest to keep the introduction short, and move the normative
description of the basic protocol exchanges into its own section.

So instead of the current:

   1.  Introduction
     1.1.  Usage Scenarios
       1.1.1.  Security Gateway to Security Gateway Tunnel Mode
       1.1.2.  Endpoint-to-Endpoint Transport Mode
       1.1.3.  Endpoint to Security Gateway Tunnel Mode
       1.1.4.  Other Scenarios
     1.2.  The Initial Exchanges
     1.3.  The CREATE_CHILD_SA Exchange
       1.3.1.  Creating New Child SAs with the CREATE_CHILD_SA
               Exchange
       1.3.2.  Rekeying IKE SAs with the CREATE_CHILD_SA Exchange
       1.3.3.  Rekeying Child SAs with the CREATE_CHILD_SA
               Exchange
     1.4.  The INFORMATIONAL Exchange
       1.4.1.  Deleting an SA with INFORMATIONAL Exchanges
     1.5.  Informational Messages outside of an IKE SA
     1.6.  Requirements Terminology
     1.7.  Differences Between RFC 4306 and This Document
   2.  IKE Protocol Details and Variations

I'd like to propose:

   1.  Introduction
     1.1.  Usage Scenarios
       1.1.1.  Security Gateway to Security Gateway Tunnel Mode
       1.1.2.  Endpoint-to-Endpoint Transport Mode
       1.1.3.  Endpoint to Security Gateway Tunnel Mode
       1.1.4.  Other Scenarios
     1.2.  Requirements Terminology

   2.  IKE Protocol Overview (or "Essentials") [today's Sec. 1.2-1.5]
     2.1.  The Initial Exchanges
     2.2.  The CREATE_CHILD_SA Exchange
       2.2.1.  Creating New Child SAs with the CREATE_CHILD_SA
               Exchange
       2.2.2.  Rekeying IKE SAs with the CREATE_CHILD_SA Exchange
       2.2.3.  Rekeying Child SAs with the CREATE_CHILD_SA
               Exchange
     2.3.  The INFORMATIONAL Exchange
       2.3.1.  Deleting an SA with INFORMATIONAL Exchanges
     2.4.  Informational Messages outside of an IKE SA

   3.  IKE Protocol Details and Variations [today's Sec. 2]

   Appendix X: Differences Between RFC 4306 and This Document [today's Sec.
1.7]

Do you see value in this, or do you prefer keeping the existing order?

Thanks,
	Yaron

------=_NextPart_000_005B_01C9FA83.479C86B0
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIPTTCCBDIw
ggMaoAMCAQICAQEwDQYJKoZIhvcNAQEFBQAwezELMAkGA1UEBhMCR0IxGzAZBgNVBAgMEkdyZWF0
ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBwwHU2FsZm9yZDEaMBgGA1UECgwRQ29tb2RvIENBIExpbWl0
ZWQxITAfBgNVBAMMGEFBQSBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczAeFw0wNDAxMDEwMDAwMDBaFw0y
ODEyMzEyMzU5NTlaMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQIDBJHcmVhdGVyIE1hbmNoZXN0ZXIx
EDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoMEUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhB
QUEgQ2VydGlmaWNhdGUgU2VydmljZXMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC+
QJ30buHqdoccTUVEjr5GyIMGncEq/hgfjuQC+vOrXVCKFjELmgbQxXAizUktVGPMtm5oRgtT6stM
JMC8ck7q8RWu9FSaEgrDerIzYOLaiVXzIljz3tzP74OGooyUT59o8piQRoQnx3a/48w1LIteB2Rl
gsBIsKiR+WGfdiBQqJHHZrXreGIDVvCKGhPqMaMeoJn9OPb2JzJYbwf1a7j7FCuvt6rM1mNfc4za
BZmoOKjLF3g2UazpnvR4Oo3PD9lC4pgMqy+fDgHe75+ZSfEt36x0TRuYtUfF5SnR+ZAYx2KcvoPH
Jns+iiXHwN2d5jVoECCdj9je0sOEnA1e6C/JAgMBAAGjgcAwgb0wHQYDVR0OBBYEFKARCiM+lvEH
7OKvKe+CpX/QMKS0MA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MHsGA1UdHwR0MHIw
OKA2oDSGMmh0dHA6Ly9jcmwuY29tb2RvY2EuY29tL0FBQUNlcnRpZmljYXRlU2VydmljZXMuY3Js
MDagNKAyhjBodHRwOi8vY3JsLmNvbW9kby5uZXQvQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmww
DQYJKoZIhvcNAQEFBQADggEBAAhW/ALwm+j/pPrWe8ZEgM5PxMX2AFjMpra8FEloBHbo5u5d7AIP
YNaNUBhPJk4B4+awpe6/vHRUQb/9/BK4x09a9IlgBX9gtwVK8/bxwr/EuXSGti19a8zS80bdL8bg
asPDNAMsfZbdWsIOpwqZwQWLqwwv81w6z2w3VQmH3lNAbFjv/LarZW4E9hvcPOBaFcae2fFZSDAh
ZQNs7Okhc+ybA6HgN62gFRiP+roCzqcsqRATLNTlCCarIpdg+JBedNSimlO98qlo4KJuwtdssaMP
nr/raOdW8q7y4ys4OgmBtWuF174t7T8at7Jj4vViLILUagBBUPE5g5+V6TaWmG4wggTdMIIDxaAD
AgECAhBxkvvmGV+sTRKFdHE0ohinMA0GCSqGSIb3DQEBBQUAMHsxCzAJBgNVBAYTAkdCMRswGQYD
VQQIDBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoMEUNvbW9k
byBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2VydmljZXMwHhcNMDQwMTAx
MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjCBrjELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYD
VQQHEw5TYWx0IExha2UgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYD
VQQLExhodHRwOi8vd3d3LnVzZXJ0cnVzdC5jb20xNjA0BgNVBAMTLVVUTi1VU0VSRmlyc3QtQ2xp
ZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBFbWFpbDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
ggEBALI5haTyfatBO2JGN67NwWB1vDll+UoaR6K5zEjMapjVTTUZuaRC5c5J4oovHnzSMQfHTrSD
ZJ0uKdWiZMSFvYVRNXmkTmiQexx6pJKoF/KYFfKTzMmkMpW7DE8wvZigC4vlbhuiRvp4vKJvq1le
pS/Pytptqi/rrKGzaqq3Lmc1i3nhHmmI4uZGzaCl6r4LznY6eg6b6vzaJ1s9cx8i5khhxkzzabGo
Lhu21DEgLLyCio6kDqXXiUP8FlqvHXHXEVnauocNr/rz4cLwpMVnjNbWVDreCqS6A3ezZcj9HtN0
YqoYymiTHqGFfvVHZcv4TVcodNI0/zC27vZiMBSMLOsCAwEAAaOCAScwggEjMB8GA1UdIwQYMBaA
FKARCiM+lvEH7OKvKe+CpX/QMKS0MB0GA1UdDgQWBBSJgmd9xJ0mcABLtFBIfN49rgRufTAOBgNV
HQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUH
AwQwEQYDVR0gBAowCDAGBgRVHSAAMHsGA1UdHwR0MHIwOKA2oDSGMmh0dHA6Ly9jcmwuY29tb2Rv
Y2EuY29tL0FBQUNlcnRpZmljYXRlU2VydmljZXMuY3JsMDagNKAyhjBodHRwOi8vY3JsLmNvbW9k
by5uZXQvQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwEQYJYIZIAYb4QgEBBAQDAgEGMA0GCSqG
SIb3DQEBBQUAA4IBAQCdlcs8uH6lCcQevwvCx3aOOTyUxhCqTwzJ4KuEXYlU4GU7820cfDcsJVRf
liH8N4SRnRXcFE+Bz1Qda2xFYMct+ZdRTPlmyjyggoymyPDi6dRK+ew/VsnddozDggFPbADzHhph
dARHA6nGQFeRvGUixSdnT1fbZFrZjR+6hi/0Bq6cae3p9M8pF9jgSp8aIC+XTFG7RgfEijdOIOMJ
MWjHnsSLneh+EbwyaBCWEZhE2CpRYE2I63Q630MGMsg5Vow6EVLTQaRDA/Tt7zMn2zngFE4mydj1
OeKJuJNdtykmQeqzm66D/Hd1yujKtf7iZUpjPkTE0MNeh3OpmByvfxV/MIIGMjCCBRqgAwIBAgIR
AIDKyDfd56zXUq4aqXlC1iYwDQYJKoZIhvcNAQEFBQAwga4xCzAJBgNVBAYTAlVTMQswCQYDVQQI
EwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtlIENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0
d29yazEhMB8GA1UECxMYaHR0cDovL3d3dy51c2VydHJ1c3QuY29tMTYwNAYDVQQDEy1VVE4tVVNF
UkZpcnN0LUNsaWVudCBBdXRoZW50aWNhdGlvbiBhbmQgRW1haWwwHhcNMDgwOTEwMDAwMDAwWhcN
MDkwOTEwMjM1OTU5WjCB3jE1MDMGA1UECxMsQ29tb2RvIFRydXN0IE5ldHdvcmsgLSBQRVJTT05B
IE5PVCBWQUxJREFURUQxRjBEBgNVBAsTPVRlcm1zIGFuZCBDb25kaXRpb25zIG9mIHVzZTogaHR0
cDovL3d3dy5jb21vZG8ubmV0L3JlcG9zaXRvcnkxHzAdBgNVBAsTFihjKTIwMDMgQ29tb2RvIExp
bWl0ZWQxFjAUBgNVBAMTDVlhcm9uIFNoZWZmZXIxJDAiBgkqhkiG9w0BCQEWFXlhcm9uZkBjaGVj
a3BvaW50LmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALqGr14AEP/lS7OgXTYs
8LjmDZYg3KegpdGXufAXa93NbmAAQ1EmqkVBw8vC/EcYCM+D9uUWeK0uC7BpmCalFDh28AMMIUKI
W0VGvDF+kE8zjnch/j7whoWvOvj6yFxYZNe9zfUlZZ7xBc+LEPzqsd4oLbK7a7WkvZAuUHfH0oiH
k2miEZkXZF/mhpGp/LplLeA8b51fvQhv8UqIzwRghVTLDCAnIhVk/w+WMmRhcHptYZDa0gOhjyza
a/4kG1oHw44Ae9cZpws8TXL+JOrUdmJG6uFY3wB0YvPw9b/u0WeY7Snq0bDF58vDNw0jaQsfIoxx
EE+MscA9JbuaPaXIFdkCAwEAAaOCAhcwggITMB8GA1UdIwQYMBaAFImCZ33EnSZwAEu0UEh83j2u
BG59MB0GA1UdDgQWBBSNbKhiJVIDkhy5HRA+njy+oWiKMDAOBgNVHQ8BAf8EBAMCBaAwDAYDVR0T
AQH/BAIwADAgBgNVHSUEGTAXBggrBgEFBQcDBAYLKwYBBAGyMQEDBQIwEQYJYIZIAYb4QgEBBAQD
AgUgMEYGA1UdIAQ/MD0wOwYMKwYBBAGyMQECAQEBMCswKQYIKwYBBQUHAgEWHWh0dHBzOi8vc2Vj
dXJlLmNvbW9kby5uZXQvQ1BTMIGlBgNVHR8EgZ0wgZowTKBKoEiGRmh0dHA6Ly9jcmwuY29tb2Rv
Y2EuY29tL1VUTi1VU0VSRmlyc3QtQ2xpZW50QXV0aGVudGljYXRpb25hbmRFbWFpbC5jcmwwSqBI
oEaGRGh0dHA6Ly9jcmwuY29tb2RvLm5ldC9VVE4tVVNFUkZpcnN0LUNsaWVudEF1dGhlbnRpY2F0
aW9uYW5kRW1haWwuY3JsMGwGCCsGAQUFBwEBBGAwXjA2BggrBgEFBQcwAoYqaHR0cDovL2NydC5j
b21vZG9jYS5jb20vVVROQUFBQ2xpZW50Q0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5j
b21vZG9jYS5jb20wIAYDVR0RBBkwF4EVeWFyb25mQGNoZWNrcG9pbnQuY29tMA0GCSqGSIb3DQEB
BQUAA4IBAQBemghknp7tCcWJ+Pzvopk4bHBaaYF/NJtkrSLXJdOb8p286uOS+7po0DIE+zh9iIyV
MTq5GFkleVzIVQHWOIOfCMnxbYh6tgrJUZKdDHMJG2vhz2i2dFOJzWnMnosWmKsDDMpmtLMH1mn+
31lQkp+rgUAkuFUruAPrG6ms5BVaO/Ta+yBGdEJ0ecLOKuA3zmKnmy8beceXpm4OdkBGWWdLvBGu
P/+v8n8KwVf2zzNTaZeEy+139MH9GTrVTiHnOsgdkvvsTu7cAl3mhRxR+o60XU0fQdk3jtbPrzeF
uK5fTY6yKlW2e/rlJg3hAr3FkIpszNRgnu+BUDYFg9VnYjjYMYIEaDCCBGQCAQEwgcQwga4xCzAJ
BgNVBAYTAlVTMQswCQYDVQQIEwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtlIENpdHkxHjAcBgNVBAoT
FVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8GA1UECxMYaHR0cDovL3d3dy51c2VydHJ1c3QuY29t
MTYwNAYDVQQDEy1VVE4tVVNFUkZpcnN0LUNsaWVudCBBdXRoZW50aWNhdGlvbiBhbmQgRW1haWwC
EQCAysg33ees11KuGql5QtYmMAkGBSsOAwIaBQCgggJ4MBgGCSqGSIb3DQEJAzELBgkqhkiG9w0B
BwEwHAYJKoZIhvcNAQkFMQ8XDTA5MDcwMTE2MzY1MFowIwYJKoZIhvcNAQkEMRYEFFnaxw59myZe
VxtIBOdDdoBcA7awMGcGCSqGSIb3DQEJDzFaMFgwCgYIKoZIhvcNAwcwDgYIKoZIhvcNAwICAgCA
MA0GCCqGSIb3DQMCAgFAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgEoMAcGBSsOAwIaMAoGCCqGSIb3
DQIFMIHVBgkrBgEEAYI3EAQxgccwgcQwga4xCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJVVDEXMBUG
A1UEBxMOU2FsdCBMYWtlIENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8G
A1UECxMYaHR0cDovL3d3dy51c2VydHJ1c3QuY29tMTYwNAYDVQQDEy1VVE4tVVNFUkZpcnN0LUNs
aWVudCBBdXRoZW50aWNhdGlvbiBhbmQgRW1haWwCEQCAysg33ees11KuGql5QtYmMIHXBgsqhkiG
9w0BCRACCzGBx6CBxDCBrjELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYDVQQHEw5TYWx0
IExha2UgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYDVQQLExhodHRw
Oi8vd3d3LnVzZXJ0cnVzdC5jb20xNjA0BgNVBAMTLVVUTi1VU0VSRmlyc3QtQ2xpZW50IEF1dGhl
bnRpY2F0aW9uIGFuZCBFbWFpbAIRAIDKyDfd56zXUq4aqXlC1iYwDQYJKoZIhvcNAQEBBQAEggEA
fWN5tTEOSl+4meW6hPkV6YxHscbKMVHbJAEdyxXeVcT7TRYpnOh/czlGlrVLdejtjOBfxOv+ELUh
e+PpIewwtbjJJuF7joXFc2glXeCREB7Ae7s8ZhkwygnORpZj5E+OnYYwWOYlLr7ZhtbFLtHru/or
Qwduz8tDyEnxMrQfzAcpzfaL04MvTx0XW44L1SqtPvxMuQ9gieCZ2g+du+LB0uWykYF3BgV8xfxW
bkxL1AWrRkrzdEpl6nNY0GV5WB4IFoMxJuV4TA6haQ2F2C5dzXC9a7FL4EpOQljpn8xnwosRi8qa
RScvD0v7pyZ3cakknCiewXJ+gqWaLHk/R/6gLwAAAAAAAA==

------=_NextPart_000_005B_01C9FA83.479C86B0--

From yaronf@checkpoint.com  Wed Jul  1 10:36:30 2009
Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A3BB33A6AB7 for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 10:36:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kYq+Zsua96S8 for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 10:36:30 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id 3DE5F3A6A16 for <ipsec@ietf.org>; Wed,  1 Jul 2009 10:36:29 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 055E629C007; Wed,  1 Jul 2009 19:41:56 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id AE3B429C002 for <ipsec@ietf.org>; Wed,  1 Jul 2009 19:41:55 +0300 (IDT)
X-CheckPoint: {4A4B8ECA-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n61Gfh3d005552 for <ipsec@ietf.org>; Wed, 1 Jul 2009 19:41:44 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Wed, 1 Jul 2009 19:41:43 +0300
From: Yaron Sheffer <yaronf@checkpoint.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Date: Wed, 1 Jul 2009 19:41:41 +0300
Thread-Topic: AES-CTR - call for volunteers
Thread-Index: Acn6as+HLVEa9zCxQxSOcPaadD8nhg==
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD5933B@il-ex01.ad.checkpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0060_01C9FA83.F4D8F9D0"
MIME-Version: 1.0
Subject: [IPsec] AES-CTR - call for volunteers
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jul 2009 17:36:30 -0000

------=_NextPart_000_0060_01C9FA83.F4D8F9D0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_0061_01C9FA83.F4D8F9D0"


------=_NextPart_001_0061_01C9FA83.F4D8F9D0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi,

 

While working on the Roadmap document, Sheila and Suresh found out that the
use of AES-CTR in IKEv2, although a SHOULD is RFC 4307, is not well defined
anywhere (it *is* defined for IKEv1). We had some off list discussion, and
came to the conclusion that a short document is needed here. If anyone is
interested in writing such a short I-D, please contact Paul and myself.

 

Thanks,

            Yaron


------=_NextPart_001_0061_01C9FA83.F4D8F9D0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:Arial;
	color:windowtext;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Hi,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>While working on the Roadmap document, Sheila and =
Suresh
found out that the use of AES-CTR in IKEv2, although a SHOULD is RFC =
4307, is
not well defined anywhere (it *<b><span =
style=3D'font-weight:bold'>is</span></b>*
defined for IKEv1). We had some off list discussion, and came to the =
conclusion
that a short document is needed here. If anyone is interested in writing =
such a
short I-D, please contact Paul and myself.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Thanks,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp; Yaron<o:p></o:p></span></font></p>

</div>

</body>

</html>

------=_NextPart_001_0061_01C9FA83.F4D8F9D0--

------=_NextPart_000_0060_01C9FA83.F4D8F9D0
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIPTTCCBDIw
ggMaoAMCAQICAQEwDQYJKoZIhvcNAQEFBQAwezELMAkGA1UEBhMCR0IxGzAZBgNVBAgMEkdyZWF0
ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBwwHU2FsZm9yZDEaMBgGA1UECgwRQ29tb2RvIENBIExpbWl0
ZWQxITAfBgNVBAMMGEFBQSBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczAeFw0wNDAxMDEwMDAwMDBaFw0y
ODEyMzEyMzU5NTlaMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQIDBJHcmVhdGVyIE1hbmNoZXN0ZXIx
EDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoMEUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhB
QUEgQ2VydGlmaWNhdGUgU2VydmljZXMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC+
QJ30buHqdoccTUVEjr5GyIMGncEq/hgfjuQC+vOrXVCKFjELmgbQxXAizUktVGPMtm5oRgtT6stM
JMC8ck7q8RWu9FSaEgrDerIzYOLaiVXzIljz3tzP74OGooyUT59o8piQRoQnx3a/48w1LIteB2Rl
gsBIsKiR+WGfdiBQqJHHZrXreGIDVvCKGhPqMaMeoJn9OPb2JzJYbwf1a7j7FCuvt6rM1mNfc4za
BZmoOKjLF3g2UazpnvR4Oo3PD9lC4pgMqy+fDgHe75+ZSfEt36x0TRuYtUfF5SnR+ZAYx2KcvoPH
Jns+iiXHwN2d5jVoECCdj9je0sOEnA1e6C/JAgMBAAGjgcAwgb0wHQYDVR0OBBYEFKARCiM+lvEH
7OKvKe+CpX/QMKS0MA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MHsGA1UdHwR0MHIw
OKA2oDSGMmh0dHA6Ly9jcmwuY29tb2RvY2EuY29tL0FBQUNlcnRpZmljYXRlU2VydmljZXMuY3Js
MDagNKAyhjBodHRwOi8vY3JsLmNvbW9kby5uZXQvQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmww
DQYJKoZIhvcNAQEFBQADggEBAAhW/ALwm+j/pPrWe8ZEgM5PxMX2AFjMpra8FEloBHbo5u5d7AIP
YNaNUBhPJk4B4+awpe6/vHRUQb/9/BK4x09a9IlgBX9gtwVK8/bxwr/EuXSGti19a8zS80bdL8bg
asPDNAMsfZbdWsIOpwqZwQWLqwwv81w6z2w3VQmH3lNAbFjv/LarZW4E9hvcPOBaFcae2fFZSDAh
ZQNs7Okhc+ybA6HgN62gFRiP+roCzqcsqRATLNTlCCarIpdg+JBedNSimlO98qlo4KJuwtdssaMP
nr/raOdW8q7y4ys4OgmBtWuF174t7T8at7Jj4vViLILUagBBUPE5g5+V6TaWmG4wggTdMIIDxaAD
AgECAhBxkvvmGV+sTRKFdHE0ohinMA0GCSqGSIb3DQEBBQUAMHsxCzAJBgNVBAYTAkdCMRswGQYD
VQQIDBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoMEUNvbW9k
byBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2VydmljZXMwHhcNMDQwMTAx
MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjCBrjELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYD
VQQHEw5TYWx0IExha2UgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYD
VQQLExhodHRwOi8vd3d3LnVzZXJ0cnVzdC5jb20xNjA0BgNVBAMTLVVUTi1VU0VSRmlyc3QtQ2xp
ZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBFbWFpbDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
ggEBALI5haTyfatBO2JGN67NwWB1vDll+UoaR6K5zEjMapjVTTUZuaRC5c5J4oovHnzSMQfHTrSD
ZJ0uKdWiZMSFvYVRNXmkTmiQexx6pJKoF/KYFfKTzMmkMpW7DE8wvZigC4vlbhuiRvp4vKJvq1le
pS/Pytptqi/rrKGzaqq3Lmc1i3nhHmmI4uZGzaCl6r4LznY6eg6b6vzaJ1s9cx8i5khhxkzzabGo
Lhu21DEgLLyCio6kDqXXiUP8FlqvHXHXEVnauocNr/rz4cLwpMVnjNbWVDreCqS6A3ezZcj9HtN0
YqoYymiTHqGFfvVHZcv4TVcodNI0/zC27vZiMBSMLOsCAwEAAaOCAScwggEjMB8GA1UdIwQYMBaA
FKARCiM+lvEH7OKvKe+CpX/QMKS0MB0GA1UdDgQWBBSJgmd9xJ0mcABLtFBIfN49rgRufTAOBgNV
HQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUH
AwQwEQYDVR0gBAowCDAGBgRVHSAAMHsGA1UdHwR0MHIwOKA2oDSGMmh0dHA6Ly9jcmwuY29tb2Rv
Y2EuY29tL0FBQUNlcnRpZmljYXRlU2VydmljZXMuY3JsMDagNKAyhjBodHRwOi8vY3JsLmNvbW9k
by5uZXQvQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwEQYJYIZIAYb4QgEBBAQDAgEGMA0GCSqG
SIb3DQEBBQUAA4IBAQCdlcs8uH6lCcQevwvCx3aOOTyUxhCqTwzJ4KuEXYlU4GU7820cfDcsJVRf
liH8N4SRnRXcFE+Bz1Qda2xFYMct+ZdRTPlmyjyggoymyPDi6dRK+ew/VsnddozDggFPbADzHhph
dARHA6nGQFeRvGUixSdnT1fbZFrZjR+6hi/0Bq6cae3p9M8pF9jgSp8aIC+XTFG7RgfEijdOIOMJ
MWjHnsSLneh+EbwyaBCWEZhE2CpRYE2I63Q630MGMsg5Vow6EVLTQaRDA/Tt7zMn2zngFE4mydj1
OeKJuJNdtykmQeqzm66D/Hd1yujKtf7iZUpjPkTE0MNeh3OpmByvfxV/MIIGMjCCBRqgAwIBAgIR
AIDKyDfd56zXUq4aqXlC1iYwDQYJKoZIhvcNAQEFBQAwga4xCzAJBgNVBAYTAlVTMQswCQYDVQQI
EwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtlIENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0
d29yazEhMB8GA1UECxMYaHR0cDovL3d3dy51c2VydHJ1c3QuY29tMTYwNAYDVQQDEy1VVE4tVVNF
UkZpcnN0LUNsaWVudCBBdXRoZW50aWNhdGlvbiBhbmQgRW1haWwwHhcNMDgwOTEwMDAwMDAwWhcN
MDkwOTEwMjM1OTU5WjCB3jE1MDMGA1UECxMsQ29tb2RvIFRydXN0IE5ldHdvcmsgLSBQRVJTT05B
IE5PVCBWQUxJREFURUQxRjBEBgNVBAsTPVRlcm1zIGFuZCBDb25kaXRpb25zIG9mIHVzZTogaHR0
cDovL3d3dy5jb21vZG8ubmV0L3JlcG9zaXRvcnkxHzAdBgNVBAsTFihjKTIwMDMgQ29tb2RvIExp
bWl0ZWQxFjAUBgNVBAMTDVlhcm9uIFNoZWZmZXIxJDAiBgkqhkiG9w0BCQEWFXlhcm9uZkBjaGVj
a3BvaW50LmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALqGr14AEP/lS7OgXTYs
8LjmDZYg3KegpdGXufAXa93NbmAAQ1EmqkVBw8vC/EcYCM+D9uUWeK0uC7BpmCalFDh28AMMIUKI
W0VGvDF+kE8zjnch/j7whoWvOvj6yFxYZNe9zfUlZZ7xBc+LEPzqsd4oLbK7a7WkvZAuUHfH0oiH
k2miEZkXZF/mhpGp/LplLeA8b51fvQhv8UqIzwRghVTLDCAnIhVk/w+WMmRhcHptYZDa0gOhjyza
a/4kG1oHw44Ae9cZpws8TXL+JOrUdmJG6uFY3wB0YvPw9b/u0WeY7Snq0bDF58vDNw0jaQsfIoxx
EE+MscA9JbuaPaXIFdkCAwEAAaOCAhcwggITMB8GA1UdIwQYMBaAFImCZ33EnSZwAEu0UEh83j2u
BG59MB0GA1UdDgQWBBSNbKhiJVIDkhy5HRA+njy+oWiKMDAOBgNVHQ8BAf8EBAMCBaAwDAYDVR0T
AQH/BAIwADAgBgNVHSUEGTAXBggrBgEFBQcDBAYLKwYBBAGyMQEDBQIwEQYJYIZIAYb4QgEBBAQD
AgUgMEYGA1UdIAQ/MD0wOwYMKwYBBAGyMQECAQEBMCswKQYIKwYBBQUHAgEWHWh0dHBzOi8vc2Vj
dXJlLmNvbW9kby5uZXQvQ1BTMIGlBgNVHR8EgZ0wgZowTKBKoEiGRmh0dHA6Ly9jcmwuY29tb2Rv
Y2EuY29tL1VUTi1VU0VSRmlyc3QtQ2xpZW50QXV0aGVudGljYXRpb25hbmRFbWFpbC5jcmwwSqBI
oEaGRGh0dHA6Ly9jcmwuY29tb2RvLm5ldC9VVE4tVVNFUkZpcnN0LUNsaWVudEF1dGhlbnRpY2F0
aW9uYW5kRW1haWwuY3JsMGwGCCsGAQUFBwEBBGAwXjA2BggrBgEFBQcwAoYqaHR0cDovL2NydC5j
b21vZG9jYS5jb20vVVROQUFBQ2xpZW50Q0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5j
b21vZG9jYS5jb20wIAYDVR0RBBkwF4EVeWFyb25mQGNoZWNrcG9pbnQuY29tMA0GCSqGSIb3DQEB
BQUAA4IBAQBemghknp7tCcWJ+Pzvopk4bHBaaYF/NJtkrSLXJdOb8p286uOS+7po0DIE+zh9iIyV
MTq5GFkleVzIVQHWOIOfCMnxbYh6tgrJUZKdDHMJG2vhz2i2dFOJzWnMnosWmKsDDMpmtLMH1mn+
31lQkp+rgUAkuFUruAPrG6ms5BVaO/Ta+yBGdEJ0ecLOKuA3zmKnmy8beceXpm4OdkBGWWdLvBGu
P/+v8n8KwVf2zzNTaZeEy+139MH9GTrVTiHnOsgdkvvsTu7cAl3mhRxR+o60XU0fQdk3jtbPrzeF
uK5fTY6yKlW2e/rlJg3hAr3FkIpszNRgnu+BUDYFg9VnYjjYMYIEaDCCBGQCAQEwgcQwga4xCzAJ
BgNVBAYTAlVTMQswCQYDVQQIEwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtlIENpdHkxHjAcBgNVBAoT
FVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8GA1UECxMYaHR0cDovL3d3dy51c2VydHJ1c3QuY29t
MTYwNAYDVQQDEy1VVE4tVVNFUkZpcnN0LUNsaWVudCBBdXRoZW50aWNhdGlvbiBhbmQgRW1haWwC
EQCAysg33ees11KuGql5QtYmMAkGBSsOAwIaBQCgggJ4MBgGCSqGSIb3DQEJAzELBgkqhkiG9w0B
BwEwHAYJKoZIhvcNAQkFMQ8XDTA5MDcwMTE2NDE0MVowIwYJKoZIhvcNAQkEMRYEFFektSkd+bZM
6VNlV52/DPdjODFFMGcGCSqGSIb3DQEJDzFaMFgwCgYIKoZIhvcNAwcwDgYIKoZIhvcNAwICAgCA
MA0GCCqGSIb3DQMCAgFAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgEoMAcGBSsOAwIaMAoGCCqGSIb3
DQIFMIHVBgkrBgEEAYI3EAQxgccwgcQwga4xCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJVVDEXMBUG
A1UEBxMOU2FsdCBMYWtlIENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8G
A1UECxMYaHR0cDovL3d3dy51c2VydHJ1c3QuY29tMTYwNAYDVQQDEy1VVE4tVVNFUkZpcnN0LUNs
aWVudCBBdXRoZW50aWNhdGlvbiBhbmQgRW1haWwCEQCAysg33ees11KuGql5QtYmMIHXBgsqhkiG
9w0BCRACCzGBx6CBxDCBrjELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYDVQQHEw5TYWx0
IExha2UgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYDVQQLExhodHRw
Oi8vd3d3LnVzZXJ0cnVzdC5jb20xNjA0BgNVBAMTLVVUTi1VU0VSRmlyc3QtQ2xpZW50IEF1dGhl
bnRpY2F0aW9uIGFuZCBFbWFpbAIRAIDKyDfd56zXUq4aqXlC1iYwDQYJKoZIhvcNAQEBBQAEggEA
G9+vn4Ct6ibE/xFNHJ7WvBNSnEIbe7X7qVEqa/cG1/up3IEJPQtguzNHe82mB94CkpHRV9oQOYNZ
WhXN1lClLWuXM2gMJS0GJnR7nUz25jKt5nr/CFCReI1FPuVnW3IjlkWTpTTwyh7cMr4OoRHWdJt1
sY05qaU1PeWUlTVjfHoth9xmTTMod3oLN0MmLM/hnYrVLbRmJ59VAimEvG5NggzNerp7ZKk0ZabW
iwRNZt8EilRToqXCl9UO+Qd9TSp0rAc2fjTsWZEiRRjIa3kXU+kxGzRIbtVAP2CaJvk+BmHFVmzQ
RYasak5AdAzve7j27IGd9MxyZRmgjTDZgSxhMAAAAAAAAA==

------=_NextPart_000_0060_01C9FA83.F4D8F9D0--

From wierbows@us.ibm.com  Wed Jul  1 11:03:30 2009
Return-Path: <wierbows@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B188B3A6960 for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 11:03:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.635
X-Spam-Level: 
X-Spam-Status: No, score=-4.635 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, SARE_GIF_ATTACH=1.42, TVD_FW_GRAPHIC_NAME_MID=0.543]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4YOoGswbkF2i for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 11:03:29 -0700 (PDT)
Received: from e5.ny.us.ibm.com (e5.ny.us.ibm.com [32.97.182.145]) by core3.amsl.com (Postfix) with ESMTP id 16C5C3A6832 for <ipsec@ietf.org>; Wed,  1 Jul 2009 11:03:28 -0700 (PDT)
Received: from d01relay02.pok.ibm.com (d01relay02.pok.ibm.com [9.56.227.234]) by e5.ny.us.ibm.com (8.13.1/8.13.1) with ESMTP id n61Huru5020390 for <ipsec@ietf.org>; Wed, 1 Jul 2009 13:56:53 -0400
Received: from d01av02.pok.ibm.com (d01av02.pok.ibm.com [9.56.224.216]) by d01relay02.pok.ibm.com (8.13.8/8.13.8/NCO v9.2) with ESMTP id n61I3SHo248976 for <ipsec@ietf.org>; Wed, 1 Jul 2009 14:03:28 -0400
Received: from d01av02.pok.ibm.com (loopback [127.0.0.1]) by d01av02.pok.ibm.com (8.12.11.20060308/8.13.3) with ESMTP id n61I12p5024118 for <ipsec@ietf.org>; Wed, 1 Jul 2009 14:01:02 -0400
Received: from d01ml084.pok.ibm.com (d01ml084.pok.ibm.com [9.63.10.23]) by d01av02.pok.ibm.com (8.12.11.20060308/8.12.11) with ESMTP id n61I12VP024111 for <ipsec@ietf.org>; Wed, 1 Jul 2009 14:01:02 -0400
In-Reply-To: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD5933A@il-ex01.ad.checkpoint.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
X-Mailer: Lotus Notes Release 7.0 HF277 June 21, 2006
Message-ID: <OF04E743EB.F52F889E-ON852575E6.006262CB-852575E6.00633147@us.ibm.com>
From: David Wierbowski <wierbows@us.ibm.com>
Date: Wed, 1 Jul 2009 14:03:27 -0400
X-MIMETrack: Serialize by Router on D01ML084/01/M/IBM(Release 8.0.2FP1|November 13, 2008) at 07/01/2009 14:03:28
MIME-Version: 1.0
Content-type: multipart/mixed;  Boundary="0__=0ABBFF75DFF1E45B8f9e8a93df938690918c0ABBFF75DFF1E45B"
Subject: Re: [IPsec] IKEv2 bis section order
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jul 2009 18:03:30 -0000

--0__=0ABBFF75DFF1E45B8f9e8a93df938690918c0ABBFF75DFF1E45B
Content-type: multipart/related; 
	Boundary="1__=0ABBFF75DFF1E45B8f9e8a93df938690918c0ABBFF75DFF1E45B"

--1__=0ABBFF75DFF1E45B8f9e8a93df938690918c0ABBFF75DFF1E45B
Content-type: multipart/alternative; 
	Boundary="2__=0ABBFF75DFF1E45B8f9e8a93df938690918c0ABBFF75DFF1E45B"

--2__=0ABBFF75DFF1E45B8f9e8a93df938690918c0ABBFF75DFF1E45B
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: quoted-printable


Yaron,

Your proposed reordering seems fine to me.  I agree with moving section=
 1.7
to an appendix.  Moving  sections 1.2-1.5 to sections 2-2.4 does not ad=
d a
great deal of value, but does make sense. I think either way is fine. I=

have no preference realtive to the section 1.2-1.5 move.

Dave Wierbowski


z/OS Comm Server Developer

 Phone:
    Tie line:   620-4055
    External:  607-429-4055





                                                                       =
    
             Yaron Sheffer                                             =
    
             <yaronf@checkpoin                                         =
    
             t.com>                                                    =
 To 
             Sent by:                  "ipsec@ietf.org" <ipsec@ietf.org=
>   
             ipsec-bounces@iet                                         =
 cc 
             f.org                                                     =
    
                                                                   Subj=
ect 
                                       [IPsec] IKEv2 bis section order =
    
             07/01/2009 12:36                                          =
    
             PM                                                        =
    
                                                                       =
    
                                                                       =
    
                                                                       =
    
                                                                       =
    




Hi,

RFC 4306 has an extremely long introductory section, which basically
contains a normative description of the main protocol exchanges. In v2b=
is,
we tried to stick to the original section order, but I think that makin=
g a
change here would make the document much more understandable, especiall=
y to
newcomers. I suggest to keep the introduction short, and move the norma=
tive
description of the basic protocol exchanges into its own section.

So instead of the current:

   1.  Introduction
     1.1.  Usage Scenarios
       1.1.1.  Security Gateway to Security Gateway Tunnel Mode
       1.1.2.  Endpoint-to-Endpoint Transport Mode
       1.1.3.  Endpoint to Security Gateway Tunnel Mode
       1.1.4.  Other Scenarios
     1.2.  The Initial Exchanges
     1.3.  The CREATE_CHILD_SA Exchange
       1.3.1.  Creating New Child SAs with the CREATE_CHILD_SA
               Exchange
       1.3.2.  Rekeying IKE SAs with the CREATE_CHILD_SA Exchange
       1.3.3.  Rekeying Child SAs with the CREATE_CHILD_SA
               Exchange
     1.4.  The INFORMATIONAL Exchange
       1.4.1.  Deleting an SA with INFORMATIONAL Exchanges
     1.5.  Informational Messages outside of an IKE SA
     1.6.  Requirements Terminology
     1.7.  Differences Between RFC 4306 and This Document
   2.  IKE Protocol Details and Variations

I'd like to propose:

   1.  Introduction
     1.1.  Usage Scenarios
       1.1.1.  Security Gateway to Security Gateway Tunnel Mode
       1.1.2.  Endpoint-to-Endpoint Transport Mode
       1.1.3.  Endpoint to Security Gateway Tunnel Mode
       1.1.4.  Other Scenarios
     1.2.  Requirements Terminology

   2.  IKE Protocol Overview (or "Essentials") [today's Sec. 1.2-1.5]
     2.1.  The Initial Exchanges
     2.2.  The CREATE_CHILD_SA Exchange
       2.2.1.  Creating New Child SAs with the CREATE_CHILD_SA
               Exchange
       2.2.2.  Rekeying IKE SAs with the CREATE_CHILD_SA Exchange
       2.2.3.  Rekeying Child SAs with the CREATE_CHILD_SA
               Exchange
     2.3.  The INFORMATIONAL Exchange
       2.3.1.  Deleting an SA with INFORMATIONAL Exchanges
     2.4.  Informational Messages outside of an IKE SA

   3.  IKE Protocol Details and Variations [today's Sec. 2]

   Appendix X: Differences Between RFC 4306 and This Document [today's =
Sec.
1.7]

Do you see value in this, or do you prefer keeping the existing order?

Thanks,
             Yaron
(See attached file: smime.p7s)
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
=

--2__=0ABBFF75DFF1E45B8f9e8a93df938690918c0ABBFF75DFF1E45B
Content-type: text/html; charset=US-ASCII
Content-Disposition: inline
Content-transfer-encoding: quoted-printable

<html><body>
<p>Yaron,<br>
<br>
Your proposed reordering seems fine to me.  I agree with moving section=
 1.7 to an appendix.  Moving  sections 1.2-1.5 to sections 2-2.4 does n=
ot add a great deal of value, but does make sense. I think either way i=
s fine. I have no preference realtive to the section 1.2-1.5 move.<br>
<br>
Dave Wierbowski <br>
<br>
<br>
z/OS Comm Server Developer <br>
<br>
 Phone:<br>
    Tie line:   620-4055<br>
    External:  607-429-4055<br>
<br>
<br>
<br>
<img width=3D"16" height=3D"16" src=3D"cid:2__=3D0ABBFF75DFF1E45B8f9e8a=
93df938@us.ibm.com" border=3D"0" alt=3D"Inactive hide details for Yaron=
 Sheffer &lt;yaronf@checkpoint.com&gt;">Yaron Sheffer &lt;yaronf@checkp=
oint.com&gt;<br>
<br>
<br>

<table width=3D"100%" border=3D"0" cellspacing=3D"0" cellpadding=3D"0">=

<tr valign=3D"top"><td style=3D"background-image:url(cid:3__=3D0ABBFF75=
DFF1E45B8f9e8a93df938@us.ibm.com); background-repeat: no-repeat; " widt=
h=3D"40%">
<ul>
<ul>
<ul>
<ul><b><font size=3D"2">Yaron Sheffer &lt;yaronf@checkpoint.com&gt;</fo=
nt></b><font size=3D"2"> </font><br>
<font size=3D"2">Sent by: ipsec-bounces@ietf.org</font>
<p><font size=3D"2">07/01/2009 12:36 PM</font></ul>
</ul>
</ul>
</ul>
</td><td width=3D"60%">
<table width=3D"100%" border=3D"0" cellspacing=3D"0" cellpadding=3D"0">=

<tr valign=3D"top"><td width=3D"1%"><img width=3D"58" height=3D"1" src=3D=
"cid:4__=3D0ABBFF75DFF1E45B8f9e8a93df938@us.ibm.com" border=3D"0" alt=3D=
""><br>
<div align=3D"right"><font size=3D"2">To</font></div></td><td width=3D"=
100%"><img width=3D"1" height=3D"1" src=3D"cid:4__=3D0ABBFF75DFF1E45B8f=
9e8a93df938@us.ibm.com" border=3D"0" alt=3D""><br>
<font size=3D"2">&quot;ipsec@ietf.org&quot; &lt;ipsec@ietf.org&gt;</fon=
t></td></tr>

<tr valign=3D"top"><td width=3D"1%"><img width=3D"58" height=3D"1" src=3D=
"cid:4__=3D0ABBFF75DFF1E45B8f9e8a93df938@us.ibm.com" border=3D"0" alt=3D=
""><br>
<div align=3D"right"><font size=3D"2">cc</font></div></td><td width=3D"=
100%"><img width=3D"1" height=3D"1" src=3D"cid:4__=3D0ABBFF75DFF1E45B8f=
9e8a93df938@us.ibm.com" border=3D"0" alt=3D""><br>
</td></tr>

<tr valign=3D"top"><td width=3D"1%"><img width=3D"58" height=3D"1" src=3D=
"cid:4__=3D0ABBFF75DFF1E45B8f9e8a93df938@us.ibm.com" border=3D"0" alt=3D=
""><br>
<div align=3D"right"><font size=3D"2">Subject</font></div></td><td widt=
h=3D"100%"><img width=3D"1" height=3D"1" src=3D"cid:4__=3D0ABBFF75DFF1E=
45B8f9e8a93df938@us.ibm.com" border=3D"0" alt=3D""><br>
<font size=3D"2">[IPsec] IKEv2 bis section order</font></td></tr>
</table>

<table border=3D"0" cellspacing=3D"0" cellpadding=3D"0">
<tr valign=3D"top"><td width=3D"58"><img width=3D"1" height=3D"1" src=3D=
"cid:4__=3D0ABBFF75DFF1E45B8f9e8a93df938@us.ibm.com" border=3D"0" alt=3D=
""></td><td width=3D"336"><img width=3D"1" height=3D"1" src=3D"cid:4__=3D=
0ABBFF75DFF1E45B8f9e8a93df938@us.ibm.com" border=3D"0" alt=3D""></td></=
tr>
</table>
</td></tr>
</table>
<br>
<tt>Hi,<br>
<br>
RFC 4306 has an extremely long introductory section, which basically<br=
>
contains a normative description of the main protocol exchanges. In v2b=
is,<br>
we tried to stick to the original section order, but I think that makin=
g a<br>
change here would make the document much more understandable, especiall=
y to<br>
newcomers. I suggest to keep the introduction short, and move the norma=
tive<br>
description of the basic protocol exchanges into its own section.<br>
<br>
So instead of the current:<br>
<br>
 &nbsp; 1. &nbsp;Introduction<br>
 &nbsp; &nbsp; 1.1. &nbsp;Usage Scenarios<br>
 &nbsp; &nbsp; &nbsp; 1.1.1. &nbsp;Security Gateway to Security Gateway=
 Tunnel Mode<br>
 &nbsp; &nbsp; &nbsp; 1.1.2. &nbsp;Endpoint-to-Endpoint Transport Mode<=
br>
 &nbsp; &nbsp; &nbsp; 1.1.3. &nbsp;Endpoint to Security Gateway Tunnel =
Mode<br>
 &nbsp; &nbsp; &nbsp; 1.1.4. &nbsp;Other Scenarios<br>
 &nbsp; &nbsp; 1.2. &nbsp;The Initial Exchanges<br>
 &nbsp; &nbsp; 1.3. &nbsp;The CREATE_CHILD_SA Exchange<br>
 &nbsp; &nbsp; &nbsp; 1.3.1. &nbsp;Creating New Child SAs with the CREA=
TE_CHILD_SA<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Exchange<br>
 &nbsp; &nbsp; &nbsp; 1.3.2. &nbsp;Rekeying IKE SAs with the CREATE_CHI=
LD_SA Exchange<br>
 &nbsp; &nbsp; &nbsp; 1.3.3. &nbsp;Rekeying Child SAs with the CREATE_C=
HILD_SA<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Exchange<br>
 &nbsp; &nbsp; 1.4. &nbsp;The INFORMATIONAL Exchange<br>
 &nbsp; &nbsp; &nbsp; 1.4.1. &nbsp;Deleting an SA with INFORMATIONAL Ex=
changes<br>
 &nbsp; &nbsp; 1.5. &nbsp;Informational Messages outside of an IKE SA<b=
r>
 &nbsp; &nbsp; 1.6. &nbsp;Requirements Terminology<br>
 &nbsp; &nbsp; 1.7. &nbsp;Differences Between RFC 4306 and This Documen=
t<br>
 &nbsp; 2. &nbsp;IKE Protocol Details and Variations<br>
<br>
I'd like to propose:<br>
<br>
 &nbsp; 1. &nbsp;Introduction<br>
 &nbsp; &nbsp; 1.1. &nbsp;Usage Scenarios<br>
 &nbsp; &nbsp; &nbsp; 1.1.1. &nbsp;Security Gateway to Security Gateway=
 Tunnel Mode<br>
 &nbsp; &nbsp; &nbsp; 1.1.2. &nbsp;Endpoint-to-Endpoint Transport Mode<=
br>
 &nbsp; &nbsp; &nbsp; 1.1.3. &nbsp;Endpoint to Security Gateway Tunnel =
Mode<br>
 &nbsp; &nbsp; &nbsp; 1.1.4. &nbsp;Other Scenarios<br>
 &nbsp; &nbsp; 1.2. &nbsp;Requirements Terminology<br>
<br>
 &nbsp; 2. &nbsp;IKE Protocol Overview (or &quot;Essentials&quot;) [tod=
ay's Sec. 1.2-1.5]<br>
 &nbsp; &nbsp; 2.1. &nbsp;The Initial Exchanges<br>
 &nbsp; &nbsp; 2.2. &nbsp;The CREATE_CHILD_SA Exchange<br>
 &nbsp; &nbsp; &nbsp; 2.2.1. &nbsp;Creating New Child SAs with the CREA=
TE_CHILD_SA<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Exchange<br>
 &nbsp; &nbsp; &nbsp; 2.2.2. &nbsp;Rekeying IKE SAs with the CREATE_CHI=
LD_SA Exchange<br>
 &nbsp; &nbsp; &nbsp; 2.2.3. &nbsp;Rekeying Child SAs with the CREATE_C=
HILD_SA<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Exchange<br>
 &nbsp; &nbsp; 2.3. &nbsp;The INFORMATIONAL Exchange<br>
 &nbsp; &nbsp; &nbsp; 2.3.1. &nbsp;Deleting an SA with INFORMATIONAL Ex=
changes<br>
 &nbsp; &nbsp; 2.4. &nbsp;Informational Messages outside of an IKE SA<b=
r>
<br>
 &nbsp; 3. &nbsp;IKE Protocol Details and Variations [today's Sec. 2]<b=
r>
<br>
 &nbsp; Appendix X: Differences Between RFC 4306 and This Document [tod=
ay's Sec.<br>
1.7]<br>
<br>
Do you see value in this, or do you prefer keeping the existing order?<=
br>
<br>
Thanks,<br>
		 Yaron<br>
</tt><i>(See attached file: smime.p7s)</i><tt>_________________________=
______________________<br>
IPsec mailing list<br>
IPsec@ietf.org<br>
</tt><tt><a href=3D"https://www.ietf.org/mailman/listinfo/ipsec">https:=
//www.ietf.org/mailman/listinfo/ipsec</a></tt><tt><br>
</tt><br>
</body></html>=


--2__=0ABBFF75DFF1E45B8f9e8a93df938690918c0ABBFF75DFF1E45B--


--1__=0ABBFF75DFF1E45B8f9e8a93df938690918c0ABBFF75DFF1E45B
Content-type: image/gif; 
	name="graycol.gif"
Content-Disposition: inline; filename="graycol.gif"
Content-ID: <2__=0ABBFF75DFF1E45B8f9e8a93df938@us.ibm.com>
Content-transfer-encoding: base64

R0lGODlhEAAQAKECAMzMzAAAAP///wAAACH5BAEAAAIALAAAAAAQABAAAAIXlI+py+0PopwxUbpu
ZRfKZ2zgSJbmSRYAIf4fT3B0aW1pemVkIGJ5IFVsZWFkIFNtYXJ0U2F2ZXIhAAA7

--1__=0ABBFF75DFF1E45B8f9e8a93df938690918c0ABBFF75DFF1E45B
Content-type: image/gif; 
	name="pic34310.gif"
Content-Disposition: inline; filename="pic34310.gif"
Content-ID: <3__=0ABBFF75DFF1E45B8f9e8a93df938@us.ibm.com>
Content-transfer-encoding: base64

R0lGODlhWABDALP/AAAAAK04Qf79/o+Gm7WuwlNObwoJFCsoSMDAwGFsmIuezf///wAAAAAAAAAA
AAAAACH5BAEAAAgALAAAAABYAEMAQAT/EMlJq704682770RiFMRinqggEUNSHIchG0BCfHhOjAuh
EDeUqTASLCbBhQrhG7xis2j0lssNDopE4jfIJhDaggI8YB1sZeZgLVA9YVCpnGagVjV171aRVrYR
RghXcAGFhoUETwYxcXNyADJ3GlcSKGAwLwllVC1vjIUHBWsFilKQdI8GA5IcpApeJQt8L09lmgkH
LZikoU5wjqcyAMMFrJIDPAKvCFletKSev1HBw8KrxtjZ2tvc3d5VyKtCKW3jfz4uMKmq3xu4N0nK
BVoJQmx2LGVOmrqNjjJf2hHAQo/eDwJGTKhQMcgQEEAnEjFS98+RnW3smGkZU6ncCWav/4wYOnAI
TihRL/4FEwbp28BXMMcoscQCVxlepL4IGDSCyJyVQOu0o7CjmLN50OZlqWmyFy5/6yBBuji0AxFR
M00oQAqNIstqI6qKHUsWRAEAvagsmfUEAImyxgbmUpJk3IklNUtJOUAVLoUr1+wqDGTE4zk+T6FG
uQb3SizBCwatiiUgCBN8vrz+zFjVyQ8FWkOlg4NQiZMB5QS8QO3mpOaKnL0Z2EKvNMSILEThKhCg
zMKPVxYJh23qm9KNW7pArPynMqZDiErsTMqI+LRi3QAgkFUbXpuFKhSYZALd0O5RKa2z9EYKBbpb
qxIKsjUPRgD7I2XYV6wyrOw92ykExP8NW4URhknC5dKGE4v4NENQj2jXjmfNgOZDaXb5glRmXQ33
YEWQYNcZFnrYcIQLNzyTFDQNkXIff0ExVlY4srziQk43inZgL4rwxxINMvpFFAz1KOODHiu+4aEw
NEjFl5B3JIKWKF3k6I9bfUGp5ZZcdunll5IA4cuHvQQJ5gcsoCWOOUwgltIwAKRxJgbIkJAQZEq0
2YliZnpZZ4BH3CnYOXldOUOfQoYDqF1LFHbXCrO8xmRsfoXDXJ6ChjCAH3QlhJcT6VWE6FCkfCco
CgrMFsROrIEX3o2whVjWDjoJccN3LdggSGXLCdLEgHr1lyU3O3QxhgohNKXJCWv8JQr/PDdaqd6w
2rj1inLiGeiCJoDspAoQlYE6QWLSECehcWIYxIQES6zhbn1iImTHEQyqJ4eIxJJoUBc+3CbBuwZE
V5cJPPkIjFDdeEabQbd6WgICTxiiz0f5dBKquXF6k4senwEhYGnKEFJeGrxUZy8dB8gmAXI/sPvH
ESfCwVt5hTgYiqQqtdRNHQIU1PJ33ZqmzgE90OwLaoJcnMop1WiMmgkPHQRIrwgFuNV90A3doNKT
mrKIN07AnGcI9BQjhCBN4RfA1qIZnMqorJCogKfGQnxSCDilTVIA0yl5ciTovgLuBDKFUDE9aQcw
9SA+rjSNf9/M1gxrj6VwDTS0IUSElMzBfsj0NFXR2kwsV1A5IF1grLgLL/r1R40BZEnuBWgmQEyb
jqRwSAt6bqMCOFkvKFN2GPPkUzIm/SCF8z8pVzpbjVnMsy0vOr1hw3SaSRUhpY09v0z0J1FnwzPl
fmh+xl4WtR0zGu24I4KbMQm3lnVu2oNWxI9W/lcyzA+mCKF4DBikxb/+UWtOGRiFP8qEwAayIgIA
Ow==

--1__=0ABBFF75DFF1E45B8f9e8a93df938690918c0ABBFF75DFF1E45B
Content-type: image/gif; 
	name="ecblank.gif"
Content-Disposition: inline; filename="ecblank.gif"
Content-ID: <4__=0ABBFF75DFF1E45B8f9e8a93df938@us.ibm.com>
Content-transfer-encoding: base64

R0lGODlhEAABAIAAAAAAAP///yH5BAEAAAEALAAAAAAQAAEAAAIEjI8ZBQA7


--1__=0ABBFF75DFF1E45B8f9e8a93df938690918c0ABBFF75DFF1E45B--


--0__=0ABBFF75DFF1E45B8f9e8a93df938690918c0ABBFF75DFF1E45B
Content-type: application/octet-stream; 
	name="smime.p7s"
Content-Disposition: attachment; filename="smime.p7s"
Content-ID: <1__=0ABBFF75DFF1E45B8f9e8a93df938@us.ibm.com>
Content-transfer-encoding: base64

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIPTTCCBDIw
ggMaoAMCAQICAQEwDQYJKoZIhvcNAQEFBQAwezELMAkGA1UEBhMCR0IxGzAZBgNVBAgMEkdyZWF0
ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBwwHU2FsZm9yZDEaMBgGA1UECgwRQ29tb2RvIENBIExpbWl0
ZWQxITAfBgNVBAMMGEFBQSBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczAeFw0wNDAxMDEwMDAwMDBaFw0y
ODEyMzEyMzU5NTlaMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQIDBJHcmVhdGVyIE1hbmNoZXN0ZXIx
EDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoMEUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhB
QUEgQ2VydGlmaWNhdGUgU2VydmljZXMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC+
QJ30buHqdoccTUVEjr5GyIMGncEq/hgfjuQC+vOrXVCKFjELmgbQxXAizUktVGPMtm5oRgtT6stM
JMC8ck7q8RWu9FSaEgrDerIzYOLaiVXzIljz3tzP74OGooyUT59o8piQRoQnx3a/48w1LIteB2Rl
gsBIsKiR+WGfdiBQqJHHZrXreGIDVvCKGhPqMaMeoJn9OPb2JzJYbwf1a7j7FCuvt6rM1mNfc4za
BZmoOKjLF3g2UazpnvR4Oo3PD9lC4pgMqy+fDgHe75+ZSfEt36x0TRuYtUfF5SnR+ZAYx2KcvoPH
Jns+iiXHwN2d5jVoECCdj9je0sOEnA1e6C/JAgMBAAGjgcAwgb0wHQYDVR0OBBYEFKARCiM+lvEH
7OKvKe+CpX/QMKS0MA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MHsGA1UdHwR0MHIw
OKA2oDSGMmh0dHA6Ly9jcmwuY29tb2RvY2EuY29tL0FBQUNlcnRpZmljYXRlU2VydmljZXMuY3Js
MDagNKAyhjBodHRwOi8vY3JsLmNvbW9kby5uZXQvQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmww
DQYJKoZIhvcNAQEFBQADggEBAAhW/ALwm+j/pPrWe8ZEgM5PxMX2AFjMpra8FEloBHbo5u5d7AIP
YNaNUBhPJk4B4+awpe6/vHRUQb/9/BK4x09a9IlgBX9gtwVK8/bxwr/EuXSGti19a8zS80bdL8bg
asPDNAMsfZbdWsIOpwqZwQWLqwwv81w6z2w3VQmH3lNAbFjv/LarZW4E9hvcPOBaFcae2fFZSDAh
ZQNs7Okhc+ybA6HgN62gFRiP+roCzqcsqRATLNTlCCarIpdg+JBedNSimlO98qlo4KJuwtdssaMP
nr/raOdW8q7y4ys4OgmBtWuF174t7T8at7Jj4vViLILUagBBUPE5g5+V6TaWmG4wggTdMIIDxaAD
AgECAhBxkvvmGV+sTRKFdHE0ohinMA0GCSqGSIb3DQEBBQUAMHsxCzAJBgNVBAYTAkdCMRswGQYD
VQQIDBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoMEUNvbW9k
byBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2VydmljZXMwHhcNMDQwMTAx
MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjCBrjELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYD
VQQHEw5TYWx0IExha2UgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYD
VQQLExhodHRwOi8vd3d3LnVzZXJ0cnVzdC5jb20xNjA0BgNVBAMTLVVUTi1VU0VSRmlyc3QtQ2xp
ZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBFbWFpbDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
ggEBALI5haTyfatBO2JGN67NwWB1vDll+UoaR6K5zEjMapjVTTUZuaRC5c5J4oovHnzSMQfHTrSD
ZJ0uKdWiZMSFvYVRNXmkTmiQexx6pJKoF/KYFfKTzMmkMpW7DE8wvZigC4vlbhuiRvp4vKJvq1le
pS/Pytptqi/rrKGzaqq3Lmc1i3nhHmmI4uZGzaCl6r4LznY6eg6b6vzaJ1s9cx8i5khhxkzzabGo
Lhu21DEgLLyCio6kDqXXiUP8FlqvHXHXEVnauocNr/rz4cLwpMVnjNbWVDreCqS6A3ezZcj9HtN0
YqoYymiTHqGFfvVHZcv4TVcodNI0/zC27vZiMBSMLOsCAwEAAaOCAScwggEjMB8GA1UdIwQYMBaA
FKARCiM+lvEH7OKvKe+CpX/QMKS0MB0GA1UdDgQWBBSJgmd9xJ0mcABLtFBIfN49rgRufTAOBgNV
HQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUH
AwQwEQYDVR0gBAowCDAGBgRVHSAAMHsGA1UdHwR0MHIwOKA2oDSGMmh0dHA6Ly9jcmwuY29tb2Rv
Y2EuY29tL0FBQUNlcnRpZmljYXRlU2VydmljZXMuY3JsMDagNKAyhjBodHRwOi8vY3JsLmNvbW9k
by5uZXQvQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwEQYJYIZIAYb4QgEBBAQDAgEGMA0GCSqG
SIb3DQEBBQUAA4IBAQCdlcs8uH6lCcQevwvCx3aOOTyUxhCqTwzJ4KuEXYlU4GU7820cfDcsJVRf
liH8N4SRnRXcFE+Bz1Qda2xFYMct+ZdRTPlmyjyggoymyPDi6dRK+ew/VsnddozDggFPbADzHhph
dARHA6nGQFeRvGUixSdnT1fbZFrZjR+6hi/0Bq6cae3p9M8pF9jgSp8aIC+XTFG7RgfEijdOIOMJ
MWjHnsSLneh+EbwyaBCWEZhE2CpRYE2I63Q630MGMsg5Vow6EVLTQaRDA/Tt7zMn2zngFE4mydj1
OeKJuJNdtykmQeqzm66D/Hd1yujKtf7iZUpjPkTE0MNeh3OpmByvfxV/MIIGMjCCBRqgAwIBAgIR
AIDKyDfd56zXUq4aqXlC1iYwDQYJKoZIhvcNAQEFBQAwga4xCzAJBgNVBAYTAlVTMQswCQYDVQQI
EwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtlIENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0
d29yazEhMB8GA1UECxMYaHR0cDovL3d3dy51c2VydHJ1c3QuY29tMTYwNAYDVQQDEy1VVE4tVVNF
UkZpcnN0LUNsaWVudCBBdXRoZW50aWNhdGlvbiBhbmQgRW1haWwwHhcNMDgwOTEwMDAwMDAwWhcN
MDkwOTEwMjM1OTU5WjCB3jE1MDMGA1UECxMsQ29tb2RvIFRydXN0IE5ldHdvcmsgLSBQRVJTT05B
IE5PVCBWQUxJREFURUQxRjBEBgNVBAsTPVRlcm1zIGFuZCBDb25kaXRpb25zIG9mIHVzZTogaHR0
cDovL3d3dy5jb21vZG8ubmV0L3JlcG9zaXRvcnkxHzAdBgNVBAsTFihjKTIwMDMgQ29tb2RvIExp
bWl0ZWQxFjAUBgNVBAMTDVlhcm9uIFNoZWZmZXIxJDAiBgkqhkiG9w0BCQEWFXlhcm9uZkBjaGVj
a3BvaW50LmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALqGr14AEP/lS7OgXTYs
8LjmDZYg3KegpdGXufAXa93NbmAAQ1EmqkVBw8vC/EcYCM+D9uUWeK0uC7BpmCalFDh28AMMIUKI
W0VGvDF+kE8zjnch/j7whoWvOvj6yFxYZNe9zfUlZZ7xBc+LEPzqsd4oLbK7a7WkvZAuUHfH0oiH
k2miEZkXZF/mhpGp/LplLeA8b51fvQhv8UqIzwRghVTLDCAnIhVk/w+WMmRhcHptYZDa0gOhjyza
a/4kG1oHw44Ae9cZpws8TXL+JOrUdmJG6uFY3wB0YvPw9b/u0WeY7Snq0bDF58vDNw0jaQsfIoxx
EE+MscA9JbuaPaXIFdkCAwEAAaOCAhcwggITMB8GA1UdIwQYMBaAFImCZ33EnSZwAEu0UEh83j2u
BG59MB0GA1UdDgQWBBSNbKhiJVIDkhy5HRA+njy+oWiKMDAOBgNVHQ8BAf8EBAMCBaAwDAYDVR0T
AQH/BAIwADAgBgNVHSUEGTAXBggrBgEFBQcDBAYLKwYBBAGyMQEDBQIwEQYJYIZIAYb4QgEBBAQD
AgUgMEYGA1UdIAQ/MD0wOwYMKwYBBAGyMQECAQEBMCswKQYIKwYBBQUHAgEWHWh0dHBzOi8vc2Vj
dXJlLmNvbW9kby5uZXQvQ1BTMIGlBgNVHR8EgZ0wgZowTKBKoEiGRmh0dHA6Ly9jcmwuY29tb2Rv
Y2EuY29tL1VUTi1VU0VSRmlyc3QtQ2xpZW50QXV0aGVudGljYXRpb25hbmRFbWFpbC5jcmwwSqBI
oEaGRGh0dHA6Ly9jcmwuY29tb2RvLm5ldC9VVE4tVVNFUkZpcnN0LUNsaWVudEF1dGhlbnRpY2F0
aW9uYW5kRW1haWwuY3JsMGwGCCsGAQUFBwEBBGAwXjA2BggrBgEFBQcwAoYqaHR0cDovL2NydC5j
b21vZG9jYS5jb20vVVROQUFBQ2xpZW50Q0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5j
b21vZG9jYS5jb20wIAYDVR0RBBkwF4EVeWFyb25mQGNoZWNrcG9pbnQuY29tMA0GCSqGSIb3DQEB
BQUAA4IBAQBemghknp7tCcWJ+Pzvopk4bHBaaYF/NJtkrSLXJdOb8p286uOS+7po0DIE+zh9iIyV
MTq5GFkleVzIVQHWOIOfCMnxbYh6tgrJUZKdDHMJG2vhz2i2dFOJzWnMnosWmKsDDMpmtLMH1mn+
31lQkp+rgUAkuFUruAPrG6ms5BVaO/Ta+yBGdEJ0ecLOKuA3zmKnmy8beceXpm4OdkBGWWdLvBGu
P/+v8n8KwVf2zzNTaZeEy+139MH9GTrVTiHnOsgdkvvsTu7cAl3mhRxR+o60XU0fQdk3jtbPrzeF
uK5fTY6yKlW2e/rlJg3hAr3FkIpszNRgnu+BUDYFg9VnYjjYMYIEaDCCBGQCAQEwgcQwga4xCzAJ
BgNVBAYTAlVTMQswCQYDVQQIEwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtlIENpdHkxHjAcBgNVBAoT
FVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8GA1UECxMYaHR0cDovL3d3dy51c2VydHJ1c3QuY29t
MTYwNAYDVQQDEy1VVE4tVVNFUkZpcnN0LUNsaWVudCBBdXRoZW50aWNhdGlvbiBhbmQgRW1haWwC
EQCAysg33ees11KuGql5QtYmMAkGBSsOAwIaBQCgggJ4MBgGCSqGSIb3DQEJAzELBgkqhkiG9w0B
BwEwHAYJKoZIhvcNAQkFMQ8XDTA5MDcwMTE2MzY1MFowIwYJKoZIhvcNAQkEMRYEFFnaxw59myZe
VxtIBOdDdoBcA7awMGcGCSqGSIb3DQEJDzFaMFgwCgYIKoZIhvcNAwcwDgYIKoZIhvcNAwICAgCA
MA0GCCqGSIb3DQMCAgFAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgEoMAcGBSsOAwIaMAoGCCqGSIb3
DQIFMIHVBgkrBgEEAYI3EAQxgccwgcQwga4xCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJVVDEXMBUG
A1UEBxMOU2FsdCBMYWtlIENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8G
A1UECxMYaHR0cDovL3d3dy51c2VydHJ1c3QuY29tMTYwNAYDVQQDEy1VVE4tVVNFUkZpcnN0LUNs
aWVudCBBdXRoZW50aWNhdGlvbiBhbmQgRW1haWwCEQCAysg33ees11KuGql5QtYmMIHXBgsqhkiG
9w0BCRACCzGBx6CBxDCBrjELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYDVQQHEw5TYWx0
IExha2UgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYDVQQLExhodHRw
Oi8vd3d3LnVzZXJ0cnVzdC5jb20xNjA0BgNVBAMTLVVUTi1VU0VSRmlyc3QtQ2xpZW50IEF1dGhl
bnRpY2F0aW9uIGFuZCBFbWFpbAIRAIDKyDfd56zXUq4aqXlC1iYwDQYJKoZIhvcNAQEBBQAEggEA
fWN5tTEOSl+4meW6hPkV6YxHscbKMVHbJAEdyxXeVcT7TRYpnOh/czlGlrVLdejtjOBfxOv+ELUh
e+PpIewwtbjJJuF7joXFc2glXeCREB7Ae7s8ZhkwygnORpZj5E+OnYYwWOYlLr7ZhtbFLtHru/or
Qwduz8tDyEnxMrQfzAcpzfaL04MvTx0XW44L1SqtPvxMuQ9gieCZ2g+du+LB0uWykYF3BgV8xfxW
bkxL1AWrRkrzdEpl6nNY0GV5WB4IFoMxJuV4TA6haQ2F2C5dzXC9a7FL4EpOQljpn8xnwosRi8qa
RScvD0v7pyZ3cakknCiewXJ+gqWaLHk/R/6gLwAAAAAAAA==

--0__=0ABBFF75DFF1E45B8f9e8a93df938690918c0ABBFF75DFF1E45B--


From smoonen@us.ibm.com  Wed Jul  1 12:20:11 2009
Return-Path: <smoonen@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C62AC3A6A31 for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 12:20:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kFnJtnaXNTdA for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 12:20:11 -0700 (PDT)
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.149]) by core3.amsl.com (Postfix) with ESMTP id DCB223A68B4 for <ipsec@ietf.org>; Wed,  1 Jul 2009 12:20:10 -0700 (PDT)
Received: from d03relay04.boulder.ibm.com (d03relay04.boulder.ibm.com [9.17.195.106]) by e31.co.us.ibm.com (8.13.1/8.13.1) with ESMTP id n61JFKLc025762 for <ipsec@ietf.org>; Wed, 1 Jul 2009 13:15:20 -0600
Received: from d03av03.boulder.ibm.com (d03av03.boulder.ibm.com [9.17.195.169]) by d03relay04.boulder.ibm.com (8.13.8/8.13.8/NCO v9.2) with ESMTP id n61JK0xX188966 for <ipsec@ietf.org>; Wed, 1 Jul 2009 13:20:00 -0600
Received: from d03av03.boulder.ibm.com (loopback [127.0.0.1]) by d03av03.boulder.ibm.com (8.12.11.20060308/8.13.3) with ESMTP id n61JJx10017844 for <ipsec@ietf.org>; Wed, 1 Jul 2009 13:20:00 -0600
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av03.boulder.ibm.com (8.12.11.20060308/8.12.11) with ESMTP id n61JJwiW017770 for <ipsec@ietf.org>; Wed, 1 Jul 2009 13:19:59 -0600
To: ipsec@ietf.org
MIME-Version: 1.0
X-KeepSent: 06EFF2FF:4A42E543-852575E6:0068391E; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2 HF623 January 16, 2009
From: Scott C Moonen <smoonen@us.ibm.com>
X-MIMETrack: S/MIME Sign by Notes Client on Scott C Moonen/Raleigh/IBM(Release 8.0.2 HF623|January 16, 2009) at 07/01/2009 03:19:28 PM, Serialize by Notes Client on Scott C Moonen/Raleigh/IBM(Release 8.0.2 HF623|January 16, 2009) at 07/01/2009 03:19:28 PM, Serialize complete at 07/01/2009 03:19:28 PM, S/MIME Sign failed at 07/01/2009 03:19:28 PM: The cryptographic key was not found, Serialize by Router on D03NM118/03/M/IBM(Release 8.5|December 05, 2008) at 07/01/2009 13:19:59, Serialize complete at 07/01/2009 13:19:59
Message-ID: <OF06EFF2FF.4A42E543-ON852575E6.0068391E-852575E6.006A322B@us.ibm.com>
Date: Wed, 1 Jul 2009 15:19:58 -0400
Content-Type: multipart/alternative; boundary="=_alternative 006A2754852575E6_="
Subject: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jul 2009 19:20:11 -0000

This is a multipart message in MIME format.
--=_alternative 006A2754852575E6_=
Content-Type: text/plain; charset="US-ASCII"

RFC 4753 documents that the shared secret obtained from an ECP 
Diffie-Hellman operation is the concatenation of the x and y coordinates 
of the derived point.

Is that correct?

That is a little strange to me, which is why I want to double check.  The 
y coordinate is simply a dependent variable, so including it doesn't seem 
to add much.  Much of the literature also seems to indicate that the x 
coordinate alone is generally considered to be the shared secret. Existing 
standards such as RSA's PKCS#11 interface use only the x coordinate. 
Moreover, in NIST publication 800-56A, "Recommendation for Pair-Wise Key 
Establishment Schemes Using Discrete Logarithm Cryptography", on p. 41 the 
x coordinate alone is again understood to be the shared secret.  This 
reference is particularly interesting, because it is incorporated into 
FIPS 140-2 via annex D, as the list of "Approved Key Establishment 
Techniques".

Assuming it is correct that IKE considers the shared secret to be the 
concatenation of the x and y coordinates, does this imply that IKE's use 
of DH groups 19, 20 and 21 cannot be made to be compliant with FIPS 140-2? 
 (Should I be asking this question somewhere else?)


Scott Moonen (smoonen@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://scott.andstuff.org/
http://www.linkedin.com/in/smoonen
--=_alternative 006A2754852575E6_=
Content-Type: text/html; charset="US-ASCII"


<br><font size=2 face="sans-serif">RFC 4753 documents that the shared secret
obtained from an ECP Diffie-Hellman operation is the concatenation of the
x and y coordinates of the derived point.</font>
<br>
<br><font size=2 face="sans-serif">Is that correct?</font>
<br>
<br><font size=2 face="sans-serif">That is a little strange to me, which
is why I want to double check. &nbsp;The y coordinate is simply a dependent
variable, so including it doesn't seem to add much. &nbsp;Much of the literature
also seems to indicate that the x coordinate alone is generally considered
to be the shared secret. &nbsp;Existing standards such as RSA's PKCS#11
interface use only the x coordinate. &nbsp;Moreover, in NIST publication
</font><a href="http://csrc.nist.gov/groups/ST/toolkit/documents/SP800-56Arev1_3-8-07.pdf"><font size=2 color=blue face="sans-serif">800-56A</font></a><font size=2 face="sans-serif">,
&quot;Recommendation for Pair-Wise Key Establishment Schemes Using Discrete
Logarithm Cryptography&quot;, on p. 41 the x coordinate alone is again
understood to be the shared secret. &nbsp;This reference is particularly
interesting, because it is incorporated into FIPS 140-2 via annex D, as
the list of &quot;Approved Key Establishment Techniques&quot;.</font>
<br>
<br><font size=2 face="sans-serif">Assuming it is correct that IKE considers
the shared secret to be the concatenation of the x and y coordinates, does
this imply that IKE's use of DH groups 19, 20 and 21 cannot be made to
be compliant with FIPS 140-2? &nbsp;(Should I be asking this question somewhere
else?)</font>
<br>
<br><font size=2 face="sans-serif"><br>
Scott Moonen (smoonen@us.ibm.com)<br>
z/OS Communications Server TCP/IP Development<br>
</font><a href=http://scott.andstuff.org/><font size=2 face="sans-serif">http://scott.andstuff.org/</font></a><font size=2 face="sans-serif"><br>
</font><a href=http://www.linkedin.com/in/smoonen><font size=2 face="sans-serif">http://www.linkedin.com/in/smoonen</font></a>
--=_alternative 006A2754852575E6_=--

From yaronf@checkpoint.com  Wed Jul  1 12:47:27 2009
Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7CF7528C142 for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 12:47:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.164
X-Spam-Level: 
X-Spam-Status: No, score=-2.164 tagged_above=-999 required=5 tests=[AWL=-0.435, BAYES_00=-2.599, SARE_MLH_Stock1=0.87]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SbUMQzboKraR for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 12:47:26 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id 4F0FA28C477 for <ipsec@ietf.org>; Wed,  1 Jul 2009 12:45:25 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id DB52929C004; Wed,  1 Jul 2009 22:45:41 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id A11D729C002 for <ipsec@ietf.org>; Wed,  1 Jul 2009 22:45:41 +0300 (IDT)
X-CheckPoint: {4A4BB9DA-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n61JjT3d014339 for <ipsec@ietf.org>; Wed, 1 Jul 2009 22:45:30 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Wed, 1 Jul 2009 22:45:29 +0300
From: Yaron Sheffer <yaronf@checkpoint.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Date: Wed, 1 Jul 2009 22:45:26 +0300
Thread-Topic: Stockholm meeting - call for agenda items
Thread-Index: Acn6bwYUpAHD6lr6T8KQYgSUo/cmEwAFIu4w
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59351@il-ex01.ad.checkpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0083_01C9FA9D.A036B880"
MIME-Version: 1.0
Subject: [IPsec] Stockholm meeting - call for agenda items
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jul 2009 19:47:27 -0000

------=_NextPart_000_0083_01C9FA9D.A036B880
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi everyone,

First, some background: We will not start the formal rechartering process
until after the face-to-face meeting, when enough documents have made
sufficient progress. However we wanted to use the meeting for short
presentations of documents that you believe should be included in the new
charter. We are planning to add 2-3 such documents in the near future, as
the existing work items move closer to publication.

As always: the actual rechartering discussion will be on the mailing list.
Presenting your draft in Stockholm is *not* a prerequisite to proposing it
for the new charter.

We are proposing the following agenda for Stockholm. Please let us know if
you'd like to have a presentation slot. There will be *very* strong
preference to work items that are already published as Internet Drafts.

- WG status (10 mins.)
- Very short reports on ongoing WG docs (40 mins.):
  - IKEv2-bis
  - Roadmap
  - WESP
  - Heuristics (?)
  - Resumption
  - Redirect
- RFC publication and the rechartering process (Paul, 10 mins.)
- 10 minutes on each proposed work item: 5 on technology and 5 on "why this
needs to be a working group document, rather than an individual or
independent submission."
- If time allows, 30 minutes on IKEv2-bis Issue #12
(http://trac.tools.ietf.org/wg/ipsecme/trac/ticket/12).

Thanks,
	Yaron

------=_NextPart_000_0083_01C9FA9D.A036B880
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_0083_01C9FA9D.A036B880--

From ynir@checkpoint.com  Wed Jul  1 13:16:35 2009
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AA8353A6F3A for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 13:16:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HEcnpKQrhFcS for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 13:16:34 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id CE2A528C589 for <ipsec@ietf.org>; Wed,  1 Jul 2009 13:15:47 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 0506E29C004; Wed,  1 Jul 2009 23:16:12 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id B62F829C002 for <ipsec@ietf.org>; Wed,  1 Jul 2009 23:16:12 +0300 (IDT)
X-CheckPoint: {4A4BC101-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n61KG03d021817 for <ipsec@ietf.org>; Wed, 1 Jul 2009 23:16:01 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Wed, 1 Jul 2009 23:16:00 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Date: Wed, 1 Jul 2009 23:12:41 +0300
Thread-Topic: I-D Action:draft-nir-ipsecme-childless-00.txt 
Thread-Index: Acn6LIMxjVVhQIC5ReqPq7jkohYKQAAW8ZWr
Message-ID: <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com>
References: <20090701091501.2DAE328C101@core3.amsl.com>
In-Reply-To: <20090701091501.2DAE328C101@core3.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/mixed; boundary="_002_006FEB08D9C6444AB014105C9AEB133F433539DEC2ilex01adcheck_"
MIME-Version: 1.0
Subject: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jul 2009 20:16:35 -0000

--_002_006FEB08D9C6444AB014105C9AEB133F433539DEC2ilex01adcheck_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi all.

This is the fourth iteration of this draft.  New in this iteration
 - Another co-author
 - Changed the name, so that this item is considered in the rechartering di=
scussion
 - Fixed some notation and some discussion based on comments from the list

Yoav
________________________________________
From: i-d-announce-bounces@ietf.org [i-d-announce-bounces@ietf.org] On Beha=
lf Of Internet-Drafts@ietf.org [Internet-Drafts@ietf.org]
Sent: Wednesday, July 01, 2009 12:15
To: i-d-announce@ietf.org
Subject: I-D Action:draft-nir-ipsecme-childless-00.txt

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.

        Title           : A Childless Initiation of the IKE SA
        Author(s)       : Y. Nir, et al.
        Filename        : draft-nir-ipsecme-childless-00.txt
        Pages           : 7
        Date            : 2009-07-01

This document describes an extension to the IKEv2 protocol that
allows an IKE SA to be created and authenticated without generating a
child SA.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-00.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

=0D=0A
Email secured by Check Point=0D=0A

--_002_006FEB08D9C6444AB014105C9AEB133F433539DEC2ilex01adcheck_
Content-Type: text/plain; name="ATT00001.txt"
Content-Description: ATT00001.txt
Content-Disposition: attachment; filename="ATT00001.txt"; size=310;
	creation-date="Wed, 01 Jul 2009 12:15:44 GMT";
	modification-date="Wed, 01 Jul 2009 12:15:44 GMT"
Content-Transfer-Encoding: base64

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCkktRC1Bbm5v
dW5jZSBtYWlsaW5nIGxpc3QNCkktRC1Bbm5vdW5jZUBpZXRmLm9yZw0KaHR0cHM6Ly93d3cuaWV0
Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9pLWQtYW5ub3VuY2UNCkludGVybmV0LURyYWZ0IGRpcmVj
dG9yaWVzOiBodHRwOi8vd3d3LmlldGYub3JnL3NoYWRvdy5odG1sDQpvciBmdHA6Ly9mdHAuaWV0
Zi5vcmcvaWV0Zi8xc2hhZG93LXNpdGVzLnR4dA0KDQoNClNjYW5uZWQgYnkgQ2hlY2sgUG9pbnQg
VG90YWwgU2VjdXJpdHkgR2F0ZXdheS4NCg==

--_002_006FEB08D9C6444AB014105C9AEB133F433539DEC2ilex01adcheck_--

From paul.hoffman@vpnc.org  Wed Jul  1 13:35:47 2009
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 455E73A6782 for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 13:35:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.576
X-Spam-Level: 
X-Spam-Status: No, score=-2.576 tagged_above=-999 required=5 tests=[AWL=0.023,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nK5QSpI3zyHw for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 13:35:46 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 23D393A65A5 for <ipsec@ietf.org>; Wed,  1 Jul 2009 13:35:45 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n61Ka1hG052391 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Jul 2009 13:36:01 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06240885c67177cdb7bf@[10.20.30.158]>
In-Reply-To: <BLU104-W286F39BD995E70560F2F34992E0@phx.gbl>
References: <BLU104-W286F39BD995E70560F2F34992E0@phx.gbl>
Date: Wed, 1 Jul 2009 13:35:57 -0700
To: Mohini Kaur <mohini_kaur@hotmail.com>, <ipsec@ietf.org>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Subject: Re: [IPsec] FW: IPSec responder cookie
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jul 2009 20:35:47 -0000

At 11:22 AM +0530 7/1/09, Mohini Kaur wrote:
>I have a doubt regarding the value of Responder cookie in ISAKMP protocol.
>
>When I read RFC 2408, Sec 2.5.3, it tells that the initiator and responder cookie must be set to a random value.

That section does not say that at all. It says "The details of cookie generation are implementation dependent". That is followed by suggestions.

>What I understand from this is, the responder cookie can have any value disregard to the cookie value from initiator.

Correct.

>But when I verify this in a Cisco device (initiator), it generates ISAKMP main mode message with initiator cookie (let it be X).
>
>When I send an ISAKMP main mode message, with responder cookie same as Cisco device (X) or incrementing it by one (X+1), it is discarding. (However it is processing the message with other values).
>
>Again when I do the same in a Linux machine as in Cisco, it is discarding the responder cookie with same value (X), however processing responder cookie with value incremented by one (X+1).
>
>1. Could someone explain me why Cisco and Linux validates ISAKMP main mode message with responder cookie differently? And which is the right validation?

You need to talk to the particular vendors about your question. This mailing list is not appropriate for that.

>2. Is there any other RFCs where I can get more information about validation of ISAKMP main mode message with responder cookie?

I believe that RFC 2408 is the correct RFC, but it doesn't cover what a system can and cannot do to validate a cookie.

--Paul Hoffman, Director
--VPN Consortium

From paul.hoffman@vpnc.org  Wed Jul  1 13:40:58 2009
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0181E3A6A73 for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 13:40:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.578
X-Spam-Level: 
X-Spam-Status: No, score=-2.578 tagged_above=-999 required=5 tests=[AWL=0.021,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0XRqbJrujIYr for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 13:40:57 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D00933A6839 for <ipsec@ietf.org>; Wed,  1 Jul 2009 13:40:56 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n61KfDiE053760 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Jul 2009 13:41:13 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06240886c671799622dd@[10.20.30.158]>
In-Reply-To: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD5933A@il-ex01.ad.checkpoint.com>
References: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD5933A@il-ex01.ad.checkpoint.com>
Date: Wed, 1 Jul 2009 13:41:11 -0700
To: Yaron Sheffer <yaronf@checkpoint.com>, "ipsec@ietf.org" <ipsec@ietf.org>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Subject: Re: [IPsec] IKEv2 bis section order
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jul 2009 20:40:58 -0000

At 7:36 PM +0300 7/1/09, Yaron Sheffer wrote:
>I'd like to propose:
>
>   1.  Introduction
>     1.1.  Usage Scenarios
>       1.1.1.  Security Gateway to Security Gateway Tunnel Mode
>       1.1.2.  Endpoint-to-Endpoint Transport Mode
>       1.1.3.  Endpoint to Security Gateway Tunnel Mode
>       1.1.4.  Other Scenarios
>     1.2.  Requirements Terminology
>
>   2.  IKE Protocol Overview (or "Essentials") [today's Sec. 1.2-1.5]
>     2.1.  The Initial Exchanges
>     2.2.  The CREATE_CHILD_SA Exchange
>       2.2.1.  Creating New Child SAs with the CREATE_CHILD_SA
>               Exchange
>       2.2.2.  Rekeying IKE SAs with the CREATE_CHILD_SA Exchange
>       2.2.3.  Rekeying Child SAs with the CREATE_CHILD_SA
>               Exchange
>     2.3.  The INFORMATIONAL Exchange
>       2.3.1.  Deleting an SA with INFORMATIONAL Exchanges
>     2.4.  Informational Messages outside of an IKE SA
>
>   3.  IKE Protocol Details and Variations [today's Sec. 2]
>
>   Appendix X: Differences Between RFC 4306 and This Document [today's Sec.
>1.7]

A different idea is to simply rename Section 1 "IKE Protocol Overview", and move the requirements terminology (which is, in essence, boilerplate that most people ignore anyway) and the differences to appendixes.

>Do you see value in this, or do you prefer keeping the existing order?

I see only minor value to the original proposal, and a high cost to me (the editor). I think my alternate proposal isn't so onerous, but am happy to follow Yaron's proposal if people really like it.

--Paul Hoffman, Director
--VPN Consortium

From paav.cisco@gmail.com  Wed Jul  1 19:58:08 2009
Return-Path: <paav.cisco@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E21853A695F; Wed,  1 Jul 2009 19:58:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WSz8Ipj61p2z; Wed,  1 Jul 2009 19:58:07 -0700 (PDT)
Received: from ey-out-2122.google.com (ey-out-2122.google.com [74.125.78.26]) by core3.amsl.com (Postfix) with ESMTP id 3785E3A68F8; Wed,  1 Jul 2009 19:58:06 -0700 (PDT)
Received: by ey-out-2122.google.com with SMTP id 22so320018eye.65 for <multiple recipients>; Wed, 01 Jul 2009 19:58:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=mgvss3WdwRFeZ97shsBy+HulJyUjW4QUOBecGkPb8hI=; b=RfopzoXBVepX74hqIvUnRRE6042PEzgxhoSBr5T31kvuDp7AYuv5v4OOpPgH7Htm/m qkzAcAk8T8rHeTcsPlvN7Yf4+/a6fL9ASTlprQssVXOK1WXpdyEmKQhrRpj2pLKcbBvc Oqsp50es28UTRBFF4kvcNyRydVVl67TRsBBic=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=gJLQfW/x1++eT3m1e/TBEKB7I9By9XveZWSEjxxk3DaUGY4EskkvbzJgTJJGnrKqVb SeLKqZwgzCTOejbkXhikTZO0QZqNYl2k25d91n5JW+1zxzLcJN4jOJ3D1iU6I8qSLzaQ MSD13d8Km+E32ZfVhaOJAXe/wv6rTaCZetBpk=
MIME-Version: 1.0
Received: by 10.211.180.19 with SMTP id h19mr277448ebp.26.1246503505724; Wed,  01 Jul 2009 19:58:25 -0700 (PDT)
In-Reply-To: <7ccecf670907010628p77e30c5ah7d7850a6afcad001@mail.gmail.com>
References: <20090616181501.A67583A6969@core3.amsl.com> <40e68ca20907010354k747e75fmea3394803acdbd98@mail.gmail.com> <7ccecf670907010628p77e30c5ah7d7850a6afcad001@mail.gmail.com>
Date: Thu, 2 Jul 2009 08:28:25 +0530
Message-ID: <40e68ca20907011958m3526c96eg7d7d147aeebd5ecb@mail.gmail.com>
From: Padmakumar AV <paav.cisco@gmail.com>
To: Raj Singh <rsjenwar@gmail.com>
Content-Type: multipart/alternative; boundary=0015174c33c8ab863a046db03629
Cc: ipsec@ietf.org, vijay@wichorus.com, Internet-Drafts@ietf.org, paav@cisco.com
Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-ikev2-redirect-11.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Jul 2009 02:58:09 -0000

--0015174c33c8ab863a046db03629
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

Hi Raj,
The case I mentioned is with usage of redirect during init exchange destined
to anycast. The router that tries to resolve the anycast address has no clue
about this as it is syntactically same as that of unicast. But an attacker
who has access to the link, precisely where anycast resolution happens can
always set override bit in the NA and win the resolution. He may not be
capable to drop the packet as mentioned in Section 10 but will be able to
redirect it either to a victim or another node or do continuous redirects. I
don't understand how the spokes resolve this problem by having a policy at
the spoke side to restrict the maximum number of redirects as its final plan
is to connect to a hub.

Thanks
Padmakumar


On Wed, Jul 1, 2009 at 6:58 PM, Raj Singh <rsjenwar@gmail.com> wrote:

> Hi Padam,
>
> It possible and avoidable by configuring a policy on client for MAX no. of
> REDIRECTs.
> Draft has a mention of this scenario in Section 10.
>
> With Regards,
> Raj
>
>
> On Wed, Jul 1, 2009 at 4:24 PM, Padmakumar AV <paav.cisco@gmail.com>wrote:
>
>> Hi Vijay,
>>
>> I have a doubt regarding the usage of redirect during INIT exchange.
>>
>> An attacker in between spoke and hub spoofs the init exchange to anycast
>> address and then redirects it to another FAKE-HUB1 by specifying unicast
>> address of the FAKE-HUB1. FAKE-HUB1 subsequently redirects it to FAKE-HUB2
>> and FAKE-HUB2 to FAKE-HUB3 and go on...
>>
>> Is that possible.
>>
>>
>>
>> Thanks
>>
>> Padmakumar
>>
>> On Tue, Jun 16, 2009 at 11:45 PM, <Internet-Drafts@ietf.org> wrote:
>>
>>> A New Internet-Draft is available from the on-line Internet-Drafts
>>> directories.
>>> This draft is a work item of the IP Security Maintenance and Extensions
>>> Working Group of the IETF.
>>>
>>>
>>>        Title           : Redirect Mechanism for IKEv2
>>>        Author(s)       : V. Devarapalli, K. Weniger
>>>        Filename        : draft-ietf-ipsecme-ikev2-redirect-11.txt
>>>        Pages           : 16
>>>        Date            : 2009-06-16
>>>
>>> IKEv2 is a protocol for setting up VPN tunnels from a remote location
>>> to a gateway so that the VPN client can access services in the
>>> network behind the gateway.  Currently there is no standard mechanism
>>> specified that allows an overloaded VPN gateway or a VPN gateway that
>>> is being shut down for maintenance to redirect the VPN client to
>>> attach to another gateway.  This document proposes a redirect
>>> mechanism for IKEv2.  The proposed mechanism can also be used in
>>> Mobile IPv6 to enable the home agent to redirect the mobile node to
>>> another home agent.
>>>
>>> A URL for this Internet-Draft is:
>>>
>>> http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-ikev2-redirect-11.txt
>>>
>>> Internet-Drafts are also available by anonymous FTP at:
>>> ftp://ftp.ietf.org/internet-drafts/
>>>
>>> Below is the data which will enable a MIME compliant mail reader
>>> implementation to automatically retrieve the ASCII version of the
>>> Internet-Draft.
>>>
>>>
>>> _______________________________________________
>>> IPsec mailing list
>>> IPsec@ietf.org
>>> https://www.ietf.org/mailman/listinfo/ipsec
>>>
>>>
>>
>> _______________________________________________
>> IPsec mailing list
>> IPsec@ietf.org
>> https://www.ietf.org/mailman/listinfo/ipsec
>>
>>
>

--0015174c33c8ab863a046db03629
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi Raj,<div><br></div><div>The case I mentioned is with usage of redirect d=
uring init exchange destined to anycast. The router that tries to resolve t=
he anycast address has no clue about this as it is=A0syntactically=A0same a=
s that of unicast. But an attacker who has access to the link, precisely wh=
ere anycast resolution happens can always set override bit in the NA and wi=
n the resolution. He may not be capable to drop the packet as mentioned in =
Section 10 but will be able to redirect it either to a victim or another no=
de or do continuous redirects. I don&#39;t understand how the spokes resolv=
e this problem by having a policy at the spoke side to restrict the maximum=
 number of redirects as its final plan is to connect to a hub.</div>
<div><br></div><div>Thanks</div><div>Padmakumar</div><div><br><br><div clas=
s=3D"gmail_quote">On Wed, Jul 1, 2009 at 6:58 PM, Raj Singh <span dir=3D"lt=
r">&lt;<a href=3D"mailto:rsjenwar@gmail.com">rsjenwar@gmail.com</a>&gt;</sp=
an> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex;">Hi Padam,<br><br>It possible and avoidable =
by configuring a policy on client for MAX no. of REDIRECTs.<br>Draft has a =
mention of this scenario in Section 10.<br>
<br>With Regards,<br><font color=3D"#888888">Raj</font><div><div></div><div=
 class=3D"h5"><br><br><div class=3D"gmail_quote">On Wed, Jul 1, 2009 at 4:2=
4 PM, Padmakumar AV <span dir=3D"ltr">&lt;<a href=3D"mailto:paav.cisco@gmai=
l.com" target=3D"_blank">paav.cisco@gmail.com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"border-left:1px solid rgb(204, 2=
04, 204);margin:0pt 0pt 0pt 0.8ex;padding-left:1ex">Hi Vijay,<div><br></div=
><div><p>I have a doubt regarding the usage of redirect during INIT
exchange.</p>

<p>An attacker in between spoke and hub spoofs the init
exchange to anycast address and then redirects it to another FAKE-HUB1 by
specifying unicast address of the FAKE-HUB1. FAKE-HUB1 subsequently redirec=
ts
it to FAKE-HUB2 and FAKE-HUB2 to FAKE-HUB3 and go on...</p>

<p>Is that possible.</p>

<p>=A0</p>

<p>Thanks</p>

<p>Padmakumar</p><font color=3D"#888888"><br></font><div class=3D"gmail_quo=
te"><div><div></div><div>On Tue, Jun 16, 2009 at 11:45 PM,  <span dir=3D"lt=
r">&lt;<a href=3D"mailto:Internet-Drafts@ietf.org" target=3D"_blank">Intern=
et-Drafts@ietf.org</a>&gt;</span> wrote:<br>

</div></div><blockquote class=3D"gmail_quote" style=3D"border-left:1px soli=
d rgb(204, 204, 204);margin:0pt 0pt 0pt 0.8ex;padding-left:1ex"><div><div><=
/div><div>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the IP Security Maintenance and Extensions Wor=
king Group of the IETF.<br>
<br>
<br>
 =A0 =A0 =A0 =A0Title =A0 =A0 =A0 =A0 =A0 : Redirect Mechanism for IKEv2<br=
>
 =A0 =A0 =A0 =A0Author(s) =A0 =A0 =A0 : V. Devarapalli, K. Weniger<br>
 =A0 =A0 =A0 =A0Filename =A0 =A0 =A0 =A0: draft-ietf-ipsecme-ikev2-redirect=
-11.txt<br>
 =A0 =A0 =A0 =A0Pages =A0 =A0 =A0 =A0 =A0 : 16<br>
 =A0 =A0 =A0 =A0Date =A0 =A0 =A0 =A0 =A0 =A0: 2009-06-16<br>
<br>
IKEv2 is a protocol for setting up VPN tunnels from a remote location<br>
to a gateway so that the VPN client can access services in the<br>
network behind the gateway. =A0Currently there is no standard mechanism<br>
specified that allows an overloaded VPN gateway or a VPN gateway that<br>
is being shut down for maintenance to redirect the VPN client to<br>
attach to another gateway. =A0This document proposes a redirect<br>
mechanism for IKEv2. =A0The proposed mechanism can also be used in<br>
Mobile IPv6 to enable the home agent to redirect the mobile node to<br>
another home agent.<br>
<br>
A URL for this Internet-Draft is:<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-ikev2-red=
irect-11.txt" target=3D"_blank">http://www.ietf.org/internet-drafts/draft-i=
etf-ipsecme-ikev2-redirect-11.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br><br></div></div><div>_______________________________________________<br=
>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org" target=3D"_blank">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/ipsec</a><br>
<br></div></blockquote></div><br></div>
<br>_______________________________________________<br>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org" target=3D"_blank">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/ipsec</a><br>
<br></blockquote></div><br>
</div></div></blockquote></div><br></div>

--0015174c33c8ab863a046db03629--

From rsjenwar@gmail.com  Wed Jul  1 20:08:41 2009
Return-Path: <rsjenwar@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 177FC3A6A02 for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 20:08:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.338
X-Spam-Level: 
X-Spam-Status: No, score=-2.338 tagged_above=-999 required=5 tests=[AWL=0.260,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2b898t8U8I15 for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 20:08:40 -0700 (PDT)
Received: from wf-out-1314.google.com (wf-out-1314.google.com [209.85.200.175]) by core3.amsl.com (Postfix) with ESMTP id E57903A6807 for <ipsec@ietf.org>; Wed,  1 Jul 2009 20:08:39 -0700 (PDT)
Received: by wf-out-1314.google.com with SMTP id 29so519703wff.31 for <ipsec@ietf.org>; Wed, 01 Jul 2009 20:09:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=7+tMn2dva2aY9f4ZQSQrIN1PFNRxZai0YgWwwpDfsNQ=; b=P/QRrjbaPL1IpHjnVwQfb/cmI7IxAr631hp2iYleB2/5BJabdPJI/VjovBuFKVx2cF v8lvKQVa44aT2JCyAXMVioSrHowYwg2jPZoL9AB//XEK2dLeuDgYpojbtZiw5aQpgchv /2wUzn0V31gWAlqHVCK98HjHsLGMcfVTHqwYQ=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=wtZ3+yTg4JQPymVTJIFzJTy6pD9FLLBcQOTXKw7kdAovWLwXgi9831x/EmAE9ud1IF uHRPv9KZLAFmSyc+72hQrWsSIdy9LN64GNthLovNw+LzLpniuAf+5sFjI+WvhN2H0aD4 9Yyc/6hYyA5cpu2W3KlwT/TIBjh7n0cSocZyk=
MIME-Version: 1.0
Received: by 10.142.246.19 with SMTP id t19mr1214484wfh.249.1246504140186;  Wed, 01 Jul 2009 20:09:00 -0700 (PDT)
In-Reply-To: <40e68ca20907011958m3526c96eg7d7d147aeebd5ecb@mail.gmail.com>
References: <20090616181501.A67583A6969@core3.amsl.com> <40e68ca20907010354k747e75fmea3394803acdbd98@mail.gmail.com> <7ccecf670907010628p77e30c5ah7d7850a6afcad001@mail.gmail.com> <40e68ca20907011958m3526c96eg7d7d147aeebd5ecb@mail.gmail.com>
Date: Thu, 2 Jul 2009 08:39:00 +0530
Message-ID: <7ccecf670907012009g100fa8e5m54598593a84d7fe0@mail.gmail.com>
From: Raj Singh <rsjenwar@gmail.com>
To: Padmakumar AV <paav.cisco@gmail.com>
Content-Type: multipart/alternative; boundary=000e0cd2e6e67ca69f046db05c3c
Cc: ipsec@ietf.org, vijay@wichorus.com, paav@cisco.com
Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-ikev2-redirect-11.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Jul 2009 03:08:41 -0000

--000e0cd2e6e67ca69f046db05c3c
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Padma,

By having a policy for MAX no of re-direct means when spoke reaches max no
of re-directs it will come to know that either it is under attack or there
is some misconfiguration. Then spoke can choose to stop trying connection
with anycast address and fall back to some other VPN gateway for connection.

Thanks,
Raj



On Thu, Jul 2, 2009 at 8:28 AM, Padmakumar AV <paav.cisco@gmail.com> wrote:

> Hi Raj,
> The case I mentioned is with usage of redirect during init exchange
> destined to anycast. The router that tries to resolve the anycast address
> has no clue about this as it is syntactically same as that of unicast. But
> an attacker who has access to the link, precisely where anycast resolution
> happens can always set override bit in the NA and win the resolution. He may
> not be capable to drop the packet as mentioned in Section 10 but will be
> able to redirect it either to a victim or another node or do continuous
> redirects. I don't understand how the spokes resolve this problem by having
> a policy at the spoke side to restrict the maximum number of redirects as
> its final plan is to connect to a hub.
>
> Thanks
> Padmakumar
>
>
> On Wed, Jul 1, 2009 at 6:58 PM, Raj Singh <rsjenwar@gmail.com> wrote:
>
>> Hi Padam,
>>
>> It possible and avoidable by configuring a policy on client for MAX no. of
>> REDIRECTs.
>> Draft has a mention of this scenario in Section 10.
>>
>> With Regards,
>> Raj
>>
>>
>> On Wed, Jul 1, 2009 at 4:24 PM, Padmakumar AV <paav.cisco@gmail.com>wrote:
>>
>>> Hi Vijay,
>>>
>>> I have a doubt regarding the usage of redirect during INIT exchange.
>>>
>>> An attacker in between spoke and hub spoofs the init exchange to anycast
>>> address and then redirects it to another FAKE-HUB1 by specifying unicast
>>> address of the FAKE-HUB1. FAKE-HUB1 subsequently redirects it to FAKE-HUB2
>>> and FAKE-HUB2 to FAKE-HUB3 and go on...
>>>
>>> Is that possible.
>>>
>>>
>>>
>>> Thanks
>>>
>>> Padmakumar
>>>
>>> On Tue, Jun 16, 2009 at 11:45 PM, <Internet-Drafts@ietf.org> wrote:
>>>
>>>> A New Internet-Draft is available from the on-line Internet-Drafts
>>>> directories.
>>>> This draft is a work item of the IP Security Maintenance and Extensions
>>>> Working Group of the IETF.
>>>>
>>>>
>>>>        Title           : Redirect Mechanism for IKEv2
>>>>        Author(s)       : V. Devarapalli, K. Weniger
>>>>        Filename        : draft-ietf-ipsecme-ikev2-redirect-11.txt
>>>>        Pages           : 16
>>>>        Date            : 2009-06-16
>>>>
>>>> IKEv2 is a protocol for setting up VPN tunnels from a remote location
>>>> to a gateway so that the VPN client can access services in the
>>>> network behind the gateway.  Currently there is no standard mechanism
>>>> specified that allows an overloaded VPN gateway or a VPN gateway that
>>>> is being shut down for maintenance to redirect the VPN client to
>>>> attach to another gateway.  This document proposes a redirect
>>>> mechanism for IKEv2.  The proposed mechanism can also be used in
>>>> Mobile IPv6 to enable the home agent to redirect the mobile node to
>>>> another home agent.
>>>>
>>>> A URL for this Internet-Draft is:
>>>>
>>>> http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-ikev2-redirect-11.txt
>>>>
>>>> Internet-Drafts are also available by anonymous FTP at:
>>>> ftp://ftp.ietf.org/internet-drafts/
>>>>
>>>> Below is the data which will enable a MIME compliant mail reader
>>>> implementation to automatically retrieve the ASCII version of the
>>>> Internet-Draft.
>>>>
>>>>
>>>> _______________________________________________
>>>> IPsec mailing list
>>>> IPsec@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/ipsec
>>>>
>>>>
>>>
>>> _______________________________________________
>>> IPsec mailing list
>>> IPsec@ietf.org
>>> https://www.ietf.org/mailman/listinfo/ipsec
>>>
>>>
>>
>

--000e0cd2e6e67ca69f046db05c3c
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Padma,<br><br>By having a policy for MAX no of re-direct means when spok=
e reaches max no of re-directs it will come to know that either it is under=
 attack or there is some misconfiguration. Then spoke can choose to stop tr=
ying connection with anycast address and fall back to some other VPN gatewa=
y for connection.<br>
<br>Thanks,<br>Raj<br><br><br><br><div class=3D"gmail_quote">On Thu, Jul 2,=
 2009 at 8:28 AM, Padmakumar AV <span dir=3D"ltr">&lt;<a href=3D"mailto:paa=
v.cisco@gmail.com">paav.cisco@gmail.com</a>&gt;</span> wrote:<br><blockquot=
e class=3D"gmail_quote" style=3D"border-left: 1px solid rgb(204, 204, 204);=
 margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
Hi Raj,<div><br></div><div>The case I mentioned is with usage of redirect d=
uring init exchange destined to anycast. The router that tries to resolve t=
he anycast address has no clue about this as it is=C2=A0syntactically=C2=A0=
same as that of unicast. But an attacker who has access to the link, precis=
ely where anycast resolution happens can always set override bit in the NA =
and win the resolution. He may not be capable to drop the packet as mention=
ed in Section 10 but will be able to redirect it either to a victim or anot=
her node or do continuous redirects. I don&#39;t understand how the spokes =
resolve this problem by having a policy at the spoke side to restrict the m=
aximum number of redirects as its final plan is to connect to a hub.</div>

<div><br></div><div>Thanks</div><div>Padmakumar</div><div><div></div><div c=
lass=3D"h5"><div><br><br><div class=3D"gmail_quote">On Wed, Jul 1, 2009 at =
6:58 PM, Raj Singh <span dir=3D"ltr">&lt;<a href=3D"mailto:rsjenwar@gmail.c=
om" target=3D"_blank">rsjenwar@gmail.com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"border-left: 1px solid rgb(204, =
204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">Hi Padam,<br><br>=
It possible and avoidable by configuring a policy on client for MAX no. of =
REDIRECTs.<br>
Draft has a mention of this scenario in Section 10.<br>
<br>With Regards,<br><font color=3D"#888888">Raj</font><div><div></div><div=
><br><br><div class=3D"gmail_quote">On Wed, Jul 1, 2009 at 4:24 PM, Padmaku=
mar AV <span dir=3D"ltr">&lt;<a href=3D"mailto:paav.cisco@gmail.com" target=
=3D"_blank">paav.cisco@gmail.com</a>&gt;</span> wrote:<br>


<blockquote class=3D"gmail_quote" style=3D"border-left: 1px solid rgb(204, =
204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">Hi Vijay,<div><br=
></div><div><p>I have a doubt regarding the usage of redirect during INIT
exchange.</p>

<p>An attacker in between spoke and hub spoofs the init
exchange to anycast address and then redirects it to another FAKE-HUB1 by
specifying unicast address of the FAKE-HUB1. FAKE-HUB1 subsequently redirec=
ts
it to FAKE-HUB2 and FAKE-HUB2 to FAKE-HUB3 and go on...</p>

<p>Is that possible.</p>

<p>=C2=A0</p>

<p>Thanks</p>

<p>Padmakumar</p><font color=3D"#888888"><br></font><div class=3D"gmail_quo=
te"><div><div></div><div>On Tue, Jun 16, 2009 at 11:45 PM,  <span dir=3D"lt=
r">&lt;<a href=3D"mailto:Internet-Drafts@ietf.org" target=3D"_blank">Intern=
et-Drafts@ietf.org</a>&gt;</span> wrote:<br>


</div></div><blockquote class=3D"gmail_quote" style=3D"border-left: 1px sol=
id rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;"><div>=
<div></div><div>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the IP Security Maintenance and Extensions Wor=
king Group of the IETF.<br>
<br>
<br>
 =C2=A0 =C2=A0 =C2=A0 =C2=A0Title =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : Redi=
rect Mechanism for IKEv2<br>
 =C2=A0 =C2=A0 =C2=A0 =C2=A0Author(s) =C2=A0 =C2=A0 =C2=A0 : V. Devarapalli=
, K. Weniger<br>
 =C2=A0 =C2=A0 =C2=A0 =C2=A0Filename =C2=A0 =C2=A0 =C2=A0 =C2=A0: draft-iet=
f-ipsecme-ikev2-redirect-11.txt<br>
 =C2=A0 =C2=A0 =C2=A0 =C2=A0Pages =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 16<b=
r>
 =C2=A0 =C2=A0 =C2=A0 =C2=A0Date =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 2009-06-16<br>
<br>
IKEv2 is a protocol for setting up VPN tunnels from a remote location<br>
to a gateway so that the VPN client can access services in the<br>
network behind the gateway. =C2=A0Currently there is no standard mechanism<=
br>
specified that allows an overloaded VPN gateway or a VPN gateway that<br>
is being shut down for maintenance to redirect the VPN client to<br>
attach to another gateway. =C2=A0This document proposes a redirect<br>
mechanism for IKEv2. =C2=A0The proposed mechanism can also be used in<br>
Mobile IPv6 to enable the home agent to redirect the mobile node to<br>
another home agent.<br>
<br>
A URL for this Internet-Draft is:<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-ikev2-red=
irect-11.txt" target=3D"_blank">http://www.ietf.org/internet-drafts/draft-i=
etf-ipsecme-ikev2-redirect-11.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br><br></div></div><div>_______________________________________________<br=
>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org" target=3D"_blank">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/ipsec</a><br>
<br></div></blockquote></div><br></div>
<br>_______________________________________________<br>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org" target=3D"_blank">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/ipsec</a><br>
<br></blockquote></div><br>
</div></div></blockquote></div><br></div>
</div></div></blockquote></div><br>

--000e0cd2e6e67ca69f046db05c3c--

From paav.cisco@gmail.com  Wed Jul  1 20:46:36 2009
Return-Path: <paav.cisco@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6B6243A6845 for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 20:46:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.693
X-Spam-Level: 
X-Spam-Status: No, score=-1.693 tagged_above=-999 required=5 tests=[AWL=0.905,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wjZSOSuE4ltT for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 20:46:35 -0700 (PDT)
Received: from mail-ew0-f210.google.com (mail-ew0-f210.google.com [209.85.219.210]) by core3.amsl.com (Postfix) with ESMTP id 9B33C3A685D for <ipsec@ietf.org>; Wed,  1 Jul 2009 20:46:34 -0700 (PDT)
Received: by ewy6 with SMTP id 6so1748680ewy.37 for <ipsec@ietf.org>; Wed, 01 Jul 2009 20:46:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=LeAqpOxCnvzjrHuwxobF157YRTegYdzfs6+k9hPkP58=; b=vfaTFCO5y3lhn0pHIHLkNGWMZP25xEbkee6af65lvF1t0KaQ7NhlRCQJpNqE3Ihh19 NrEgofj4Ems/hyd/Zu39nTY9+eyRCXISQjetKWtDb4MGSzxha2BmVBiOSW2NtQRa3z+z yT+MI3W6caDpY210OnYxhGldPiojmW08ge4EA=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=lZHa/9zXJfI3hkPqTfzfy5LfdatjJo4a3P3k3IxaE6/vDmP6I1rnKF4s5dnhgI7Ask 8WQTDYNgSduyJwhg9aNp9VgHLmbcc9ow2sMdRS4I6kXiZWP5hy5TOtvmZsShUg5eFggF 7g9GGN5n8lcwB2/p6tDRETayHfS2URxSdnHn0=
MIME-Version: 1.0
Received: by 10.210.30.1 with SMTP id d1mr4549855ebd.37.1246506414033; Wed, 01  Jul 2009 20:46:54 -0700 (PDT)
In-Reply-To: <7ccecf670907012009g100fa8e5m54598593a84d7fe0@mail.gmail.com>
References: <20090616181501.A67583A6969@core3.amsl.com> <40e68ca20907010354k747e75fmea3394803acdbd98@mail.gmail.com> <7ccecf670907010628p77e30c5ah7d7850a6afcad001@mail.gmail.com> <40e68ca20907011958m3526c96eg7d7d147aeebd5ecb@mail.gmail.com> <7ccecf670907012009g100fa8e5m54598593a84d7fe0@mail.gmail.com>
Date: Thu, 2 Jul 2009 09:16:53 +0530
Message-ID: <40e68ca20907012046n58c54accy5bf0297861038905@mail.gmail.com>
From: Padmakumar AV <paav.cisco@gmail.com>
To: Raj Singh <rsjenwar@gmail.com>
Content-Type: multipart/alternative; boundary=0015174bdea004cbf7046db0e4a8
Cc: ipsec@ietf.org, vijay@wichorus.com, paav@cisco.com
Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-ikev2-redirect-11.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Jul 2009 03:46:36 -0000

--0015174bdea004cbf7046db0e4a8
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

Hi Raj,
That is exactly what I am saying. Two things:

1. permitting redirects during Init exchange (you have no choice when the
destination is anycast)
2. usage of anycast

These two are not serving any special purpose here instead it creates more
problem.

Thanks
Padmakumar


On Thu, Jul 2, 2009 at 8:39 AM, Raj Singh <rsjenwar@gmail.com> wrote:

> Hi Padma,
>
> By having a policy for MAX no of re-direct means when spoke reaches max no
> of re-directs it will come to know that either it is under attack or there
> is some misconfiguration. Then spoke can choose to stop trying connection
> with anycast address and fall back to some other VPN gateway for connection.
>
> Thanks,
> Raj
>
>
>
>
> On Thu, Jul 2, 2009 at 8:28 AM, Padmakumar AV <paav.cisco@gmail.com>wrote:
>
>> Hi Raj,
>> The case I mentioned is with usage of redirect during init exchange
>> destined to anycast. The router that tries to resolve the anycast address
>> has no clue about this as it is syntactically same as that of unicast. But
>> an attacker who has access to the link, precisely where anycast resolution
>> happens can always set override bit in the NA and win the resolution. He may
>> not be capable to drop the packet as mentioned in Section 10 but will be
>> able to redirect it either to a victim or another node or do continuous
>> redirects. I don't understand how the spokes resolve this problem by having
>> a policy at the spoke side to restrict the maximum number of redirects as
>> its final plan is to connect to a hub.
>>
>> Thanks
>> Padmakumar
>>
>>
>> On Wed, Jul 1, 2009 at 6:58 PM, Raj Singh <rsjenwar@gmail.com> wrote:
>>
>>> Hi Padam,
>>>
>>> It possible and avoidable by configuring a policy on client for MAX no.
>>> of REDIRECTs.
>>> Draft has a mention of this scenario in Section 10.
>>>
>>> With Regards,
>>> Raj
>>>
>>>
>>> On Wed, Jul 1, 2009 at 4:24 PM, Padmakumar AV <paav.cisco@gmail.com>wrote:
>>>
>>>> Hi Vijay,
>>>>
>>>> I have a doubt regarding the usage of redirect during INIT exchange.
>>>>
>>>> An attacker in between spoke and hub spoofs the init exchange to anycast
>>>> address and then redirects it to another FAKE-HUB1 by specifying unicast
>>>> address of the FAKE-HUB1. FAKE-HUB1 subsequently redirects it to FAKE-HUB2
>>>> and FAKE-HUB2 to FAKE-HUB3 and go on...
>>>>
>>>> Is that possible.
>>>>
>>>>
>>>>
>>>> Thanks
>>>>
>>>> Padmakumar
>>>>
>>>> On Tue, Jun 16, 2009 at 11:45 PM, <Internet-Drafts@ietf.org> wrote:
>>>>
>>>>> A New Internet-Draft is available from the on-line Internet-Drafts
>>>>> directories.
>>>>> This draft is a work item of the IP Security Maintenance and Extensions
>>>>> Working Group of the IETF.
>>>>>
>>>>>
>>>>>        Title           : Redirect Mechanism for IKEv2
>>>>>        Author(s)       : V. Devarapalli, K. Weniger
>>>>>        Filename        : draft-ietf-ipsecme-ikev2-redirect-11.txt
>>>>>        Pages           : 16
>>>>>        Date            : 2009-06-16
>>>>>
>>>>> IKEv2 is a protocol for setting up VPN tunnels from a remote location
>>>>> to a gateway so that the VPN client can access services in the
>>>>> network behind the gateway.  Currently there is no standard mechanism
>>>>> specified that allows an overloaded VPN gateway or a VPN gateway that
>>>>> is being shut down for maintenance to redirect the VPN client to
>>>>> attach to another gateway.  This document proposes a redirect
>>>>> mechanism for IKEv2.  The proposed mechanism can also be used in
>>>>> Mobile IPv6 to enable the home agent to redirect the mobile node to
>>>>> another home agent.
>>>>>
>>>>> A URL for this Internet-Draft is:
>>>>>
>>>>> http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-ikev2-redirect-11.txt
>>>>>
>>>>> Internet-Drafts are also available by anonymous FTP at:
>>>>> ftp://ftp.ietf.org/internet-drafts/
>>>>>
>>>>> Below is the data which will enable a MIME compliant mail reader
>>>>> implementation to automatically retrieve the ASCII version of the
>>>>> Internet-Draft.
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> IPsec mailing list
>>>>> IPsec@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/ipsec
>>>>>
>>>>>
>>>>
>>>> _______________________________________________
>>>> IPsec mailing list
>>>> IPsec@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/ipsec
>>>>
>>>>
>>>
>>
>

--0015174bdea004cbf7046db0e4a8
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi Raj,<div><br></div><div>That is exactly what I am saying. Two things:</d=
iv><div><br></div><div>1. permitting redirects during Init exchange (you ha=
ve no choice when the destination is anycast)</div><div>2. usage of anycast=
=A0</div>
<div><br></div><div>These two are not serving any special purpose here inst=
ead it creates more problem.</div><div><br></div><div>Thanks</div><div>Padm=
akumar</div><div><br></div><div><br><div class=3D"gmail_quote">On Thu, Jul =
2, 2009 at 8:39 AM, Raj Singh <span dir=3D"ltr">&lt;<a href=3D"mailto:rsjen=
war@gmail.com">rsjenwar@gmail.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex;">Hi Padma,<br><br>By having a policy for MAX=
 no of re-direct means when spoke reaches max no of re-directs it will come=
 to know that either it is under attack or there is some misconfiguration. =
Then spoke can choose to stop trying connection with anycast address and fa=
ll back to some other VPN gateway for connection.<br>

<br>Thanks,<br><font color=3D"#888888">Raj</font><div><div></div><div class=
=3D"h5"><br><br><br><br><div class=3D"gmail_quote">On Thu, Jul 2, 2009 at 8=
:28 AM, Padmakumar AV <span dir=3D"ltr">&lt;<a href=3D"mailto:paav.cisco@gm=
ail.com" target=3D"_blank">paav.cisco@gmail.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"border-left:1px solid rgb(204, 2=
04, 204);margin:0pt 0pt 0pt 0.8ex;padding-left:1ex">
Hi Raj,<div><br></div><div>The case I mentioned is with usage of redirect d=
uring init exchange destined to anycast. The router that tries to resolve t=
he anycast address has no clue about this as it is=A0syntactically=A0same a=
s that of unicast. But an attacker who has access to the link, precisely wh=
ere anycast resolution happens can always set override bit in the NA and wi=
n the resolution. He may not be capable to drop the packet as mentioned in =
Section 10 but will be able to redirect it either to a victim or another no=
de or do continuous redirects. I don&#39;t understand how the spokes resolv=
e this problem by having a policy at the spoke side to restrict the maximum=
 number of redirects as its final plan is to connect to a hub.</div>


<div><br></div><div>Thanks</div><div>Padmakumar</div><div><div></div><div><=
div><br><br><div class=3D"gmail_quote">On Wed, Jul 1, 2009 at 6:58 PM, Raj =
Singh <span dir=3D"ltr">&lt;<a href=3D"mailto:rsjenwar@gmail.com" target=3D=
"_blank">rsjenwar@gmail.com</a>&gt;</span> wrote:<br>


<blockquote class=3D"gmail_quote" style=3D"border-left:1px solid rgb(204, 2=
04, 204);margin:0pt 0pt 0pt 0.8ex;padding-left:1ex">Hi Padam,<br><br>It pos=
sible and avoidable by configuring a policy on client for MAX no. of REDIRE=
CTs.<br>

Draft has a mention of this scenario in Section 10.<br>
<br>With Regards,<br><font color=3D"#888888">Raj</font><div><div></div><div=
><br><br><div class=3D"gmail_quote">On Wed, Jul 1, 2009 at 4:24 PM, Padmaku=
mar AV <span dir=3D"ltr">&lt;<a href=3D"mailto:paav.cisco@gmail.com" target=
=3D"_blank">paav.cisco@gmail.com</a>&gt;</span> wrote:<br>



<blockquote class=3D"gmail_quote" style=3D"border-left:1px solid rgb(204, 2=
04, 204);margin:0pt 0pt 0pt 0.8ex;padding-left:1ex">Hi Vijay,<div><br></div=
><div><p>I have a doubt regarding the usage of redirect during INIT
exchange.</p>

<p>An attacker in between spoke and hub spoofs the init
exchange to anycast address and then redirects it to another FAKE-HUB1 by
specifying unicast address of the FAKE-HUB1. FAKE-HUB1 subsequently redirec=
ts
it to FAKE-HUB2 and FAKE-HUB2 to FAKE-HUB3 and go on...</p>

<p>Is that possible.</p>

<p>=A0</p>

<p>Thanks</p>

<p>Padmakumar</p><font color=3D"#888888"><br></font><div class=3D"gmail_quo=
te"><div><div></div><div>On Tue, Jun 16, 2009 at 11:45 PM,  <span dir=3D"lt=
r">&lt;<a href=3D"mailto:Internet-Drafts@ietf.org" target=3D"_blank">Intern=
et-Drafts@ietf.org</a>&gt;</span> wrote:<br>



</div></div><blockquote class=3D"gmail_quote" style=3D"border-left:1px soli=
d rgb(204, 204, 204);margin:0pt 0pt 0pt 0.8ex;padding-left:1ex"><div><div><=
/div><div>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the IP Security Maintenance and Extensions Wor=
king Group of the IETF.<br>
<br>
<br>
 =A0 =A0 =A0 =A0Title =A0 =A0 =A0 =A0 =A0 : Redirect Mechanism for IKEv2<br=
>
 =A0 =A0 =A0 =A0Author(s) =A0 =A0 =A0 : V. Devarapalli, K. Weniger<br>
 =A0 =A0 =A0 =A0Filename =A0 =A0 =A0 =A0: draft-ietf-ipsecme-ikev2-redirect=
-11.txt<br>
 =A0 =A0 =A0 =A0Pages =A0 =A0 =A0 =A0 =A0 : 16<br>
 =A0 =A0 =A0 =A0Date =A0 =A0 =A0 =A0 =A0 =A0: 2009-06-16<br>
<br>
IKEv2 is a protocol for setting up VPN tunnels from a remote location<br>
to a gateway so that the VPN client can access services in the<br>
network behind the gateway. =A0Currently there is no standard mechanism<br>
specified that allows an overloaded VPN gateway or a VPN gateway that<br>
is being shut down for maintenance to redirect the VPN client to<br>
attach to another gateway. =A0This document proposes a redirect<br>
mechanism for IKEv2. =A0The proposed mechanism can also be used in<br>
Mobile IPv6 to enable the home agent to redirect the mobile node to<br>
another home agent.<br>
<br>
A URL for this Internet-Draft is:<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-ikev2-red=
irect-11.txt" target=3D"_blank">http://www.ietf.org/internet-drafts/draft-i=
etf-ipsecme-ikev2-redirect-11.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br><br></div></div><div>_______________________________________________<br=
>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org" target=3D"_blank">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/ipsec</a><br>
<br></div></blockquote></div><br></div>
<br>_______________________________________________<br>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org" target=3D"_blank">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/ipsec</a><br>
<br></blockquote></div><br>
</div></div></blockquote></div><br></div>
</div></div></blockquote></div><br>
</div></div></blockquote></div><br></div>

--0015174bdea004cbf7046db0e4a8--

From rsjenwar@gmail.com  Wed Jul  1 23:19:57 2009
Return-Path: <rsjenwar@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AB31F3A6CDA for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 23:19:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.381
X-Spam-Level: 
X-Spam-Status: No, score=-2.381 tagged_above=-999 required=5 tests=[AWL=0.217,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SZS6QiqUzumz for <ipsec@core3.amsl.com>; Wed,  1 Jul 2009 23:19:56 -0700 (PDT)
Received: from mail-pz0-f198.google.com (mail-pz0-f198.google.com [209.85.222.198]) by core3.amsl.com (Postfix) with ESMTP id B957C3A6AA8 for <ipsec@ietf.org>; Wed,  1 Jul 2009 23:19:56 -0700 (PDT)
Received: by pzk36 with SMTP id 36so1630248pzk.29 for <ipsec@ietf.org>; Wed, 01 Jul 2009 23:20:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=e9p27I8cgH83WCnDAn66u8a+hJN9kq2Nd0wMn7mDS4s=; b=PGIEIlC86zLuLPqNvmRL3hqYZ476B89H7nzQDaLbvPCmEuv/KgtVISdntYmFQzsLOt SW9C8jk66kDmZOFPNjoOTl0HTOBAwPmBUDMgQEJRfZoYH7mJUx7eOx7Eb6F9QBN2wmdW byJHKSWjI79cFCjyncdjIhz+VMvK/vq85UHZs=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=u+rkHfAtFVVXC50S3KNNdiy7xAtwagJLaS6PPMoG2N34AvvQa7HDXX5DsvMfMGfY0Y c5LScnxJi0Askke6epdtlxKZo1n1i3vHlGn+r9kM+DKkcaRRFPb2aPOK+N7YYBnb+mwH BTKvUKELckK1GV73AC+cBwTMBtsM0orBM3h0o=
MIME-Version: 1.0
Received: by 10.142.211.7 with SMTP id j7mr2857128wfg.172.1246515607468; Wed,  01 Jul 2009 23:20:07 -0700 (PDT)
In-Reply-To: <p06240886c671799622dd@10.20.30.158>
References: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD5933A@il-ex01.ad.checkpoint.com> <p06240886c671799622dd@10.20.30.158>
Date: Thu, 2 Jul 2009 11:50:07 +0530
Message-ID: <7ccecf670907012320v663b9698h5e8f32832c006e9e@mail.gmail.com>
From: Raj Singh <rsjenwar@gmail.com>
To: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: multipart/alternative; boundary=000e0cd33278fd7d2d046db307ac
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] IKEv2 bis section order
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Jul 2009 06:19:57 -0000

--000e0cd33278fd7d2d046db307ac
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Team,

I think we can have Introduction and IKE Protocol View [today's Sec.
1.2-1.5] as Section 1 and move Usage scenario to IKE Protocol Details and
Variations.
Usage scenario can make more sense after brief protocol description and it's
difference with IKEv1.

Regards,
Raj

On Thu, Jul 2, 2009 at 2:11 AM, Paul Hoffman <paul.hoffman@vpnc.org> wrote:

> At 7:36 PM +0300 7/1/09, Yaron Sheffer wrote:
> >I'd like to propose:
> >
> >   1.  Introduction
> >     1.1.  Usage Scenarios
> >       1.1.1.  Security Gateway to Security Gateway Tunnel Mode
> >       1.1.2.  Endpoint-to-Endpoint Transport Mode
> >       1.1.3.  Endpoint to Security Gateway Tunnel Mode
> >       1.1.4.  Other Scenarios
> >     1.2.  Requirements Terminology
> >
> >   2.  IKE Protocol Overview (or "Essentials") [today's Sec. 1.2-1.5]
> >     2.1.  The Initial Exchanges
> >     2.2.  The CREATE_CHILD_SA Exchange
> >       2.2.1.  Creating New Child SAs with the CREATE_CHILD_SA
> >               Exchange
> >       2.2.2.  Rekeying IKE SAs with the CREATE_CHILD_SA Exchange
> >       2.2.3.  Rekeying Child SAs with the CREATE_CHILD_SA
> >               Exchange
> >     2.3.  The INFORMATIONAL Exchange
> >       2.3.1.  Deleting an SA with INFORMATIONAL Exchanges
> >     2.4.  Informational Messages outside of an IKE SA
> >
> >   3.  IKE Protocol Details and Variations [today's Sec. 2]
> >
> >   Appendix X: Differences Between RFC 4306 and This Document [today's
> Sec.
> >1.7]
>
> A different idea is to simply rename Section 1 "IKE Protocol Overview", and
> move the requirements terminology (which is, in essence, boilerplate that
> most people ignore anyway) and the differences to appendixes.
>
> >Do you see value in this, or do you prefer keeping the existing order?
>
> I see only minor value to the original proposal, and a high cost to me (the
> editor). I think my alternate proposal isn't so onerous, but am happy to
> follow Yaron's proposal if people really like it.
>
> --Paul Hoffman, Director
> --VPN Consortium
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>

--000e0cd33278fd7d2d046db307ac
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Team,<br><br>I think we can have Introduction and IKE Protocol View [tod=
ay&#39;s Sec. 1.2-1.5] as Section 1 and move Usage scenario to IKE Protocol=
 Details and Variations.<br>Usage scenario can make more sense after brief =
protocol description and it&#39;s difference with IKEv1.<br>
<br>Regards,<br>Raj<br><br><div class=3D"gmail_quote">On Thu, Jul 2, 2009 a=
t 2:11 AM, Paul Hoffman <span dir=3D"ltr">&lt;<a href=3D"mailto:paul.hoffma=
n@vpnc.org">paul.hoffman@vpnc.org</a>&gt;</span> wrote:<br><blockquote clas=
s=3D"gmail_quote" style=3D"border-left: 1px solid rgb(204, 204, 204); margi=
n: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<div class=3D"im">At 7:36 PM +0300 7/1/09, Yaron Sheffer wrote:<br>
&gt;I&#39;d like to propose:<br>
&gt;<br>
&gt; =C2=A0 1. =C2=A0Introduction<br>
&gt; =C2=A0 =C2=A0 1.1. =C2=A0Usage Scenarios<br>
&gt; =C2=A0 =C2=A0 =C2=A0 1.1.1. =C2=A0Security Gateway to Security Gateway=
 Tunnel Mode<br>
&gt; =C2=A0 =C2=A0 =C2=A0 1.1.2. =C2=A0Endpoint-to-Endpoint Transport Mode<=
br>
&gt; =C2=A0 =C2=A0 =C2=A0 1.1.3. =C2=A0Endpoint to Security Gateway Tunnel =
Mode<br>
&gt; =C2=A0 =C2=A0 =C2=A0 1.1.4. =C2=A0Other Scenarios<br>
&gt; =C2=A0 =C2=A0 1.2. =C2=A0Requirements Terminology<br>
&gt;<br>
&gt; =C2=A0 2. =C2=A0IKE Protocol Overview (or &quot;Essentials&quot;) [tod=
ay&#39;s Sec. 1.2-1.5]<br>
&gt; =C2=A0 =C2=A0 2.1. =C2=A0The Initial Exchanges<br>
&gt; =C2=A0 =C2=A0 2.2. =C2=A0The CREATE_CHILD_SA Exchange<br>
&gt; =C2=A0 =C2=A0 =C2=A0 2.2.1. =C2=A0Creating New Child SAs with the CREA=
TE_CHILD_SA<br>
&gt; =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Exchange<br>
&gt; =C2=A0 =C2=A0 =C2=A0 2.2.2. =C2=A0Rekeying IKE SAs with the CREATE_CHI=
LD_SA Exchange<br>
&gt; =C2=A0 =C2=A0 =C2=A0 2.2.3. =C2=A0Rekeying Child SAs with the CREATE_C=
HILD_SA<br>
&gt; =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Exchange<br>
&gt; =C2=A0 =C2=A0 2.3. =C2=A0The INFORMATIONAL Exchange<br>
&gt; =C2=A0 =C2=A0 =C2=A0 2.3.1. =C2=A0Deleting an SA with INFORMATIONAL Ex=
changes<br>
&gt; =C2=A0 =C2=A0 2.4. =C2=A0Informational Messages outside of an IKE SA<b=
r>
&gt;<br>
&gt; =C2=A0 3. =C2=A0IKE Protocol Details and Variations [today&#39;s Sec. =
2]<br>
&gt;<br>
&gt; =C2=A0 Appendix X: Differences Between RFC 4306 and This Document [tod=
ay&#39;s Sec.<br>
&gt;1.7]<br>
<br>
</div>A different idea is to simply rename Section 1 &quot;IKE Protocol Ove=
rview&quot;, and move the requirements terminology (which is, in essence, b=
oilerplate that most people ignore anyway) and the differences to appendixe=
s.<br>

<div class=3D"im"><br>
&gt;Do you see value in this, or do you prefer keeping the existing order?<=
br>
<br>
</div>I see only minor value to the original proposal, and a high cost to m=
e (the editor). I think my alternate proposal isn&#39;t so onerous, but am =
happy to follow Yaron&#39;s proposal if people really like it.<br>
<font color=3D"#888888"><br>
--Paul Hoffman, Director<br>
--VPN Consortium<br>
</font><div><div></div><div class=3D"h5">__________________________________=
_____________<br>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/ipsec</a><br>
</div></div></blockquote></div><br>

--000e0cd33278fd7d2d046db307ac--

From paul.hoffman@vpnc.org  Thu Jul  2 10:28:08 2009
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 48A8528C1AC for <ipsec@core3.amsl.com>; Thu,  2 Jul 2009 10:28:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.579
X-Spam-Level: 
X-Spam-Status: No, score=-2.579 tagged_above=-999 required=5 tests=[AWL=0.020,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6ttkAUDKXRQx for <ipsec@core3.amsl.com>; Thu,  2 Jul 2009 10:28:07 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 2474028C160 for <ipsec@ietf.org>; Thu,  2 Jul 2009 10:28:06 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n62HSQZq039048 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Jul 2009 10:28:27 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06240888c6717b5c8d51@[10.20.30.158]>
In-Reply-To: <OF06EFF2FF.4A42E543-ON852575E6.0068391E-852575E6.006A322B@us.ibm.com>
References: <OF06EFF2FF.4A42E543-ON852575E6.0068391E-852575E6.006A322B@us.ibm.com>
Date: Thu, 2 Jul 2009 10:28:23 -0700
To: Scott C Moonen <smoonen@us.ibm.com>, ipsec@ietf.org
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Jul 2009 17:28:08 -0000

At 3:19 PM -0400 7/1/09, Scott C Moonen wrote:
>RFC 4753 documents that the shared secret obtained from an ECP Diffie-Hellman operation is the concatenation of the x and y coordinates of the derived point.
>
>Is that correct?

Yes, I believe.

>That is a little strange to me, which is why I want to double check.  The y coordinate is simply a dependent variable, so including it doesn't seem to add much.  

It does help to keep the formats aligned. It is probably superfluous but harmless.

>Assuming it is correct that IKE considers the shared secret to be the concatenation of the x and y coordinates, does this imply that IKE's use of DH groups 19, 20 and 21 cannot be made to be compliant with FIPS 140-2?

No.

>  (Should I be asking this question somewhere else?)

Yes. Ask the folks at NIST.

--Paul Hoffman, Director
--VPN Consortium

From smoonen@us.ibm.com  Thu Jul  2 11:39:13 2009
Return-Path: <smoonen@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1B7633A6A36 for <ipsec@core3.amsl.com>; Thu,  2 Jul 2009 11:39:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dKfqra43N1Sm for <ipsec@core3.amsl.com>; Thu,  2 Jul 2009 11:39:12 -0700 (PDT)
Received: from e32.co.us.ibm.com (e32.co.us.ibm.com [32.97.110.150]) by core3.amsl.com (Postfix) with ESMTP id 502953A6B38 for <ipsec@ietf.org>; Thu,  2 Jul 2009 11:38:54 -0700 (PDT)
Received: from d03relay02.boulder.ibm.com (d03relay02.boulder.ibm.com [9.17.195.227]) by e32.co.us.ibm.com (8.13.1/8.13.1) with ESMTP id n62IZ1n2012809 for <ipsec@ietf.org>; Thu, 2 Jul 2009 12:35:01 -0600
Received: from d03av06.boulder.ibm.com (d03av06.boulder.ibm.com [9.17.195.245]) by d03relay02.boulder.ibm.com (8.13.8/8.13.8/NCO v9.2) with ESMTP id n62Icls1176802 for <ipsec@ietf.org>; Thu, 2 Jul 2009 12:38:53 -0600
Received: from d03av06.boulder.ibm.com (loopback [127.0.0.1]) by d03av06.boulder.ibm.com (8.13.1/8.13.3) with ESMTP id n62IdRNM031882 for <ipsec@ietf.org>; Thu, 2 Jul 2009 12:39:27 -0600
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av06.boulder.ibm.com (8.13.1/8.12.11) with ESMTP id n62IdRvL031876; Thu, 2 Jul 2009 12:39:27 -0600
In-Reply-To: <p06240888c6717b5c8d51@[10.20.30.158]>
References: <OF06EFF2FF.4A42E543-ON852575E6.0068391E-852575E6.006A322B@us.ibm.com> <p06240888c6717b5c8d51@[10.20.30.158]>
To: Paul Hoffman <paul.hoffman@vpnc.org>
MIME-Version: 1.0
X-KeepSent: FAF473E4:0CEDAB4F-852575E7:0061407F; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2 HF623 January 16, 2009
From: Scott C Moonen <smoonen@us.ibm.com>
X-MIMETrack: S/MIME Sign by Notes Client on Scott C Moonen/Raleigh/IBM(Release 8.0.2 HF623|January 16, 2009) at 07/02/2009 02:31:40 PM, Serialize by Notes Client on Scott C Moonen/Raleigh/IBM(Release 8.0.2 HF623|January 16, 2009) at 07/02/2009 02:31:40 PM, Serialize complete at 07/02/2009 02:31:40 PM, S/MIME Sign failed at 07/02/2009 02:31:40 PM: The cryptographic key was not found, Serialize by Router on D03NM118/03/M/IBM(Release 8.5|December 05, 2008) at 07/02/2009 12:38:43, Serialize complete at 07/02/2009 12:38:43
Message-ID: <OFFAF473E4.0CEDAB4F-ON852575E7.0061407F-852575E7.00666B4A@us.ibm.com>
Date: Thu, 2 Jul 2009 14:38:43 -0400
Content-Type: multipart/alternative; boundary="=_alternative 0065C6CE852575E7_="
Cc: ipsec@ietf.org
Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Jul 2009 18:39:13 -0000

This is a multipart message in MIME format.
--=_alternative 0065C6CE852575E7_=
Content-Type: text/plain; charset="US-ASCII"

> >RFC 4753 documents that the shared secret obtained from an ECP 
Diffie-Hellman operation is the concatenation of the x and y coordinates 
of the derived point.
> >
> >Is that correct?
> 
> Yes, I believe.

Thank you, Paul.

It matters little at this point, but I am curious to hear if any other IKE 
implementors faced challenges with crypto libraries or service providers 
only generating the x coordinate.

Thanks,


Scott Moonen (smoonen@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://scott.andstuff.org/
http://www.linkedin.com/in/smoonen



From:
Paul Hoffman <paul.hoffman@vpnc.org>
To:
Scott C Moonen/Raleigh/IBM@IBMUS, ipsec@ietf.org
Date:
07/02/2009 01:28 PM
Subject:
Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.



At 3:19 PM -0400 7/1/09, Scott C Moonen wrote:
>RFC 4753 documents that the shared secret obtained from an ECP 
Diffie-Hellman operation is the concatenation of the x and y coordinates 
of the derived point.
>
>Is that correct?

Yes, I believe.

>That is a little strange to me, which is why I want to double check.  The 
y coordinate is simply a dependent variable, so including it doesn't seem 
to add much. 

It does help to keep the formats aligned. It is probably superfluous but 
harmless.

>Assuming it is correct that IKE considers the shared secret to be the 
concatenation of the x and y coordinates, does this imply that IKE's use 
of DH groups 19, 20 and 21 cannot be made to be compliant with FIPS 140-2?

No.

>  (Should I be asking this question somewhere else?)

Yes. Ask the folks at NIST.

--Paul Hoffman, Director
--VPN Consortium



--=_alternative 0065C6CE852575E7_=
Content-Type: text/html; charset="US-ASCII"


<br><tt><font size=2>&gt; &gt;RFC 4753 documents that the shared secret
obtained from an ECP Diffie-Hellman operation is the concatenation of the
x and y coordinates of the derived point.<br>
&gt; &gt;<br>
&gt; &gt;Is that correct?<br>
&gt; <br>
&gt; Yes, I believe.</font></tt>
<br>
<br><font size=2 face="sans-serif">Thank you, Paul.</font>
<br>
<br><font size=2 face="sans-serif">It matters little at this point, but
I am curious to hear if any other IKE implementors faced challenges with
crypto libraries or service providers only generating the x coordinate.</font>
<br>
<br><font size=2 face="sans-serif">Thanks,</font>
<br>
<br>
<br><font size=2 face="sans-serif">Scott Moonen (smoonen@us.ibm.com)<br>
z/OS Communications Server TCP/IP Development<br>
</font><a href=http://scott.andstuff.org/><font size=2 face="sans-serif">http://scott.andstuff.org/</font></a><font size=2 face="sans-serif"><br>
</font><a href=http://www.linkedin.com/in/smoonen><font size=2 face="sans-serif">http://www.linkedin.com/in/smoonen</font></a>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">From:</font>
<td><font size=1 face="sans-serif">Paul Hoffman &lt;paul.hoffman@vpnc.org&gt;</font>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">To:</font>
<td><font size=1 face="sans-serif">Scott C Moonen/Raleigh/IBM@IBMUS, ipsec@ietf.org</font>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">Date:</font>
<td><font size=1 face="sans-serif">07/02/2009 01:28 PM</font>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">Subject:</font>
<td><font size=1 face="sans-serif">Re: [IPsec] IKE's DH groups 19-21, NIST,
FIPS 140-2, etc.</font></table>
<br>
<hr noshade>
<br>
<br>
<br><tt><font size=2>At 3:19 PM -0400 7/1/09, Scott C Moonen wrote:<br>
&gt;RFC 4753 documents that the shared secret obtained from an ECP Diffie-Hellman
operation is the concatenation of the x and y coordinates of the derived
point.<br>
&gt;<br>
&gt;Is that correct?<br>
<br>
Yes, I believe.<br>
<br>
&gt;That is a little strange to me, which is why I want to double check.
&nbsp;The y coordinate is simply a dependent variable, so including it
doesn't seem to add much. &nbsp;<br>
<br>
It does help to keep the formats aligned. It is probably superfluous but
harmless.<br>
<br>
&gt;Assuming it is correct that IKE considers the shared secret to be the
concatenation of the x and y coordinates, does this imply that IKE's use
of DH groups 19, 20 and 21 cannot be made to be compliant with FIPS 140-2?<br>
<br>
No.<br>
<br>
&gt; &nbsp;(Should I be asking this question somewhere else?)<br>
<br>
Yes. Ask the folks at NIST.<br>
<br>
--Paul Hoffman, Director<br>
--VPN Consortium<br>
</font></tt>
<br>
<br>
--=_alternative 0065C6CE852575E7_=--

From sean@stratussolutions.com  Thu Jul  2 16:05:58 2009
Return-Path: <sean@stratussolutions.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 994873A6B0F for <ipsec@core3.amsl.com>; Thu,  2 Jul 2009 16:05:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.871
X-Spam-Level: 
X-Spam-Status: No, score=-1.871 tagged_above=-999 required=5 tests=[AWL=0.728,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ryh+dQHz7nU2 for <ipsec@core3.amsl.com>; Thu,  2 Jul 2009 16:05:57 -0700 (PDT)
Received: from mail-qy0-f178.google.com (mail-qy0-f178.google.com [209.85.221.178]) by core3.amsl.com (Postfix) with ESMTP id 98C593A6807 for <ipsec@ietf.org>; Thu,  2 Jul 2009 16:05:57 -0700 (PDT)
Received: by qyk8 with SMTP id 8so2148399qyk.32 for <ipsec@ietf.org>; Thu, 02 Jul 2009 16:06:18 -0700 (PDT)
Received: by 10.224.2.135 with SMTP id 7mr872685qaj.206.1246575978333; Thu, 02 Jul 2009 16:06:18 -0700 (PDT)
Received: from MacBook.home (pool-173-79-136-151.washdc.fios.verizon.net [173.79.136.151]) by mx.google.com with ESMTPS id 8sm5812811qwj.29.2009.07.02.16.06.16 (version=TLSv1/SSLv3 cipher=RC4-MD5); Thu, 02 Jul 2009 16:06:17 -0700 (PDT)
Message-Id: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com>
From: Sean Kevin O'Keeffe <sean@stratussolutions.com>
To: smoonen@us.ibm.com
Content-Type: text/plain; charset=US-ASCII; format=flowed
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v935.3)
Date: Thu, 2 Jul 2009 19:06:07 -0400
X-Mailer: Apple Mail (2.935.3)
Cc: ipsec@ietf.org, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Jul 2009 23:06:38 -0000

At 3:19 PM -0400 7/1/09, Scott C Moonen wrote:
 > RFC 4753 documents that the shared secret obtained from an ECP
 > Diffie-Hellman operation is the concatenation of the x and y
 > coordinates of the derived point.
 > Is that correct?

It is not.  There is an errata for RFC 4753.  The shared secret
is the x coordinate of the derived point.

See: http://www.rfc-editor.org/errata_search.php?eid=9

Regards, Sean

Sean Kevin O'Keeffe
STRATUS Solutions, Inc.


From paul.hoffman@vpnc.org  Thu Jul  2 17:18:26 2009
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AC58C3A6951 for <ipsec@core3.amsl.com>; Thu,  2 Jul 2009 17:18:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.28
X-Spam-Level: 
X-Spam-Status: No, score=-1.28 tagged_above=-999 required=5 tests=[AWL=-1.281,  BAYES_00=-2.599, SARE_BAYES_5x8=0.8, SARE_BAYES_6x8=0.8, SARE_BAYES_7x8=1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0DXJMg27IYsZ for <ipsec@core3.amsl.com>; Thu,  2 Jul 2009 17:18:25 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 71A1E3A6C04 for <ipsec@ietf.org>; Thu,  2 Jul 2009 17:18:25 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n630IiIi063612 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Jul 2009 17:18:45 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p062408b4c672f6178fca@[10.20.30.158]>
In-Reply-To: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com>
References: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com>
Date: Thu, 2 Jul 2009 17:18:07 -0700
To: "Sean Kevin O'Keeffe" <sean@stratussolutions.com>, smoonen@us.ibm.com
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Cc: ipsec@ietf.org
Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Jul 2009 00:18:26 -0000

At 7:06 PM -0400 7/2/09, Sean Kevin O'Keeffe wrote:
>At 3:19 PM -0400 7/1/09, Scott C Moonen wrote:
>> RFC 4753 documents that the shared secret obtained from an ECP
>> Diffie-Hellman operation is the concatenation of the x and y
>> coordinates of the derived point.
>> Is that correct?
>
>It is not.  There is an errata for RFC 4753.  The shared secret
>is the x coordinate of the derived point.
>
>See: http://www.rfc-editor.org/errata_search.php?eid=9

Urrrrgh. (I have elided something much stronger...)

First, thanks to Sean for pointing this out.

It appears that the errata is either wrong or insufficient. If the errata is right, then I'm pretty sure the test vectors in section 8 are wrong. For example, from 8.1:
------------------------------------
gix:
 DAD0B653 94221CF9 B051E1FE CA5787D0 98DFE637 FC90B9EF 945D0C37 72581180

giy:
 5271A046 1CDB8252 D61F1C45 6FA3E59A B1F45B33 ACCF5F58 389E0577 B8990BB3

   The KEi payload is as follows.

 00000048 00130000 DAD0B653 94221CF9 B051E1FE CA5787D0 98DFE637 FC90B9EF
 945D0C37 72581180 5271A046 1CDB8252 D61F1C45 6FA3E59A B1F45B33 ACCF5F58
 389E0577 B8990BB3
------------------------------------
That sure looks like the concatenation of x an y, which is why I responded as I did earlier.

The record of this change is pretty clear. On 16 Feb 2006, Tero posted a criticism of the -02 version of the draft, saying that it didn't explain the formats explicitly, only in the test vectors. After that, the authors updated the draft to -03 to say explicitly that the format was the concatenation of x and y, which matches the test vectors that had already been in the document. The errata disagrees with the change in -03 and the test vectors.

My view is that the errata is technically wrong and should be withdrawn because it changes something that is disagreed to by test vectors in the document itself. If the authors of RFC 4753 want the format to be just the x coordinate, they should prepare a revision to RFC 4753 that obsoletes it and has correct text and test vectors.

--Paul Hoffman, Director
--VPN Consortium

From sean@stratussolutions.com  Thu Jul  2 18:45:54 2009
Return-Path: <sean@stratussolutions.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 54B0A3A6C53 for <ipsec@core3.amsl.com>; Thu,  2 Jul 2009 18:45:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.073
X-Spam-Level: 
X-Spam-Status: No, score=-2.073 tagged_above=-999 required=5 tests=[AWL=0.526,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mA3X9cBjxdUc for <ipsec@core3.amsl.com>; Thu,  2 Jul 2009 18:45:53 -0700 (PDT)
Received: from mail-qy0-f196.google.com (mail-qy0-f196.google.com [209.85.221.196]) by core3.amsl.com (Postfix) with ESMTP id 647C63A683F for <ipsec@ietf.org>; Thu,  2 Jul 2009 18:45:53 -0700 (PDT)
Received: by qyk34 with SMTP id 34so1631898qyk.29 for <ipsec@ietf.org>; Thu, 02 Jul 2009 18:46:12 -0700 (PDT)
Received: by 10.224.2.137 with SMTP id 9mr1061653qaj.59.1246585572728; Thu, 02 Jul 2009 18:46:12 -0700 (PDT)
Received: from MacBook.home (pool-173-79-136-151.washdc.fios.verizon.net [173.79.136.151]) by mx.google.com with ESMTPS id 7sm6114860qwf.36.2009.07.02.18.46.12 (version=TLSv1/SSLv3 cipher=RC4-MD5); Thu, 02 Jul 2009 18:46:12 -0700 (PDT)
Message-Id: <7D42CBF1-5BEB-4EE3-93E2-754A4BC2764A@stratussolutions.com>
From: Sean Kevin O'Keeffe <sean@stratussolutions.com>
To: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <p062408b4c672f6178fca@[10.20.30.158]>
Content-Type: text/plain; charset=US-ASCII; format=flowed
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v935.3)
Date: Thu, 2 Jul 2009 21:46:11 -0400
References: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com> <p062408b4c672f6178fca@[10.20.30.158]>
X-Mailer: Apple Mail (2.935.3)
Cc: ipsec@ietf.org
Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Jul 2009 01:45:54 -0000

On Jul 2, 2009, at 8:18 PM, Paul Hoffman wrote:

 > It appears that the errata is either wrong or insufficient. If the
 > errata is right, then I'm pretty sure the test vectors in section 8
 > are wrong. For example, from 8.1:
 > ------------------------------------

<snip>

 > ------------------------------------
 > That sure looks like the concatenation of x an y, which is why I
 > responded as I did earlier.

We need to differentiate between the values transmitted over the
wire between IKEv2 peers, and the value they used as a seed to
derive keying material.

I think the KE payload examples are correct in 8.1.  The peers need
both coordinates to compute the derived point. However, they only
need to use the x coordinate of this point as the shared secret.

In the context of the example in 8.1, I interpreted the errata as
changing the last sentence in the section to:
    "girx is the value that is used in the formation of SKEYSEED."
I'm aware of several implementations that comply with this errata,
so I think a decision to withdraw it requires careful deliberation.
That being said, this issue needs to be clearly resolved so
implementations from different vendors can interoperate.

Regards, Sean

Sean Kevin O'Keeffe
STRATUS Solutions, Inc.


From paul.hoffman@vpnc.org  Thu Jul  2 19:13:07 2009
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D9F6F3A6A0A for <ipsec@core3.amsl.com>; Thu,  2 Jul 2009 19:13:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.104
X-Spam-Level: 
X-Spam-Status: No, score=-1.104 tagged_above=-999 required=5 tests=[AWL=-1.106, BAYES_00=-2.599, OBSCURED_EMAIL=0.001, SARE_BAYES_5x8=0.8, SARE_BAYES_6x8=0.8, SARE_BAYES_7x8=1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lM3ey6fd7g2t for <ipsec@core3.amsl.com>; Thu,  2 Jul 2009 19:13:07 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id B9AC83A6895 for <ipsec@ietf.org>; Thu,  2 Jul 2009 19:13:06 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n632DPUL069275 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Jul 2009 19:13:26 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p062408e0c67317806446@[10.20.30.158]>
In-Reply-To: <7D42CBF1-5BEB-4EE3-93E2-754A4BC2764A@stratussolutions.com>
References: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com> <p062408b4c672f6178fca@[10.20.30.158]> <7D42CBF1-5BEB-4EE3-93E2-754A4BC2764A@stratussolutions.com>
Date: Thu, 2 Jul 2009 19:13:24 -0700
To: "Sean Kevin O'Keeffe" <sean@stratussolutions.com>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Cc: ipsec@ietf.org
Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Jul 2009 02:13:07 -0000

At 9:46 PM -0400 7/2/09, Sean Kevin O'Keeffe wrote:
>We need to differentiate between the values transmitted over the
>wire between IKEv2 peers, and the value they used as a seed to
>derive keying material.

The fact that they're different seems needlessly error-prone.

>I think the KE payload examples are correct in 8.1.  The peers need
>both coordinates to compute the derived point. However, they only
>need to use the x coordinate of this point as the shared secret.

Correct; that's what Scott was referring to when he started this thread.

>In the context of the example in 8.1, I interpreted the errata as
>changing the last sentence in the section to:
>   "girx is the value that is used in the formation of SKEYSEED."

This might make sense, but it still completely disagrees with examples given. Look at the end of 8.1:
-----------------------
   The shared secret value g^ir=(girx,giry) where

girx:
 D6840F6B 42F6EDAF D13116E0 E1256520 2FEF8E9E CE7DCE03 812464D0 4B9442DE

giry:
 522BDE0A F0D8585B 8DEF9C18 3B5AE38F 50235206 A8674ECB 5D98EDB2 0EB153A2

   These are concatenated to form

g^ir:
 D6840F6B 42F6EDAF D13116E0 E1256520 2FEF8E9E CE7DCE03 812464D0 4B9442DE
 522BDE0A F0D8585B 8DEF9C18 3B5AE38F 50235206 A8674ECB 5D98EDB2 0EB153A2

   This is the value that is used in the formation of SKEYSEED.
------------------------

Doesn't that say "the concatenated values is used in the formation of SKEYSEED"?


>I'm aware of several implementations that comply with this errata,

This might be true, but it doesn't follow from the RFC, or from the errata. The fact that several implementations agreed after testing with each other is cause to update the RFC.

>so I think a decision to withdraw it requires careful deliberation.

Absolutely. It would be much better to, instead, obsolete this RFC with one that matches what the implementations are doing, noting the difference in the new RFC.

>That being said, this issue needs to be clearly resolved so
>implementations from different vendors can interoperate.

Fully agree.

--Paul Hoffman, Director
--VPN Consortium

From rsjenwar@gmail.com  Fri Jul  3 06:50:45 2009
Return-Path: <rsjenwar@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9FA2F3A69E7 for <ipsec@core3.amsl.com>; Fri,  3 Jul 2009 06:50:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.412
X-Spam-Level: 
X-Spam-Status: No, score=-2.412 tagged_above=-999 required=5 tests=[AWL=0.186,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IQeFrPOTqR5o for <ipsec@core3.amsl.com>; Fri,  3 Jul 2009 06:50:44 -0700 (PDT)
Received: from mail-px0-f178.google.com (mail-px0-f178.google.com [209.85.216.178]) by core3.amsl.com (Postfix) with ESMTP id 174113A6AB6 for <ipsec@ietf.org>; Fri,  3 Jul 2009 06:50:43 -0700 (PDT)
Received: by pxi8 with SMTP id 8so2845050pxi.29 for <ipsec@ietf.org>; Fri, 03 Jul 2009 06:51:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=alRhyS07IXV0H2TO+dQd6hyMbA73zAMYru4LJLNZZa8=; b=rG5fEk02kSXiLrmTbEHk/DjeY6uWCaljkadUcF0RC7o3q0wQvnWRgT/Ul/dgpkm5NG 1AVJXmwZPk7UA1PZL1/29Q9p0MSC3TTw53wZ1Q8VEMC4qKeFb9g8YeUWtgMWmDtg7HBV nKsbR4+JohLDTtrNEwKK+CFIk4eJjs8U/+W9k=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=rXlQevr5eBVRv2hUaZUoTX+gFkSUPsYuXeVK5Ekw5G0/40AlW40DG1N8W/hbTm4rV7 vmFuaVlg8g0+PWptohiV4guR/VzkAWuhiOLTwNCwjc+3WrLb/hCeY/lCVMOp34flT6xy QUex0IGqtS8fE9qjc+MLQ2c1ioOrgTnEncHSg=
MIME-Version: 1.0
Received: by 10.142.229.5 with SMTP id b5mr513646wfh.314.1246629064352; Fri,  03 Jul 2009 06:51:04 -0700 (PDT)
In-Reply-To: <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com>
Date: Fri, 3 Jul 2009 19:21:02 +0530
Message-ID: <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com>
From: Raj Singh <rsjenwar@gmail.com>
To: Yoav Nir <ynir@checkpoint.com>
Content-Type: multipart/alternative; boundary=000e0cd149408c4b23046dcd72bf
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Jul 2009 13:50:45 -0000

--000e0cd149408c4b23046dcd72bf
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Yoav,

Mostly the Initiator will decide that it wants to bring UP only IKE SA
without child SA.
But currently there is no notify/VID from Initiator to Responder to indicate
that initiator wants to bring only IKE SA. Even if responder does not
supports "childless IKE_AUTH", it will process IKE_SA_INIT, involding CPU
intensive D-H calculations, and send IKE_SA_INIT response without "childless
VID" payload.

By introducing a notify/VID payload from Initiator that it wants to bring UP
only IKE SA without child SA wil ease the processing ar Responder side. If
responder does not support "childless IKE_AUTH", it can send INVALID_SYNTAX.
Then, Initiator will wait for "Child SA" info to be available to bring UP
both IKE and child SA, normally as mentioned in RFC 4306.

Thanks,
Raj

On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir <ynir@checkpoint.com> wrote:

> Hi all.
>
> This is the fourth iteration of this draft.  New in this iteration
>  - Another co-author
>  - Changed the name, so that this item is considered in the rechartering
> discussion
>  - Fixed some notation and some discussion based on comments from the list
>
> Yoav
> ________________________________________
> From: i-d-announce-bounces@ietf.org [i-d-announce-bounces@ietf.org] On
> Behalf Of Internet-Drafts@ietf.org [Internet-Drafts@ietf.org]
> Sent: Wednesday, July 01, 2009 12:15
> To: i-d-announce@ietf.org
> Subject: I-D Action:draft-nir-ipsecme-childless-00.txt
>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>
>        Title           : A Childless Initiation of the IKE SA
>        Author(s)       : Y. Nir, et al.
>        Filename        : draft-nir-ipsecme-childless-00.txt
>        Pages           : 7
>        Date            : 2009-07-01
>
> This document describes an extension to the IKEv2 protocol that
> allows an IKE SA to be created and authenticated without generating a
> child SA.
>
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-00.txt
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> Below is the data which will enable a MIME compliant mail reader
> implementation to automatically retrieve the ASCII version of the
> Internet-Draft.
>
>
>
> Email secured by Check Point
>
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
>

--000e0cd149408c4b23046dcd72bf
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Yoav,<br><br>Mostly the Initiator will decide that it wants to bring UP =
only IKE SA without child SA.<br>But currently there is no notify/VID from =
Initiator to Responder to indicate that initiator wants to bring only IKE S=
A. Even if responder does not supports &quot;childless IKE_AUTH&quot;, it w=
ill process IKE_SA_INIT, involding CPU intensive D-H calculations, and send=
 IKE_SA_INIT response without &quot;childless VID&quot; payload.<br>
<br>By introducing a notify/VID payload from Initiator that it wants to bri=
ng UP only IKE SA without child SA wil ease the processing ar Responder sid=
e. If responder does not support &quot;childless IKE_AUTH&quot;, it can sen=
d INVALID_SYNTAX. Then, Initiator will wait for &quot;Child SA&quot; info t=
o be available to bring UP both IKE and child SA, normally as mentioned in =
RFC 4306.<br>
<br>Thanks,<br>Raj <br><br><div class=3D"gmail_quote">On Thu, Jul 2, 2009 a=
t 1:42 AM, Yoav Nir <span dir=3D"ltr">&lt;<a href=3D"mailto:ynir@checkpoint=
.com">ynir@checkpoint.com</a>&gt;</span> wrote:<br><blockquote class=3D"gma=
il_quote" style=3D"border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0=
pt 0pt 0.8ex; padding-left: 1ex;">
Hi all.<br>
<br>
This is the fourth iteration of this draft. =C2=A0New in this iteration<br>
=C2=A0- Another co-author<br>
=C2=A0- Changed the name, so that this item is considered in the recharteri=
ng discussion<br>
=C2=A0- Fixed some notation and some discussion based on comments from the =
list<br>
<br>
Yoav<br>
________________________________________<br>
From: <a href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces=
@ietf.org</a> [<a href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announc=
e-bounces@ietf.org</a>] On Behalf Of <a href=3D"mailto:Internet-Drafts@ietf=
.org">Internet-Drafts@ietf.org</a> [<a href=3D"mailto:Internet-Drafts@ietf.=
org">Internet-Drafts@ietf.org</a>]<br>

Sent: Wednesday, July 01, 2009 12:15<br>
To: <a href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a><br>
Subject: I-D Action:draft-nir-ipsecme-childless-00.txt<br>
<br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
<br>
 =C2=A0 =C2=A0 =C2=A0 =C2=A0Title =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : A Ch=
ildless Initiation of the IKE SA<br>
 =C2=A0 =C2=A0 =C2=A0 =C2=A0Author(s) =C2=A0 =C2=A0 =C2=A0 : Y. Nir, et al.=
<br>
 =C2=A0 =C2=A0 =C2=A0 =C2=A0Filename =C2=A0 =C2=A0 =C2=A0 =C2=A0: draft-nir=
-ipsecme-childless-00.txt<br>
 =C2=A0 =C2=A0 =C2=A0 =C2=A0Pages =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 7<br=
>
 =C2=A0 =C2=A0 =C2=A0 =C2=A0Date =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 2009-07-01<br>
<br>
This document describes an extension to the IKEv2 protocol that<br>
allows an IKE SA to be created and authenticated without generating a<br>
child SA.<br>
<br>
A URL for this Internet-Draft is:<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-=
00.txt" target=3D"_blank">http://www.ietf.org/internet-drafts/draft-nir-ips=
ecme-childless-00.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br>
<br>
<br>
Email secured by Check Point<br>
<br>
<br>_______________________________________________<br>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/ipsec</a><br>
<br></blockquote></div><br>

--000e0cd149408c4b23046dcd72bf--

From yaronf@checkpoint.com  Fri Jul  3 11:45:56 2009
Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 643323A6E8A for <ipsec@core3.amsl.com>; Fri,  3 Jul 2009 11:45:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.559
X-Spam-Level: 
X-Spam-Status: No, score=-2.559 tagged_above=-999 required=5 tests=[AWL=0.039,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VplH1s1venTU for <ipsec@core3.amsl.com>; Fri,  3 Jul 2009 11:45:55 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id 343563A6A71 for <ipsec@ietf.org>; Fri,  3 Jul 2009 11:45:54 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 3148829C004; Fri,  3 Jul 2009 21:46:18 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id D154C29C002; Fri,  3 Jul 2009 21:46:17 +0300 (IDT)
X-CheckPoint: {4A4E4ED3-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n63Ik53d017071; Fri, 3 Jul 2009 21:46:05 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Fri, 3 Jul 2009 21:46:05 +0300
From: Yaron Sheffer <yaronf@checkpoint.com>
To: Raj Singh <rsjenwar@gmail.com>, Yoav Nir <ynir@checkpoint.com>
Date: Fri, 3 Jul 2009 21:46:01 +0300
Thread-Topic: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
Thread-Index: Acn75VZ+uIMypQcXS8CB0oefM1Q5VwAKD9RA
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594C4@il-ex01.ad.checkpoint.com>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com> <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com>
In-Reply-To: <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_015E_01C9FC27.A86EFD60"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Jul 2009 18:45:56 -0000

------=_NextPart_000_015E_01C9FC27.A86EFD60
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_015F_01C9FC27.A86EFD60"


------=_NextPart_001_015F_01C9FC27.A86EFD60
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi Raj,

 

It sounds like you want a critical payload (RFC 4306, Sec. 2.5), probably a
payload with no data. In fact the draft could specify both options, the
current VID and such a payload, and leave it to the Initiator to decide
which behavior it prefers. Different scenarios might call for different
behaviors.

 

Thanks,

            Yaron

 

  _____  

From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of
Raj Singh
Sent: Friday, July 03, 2009 16:51
To: Yoav Nir
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

 

Hi Yoav,

Mostly the Initiator will decide that it wants to bring UP only IKE SA
without child SA.
But currently there is no notify/VID from Initiator to Responder to indicate
that initiator wants to bring only IKE SA. Even if responder does not
supports "childless IKE_AUTH", it will process IKE_SA_INIT, involding CPU
intensive D-H calculations, and send IKE_SA_INIT response without "childless
VID" payload.

By introducing a notify/VID payload from Initiator that it wants to bring UP
only IKE SA without child SA wil ease the processing ar Responder side. If
responder does not support "childless IKE_AUTH", it can send INVALID_SYNTAX.
Then, Initiator will wait for "Child SA" info to be available to bring UP
both IKE and child SA, normally as mentioned in RFC 4306.

Thanks,
Raj 

On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir <ynir@checkpoint.com> wrote:

Hi all.

This is the fourth iteration of this draft.  New in this iteration
 - Another co-author
 - Changed the name, so that this item is considered in the rechartering
discussion
 - Fixed some notation and some discussion based on comments from the list

Yoav
________________________________________
From: i-d-announce-bounces@ietf.org [i-d-announce-bounces@ietf.org] On
Behalf Of Internet-Drafts@ietf.org [Internet-Drafts@ietf.org]
Sent: Wednesday, July 01, 2009 12:15
To: i-d-announce@ietf.org
Subject: I-D Action:draft-nir-ipsecme-childless-00.txt

A New Internet-Draft is available from the on-line Internet-Drafts
directories.

       Title           : A Childless Initiation of the IKE SA
       Author(s)       : Y. Nir, et al.
       Filename        : draft-nir-ipsecme-childless-00.txt
       Pages           : 7
       Date            : 2009-07-01

This document describes an extension to the IKEv2 protocol that
allows an IKE SA to be created and authenticated without generating a
child SA.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-00.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.



Email secured by Check Point


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec




Scanned by Check Point Total Security Gateway. 


------=_NextPart_001_015F_01C9FC27.A86EFD60
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" =
name=3D"PersonName"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Hi =
Raj,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>It sounds like you want a critical =
payload
(RFC 4306, Sec. 2.5), probably a payload with no data. In fact the draft =
could
specify both options, the current VID and such a payload, and leave it =
to the
Initiator to decide which behavior it prefers. Different scenarios might =
call
for different behaviors.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Thanks,<o:p></o:p></span></font></p>=


<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Yaron<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0cm 0cm =
0cm 4.0pt'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <b><span
style=3D'font-weight:bold'>On Behalf Of </span></b>Raj Singh<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Friday, July 03, =
2009 16:51<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName =
w:st=3D"on">Yoav
 Nir</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> <st1:PersonName =
w:st=3D"on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] FW: =
I-D
Action:draft-nir-ipsecme-childless-00.txt</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>Hi Yoav,<br>
<br>
Mostly the Initiator will decide that it wants to bring UP only IKE SA =
without
child SA.<br>
But currently there is no notify/VID from Initiator to Responder to =
indicate
that initiator wants to bring only IKE SA. Even if responder does not =
supports
&quot;childless IKE_AUTH&quot;, it will process IKE_SA_INIT, involding =
CPU
intensive D-H calculations, and send IKE_SA_INIT response without
&quot;childless VID&quot; payload.<br>
<br>
By introducing a notify/VID payload from Initiator that it wants to =
bring UP
only IKE SA without child SA wil ease the processing ar Responder side. =
If
responder does not support &quot;childless IKE_AUTH&quot;, it can send
INVALID_SYNTAX. Then, Initiator will wait for &quot;Child SA&quot; info =
to be available
to bring UP both IKE and child SA, normally as mentioned in RFC =
4306.<br>
<br>
Thanks,<br>
Raj <o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>On Thu, Jul 2, 2009 at 1:42 AM, <st1:PersonName w:st=3D"on">Yoav =
Nir</st1:PersonName>
&lt;<a href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&gt; =
wrote:<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>Hi all.<br>
<br>
This is the fourth iteration of this draft. &nbsp;New in this =
iteration<br>
&nbsp;- Another co-author<br>
&nbsp;- Changed the name, so that this item is considered in the =
rechartering
discussion<br>
&nbsp;- Fixed some notation and some discussion based on comments from =
the list<br>
<br>
Yoav<br>
________________________________________<br>
From: <a =
href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf.o=
rg</a>
[<a =
href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf.o=
rg</a>]
On Behalf Of <a =
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a>
[<a =
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a>]<br=
>
Sent: Wednesday, July 01, 2009 12:15<br>
To: <a =
href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a><br>
Subject: I-D Action:draft-nir-ipsecme-childless-00.txt<br>
<br>
A New Internet-Draft is available from the on-line Internet-Drafts =
directories.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp;Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : A
Childless Initiation of the IKE SA<br>
&nbsp; &nbsp; &nbsp; &nbsp;Author(s) &nbsp; &nbsp; &nbsp; : Y. Nir, et =
al.<br>
&nbsp; &nbsp; &nbsp; &nbsp;Filename &nbsp; &nbsp; &nbsp; &nbsp;:
draft-nir-ipsecme-childless-00.txt<br>
&nbsp; &nbsp; &nbsp; &nbsp;Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : =
7<br>
&nbsp; &nbsp; &nbsp; &nbsp;Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp;:
2009-07-01<br>
<br>
This document describes an extension to the IKEv2 protocol that<br>
allows an IKE SA to be created and authenticated without generating =
a<br>
child SA.<br>
<br>
A URL for this Internet-Draft is:<br>
<a =
href=3D"http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-0=
0.txt"
target=3D"_blank">http://www.ietf.org/internet-drafts/draft-nir-ipsecme-c=
hildless-00.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" =
target=3D"_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br>
<br>
<br>
Email secured by Check Point<br>
<br>
<br>
_______________________________________________<br>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/ipsec</a><o:p></o=
:p></span></font></p>

</div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
<br>
Scanned by Check Point Total Security Gateway. =
<o:p></o:p></span></font></p>

</div>

</div>

</body>

</html>

------=_NextPart_001_015F_01C9FC27.A86EFD60--

------=_NextPart_000_015E_01C9FC27.A86EFD60
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_015E_01C9FC27.A86EFD60--

From hoskuld@hotmail.com  Fri Jul  3 17:11:43 2009
Return-Path: <hoskuld@hotmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8F1E83A687B for <ipsec@core3.amsl.com>; Fri,  3 Jul 2009 17:11:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 48lI9Vacr6tV for <ipsec@core3.amsl.com>; Fri,  3 Jul 2009 17:11:42 -0700 (PDT)
Received: from bay0-omc2-s11.bay0.hotmail.com (bay0-omc2-s11.bay0.hotmail.com [65.54.246.147]) by core3.amsl.com (Postfix) with ESMTP id 80E083A67AA for <ipsec@ietf.org>; Fri,  3 Jul 2009 17:11:42 -0700 (PDT)
Received: from BAY114-W46 ([65.54.169.146]) by bay0-omc2-s11.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959);  Fri, 3 Jul 2009 17:09:19 -0700
Message-ID: <BAY114-W46C914B413819B5E72C1DCAD2D0@phx.gbl>
X-Originating-IP: [124.168.78.223]
From: Greg Daley <hoskuld@hotmail.com>
To: <ipsec@ietf.org>
Date: Sat, 4 Jul 2009 10:09:18 +1000
Importance: Normal
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginalArrivalTime: 04 Jul 2009 00:09:19.0268 (UTC) FILETIME=[AD02C640:01C9FC3B]
Subject: [IPsec] New draft about issues in alternative Traffic Selectors in IPSec/IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Jul 2009 00:11:43 -0000

Hi=2C=20

A new draft has been published regarding the use of non-traditional
traffic selectors in IPsec.   This document discusses some of the
issues of relevance if one is to define new Traffic Selectors
(TS Type other than 7 and 8).

Please feel free to comment on this draft=2C or direct me to a more
appropriate venue.

The draft may be accessed at:=20

http://tools.ietf.org/html/draft-daley-mpsec-traffic-sel-ps-00

Sincerely=2C

Greg Daley

_________________________________________________________________
Looking for a new car this winter? Let us help with car news=2C reviews and=
 more
http://a.ninemsn.com.au/b.aspx?URL=3Dhttp%3A%2F%2Fsecure%2Dau%2Eimrworldwid=
e%2Ecom%2Fcgi%2Dbin%2Fa%2Fci%5F450304%2Fet%5F2%2Fcg%5F801459%2Fpi%5F1004813=
%2Fai%5F859641&_t=3D762955845&_r=3Dtig_OCT07&_m=3DEXT=

From rsjenwar@gmail.com  Sat Jul  4 03:45:18 2009
Return-Path: <rsjenwar@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 64A183A679C for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 03:45:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.436
X-Spam-Level: 
X-Spam-Status: No, score=-2.436 tagged_above=-999 required=5 tests=[AWL=0.162,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cY7ZSlE70lpQ for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 03:45:17 -0700 (PDT)
Received: from mail-pz0-f198.google.com (mail-pz0-f198.google.com [209.85.222.198]) by core3.amsl.com (Postfix) with ESMTP id E02A33A67CC for <ipsec@ietf.org>; Sat,  4 Jul 2009 03:44:05 -0700 (PDT)
Received: by pzk36 with SMTP id 36so3221190pzk.29 for <ipsec@ietf.org>; Sat, 04 Jul 2009 03:43:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=IGOrI0gYAkev2gfMbMmY8OXKm6LhTq8n3hKu33tojqQ=; b=rVVcZXY/qnkkqmc5eXuloGwmzK1y0BjRgvKHT8UJQMDCXC0hlXhnQ4liJEtW6gz3Ua mz23p3dRYFQ5ubWLi7LDk5fB43JcXubiPH1FMmmQAqPE+eLQmvovWly42A92y/m3trjD 6d7oySycZjSwWTu68Yif638eBw7iyFkh4ER0E=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=ORDP1th7B4pPOeQ619qzaXMdozKnhALkutl6IwU/L3Oj8dcrITrrrI6t8UXt92NtyB wAlTTEKrUWGClA2E4NiCMVkVEt5N15L2NNtYm6k9TgkgfVAMrYxNhAMmdglleGAlakvF 2T+1QtbCI4V2050vYPCEJHPMQhyRXi03wS2wc=
MIME-Version: 1.0
Received: by 10.142.254.8 with SMTP id b8mr748799wfi.144.1246703807770; Sat,  04 Jul 2009 03:36:47 -0700 (PDT)
In-Reply-To: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594C4@il-ex01.ad.checkpoint.com>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com> <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594C4@il-ex01.ad.checkpoint.com>
Date: Sat, 4 Jul 2009 16:06:47 +0530
Message-ID: <7ccecf670907040336t51b15b1t790284952459069a@mail.gmail.com>
From: Raj Singh <rsjenwar@gmail.com>
To: Yaron Sheffer <yaronf@checkpoint.com>
Content-Type: multipart/alternative; boundary=00504502ccd59a30e6046dded9cf
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Yoav Nir <ynir@checkpoint.com>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Jul 2009 10:45:18 -0000

--00504502ccd59a30e6046dded9cf
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Yaron,

I agree with you.
Your suggestion of having "critical" bit set on childless notify/VID payload
from initiator in IKE_SA_INIT exchange will define the bahavior as mentioned
below.

If initiator want to childless IKE_AUTH, it will send  CHILDLESS_IKE_AUTH
notify/VID payload having "critical" flag SET in IKE_SA_INIT request.

1. It will help responder not to process the IKE_SA_INIT exchange if it does
not support childless IKE_AUTH.

"The responder MUST reject IKE_SA_INIT exchange if it receives
CHILDLESS_IKE_AUTH notify/VID payload in IKE_SA_INIT exchange from initiator
if responder does not support childless IKE_AUTH and in response to the
IKE_SA_INIT exchange containing CHILDLESS_IKE_AUTH it MUST send
UNSUPPORTED_CRITICAL_PAYLOAD, the notification data will contain two-octet
unsupported notify/VID payload type i.e. CHILDLESS_IKE_AUTH."

2. It will help initiator to not to go ahead with childless IKE_AUTH if
responder doesn't support it wtithout procesing IKE_SA_INIT response.

With Regards,
Raj

On Sat, Jul 4, 2009 at 12:16 AM, Yaron Sheffer <yaronf@checkpoint.com>wrote:

>  Hi Raj,
>
>
>
> It sounds like you want a critical payload (RFC 4306, Sec. 2.5), probably a
> payload with no data. In fact the draft could specify both options, the
> current VID and such a payload, and leave it to the Initiator to decide
> which behavior it prefers. Different scenarios might call for different
> behaviors.
>
>
>
> Thanks,
>
>             Yaron
>
>
>   ------------------------------
>
> *From:* ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] *On Behalf
> Of *Raj Singh
> *Sent:* Friday, July 03, 2009 16:51
> *To:* Yoav Nir
> *Cc:* ipsec@ietf.org
> *Subject:* Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
>
>
>
> Hi Yoav,
>
> Mostly the Initiator will decide that it wants to bring UP only IKE SA
> without child SA.
> But currently there is no notify/VID from Initiator to Responder to
> indicate that initiator wants to bring only IKE SA. Even if responder does
> not supports "childless IKE_AUTH", it will process IKE_SA_INIT, involding
> CPU intensive D-H calculations, and send IKE_SA_INIT response without
> "childless VID" payload.
>
> By introducing a notify/VID payload from Initiator that it wants to bring
> UP only IKE SA without child SA wil ease the processing ar Responder side.
> If responder does not support "childless IKE_AUTH", it can send
> INVALID_SYNTAX. Then, Initiator will wait for "Child SA" info to be
> available to bring UP both IKE and child SA, normally as mentioned in RFC
> 4306.
>
> Thanks,
> Raj
>
> On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir <ynir@checkpoint.com> wrote:
>
> Hi all.
>
> This is the fourth iteration of this draft.  New in this iteration
>  - Another co-author
>  - Changed the name, so that this item is considered in the rechartering
> discussion
>  - Fixed some notation and some discussion based on comments from the list
>
> Yoav
> ________________________________________
> From: i-d-announce-bounces@ietf.org [i-d-announce-bounces@ietf.org] On
> Behalf Of Internet-Drafts@ietf.org [Internet-Drafts@ietf.org]
> Sent: Wednesday, July 01, 2009 12:15
> To: i-d-announce@ietf.org
> Subject: I-D Action:draft-nir-ipsecme-childless-00.txt
>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>
>        Title           : A Childless Initiation of the IKE SA
>        Author(s)       : Y. Nir, et al.
>        Filename        : draft-nir-ipsecme-childless-00.txt
>        Pages           : 7
>        Date            : 2009-07-01
>
> This document describes an extension to the IKEv2 protocol that
> allows an IKE SA to be created and authenticated without generating a
> child SA.
>
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-00.txt
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> Below is the data which will enable a MIME compliant mail reader
> implementation to automatically retrieve the ASCII version of the
> Internet-Draft.
>
>
>
> Email secured by Check Point
>
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
>
>
>
> Scanned by Check Point Total Security Gateway.
>

--00504502ccd59a30e6046dded9cf
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Yaron,<br><br>I agree with you. <br>Your suggestion of having &quot;crit=
ical&quot; bit set on childless notify/VID payload from initiator in IKE_SA=
_INIT exchange will define the bahavior as mentioned below.<br><br>If initi=
ator want to childless IKE_AUTH, it will send=C2=A0 CHILDLESS_IKE_AUTH noti=
fy/VID payload having &quot;critical&quot; flag SET in IKE_SA_INIT request.=
<br>
<br>1. It will help responder not to process the IKE_SA_INIT exchange if it=
 does not support childless IKE_AUTH. <br><br>&quot;The responder MUST reje=
ct IKE_SA_INIT exchange if it receives CHILDLESS_IKE_AUTH notify/VID payloa=
d in IKE_SA_INIT exchange from initiator if responder does not support chil=
dless IKE_AUTH and in response to the IKE_SA_INIT exchange containing CHILD=
LESS_IKE_AUTH it MUST send UNSUPPORTED_CRITICAL_PAYLOAD, the notification d=
ata will contain two-octet unsupported notify/VID payload type i.e. CHILDLE=
SS_IKE_AUTH.&quot;<br>
<br>2. It will help initiator to not to go ahead with childless IKE_AUTH if=
 responder doesn&#39;t support it wtithout procesing IKE_SA_INIT response.<=
br><br>With Regards,<br>Raj<br><br><div class=3D"gmail_quote">On Sat, Jul 4=
, 2009 at 12:16 AM, Yaron Sheffer <span dir=3D"ltr">&lt;<a href=3D"mailto:y=
aronf@checkpoint.com" target=3D"_blank">yaronf@checkpoint.com</a>&gt;</span=
> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"border-left: 1px solid rgb(204, =
204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">










<div link=3D"blue" vlink=3D"blue" lang=3D"EN-US">

<div>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">Hi Raj,</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">It sounds like you want a critical=
 payload
(RFC 4306, Sec. 2.5), probably a payload with no data. In fact the draft co=
uld
specify both options, the current VID and such a payload, and leave it to t=
he
Initiator to decide which behavior it prefers. Different scenarios might ca=
ll
for different behaviors.</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">Thanks,</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Yaron</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<div style=3D"border-style: none none none solid; border-color: -moz-use-te=
xt-color -moz-use-text-color -moz-use-text-color blue; border-width: medium=
 medium medium 1.5pt; padding: 0cm 0cm 0cm 4pt;">

<div>

<div style=3D"text-align: center;" align=3D"center"><font size=3D"3" face=
=3D"Times New Roman"><span style=3D"font-size: 12pt;">

<hr size=3D"2" width=3D"100%" align=3D"center">

</span></font></div>

<p><b><font size=3D"2" face=3D"Tahoma"><span style=3D"font-size: 10pt; font=
-family: Tahoma; font-weight: bold;">From:</span></font></b><font size=3D"2=
" face=3D"Tahoma"><span style=3D"font-size: 10pt; font-family: Tahoma;">
<a href=3D"mailto:ipsec-bounces@ietf.org" target=3D"_blank">ipsec-bounces@i=
etf.org</a> [mailto:<a href=3D"mailto:ipsec-bounces@ietf.org" target=3D"_bl=
ank">ipsec-bounces@ietf.org</a>] <b><span style=3D"font-weight: bold;">On B=
ehalf Of </span></b>Raj Singh<br>


<b><span style=3D"font-weight: bold;">Sent:</span></b> Friday, July 03, 200=
9 16:51<br>
<b><span style=3D"font-weight: bold;">To:</span></b> Yoav
 Nir<br>
<b><span style=3D"font-weight: bold;">Cc:</span></b> <a href=3D"mailto:ipse=
c@ietf.org" target=3D"_blank">ipsec@ietf.org</a><br>
<b><span style=3D"font-weight: bold;">Subject:</span></b> Re: [IPsec] FW: I=
-D
Action:draft-nir-ipsecme-childless-00.txt</span></font></p>

</div><div><div></div><div>

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">=C2=A0</span></font></p>

<p style=3D"margin-bottom: 12pt;"><font size=3D"3" face=3D"Times New Roman"=
><span style=3D"font-size: 12pt;">Hi Yoav,<br>
<br>
Mostly the Initiator will decide that it wants to bring UP only IKE SA with=
out
child SA.<br>
But currently there is no notify/VID from Initiator to Responder to indicat=
e
that initiator wants to bring only IKE SA. Even if responder does not suppo=
rts
&quot;childless IKE_AUTH&quot;, it will process IKE_SA_INIT, involding CPU
intensive D-H calculations, and send IKE_SA_INIT response without
&quot;childless VID&quot; payload.<br>
<br>
By introducing a notify/VID payload from Initiator that it wants to bring U=
P
only IKE SA without child SA wil ease the processing ar Responder side. If
responder does not support &quot;childless IKE_AUTH&quot;, it can send
INVALID_SYNTAX. Then, Initiator will wait for &quot;Child SA&quot; info to =
be available
to bring UP both IKE and child SA, normally as mentioned in RFC 4306.<br>
<br>
Thanks,<br>
Raj </span></font></p>

<div>

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir
&lt;<a href=3D"mailto:ynir@checkpoint.com" target=3D"_blank">ynir@checkpoin=
t.com</a>&gt; wrote:</span></font></p>

<p style=3D"margin-bottom: 12pt;"><font size=3D"3" face=3D"Times New Roman"=
><span style=3D"font-size: 12pt;">Hi all.<br>
<br>
This is the fourth iteration of this draft. =C2=A0New in this iteration<br>
=C2=A0- Another co-author<br>
=C2=A0- Changed the name, so that this item is considered in the recharteri=
ng
discussion<br>
=C2=A0- Fixed some notation and some discussion based on comments from the =
list<br>
<br>
Yoav<br>
________________________________________<br>
From: <a href=3D"mailto:i-d-announce-bounces@ietf.org" target=3D"_blank">i-=
d-announce-bounces@ietf.org</a>
[<a href=3D"mailto:i-d-announce-bounces@ietf.org" target=3D"_blank">i-d-ann=
ounce-bounces@ietf.org</a>]
On Behalf Of <a href=3D"mailto:Internet-Drafts@ietf.org" target=3D"_blank">=
Internet-Drafts@ietf.org</a>
[<a href=3D"mailto:Internet-Drafts@ietf.org" target=3D"_blank">Internet-Dra=
fts@ietf.org</a>]<br>
Sent: Wednesday, July 01, 2009 12:15<br>
To: <a href=3D"mailto:i-d-announce@ietf.org" target=3D"_blank">i-d-announce=
@ietf.org</a><br>
Subject: I-D Action:draft-nir-ipsecme-childless-00.txt<br>
<br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0Title =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : A
Childless Initiation of the IKE SA<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0Author(s) =C2=A0 =C2=A0 =C2=A0 : Y. Nir, et al.<=
br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0Filename =C2=A0 =C2=A0 =C2=A0 =C2=A0:
draft-nir-ipsecme-childless-00.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0Pages =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 7<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0Date =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:
2009-07-01<br>
<br>
This document describes an extension to the IKEv2 protocol that<br>
allows an IKE SA to be created and authenticated without generating a<br>
child SA.<br>
<br>
A URL for this Internet-Draft is:<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-=
00.txt" target=3D"_blank">http://www.ietf.org/internet-drafts/draft-nir-ips=
ecme-childless-00.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br>
<br>
<br>
Email secured by Check Point<br>
<br>
<br>
_______________________________________________<br>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org" target=3D"_blank">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/ipsec</a></span></font></p>

</div>

</div></div><p style=3D"margin-bottom: 12pt;"><font size=3D"3" face=3D"Time=
s New Roman"><span style=3D"font-size: 12pt;"><br>
<br>
<br>
Scanned by Check Point Total Security Gateway. </span></font></p>

</div>

</div>

</div>


</blockquote></div><br>

--00504502ccd59a30e6046dded9cf--

From smoonen@us.ibm.com  Sat Jul  4 04:43:31 2009
Return-Path: <smoonen@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 432CD3A6836; Sat,  4 Jul 2009 04:43:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.298
X-Spam-Level: 
X-Spam-Status: No, score=-5.298 tagged_above=-999 required=5 tests=[AWL=-1.301, BAYES_00=-2.599, HTML_MESSAGE=0.001, OBSCURED_EMAIL=0.001, RCVD_IN_DNSWL_MED=-4, SARE_BAYES_5x8=0.8, SARE_BAYES_6x8=0.8, SARE_BAYES_7x8=1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SYKoqmA9obvf; Sat,  4 Jul 2009 04:43:30 -0700 (PDT)
Received: from e36.co.us.ibm.com (e36.co.us.ibm.com [32.97.110.154]) by core3.amsl.com (Postfix) with ESMTP id D42FB3A69D3; Sat,  4 Jul 2009 04:43:29 -0700 (PDT)
Received: from d03relay04.boulder.ibm.com (d03relay04.boulder.ibm.com [9.17.195.106]) by e36.co.us.ibm.com (8.13.1/8.13.1) with ESMTP id n64Bfgrv002440; Sat, 4 Jul 2009 05:41:42 -0600
Received: from d03av01.boulder.ibm.com (d03av01.boulder.ibm.com [9.17.195.167]) by d03relay04.boulder.ibm.com (8.13.8/8.13.8/NCO v9.2) with ESMTP id n64BhC3U200060; Sat, 4 Jul 2009 05:43:12 -0600
Received: from d03av01.boulder.ibm.com (loopback [127.0.0.1]) by d03av01.boulder.ibm.com (8.12.11.20060308/8.13.3) with ESMTP id n64BhCSA004031; Sat, 4 Jul 2009 05:43:12 -0600
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av01.boulder.ibm.com (8.12.11.20060308/8.12.11) with ESMTP id n64BhC3L004028; Sat, 4 Jul 2009 05:43:12 -0600
In-Reply-To: <p062408e0c67317806446@[10.20.30.158]>
References: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com>	<p062408b4c672f6178fca@[10.20.30.158]> <7D42CBF1-5BEB-4EE3-93E2-754A4BC2764A@stratussolutions.com> <p062408e0c67317806446@[10.20.30.158]>
To: Paul Hoffman <paul.hoffman@vpnc.org>
MIME-Version: 1.0
X-KeepSent: 3AB4DB32:79E9CCEB-852575E9:00403C25; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2 HF623 January 16, 2009
From: Scott C Moonen <smoonen@us.ibm.com>
X-MIMETrack: S/MIME Sign by Notes Client on Scott C Moonen/Raleigh/IBM(Release 8.0.2 HF623|January 16, 2009) at 07/04/2009 07:42:52 AM, Serialize by Notes Client on Scott C Moonen/Raleigh/IBM(Release 8.0.2 HF623|January 16, 2009) at 07/04/2009 07:42:52 AM, Serialize complete at 07/04/2009 07:42:52 AM, S/MIME Sign failed at 07/04/2009 07:42:52 AM: The cryptographic key was not found, Serialize by Router on D03NM118/03/M/IBM(Release 8.5|December 05, 2008) at 07/04/2009 05:43:12, Serialize complete at 07/04/2009 05:43:12
Message-ID: <OF3AB4DB32.79E9CCEB-ON852575E9.00403C25-852575E9.0040606B@us.ibm.com>
Date: Sat, 4 Jul 2009 07:43:11 -0400
Content-Type: multipart/alternative; boundary="=_alternative 004059CA852575E9_="
Cc: ipsec@ietf.org, ipsec-bounces@ietf.org, Sean Kevin O'Keeffe <sean@stratussolutions.com>
Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Jul 2009 11:43:31 -0000

This is a multipart message in MIME format.
--=_alternative 004059CA852575E9_=
Content-Type: text/plain; charset="US-ASCII"

Thanks, Paul, Sean.

What's the next step?  If there's agreement that we need a new RFC, I'd be 
glad to pitch in with the effort.


Scott Moonen (smoonen@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://scott.andstuff.org/
http://www.linkedin.com/in/smoonen



From:
Paul Hoffman <paul.hoffman@vpnc.org>
To:
"Sean Kevin O'Keeffe" <sean@stratussolutions.com>
Cc:
ipsec@ietf.org
Date:
07/02/2009 10:13 PM
Subject:
Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.



At 9:46 PM -0400 7/2/09, Sean Kevin O'Keeffe wrote:
>We need to differentiate between the values transmitted over the
>wire between IKEv2 peers, and the value they used as a seed to
>derive keying material.

The fact that they're different seems needlessly error-prone.

>I think the KE payload examples are correct in 8.1.  The peers need
>both coordinates to compute the derived point. However, they only
>need to use the x coordinate of this point as the shared secret.

Correct; that's what Scott was referring to when he started this thread.

>In the context of the example in 8.1, I interpreted the errata as
>changing the last sentence in the section to:
>   "girx is the value that is used in the formation of SKEYSEED."

This might make sense, but it still completely disagrees with examples 
given. Look at the end of 8.1:
-----------------------
   The shared secret value g^ir=(girx,giry) where

girx:
 D6840F6B 42F6EDAF D13116E0 E1256520 2FEF8E9E CE7DCE03 812464D0 4B9442DE

giry:
 522BDE0A F0D8585B 8DEF9C18 3B5AE38F 50235206 A8674ECB 5D98EDB2 0EB153A2

   These are concatenated to form

g^ir:
 D6840F6B 42F6EDAF D13116E0 E1256520 2FEF8E9E CE7DCE03 812464D0 4B9442DE
 522BDE0A F0D8585B 8DEF9C18 3B5AE38F 50235206 A8674ECB 5D98EDB2 0EB153A2

   This is the value that is used in the formation of SKEYSEED.
------------------------

Doesn't that say "the concatenated values is used in the formation of 
SKEYSEED"?


>I'm aware of several implementations that comply with this errata,

This might be true, but it doesn't follow from the RFC, or from the 
errata. The fact that several implementations agreed after testing with 
each other is cause to update the RFC.

>so I think a decision to withdraw it requires careful deliberation.

Absolutely. It would be much better to, instead, obsolete this RFC with 
one that matches what the implementations are doing, noting the difference 
in the new RFC.

>That being said, this issue needs to be clearly resolved so
>implementations from different vendors can interoperate.

Fully agree.

--Paul Hoffman, Director
--VPN Consortium
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec



--=_alternative 004059CA852575E9_=
Content-Type: text/html; charset="US-ASCII"


<br><font size=2 face="sans-serif">Thanks, Paul, Sean.</font>
<br>
<br><font size=2 face="sans-serif">What's the next step? &nbsp;If there's
agreement that we need a new RFC, I'd be glad to pitch in with the effort.</font>
<br>
<br><font size=2 face="sans-serif"><br>
Scott Moonen (smoonen@us.ibm.com)<br>
z/OS Communications Server TCP/IP Development<br>
</font><a href=http://scott.andstuff.org/><font size=2 face="sans-serif">http://scott.andstuff.org/</font></a><font size=2 face="sans-serif"><br>
</font><a href=http://www.linkedin.com/in/smoonen><font size=2 face="sans-serif">http://www.linkedin.com/in/smoonen</font></a>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">From:</font>
<td><font size=1 face="sans-serif">Paul Hoffman &lt;paul.hoffman@vpnc.org&gt;</font>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">To:</font>
<td><font size=1 face="sans-serif">&quot;Sean Kevin O'Keeffe&quot; &lt;sean@stratussolutions.com&gt;</font>
<tr>
<td valign=top><font size=1 color=#5f5f5f face="sans-serif">Cc:</font>
<td><font size=1 face="sans-serif">ipsec@ietf.org</font>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">Date:</font>
<td><font size=1 face="sans-serif">07/02/2009 10:13 PM</font>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">Subject:</font>
<td><font size=1 face="sans-serif">Re: [IPsec] IKE's DH groups 19-21, NIST,
FIPS 140-2, etc.</font></table>
<br>
<hr noshade>
<br>
<br>
<br><tt><font size=2>At 9:46 PM -0400 7/2/09, Sean Kevin O'Keeffe wrote:<br>
&gt;We need to differentiate between the values transmitted over the<br>
&gt;wire between IKEv2 peers, and the value they used as a seed to<br>
&gt;derive keying material.<br>
<br>
The fact that they're different seems needlessly error-prone.<br>
<br>
&gt;I think the KE payload examples are correct in 8.1. &nbsp;The peers
need<br>
&gt;both coordinates to compute the derived point. However, they only<br>
&gt;need to use the x coordinate of this point as the shared secret.<br>
<br>
Correct; that's what Scott was referring to when he started this thread.<br>
<br>
&gt;In the context of the example in 8.1, I interpreted the errata as<br>
&gt;changing the last sentence in the section to:<br>
&gt; &nbsp; &quot;girx is the value that is used in the formation of SKEYSEED.&quot;<br>
<br>
This might make sense, but it still completely disagrees with examples
given. Look at the end of 8.1:<br>
-----------------------<br>
 &nbsp; The shared secret value g^ir=(girx,giry) where<br>
<br>
girx:<br>
 D6840F6B 42F6EDAF D13116E0 E1256520 2FEF8E9E CE7DCE03 812464D0 4B9442DE<br>
<br>
giry:<br>
 522BDE0A F0D8585B 8DEF9C18 3B5AE38F 50235206 A8674ECB 5D98EDB2 0EB153A2<br>
<br>
 &nbsp; These are concatenated to form<br>
<br>
g^ir:<br>
 D6840F6B 42F6EDAF D13116E0 E1256520 2FEF8E9E CE7DCE03 812464D0 4B9442DE<br>
 522BDE0A F0D8585B 8DEF9C18 3B5AE38F 50235206 A8674ECB 5D98EDB2 0EB153A2<br>
<br>
 &nbsp; This is the value that is used in the formation of SKEYSEED.<br>
------------------------<br>
<br>
Doesn't that say &quot;the concatenated values is used in the formation
of SKEYSEED&quot;?<br>
<br>
<br>
&gt;I'm aware of several implementations that comply with this errata,<br>
<br>
This might be true, but it doesn't follow from the RFC, or from the errata.
The fact that several implementations agreed after testing with each other
is cause to update the RFC.<br>
<br>
&gt;so I think a decision to withdraw it requires careful deliberation.<br>
<br>
Absolutely. It would be much better to, instead, obsolete this RFC with
one that matches what the implementations are doing, noting the difference
in the new RFC.<br>
<br>
&gt;That being said, this issue needs to be clearly resolved so<br>
&gt;implementations from different vendors can interoperate.<br>
<br>
Fully agree.<br>
<br>
--Paul Hoffman, Director<br>
--VPN Consortium<br>
_______________________________________________<br>
IPsec mailing list<br>
IPsec@ietf.org<br>
</font></tt><a href=https://www.ietf.org/mailman/listinfo/ipsec><tt><font size=2>https://www.ietf.org/mailman/listinfo/ipsec</font></tt></a><tt><font size=2><br>
</font></tt>
<br>
<br>
--=_alternative 004059CA852575E9_=--

From yaronf@checkpoint.com  Sat Jul  4 06:12:44 2009
Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D39E228C1A0 for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 06:12:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.562
X-Spam-Level: 
X-Spam-Status: No, score=-2.562 tagged_above=-999 required=5 tests=[AWL=0.036,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fIcw9uaAqivR for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 06:12:43 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id 92F5C3A684B for <ipsec@ietf.org>; Sat,  4 Jul 2009 06:12:42 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id B3BAE29C004; Sat,  4 Jul 2009 16:13:13 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 5E56229C002; Sat,  4 Jul 2009 16:13:10 +0300 (IDT)
X-CheckPoint: {4A4F5235-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n64DCv3d002227; Sat, 4 Jul 2009 16:12:58 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Sat, 4 Jul 2009 16:12:57 +0300
From: Yaron Sheffer <yaronf@checkpoint.com>
To: Raj Singh <rsjenwar@gmail.com>
Date: Sat, 4 Jul 2009 16:12:55 +0300
Thread-Topic: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
Thread-Index: Acn8k1eTnRZEG/RDQWqDudYMSwy5TAAFWmkg
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594DF@il-ex01.ad.checkpoint.com>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com> <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594C4@il-ex01.ad.checkpoint.com> <7ccecf670907040336t51b15b1t790284952459069a@mail.gmail.com>
In-Reply-To: <7ccecf670907040336t51b15b1t790284952459069a@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0179_01C9FCC2.49F24940"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Yoav Nir <ynir@checkpoint.com>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Jul 2009 13:12:44 -0000

------=_NextPart_000_0179_01C9FCC2.49F24940
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_017A_01C9FCC2.49F24940"


------=_NextPart_001_017A_01C9FCC2.49F24940
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Nope. The Critical bit refers to the payload, rather than to its contents,
and in fact cannot be set for payloads defined in RFC 4306 (such as VID and
Notify). So you need to define a NEW payload to benefit from it.

 

Thanks,

            Yaron

 

  _____  

From: Raj Singh [mailto:rsjenwar@gmail.com] 
Sent: Saturday, July 04, 2009 13:37
To: Yaron Sheffer
Cc: Yoav Nir; ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

 

Hi Yaron,

I agree with you. 
Your suggestion of having "critical" bit set on childless notify/VID payload
from initiator in IKE_SA_INIT exchange will define the bahavior as mentioned
below.

If initiator want to childless IKE_AUTH, it will send  CHILDLESS_IKE_AUTH
notify/VID payload having "critical" flag SET in IKE_SA_INIT request.

1. It will help responder not to process the IKE_SA_INIT exchange if it does
not support childless IKE_AUTH. 

"The responder MUST reject IKE_SA_INIT exchange if it receives
CHILDLESS_IKE_AUTH notify/VID payload in IKE_SA_INIT exchange from initiator
if responder does not support childless IKE_AUTH and in response to the
IKE_SA_INIT exchange containing CHILDLESS_IKE_AUTH it MUST send
UNSUPPORTED_CRITICAL_PAYLOAD, the notification data will contain two-octet
unsupported notify/VID payload type i.e. CHILDLESS_IKE_AUTH."

2. It will help initiator to not to go ahead with childless IKE_AUTH if
responder doesn't support it wtithout procesing IKE_SA_INIT response.

With Regards,
Raj

On Sat, Jul 4, 2009 at 12:16 AM, Yaron Sheffer <yaronf@checkpoint.com>
wrote:

Hi Raj,

 

It sounds like you want a critical payload (RFC 4306, Sec. 2.5), probably a
payload with no data. In fact the draft could specify both options, the
current VID and such a payload, and leave it to the Initiator to decide
which behavior it prefers. Different scenarios might call for different
behaviors.

 

Thanks,

            Yaron

 

  _____  

From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of
Raj Singh
Sent: Friday, July 03, 2009 16:51
To: Yoav Nir
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

 

Hi Yoav,

Mostly the Initiator will decide that it wants to bring UP only IKE SA
without child SA.
But currently there is no notify/VID from Initiator to Responder to indicate
that initiator wants to bring only IKE SA. Even if responder does not
supports "childless IKE_AUTH", it will process IKE_SA_INIT, involding CPU
intensive D-H calculations, and send IKE_SA_INIT response without "childless
VID" payload.

By introducing a notify/VID payload from Initiator that it wants to bring UP
only IKE SA without child SA wil ease the processing ar Responder side. If
responder does not support "childless IKE_AUTH", it can send INVALID_SYNTAX.
Then, Initiator will wait for "Child SA" info to be available to bring UP
both IKE and child SA, normally as mentioned in RFC 4306.

Thanks,
Raj 

On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir <ynir@checkpoint.com> wrote:

Hi all.

This is the fourth iteration of this draft.  New in this iteration
 - Another co-author
 - Changed the name, so that this item is considered in the rechartering
discussion
 - Fixed some notation and some discussion based on comments from the list

Yoav
________________________________________
From: i-d-announce-bounces@ietf.org [i-d-announce-bounces@ietf.org] On
Behalf Of Internet-Drafts@ietf.org [Internet-Drafts@ietf.org]
Sent: Wednesday, July 01, 2009 12:15
To: i-d-announce@ietf.org
Subject: I-D Action:draft-nir-ipsecme-childless-00.txt

A New Internet-Draft is available from the on-line Internet-Drafts
directories.

       Title           : A Childless Initiation of the IKE SA
       Author(s)       : Y. Nir, et al.
       Filename        : draft-nir-ipsecme-childless-00.txt
       Pages           : 7
       Date            : 2009-07-01

This document describes an extension to the IKEv2 protocol that
allows an IKE SA to be created and authenticated without generating a
child SA.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-00.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.



Email secured by Check Point


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec




Scanned by Check Point Total Security Gateway. 




Scanned by Check Point Total Security Gateway. 


------=_NextPart_001_017A_01C9FCC2.49F24940
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" =
name=3D"PersonName"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:12.0pt;
	font-family:"Times New Roman";}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Nope. The Critical bit refers to =
the
payload, rather than to its contents, and in fact cannot be set for =
payloads
defined in RFC 4306 (such as VID and Notify). So you need to define a =
NEW
payload to benefit from it.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Thanks,<o:p></o:p></span></font></p>=


<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Yaron<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0cm 0cm =
0cm 4.0pt'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> Raj =
Singh
[mailto:rsjenwar@gmail.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Saturday, July 04, =
2009
13:37<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName =
w:st=3D"on">Yaron
 Sheffer</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> <st1:PersonName =
w:st=3D"on">Yoav
 Nir</st1:PersonName>; <st1:PersonName =
w:st=3D"on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] FW: =
I-D
Action:draft-nir-ipsecme-childless-00.txt</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>Hi Yaron,<br>
<br>
I agree with you. <br>
Your suggestion of having &quot;critical&quot; bit set on childless =
notify/VID
payload from initiator in IKE_SA_INIT exchange will define the bahavior =
as
mentioned below.<br>
<br>
If initiator want to childless IKE_AUTH, it will send&nbsp; =
CHILDLESS_IKE_AUTH
notify/VID payload having &quot;critical&quot; flag SET in IKE_SA_INIT =
request.<br>
<br>
1. It will help responder not to process the IKE_SA_INIT exchange if it =
does
not support childless IKE_AUTH. <br>
<br>
&quot;The responder MUST reject IKE_SA_INIT exchange if it receives
CHILDLESS_IKE_AUTH notify/VID payload in IKE_SA_INIT exchange from =
initiator if
responder does not support childless IKE_AUTH and in response to the
IKE_SA_INIT exchange containing CHILDLESS_IKE_AUTH it MUST send
UNSUPPORTED_CRITICAL_PAYLOAD, the notification data will contain =
two-octet
unsupported notify/VID payload type i.e. CHILDLESS_IKE_AUTH.&quot;<br>
<br>
2. It will help initiator to not to go ahead with childless IKE_AUTH if
responder doesn't support it wtithout procesing IKE_SA_INIT =
response.<br>
<br>
With Regards,<br>
Raj<o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>On Sat, Jul 4, 2009 at 12:16 AM, <st1:PersonName =
w:st=3D"on">Yaron
 Sheffer</st1:PersonName> &lt;<a href=3D"mailto:yaronf@checkpoint.com"
target=3D"_blank">yaronf@checkpoint.com</a>&gt; =
wrote:<o:p></o:p></span></font></p>

<div link=3Dblue vlink=3Dblue>

<div>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>Hi Raj,</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>It sounds like you want a critical payload (RFC 4306, =
Sec.
2.5), probably a payload with no data. In fact the draft could specify =
both
options, the current VID and such a payload, and leave it to the =
Initiator to
decide which behavior it prefers. Different scenarios might call for =
different
behaviors.</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>Thanks,</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
Yaron</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<div style=3D'border:none;border-left:solid windowtext 1.5pt;padding:0cm =
0cm 0cm 4.0pt;
border-color:-moz-use-text-color -moz-use-text-color -moz-use-text-color =
blue'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>

<p><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;font-family:Tahoma;
font-weight:bold'>From:</span></font></b><font size=3D2 =
face=3DTahoma><span
style=3D'font-size:10.0pt;font-family:Tahoma'> <a
href=3D"mailto:ipsec-bounces@ietf.org" =
target=3D"_blank">ipsec-bounces@ietf.org</a>
[mailto:<a href=3D"mailto:ipsec-bounces@ietf.org" =
target=3D"_blank">ipsec-bounces@ietf.org</a>]
<b><span style=3D'font-weight:bold'>On Behalf Of </span></b>Raj =
Singh<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Friday, July 03, =
2009 16:51<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName =
w:st=3D"on">Yoav
 Nir</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> <a =
href=3D"mailto:ipsec@ietf.org"
target=3D"_blank">ipsec@ietf.org</a><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] FW: =
I-D
Action:draft-nir-ipsecme-childless-00.txt</span></font><o:p></o:p></p>

</div>

<div>

<div>

<p><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p style=3D'margin-bottom:12.0pt'><font size=3D3 face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt'>Hi Yoav,<br>
<br>
Mostly the Initiator will decide that it wants to bring UP only IKE SA =
without
child SA.<br>
But currently there is no notify/VID from Initiator to Responder to =
indicate
that initiator wants to bring only IKE SA. Even if responder does not =
supports
&quot;childless IKE_AUTH&quot;, it will process IKE_SA_INIT, involding =
CPU
intensive D-H calculations, and send IKE_SA_INIT response without
&quot;childless VID&quot; payload.<br>
<br>
By introducing a notify/VID payload from Initiator that it wants to =
bring UP
only IKE SA without child SA wil ease the processing ar Responder side. =
If
responder does not support &quot;childless IKE_AUTH&quot;, it can send
INVALID_SYNTAX. Then, Initiator will wait for &quot;Child SA&quot; info =
to be
available to bring UP both IKE and child SA, normally as mentioned in =
RFC 4306.<br>
<br>
Thanks,<br>
Raj <o:p></o:p></span></font></p>

<div>

<p><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'>On Thu,
Jul 2, 2009 at 1:42 AM, <st1:PersonName w:st=3D"on">Yoav =
Nir</st1:PersonName>
&lt;<a href=3D"mailto:ynir@checkpoint.com" =
target=3D"_blank">ynir@checkpoint.com</a>&gt;
wrote:<o:p></o:p></span></font></p>

<p style=3D'margin-bottom:12.0pt'><font size=3D3 face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt'>Hi all.<br>
<br>
This is the fourth iteration of this draft. &nbsp;New in this =
iteration<br>
&nbsp;- Another co-author<br>
&nbsp;- Changed the name, so that this item is considered in the =
rechartering
discussion<br>
&nbsp;- Fixed some notation and some discussion based on comments from =
the list<br>
<br>
Yoav<br>
________________________________________<br>
From: <a href=3D"mailto:i-d-announce-bounces@ietf.org" =
target=3D"_blank">i-d-announce-bounces@ietf.org</a>
[<a href=3D"mailto:i-d-announce-bounces@ietf.org" =
target=3D"_blank">i-d-announce-bounces@ietf.org</a>]
On Behalf Of <a href=3D"mailto:Internet-Drafts@ietf.org" =
target=3D"_blank">Internet-Drafts@ietf.org</a>
[<a href=3D"mailto:Internet-Drafts@ietf.org" =
target=3D"_blank">Internet-Drafts@ietf.org</a>]<br>
Sent: Wednesday, July 01, 2009 12:15<br>
To: <a href=3D"mailto:i-d-announce@ietf.org" =
target=3D"_blank">i-d-announce@ietf.org</a><br>
Subject: I-D Action:draft-nir-ipsecme-childless-00.txt<br>
<br>
A New Internet-Draft is available from the on-line Internet-Drafts =
directories.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp;Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : A
Childless Initiation of the IKE SA<br>
&nbsp; &nbsp; &nbsp; &nbsp;Author(s) &nbsp; &nbsp; &nbsp; : Y. Nir, et =
al.<br>
&nbsp; &nbsp; &nbsp; &nbsp;Filename &nbsp; &nbsp; &nbsp; &nbsp;:
draft-nir-ipsecme-childless-00.txt<br>
&nbsp; &nbsp; &nbsp; &nbsp;Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : =
7<br>
&nbsp; &nbsp; &nbsp; &nbsp;Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp;:
2009-07-01<br>
<br>
This document describes an extension to the IKEv2 protocol that<br>
allows an IKE SA to be created and authenticated without generating =
a<br>
child SA.<br>
<br>
A URL for this Internet-Draft is:<br>
<a =
href=3D"http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-0=
0.txt"
target=3D"_blank">http://www.ietf.org/internet-drafts/draft-nir-ipsecme-c=
hildless-00.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" =
target=3D"_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br>
<br>
<br>
Email secured by Check Point<br>
<br>
<br>
_______________________________________________<br>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org" =
target=3D"_blank">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/ipsec</a><o:p></o=
:p></span></font></p>

</div>

</div>

</div>

<p style=3D'margin-bottom:12.0pt'><font size=3D3 face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt'><br>
<br>
<br>
Scanned by Check Point Total Security Gateway. =
<o:p></o:p></span></font></p>

</div>

</div>

</div>

</div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
<br>
Scanned by Check Point Total Security Gateway. =
<o:p></o:p></span></font></p>

</div>

</div>

</body>

</html>

------=_NextPart_001_017A_01C9FCC2.49F24940--

------=_NextPart_000_0179_01C9FCC2.49F24940
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_0179_01C9FCC2.49F24940--

From paul.hoffman@vpnc.org  Sat Jul  4 07:57:59 2009
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7551828C0FF for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 07:57:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.349
X-Spam-Level: 
X-Spam-Status: No, score=-2.349 tagged_above=-999 required=5 tests=[AWL=0.250,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eqBIOWZQSulX for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 07:57:58 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 6D47428C210 for <ipsec@ietf.org>; Sat,  4 Jul 2009 07:57:58 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n64EwIAS001238 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 4 Jul 2009 07:58:20 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06240816c6751e1439fb@[10.20.30.158]>
In-Reply-To: <OF3AB4DB32.79E9CCEB-ON852575E9.00403C25-852575E9.0040606B@us.ibm.com>
References: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com> <p062408b4c672f6178fca@[10.20.30.158]> <7D42CBF1-5BEB-4EE3-93E2-754A4BC2764A@stratussolutions.com> <p062408e0c67317806446@[10.20.30.158]> <OF3AB4DB32.79E9CCEB-ON852575E9.00403C25-852575E9.0040606B@us.ibm.com>
Date: Sat, 4 Jul 2009 07:58:17 -0700
To: Scott C Moonen <smoonen@us.ibm.com>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Cc: ipsec@ietf.org, Sean Kevin O'Keeffe <sean@stratussolutions.com>
Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Jul 2009 14:57:59 -0000

At 7:43 AM -0400 7/4/09, Scott C Moonen wrote:
>What's the next step?  

I have sent a message to the RFC Editor (which then gets sent to the doc authors and the IESG) about my concern about the correctness of the errata. We see how that plays out.

>If there's agreement that we need a new RFC, I'd be glad to pitch in with the effort.

Generally, this should be done by the authors themselves. Failing that, someone else could do it.

--Paul Hoffman, Director
--VPN Consortium

From rsjenwar@gmail.com  Sat Jul  4 09:39:21 2009
Return-Path: <rsjenwar@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 91B163A6CD3 for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 09:39:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.454
X-Spam-Level: 
X-Spam-Status: No, score=-2.454 tagged_above=-999 required=5 tests=[AWL=0.144,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NvW4nTKa1y5R for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 09:39:20 -0700 (PDT)
Received: from wf-out-1314.google.com (wf-out-1314.google.com [209.85.200.175]) by core3.amsl.com (Postfix) with ESMTP id 8B5603A6C63 for <ipsec@ietf.org>; Sat,  4 Jul 2009 09:39:19 -0700 (PDT)
Received: by wf-out-1314.google.com with SMTP id 29so1131914wff.31 for <ipsec@ietf.org>; Sat, 04 Jul 2009 09:39:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=TpV6lOpwkKcyF7zjfTRzUH/ufopCgL7bxH2kIbcVQKE=; b=BXkq9xXioLUV48EXLnkTWx4v07moZkeh/uxbRZwJA2YoIzIFcl7jgQM7oWYCjKcwsD Vzg44vkZNKrTuU0uct/+LW4ojHUvGjdEj8V3RlNIS4XTWXyAld/dGQjir0K+E2EqK/3E DuMYWLfPM69a99tWjc/OymDGvq3/Huk920Ots=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=q14pqcBldpDYCs6OMvFuL/Lu8xVl3HODlO5+1FxeodZPil5RyD3/4T3+rn1XlAFb4t kQpAJhoyGSGaAmRkhWQHAXpDTCGRElDX5leXvjKTB1tPVoJ6ynN8PHXaqJd4gIdbpxB/ 928DP8PgVLaa7SS9OqOXOu57CmBKZJKvm7wao=
MIME-Version: 1.0
Received: by 10.143.5.21 with SMTP id h21mr932606wfi.72.1246725551684; Sat, 04  Jul 2009 09:39:11 -0700 (PDT)
In-Reply-To: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594DF@il-ex01.ad.checkpoint.com>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com> <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594C4@il-ex01.ad.checkpoint.com> <7ccecf670907040336t51b15b1t790284952459069a@mail.gmail.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594DF@il-ex01.ad.checkpoint.com>
Date: Sat, 4 Jul 2009 22:09:11 +0530
Message-ID: <7ccecf670907040939r3a750cdcx22447123ac400044@mail.gmail.com>
From: Raj Singh <rsjenwar@gmail.com>
To: Yaron Sheffer <yaronf@checkpoint.com>
Content-Type: multipart/alternative; boundary=001636e0a64aa3fe62046de3e91b
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Yoav Nir <ynir@checkpoint.com>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Jul 2009 16:39:21 -0000

--001636e0a64aa3fe62046de3e91b
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Yaron,

Its clear that critical bit refer to the payload, than to its content. Point
well taken.
But i am not able to understand why we can't define "critical" bit for new
CHILDLESS_IKE_AUTH notify/VID payload ?

With Regards,
Raj

On Sat, Jul 4, 2009 at 6:42 PM, Yaron Sheffer <yaronf@checkpoint.com> wrote:

>  Nope. The Critical bit refers to the payload, rather than to its
> contents, and in fact cannot be set for payloads defined in RFC 4306 (such
> as VID and Notify). So you need to define a NEW payload to benefit from it.
>
>
>
> Thanks,
>
>             Yaron
>
>
>   ------------------------------
>
> *From:* Raj Singh [mailto:rsjenwar@gmail.com]
> *Sent:* Saturday, July 04, 2009 13:37
> *To:* Yaron Sheffer
> *Cc:* Yoav Nir; ipsec@ietf.org
>
> *Subject:* Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
>
>
>
> Hi Yaron,
>
> I agree with you.
> Your suggestion of having "critical" bit set on childless notify/VID
> payload from initiator in IKE_SA_INIT exchange will define the bahavior as
> mentioned below.
>
> If initiator want to childless IKE_AUTH, it will send  CHILDLESS_IKE_AUTH
> notify/VID payload having "critical" flag SET in IKE_SA_INIT request.
>
> 1. It will help responder not to process the IKE_SA_INIT exchange if it
> does not support childless IKE_AUTH.
>
> "The responder MUST reject IKE_SA_INIT exchange if it receives
> CHILDLESS_IKE_AUTH notify/VID payload in IKE_SA_INIT exchange from initiator
> if responder does not support childless IKE_AUTH and in response to the
> IKE_SA_INIT exchange containing CHILDLESS_IKE_AUTH it MUST send
> UNSUPPORTED_CRITICAL_PAYLOAD, the notification data will contain two-octet
> unsupported notify/VID payload type i.e. CHILDLESS_IKE_AUTH."
>
> 2. It will help initiator to not to go ahead with childless IKE_AUTH if
> responder doesn't support it wtithout procesing IKE_SA_INIT response.
>
> With Regards,
> Raj
>
> On Sat, Jul 4, 2009 at 12:16 AM, Yaron Sheffer <yaronf@checkpoint.com>
> wrote:
>
> Hi Raj,
>
>
>
> It sounds like you want a critical payload (RFC 4306, Sec. 2.5), probably a
> payload with no data. In fact the draft could specify both options, the
> current VID and such a payload, and leave it to the Initiator to decide
> which behavior it prefers. Different scenarios might call for different
> behaviors.
>
>
>
> Thanks,
>
>             Yaron
>
>
>   ------------------------------
>
> *From:* ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] *On Behalf
> Of *Raj Singh
> *Sent:* Friday, July 03, 2009 16:51
> *To:* Yoav Nir
> *Cc:* ipsec@ietf.org
> *Subject:* Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
>
>
>
> Hi Yoav,
>
> Mostly the Initiator will decide that it wants to bring UP only IKE SA
> without child SA.
> But currently there is no notify/VID from Initiator to Responder to
> indicate that initiator wants to bring only IKE SA. Even if responder does
> not supports "childless IKE_AUTH", it will process IKE_SA_INIT, involding
> CPU intensive D-H calculations, and send IKE_SA_INIT response without
> "childless VID" payload.
>
> By introducing a notify/VID payload from Initiator that it wants to bring
> UP only IKE SA without child SA wil ease the processing ar Responder side.
> If responder does not support "childless IKE_AUTH", it can send
> INVALID_SYNTAX. Then, Initiator will wait for "Child SA" info to be
> available to bring UP both IKE and child SA, normally as mentioned in RFC
> 4306.
>
> Thanks,
> Raj
>
> On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir <ynir@checkpoint.com> wrote:
>
> Hi all.
>
> This is the fourth iteration of this draft.  New in this iteration
>  - Another co-author
>  - Changed the name, so that this item is considered in the rechartering
> discussion
>  - Fixed some notation and some discussion based on comments from the list
>
> Yoav
> ________________________________________
> From: i-d-announce-bounces@ietf.org [i-d-announce-bounces@ietf.org] On
> Behalf Of Internet-Drafts@ietf.org [Internet-Drafts@ietf.org]
> Sent: Wednesday, July 01, 2009 12:15
> To: i-d-announce@ietf.org
> Subject: I-D Action:draft-nir-ipsecme-childless-00.txt
>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>
>        Title           : A Childless Initiation of the IKE SA
>        Author(s)       : Y. Nir, et al.
>        Filename        : draft-nir-ipsecme-childless-00.txt
>        Pages           : 7
>        Date            : 2009-07-01
>
> This document describes an extension to the IKEv2 protocol that
> allows an IKE SA to be created and authenticated without generating a
> child SA.
>
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-00.txt
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> Below is the data which will enable a MIME compliant mail reader
> implementation to automatically retrieve the ASCII version of the
> Internet-Draft.
>
>
>
> Email secured by Check Point
>
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
>
>
>
> Scanned by Check Point Total Security Gateway.
>
>
>
>
> Scanned by Check Point Total Security Gateway.
>

--001636e0a64aa3fe62046de3e91b
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Yaron,<br><br>Its clear that critical bit refer to the payload, than to =
its content. Point well taken.<br>But i am not able to understand why we ca=
n&#39;t define &quot;critical&quot; bit for new CHILDLESS_IKE_AUTH notify/V=
ID payload ?<br>
<br>With Regards,<br>Raj<br><br><div class=3D"gmail_quote">On Sat, Jul 4, 2=
009 at 6:42 PM, Yaron Sheffer <span dir=3D"ltr">&lt;<a href=3D"mailto:yaron=
f@checkpoint.com">yaronf@checkpoint.com</a>&gt;</span> wrote:<br><blockquot=
e class=3D"gmail_quote" style=3D"border-left: 1px solid rgb(204, 204, 204);=
 margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">











<div link=3D"blue" vlink=3D"blue" lang=3D"EN-US">

<div>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">Nope. The Critical bit refers to t=
he
payload, rather than to its contents, and in fact cannot be set for payload=
s
defined in RFC 4306 (such as VID and Notify). So you need to define a NEW
payload to benefit from it.</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">Thanks,</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Yaron</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<div style=3D"border-style: none none none solid; border-color: -moz-use-te=
xt-color -moz-use-text-color -moz-use-text-color blue; border-width: medium=
 medium medium 1.5pt; padding: 0cm 0cm 0cm 4pt;">

<div>

<div style=3D"text-align: center;" align=3D"center"><font size=3D"3" face=
=3D"Times New Roman"><span style=3D"font-size: 12pt;">

<hr size=3D"2" width=3D"100%" align=3D"center">

</span></font></div>

<p><b><font size=3D"2" face=3D"Tahoma"><span style=3D"font-size: 10pt; font=
-family: Tahoma; font-weight: bold;">From:</span></font></b><font size=3D"2=
" face=3D"Tahoma"><span style=3D"font-size: 10pt; font-family: Tahoma;"> Ra=
j Singh
[mailto:<a href=3D"mailto:rsjenwar@gmail.com" target=3D"_blank">rsjenwar@gm=
ail.com</a>] <br>
<b><span style=3D"font-weight: bold;">Sent:</span></b> Saturday, July 04, 2=
009
13:37<br>
<b><span style=3D"font-weight: bold;">To:</span></b> Yaron
 Sheffer<br>
<b><span style=3D"font-weight: bold;">Cc:</span></b> Yoav
 Nir; <a href=3D"mailto:ipsec@ietf.org" target=3D"_blank">ipsec@ietf.org</a=
><div><div></div><div class=3D"h5"><br>
<b><span style=3D"font-weight: bold;">Subject:</span></b> Re: [IPsec] FW: I=
-D
Action:draft-nir-ipsecme-childless-00.txt</div></div></span></font></p>

</div><div><div></div><div class=3D"h5">

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">=C2=A0</span></font></p>

<p style=3D"margin-bottom: 12pt;"><font size=3D"3" face=3D"Times New Roman"=
><span style=3D"font-size: 12pt;">Hi Yaron,<br>
<br>
I agree with you. <br>
Your suggestion of having &quot;critical&quot; bit set on childless notify/=
VID
payload from initiator in IKE_SA_INIT exchange will define the bahavior as
mentioned below.<br>
<br>
If initiator want to childless IKE_AUTH, it will send=C2=A0 CHILDLESS_IKE_A=
UTH
notify/VID payload having &quot;critical&quot; flag SET in IKE_SA_INIT requ=
est.<br>
<br>
1. It will help responder not to process the IKE_SA_INIT exchange if it doe=
s
not support childless IKE_AUTH. <br>
<br>
&quot;The responder MUST reject IKE_SA_INIT exchange if it receives
CHILDLESS_IKE_AUTH notify/VID payload in IKE_SA_INIT exchange from initiato=
r if
responder does not support childless IKE_AUTH and in response to the
IKE_SA_INIT exchange containing CHILDLESS_IKE_AUTH it MUST send
UNSUPPORTED_CRITICAL_PAYLOAD, the notification data will contain two-octet
unsupported notify/VID payload type i.e. CHILDLESS_IKE_AUTH.&quot;<br>
<br>
2. It will help initiator to not to go ahead with childless IKE_AUTH if
responder doesn&#39;t support it wtithout procesing IKE_SA_INIT response.<b=
r>
<br>
With Regards,<br>
Raj</span></font></p>

<div>

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">On Sat, Jul 4, 2009 at 12:16 AM, Yaron
 Sheffer &lt;<a href=3D"mailto:yaronf@checkpoint.com" target=3D"_blank">yar=
onf@checkpoint.com</a>&gt; wrote:</span></font></p>

<div link=3D"blue" vlink=3D"blue">

<div>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">Hi Raj,</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">It sounds like you want a critical=
 payload (RFC 4306, Sec.
2.5), probably a payload with no data. In fact the draft could specify both
options, the current VID and such a payload, and leave it to the Initiator =
to
decide which behavior it prefers. Different scenarios might call for differ=
ent
behaviors.</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">Thanks,</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
Yaron</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<div style=3D"border-style: none none none solid; border-color: -moz-use-te=
xt-color -moz-use-text-color -moz-use-text-color blue; border-width: medium=
 medium medium 1.5pt; padding: 0cm 0cm 0cm 4pt;">

<div>

<div style=3D"text-align: center;" align=3D"center"><font size=3D"3" face=
=3D"Times New Roman"><span style=3D"font-size: 12pt;">

<hr size=3D"2" width=3D"100%" align=3D"center">

</span></font></div>

<p><b><font size=3D"2" face=3D"Tahoma"><span style=3D"font-size: 10pt; font=
-family: Tahoma; font-weight: bold;">From:</span></font></b><font size=3D"2=
" face=3D"Tahoma"><span style=3D"font-size: 10pt; font-family: Tahoma;"> <a=
 href=3D"mailto:ipsec-bounces@ietf.org" target=3D"_blank">ipsec-bounces@iet=
f.org</a>
[mailto:<a href=3D"mailto:ipsec-bounces@ietf.org" target=3D"_blank">ipsec-b=
ounces@ietf.org</a>]
<b><span style=3D"font-weight: bold;">On Behalf Of </span></b>Raj Singh<br>
<b><span style=3D"font-weight: bold;">Sent:</span></b> Friday, July 03, 200=
9 16:51<br>
<b><span style=3D"font-weight: bold;">To:</span></b> Yoav
 Nir<br>
<b><span style=3D"font-weight: bold;">Cc:</span></b> <a href=3D"mailto:ipse=
c@ietf.org" target=3D"_blank">ipsec@ietf.org</a><br>
<b><span style=3D"font-weight: bold;">Subject:</span></b> Re: [IPsec] FW: I=
-D
Action:draft-nir-ipsecme-childless-00.txt</span></font></p>

</div>

<div>

<div>

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">=C2=A0</span></font></p>

<p style=3D"margin-bottom: 12pt;"><font size=3D"3" face=3D"Times New Roman"=
><span style=3D"font-size: 12pt;">Hi Yoav,<br>
<br>
Mostly the Initiator will decide that it wants to bring UP only IKE SA with=
out
child SA.<br>
But currently there is no notify/VID from Initiator to Responder to indicat=
e
that initiator wants to bring only IKE SA. Even if responder does not suppo=
rts
&quot;childless IKE_AUTH&quot;, it will process IKE_SA_INIT, involding CPU
intensive D-H calculations, and send IKE_SA_INIT response without
&quot;childless VID&quot; payload.<br>
<br>
By introducing a notify/VID payload from Initiator that it wants to bring U=
P
only IKE SA without child SA wil ease the processing ar Responder side. If
responder does not support &quot;childless IKE_AUTH&quot;, it can send
INVALID_SYNTAX. Then, Initiator will wait for &quot;Child SA&quot; info to =
be
available to bring UP both IKE and child SA, normally as mentioned in RFC 4=
306.<br>
<br>
Thanks,<br>
Raj </span></font></p>

<div>

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">On Thu,
Jul 2, 2009 at 1:42 AM, Yoav Nir
&lt;<a href=3D"mailto:ynir@checkpoint.com" target=3D"_blank">ynir@checkpoin=
t.com</a>&gt;
wrote:</span></font></p>

<p style=3D"margin-bottom: 12pt;"><font size=3D"3" face=3D"Times New Roman"=
><span style=3D"font-size: 12pt;">Hi all.<br>
<br>
This is the fourth iteration of this draft. =C2=A0New in this iteration<br>
=C2=A0- Another co-author<br>
=C2=A0- Changed the name, so that this item is considered in the recharteri=
ng
discussion<br>
=C2=A0- Fixed some notation and some discussion based on comments from the =
list<br>
<br>
Yoav<br>
________________________________________<br>
From: <a href=3D"mailto:i-d-announce-bounces@ietf.org" target=3D"_blank">i-=
d-announce-bounces@ietf.org</a>
[<a href=3D"mailto:i-d-announce-bounces@ietf.org" target=3D"_blank">i-d-ann=
ounce-bounces@ietf.org</a>]
On Behalf Of <a href=3D"mailto:Internet-Drafts@ietf.org" target=3D"_blank">=
Internet-Drafts@ietf.org</a>
[<a href=3D"mailto:Internet-Drafts@ietf.org" target=3D"_blank">Internet-Dra=
fts@ietf.org</a>]<br>
Sent: Wednesday, July 01, 2009 12:15<br>
To: <a href=3D"mailto:i-d-announce@ietf.org" target=3D"_blank">i-d-announce=
@ietf.org</a><br>
Subject: I-D Action:draft-nir-ipsecme-childless-00.txt<br>
<br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0Title =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : A
Childless Initiation of the IKE SA<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0Author(s) =C2=A0 =C2=A0 =C2=A0 : Y. Nir, et al.<=
br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0Filename =C2=A0 =C2=A0 =C2=A0 =C2=A0:
draft-nir-ipsecme-childless-00.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0Pages =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 7<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0Date =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:
2009-07-01<br>
<br>
This document describes an extension to the IKEv2 protocol that<br>
allows an IKE SA to be created and authenticated without generating a<br>
child SA.<br>
<br>
A URL for this Internet-Draft is:<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-=
00.txt" target=3D"_blank">http://www.ietf.org/internet-drafts/draft-nir-ips=
ecme-childless-00.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br>
<br>
<br>
Email secured by Check Point<br>
<br>
<br>
_______________________________________________<br>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org" target=3D"_blank">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/ipsec</a></span></font></p>

</div>

</div>

</div>

<p style=3D"margin-bottom: 12pt;"><font size=3D"3" face=3D"Times New Roman"=
><span style=3D"font-size: 12pt;"><br>
<br>
<br>
Scanned by Check Point Total Security Gateway. </span></font></p>

</div>

</div>

</div>

</div>

<p style=3D"margin-bottom: 12pt;"><font size=3D"3" face=3D"Times New Roman"=
><span style=3D"font-size: 12pt;"><br>
<br>
<br>
Scanned by Check Point Total Security Gateway. </span></font></p>

</div></div></div>

</div>

</div>


</blockquote></div><br>

--001636e0a64aa3fe62046de3e91b--

From yaronf@checkpoint.com  Sat Jul  4 12:19:20 2009
Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 920793A67F0 for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 12:19:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.565
X-Spam-Level: 
X-Spam-Status: No, score=-2.565 tagged_above=-999 required=5 tests=[AWL=0.033,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tI4r2A6hH6+S for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 12:19:12 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id A74753A6A92 for <ipsec@ietf.org>; Sat,  4 Jul 2009 12:18:55 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id E4A3229C004; Sat,  4 Jul 2009 22:19:30 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 85EB929C002; Sat,  4 Jul 2009 22:19:30 +0300 (IDT)
X-CheckPoint: {4A4FA80E-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n64JJH3d006030; Sat, 4 Jul 2009 22:19:18 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Sat, 4 Jul 2009 22:19:17 +0300
From: Yaron Sheffer <yaronf@checkpoint.com>
To: Raj Singh <rsjenwar@gmail.com>
Date: Sat, 4 Jul 2009 22:19:14 +0300
Thread-Topic: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
Thread-Index: Acn8xfgyUsGqWtYrT+uAUbzOpjr+PgAFijTQ
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594E2@il-ex01.ad.checkpoint.com>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com> <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594C4@il-ex01.ad.checkpoint.com> <7ccecf670907040336t51b15b1t790284952459069a@mail.gmail.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594DF@il-ex01.ad.checkpoint.com> <7ccecf670907040939r3a750cdcx22447123ac400044@mail.gmail.com>
In-Reply-To: <7ccecf670907040939r3a750cdcx22447123ac400044@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0181_01C9FCF5.76811D50"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Yoav Nir <ynir@checkpoint.com>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Jul 2009 19:19:20 -0000

------=_NextPart_000_0181_01C9FCF5.76811D50
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_0182_01C9FCF5.76811D50"


------=_NextPart_001_0182_01C9FCF5.76811D50
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi Raj,

 

We sure can. But it will not be any of the existing payloads, i.e. won't be
a Notify or a Vendor ID. It will be a completely new payload, presumably
with the same semantics.

 

Thanks,

            Yaron

 

  _____  

From: Raj Singh [mailto:rsjenwar@gmail.com] 
Sent: Saturday, July 04, 2009 19:39
To: Yaron Sheffer
Cc: Yoav Nir; ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

 

Hi Yaron,

Its clear that critical bit refer to the payload, than to its content. Point
well taken.
But i am not able to understand why we can't define "critical" bit for new
CHILDLESS_IKE_AUTH notify/VID payload ?

With Regards,
Raj

On Sat, Jul 4, 2009 at 6:42 PM, Yaron Sheffer <yaronf@checkpoint.com> wrote:

Nope. The Critical bit refers to the payload, rather than to its contents,
and in fact cannot be set for payloads defined in RFC 4306 (such as VID and
Notify). So you need to define a NEW payload to benefit from it.

 

Thanks,

            Yaron

 

  _____  

From: Raj Singh [mailto:rsjenwar@gmail.com] 
Sent: Saturday, July 04, 2009 13:37
To: Yaron Sheffer
Cc: Yoav Nir; ipsec@ietf.org


Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

 

Hi Yaron,

I agree with you. 
Your suggestion of having "critical" bit set on childless notify/VID payload
from initiator in IKE_SA_INIT exchange will define the bahavior as mentioned
below.

If initiator want to childless IKE_AUTH, it will send  CHILDLESS_IKE_AUTH
notify/VID payload having "critical" flag SET in IKE_SA_INIT request.

1. It will help responder not to process the IKE_SA_INIT exchange if it does
not support childless IKE_AUTH. 

"The responder MUST reject IKE_SA_INIT exchange if it receives
CHILDLESS_IKE_AUTH notify/VID payload in IKE_SA_INIT exchange from initiator
if responder does not support childless IKE_AUTH and in response to the
IKE_SA_INIT exchange containing CHILDLESS_IKE_AUTH it MUST send
UNSUPPORTED_CRITICAL_PAYLOAD, the notification data will contain two-octet
unsupported notify/VID payload type i.e. CHILDLESS_IKE_AUTH."

2. It will help initiator to not to go ahead with childless IKE_AUTH if
responder doesn't support it wtithout procesing IKE_SA_INIT response.

With Regards,
Raj

On Sat, Jul 4, 2009 at 12:16 AM, Yaron Sheffer <yaronf@checkpoint.com>
wrote:

Hi Raj,

 

It sounds like you want a critical payload (RFC 4306, Sec. 2.5), probably a
payload with no data. In fact the draft could specify both options, the
current VID and such a payload, and leave it to the Initiator to decide
which behavior it prefers. Different scenarios might call for different
behaviors.

 

Thanks,

            Yaron

 

  _____  

From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of
Raj Singh
Sent: Friday, July 03, 2009 16:51
To: Yoav Nir
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

 

Hi Yoav,

Mostly the Initiator will decide that it wants to bring UP only IKE SA
without child SA.
But currently there is no notify/VID from Initiator to Responder to indicate
that initiator wants to bring only IKE SA. Even if responder does not
supports "childless IKE_AUTH", it will process IKE_SA_INIT, involding CPU
intensive D-H calculations, and send IKE_SA_INIT response without "childless
VID" payload.

By introducing a notify/VID payload from Initiator that it wants to bring UP
only IKE SA without child SA wil ease the processing ar Responder side. If
responder does not support "childless IKE_AUTH", it can send INVALID_SYNTAX.
Then, Initiator will wait for "Child SA" info to be available to bring UP
both IKE and child SA, normally as mentioned in RFC 4306.

Thanks,
Raj 

On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir <ynir@checkpoint.com> wrote:

Hi all.

This is the fourth iteration of this draft.  New in this iteration
 - Another co-author
 - Changed the name, so that this item is considered in the rechartering
discussion
 - Fixed some notation and some discussion based on comments from the list

Yoav
________________________________________
From: i-d-announce-bounces@ietf.org [i-d-announce-bounces@ietf.org] On
Behalf Of Internet-Drafts@ietf.org [Internet-Drafts@ietf.org]
Sent: Wednesday, July 01, 2009 12:15
To: i-d-announce@ietf.org
Subject: I-D Action:draft-nir-ipsecme-childless-00.txt

A New Internet-Draft is available from the on-line Internet-Drafts
directories.

       Title           : A Childless Initiation of the IKE SA
       Author(s)       : Y. Nir, et al.
       Filename        : draft-nir-ipsecme-childless-00.txt
       Pages           : 7
       Date            : 2009-07-01

This document describes an extension to the IKEv2 protocol that
allows an IKE SA to be created and authenticated without generating a
child SA.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-00.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.



Email secured by Check Point


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec




Scanned by Check Point Total Security Gateway. 




Scanned by Check Point Total Security Gateway. 

 


------=_NextPart_001_0182_01C9FCF5.76811D50
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" =
name=3D"PersonName"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:12.0pt;
	font-family:"Times New Roman";}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Hi =
Raj,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>We sure can. But it will not be any =
of the
existing payloads, i.e. won&#8217;t be a Notify or a Vendor ID. It will =
be a
completely new payload, presumably with the same =
semantics.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Thanks,<o:p></o:p></span></font></p>=


<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Yaron<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0cm 0cm =
0cm 4.0pt'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> Raj =
Singh [mailto:rsjenwar@gmail.com]
<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Saturday, July 04, =
2009
19:39<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName =
w:st=3D"on">Yaron
 Sheffer</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> <st1:PersonName =
w:st=3D"on">Yoav
 Nir</st1:PersonName>; <st1:PersonName =
w:st=3D"on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] FW: =
I-D
Action:draft-nir-ipsecme-childless-00.txt</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>Hi Yaron,<br>
<br>
Its clear that critical bit refer to the payload, than to its content. =
Point
well taken.<br>
But i am not able to understand why we can't define &quot;critical&quot; =
bit
for new CHILDLESS_IKE_AUTH notify/VID payload ?<br>
<br>
With Regards,<br>
Raj<o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>On Sat, Jul 4, 2009 at 6:42 PM, <st1:PersonName =
w:st=3D"on">Yaron Sheffer</st1:PersonName>
&lt;<a =
href=3D"mailto:yaronf@checkpoint.com">yaronf@checkpoint.com</a>&gt; =
wrote:<o:p></o:p></span></font></p>

<div link=3Dblue vlink=3Dblue>

<div>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>Nope. The Critical bit refers to the payload, rather =
than to
its contents, and in fact cannot be set for payloads defined in RFC 4306 =
(such
as VID and Notify). So you need to define a NEW payload to benefit from =
it.</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>Thanks,</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
Yaron</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<div style=3D'border:none;border-left:solid windowtext 1.5pt;padding:0cm =
0cm 0cm 4.0pt;
border-color:-moz-use-text-color -moz-use-text-color -moz-use-text-color =
blue'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>

<p><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;font-family:Tahoma;
font-weight:bold'>From:</span></font></b><font size=3D2 =
face=3DTahoma><span
style=3D'font-size:10.0pt;font-family:Tahoma'> Raj Singh [mailto:<a
href=3D"mailto:rsjenwar@gmail.com" =
target=3D"_blank">rsjenwar@gmail.com</a>] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Saturday, July 04, =
2009
13:37<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName =
w:st=3D"on">Yaron
 Sheffer</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> <st1:PersonName =
w:st=3D"on">Yoav
 Nir</st1:PersonName>; <a href=3D"mailto:ipsec@ietf.org" =
target=3D"_blank">ipsec@ietf.org</a><o:p></o:p></span></font></p>

<div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma'><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] FW: =
I-D
Action:draft-nir-ipsecme-childless-00.txt<o:p></o:p></span></font></p>

</div>

</div>

</div>

<div>

<div>

<p><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p style=3D'margin-bottom:12.0pt'><font size=3D3 face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt'>Hi Yaron,<br>
<br>
I agree with you. <br>
Your suggestion of having &quot;critical&quot; bit set on childless =
notify/VID
payload from initiator in IKE_SA_INIT exchange will define the bahavior =
as
mentioned below.<br>
<br>
If initiator want to childless IKE_AUTH, it will send&nbsp; =
CHILDLESS_IKE_AUTH
notify/VID payload having &quot;critical&quot; flag SET in IKE_SA_INIT =
request.<br>
<br>
1. It will help responder not to process the IKE_SA_INIT exchange if it =
does
not support childless IKE_AUTH. <br>
<br>
&quot;The responder MUST reject IKE_SA_INIT exchange if it receives
CHILDLESS_IKE_AUTH notify/VID payload in IKE_SA_INIT exchange from =
initiator if
responder does not support childless IKE_AUTH and in response to the
IKE_SA_INIT exchange containing CHILDLESS_IKE_AUTH it MUST send
UNSUPPORTED_CRITICAL_PAYLOAD, the notification data will contain =
two-octet
unsupported notify/VID payload type i.e. CHILDLESS_IKE_AUTH.&quot;<br>
<br>
2. It will help initiator to not to go ahead with childless IKE_AUTH if
responder doesn't support it wtithout procesing IKE_SA_INIT =
response.<br>
<br>
With Regards,<br>
Raj<o:p></o:p></span></font></p>

<div>

<p><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'>On Sat,
Jul 4, 2009 at 12:16 AM, <st1:PersonName w:st=3D"on">Yaron =
Sheffer</st1:PersonName>
&lt;<a href=3D"mailto:yaronf@checkpoint.com" =
target=3D"_blank">yaronf@checkpoint.com</a>&gt;
wrote:<o:p></o:p></span></font></p>

<div link=3Dblue vlink=3Dblue>

<div>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>Hi Raj,</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>It sounds like you want a critical payload (RFC 4306, =
Sec. 2.5),
probably a payload with no data. In fact the draft could specify both =
options,
the current VID and such a payload, and leave it to the Initiator to =
decide
which behavior it prefers. Different scenarios might call for different
behaviors.</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>Thanks,</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
Yaron</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<div style=3D'border:none;border-left:solid windowtext 1.5pt;padding:0cm =
0cm 0cm 4.0pt;
border-color:-moz-use-text-color -moz-use-text-color -moz-use-text-color =
blue'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>

<p><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;font-family:Tahoma;
font-weight:bold'>From:</span></font></b><font size=3D2 =
face=3DTahoma><span
style=3D'font-size:10.0pt;font-family:Tahoma'> <a
href=3D"mailto:ipsec-bounces@ietf.org" =
target=3D"_blank">ipsec-bounces@ietf.org</a>
[mailto:<a href=3D"mailto:ipsec-bounces@ietf.org" =
target=3D"_blank">ipsec-bounces@ietf.org</a>]
<b><span style=3D'font-weight:bold'>On Behalf Of </span></b>Raj =
Singh<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Friday, July 03, =
2009 16:51<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName =
w:st=3D"on">Yoav
 Nir</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> <a =
href=3D"mailto:ipsec@ietf.org"
target=3D"_blank">ipsec@ietf.org</a><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] FW: =
I-D
Action:draft-nir-ipsecme-childless-00.txt</span></font><o:p></o:p></p>

</div>

<div>

<div>

<p><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p style=3D'margin-bottom:12.0pt'><font size=3D3 face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt'>Hi Yoav,<br>
<br>
Mostly the Initiator will decide that it wants to bring UP only IKE SA =
without
child SA.<br>
But currently there is no notify/VID from Initiator to Responder to =
indicate
that initiator wants to bring only IKE SA. Even if responder does not =
supports
&quot;childless IKE_AUTH&quot;, it will process IKE_SA_INIT, involding =
CPU
intensive D-H calculations, and send IKE_SA_INIT response without
&quot;childless VID&quot; payload.<br>
<br>
By introducing a notify/VID payload from Initiator that it wants to =
bring UP
only IKE SA without child SA wil ease the processing ar Responder side. =
If
responder does not support &quot;childless IKE_AUTH&quot;, it can send
INVALID_SYNTAX. Then, Initiator will wait for &quot;Child SA&quot; info =
to be
available to bring UP both IKE and child SA, normally as mentioned in =
RFC 4306.<br>
<br>
Thanks,<br>
Raj <o:p></o:p></span></font></p>

<div>

<p><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'>On Thu,
Jul 2, 2009 at 1:42 AM, <st1:PersonName w:st=3D"on">Yoav =
Nir</st1:PersonName>
&lt;<a href=3D"mailto:ynir@checkpoint.com" =
target=3D"_blank">ynir@checkpoint.com</a>&gt;
wrote:<o:p></o:p></span></font></p>

<p style=3D'margin-bottom:12.0pt'><font size=3D3 face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt'>Hi all.<br>
<br>
This is the fourth iteration of this draft. &nbsp;New in this =
iteration<br>
&nbsp;- Another co-author<br>
&nbsp;- Changed the name, so that this item is considered in the =
rechartering
discussion<br>
&nbsp;- Fixed some notation and some discussion based on comments from =
the list<br>
<br>
Yoav<br>
________________________________________<br>
From: <a href=3D"mailto:i-d-announce-bounces@ietf.org" =
target=3D"_blank">i-d-announce-bounces@ietf.org</a>
[<a href=3D"mailto:i-d-announce-bounces@ietf.org" =
target=3D"_blank">i-d-announce-bounces@ietf.org</a>]
On Behalf Of <a href=3D"mailto:Internet-Drafts@ietf.org" =
target=3D"_blank">Internet-Drafts@ietf.org</a>
[<a href=3D"mailto:Internet-Drafts@ietf.org" =
target=3D"_blank">Internet-Drafts@ietf.org</a>]<br>
Sent: Wednesday, July 01, 2009 12:15<br>
To: <a href=3D"mailto:i-d-announce@ietf.org" =
target=3D"_blank">i-d-announce@ietf.org</a><br>
Subject: I-D Action:draft-nir-ipsecme-childless-00.txt<br>
<br>
A New Internet-Draft is available from the on-line Internet-Drafts =
directories.<br>
<br>
&nbsp; &nbsp; &nbsp; &nbsp;Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : A
Childless Initiation of the IKE SA<br>
&nbsp; &nbsp; &nbsp; &nbsp;Author(s) &nbsp; &nbsp; &nbsp; : Y. Nir, et =
al.<br>
&nbsp; &nbsp; &nbsp; &nbsp;Filename &nbsp; &nbsp; &nbsp; &nbsp;:
draft-nir-ipsecme-childless-00.txt<br>
&nbsp; &nbsp; &nbsp; &nbsp;Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : =
7<br>
&nbsp; &nbsp; &nbsp; &nbsp;Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp;:
2009-07-01<br>
<br>
This document describes an extension to the IKEv2 protocol that<br>
allows an IKE SA to be created and authenticated without generating =
a<br>
child SA.<br>
<br>
A URL for this Internet-Draft is:<br>
<a =
href=3D"http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-0=
0.txt"
target=3D"_blank">http://www.ietf.org/internet-drafts/draft-nir-ipsecme-c=
hildless-00.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" =
target=3D"_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br>
<br>
<br>
Email secured by Check Point<br>
<br>
<br>
_______________________________________________<br>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org" =
target=3D"_blank">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/ipsec</a><o:p></o=
:p></span></font></p>

</div>

</div>

</div>

<p style=3D'margin-bottom:12.0pt'><font size=3D3 face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt'><br>
<br>
<br>
Scanned by Check Point Total Security Gateway. =
<o:p></o:p></span></font></p>

</div>

</div>

</div>

</div>

<p style=3D'margin-bottom:12.0pt'><font size=3D3 face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt'><br>
<br>
<br>
Scanned by Check Point Total Security Gateway. =
<o:p></o:p></span></font></p>

</div>

</div>

</div>

</div>

</div>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

</div>

</body>

</html>

------=_NextPart_001_0182_01C9FCF5.76811D50--

------=_NextPart_000_0181_01C9FCF5.76811D50
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_0181_01C9FCF5.76811D50--

From yaronf@checkpoint.com  Sat Jul  4 12:48:12 2009
Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E75BA28C2E2 for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 12:48:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.567
X-Spam-Level: 
X-Spam-Status: No, score=-2.567 tagged_above=-999 required=5 tests=[AWL=0.031,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OkVbVJO0SLsf for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 12:48:10 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id B62CC3A68A1 for <ipsec@ietf.org>; Sat,  4 Jul 2009 12:48:09 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 12B2129C004; Sat,  4 Jul 2009 22:48:45 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id BB7ED29C002 for <ipsec@ietf.org>; Sat,  4 Jul 2009 22:48:44 +0300 (IDT)
X-CheckPoint: {4A4FAEE8-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n64JmW3d011027 for <ipsec@ietf.org>; Sat, 4 Jul 2009 22:48:32 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Sat, 4 Jul 2009 22:48:31 +0300
From: Yaron Sheffer <yaronf@checkpoint.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Date: Sat, 4 Jul 2009 22:48:29 +0300
Thread-Topic: WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
Thread-Index: Acn84GccXdkwAkW2QlWsL8kxCqVagw==
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594E4@il-ex01.ad.checkpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_018D_01C9FCF9.8C708390"
MIME-Version: 1.0
Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Jul 2009 19:48:13 -0000

------=_NextPart_000_018D_01C9FCF9.8C708390
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_018E_01C9FCF9.8C708390"


------=_NextPart_001_018E_01C9FCF9.8C708390
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

This is the beginning of a two-week WG Last Call, which will end July 18.
The target status for this document is Proposed Standard. The current
document is at
http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05.

 

If you have not read the document before now, please do so. Having fresh
eyes on the document often brings up important issues. If you HAVE read it
before, please note that there have been several revisions since San
Francisco, so you might want to read it again (plus it's a short document).
Send any comments to the list, even if they are as simple as "I read it and
it seems fine".

 

Please clearly indicate the position of any issue in the Internet Draft, and
if possible provide alternative text. Please also indicate the nature or
severity of the error or correction, e.g. major technical, minor technical,
nit, so that we can quickly judge the extent of problems with the document.

 

Thanks,

            Yaron


------=_NextPart_001_018E_01C9FCF9.8C708390
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" =
xmlns:p=3D"urn:schemas-microsoft-com:office:powerpoint" =
xmlns:a=3D"urn:schemas-microsoft-com:office:access" =
xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" =
xmlns:s=3D"uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" =
xmlns:rs=3D"urn:schemas-microsoft-com:rowset" xmlns:z=3D"#RowsetSchema" =
xmlns:b=3D"urn:schemas-microsoft-com:office:publisher" =
xmlns:ss=3D"urn:schemas-microsoft-com:office:spreadsheet" =
xmlns:c=3D"urn:schemas-microsoft-com:office:component:spreadsheet" =
xmlns:odc=3D"urn:schemas-microsoft-com:office:odc" =
xmlns:oa=3D"urn:schemas-microsoft-com:office:activation" =
xmlns:html=3D"http://www.w3.org/TR/REC-html40" =
xmlns:q=3D"http://schemas.xmlsoap.org/soap/envelope/" =
xmlns:rtc=3D"http://microsoft.com/officenet/conferencing" =
xmlns:D=3D"DAV:" xmlns:Repl=3D"http://schemas.microsoft.com/repl/" =
xmlns:mt=3D"http://schemas.microsoft.com/sharepoint/soap/meetings/" =
xmlns:x2=3D"http://schemas.microsoft.com/office/excel/2003/xml" =
xmlns:ppda=3D"http://www.passport.com/NameSpace.xsd" =
xmlns:ois=3D"http://schemas.microsoft.com/sharepoint/soap/ois/" =
xmlns:dir=3D"http://schemas.microsoft.com/sharepoint/soap/directory/" =
xmlns:ds=3D"http://www.w3.org/2000/09/xmldsig#" =
xmlns:dsp=3D"http://schemas.microsoft.com/sharepoint/dsp" =
xmlns:udc=3D"http://schemas.microsoft.com/data/udc" =
xmlns:xsd=3D"http://www.w3.org/2001/XMLSchema" =
xmlns:sub=3D"http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/"=
 xmlns:ec=3D"http://www.w3.org/2001/04/xmlenc#" =
xmlns:sp=3D"http://schemas.microsoft.com/sharepoint/" =
xmlns:sps=3D"http://schemas.microsoft.com/sharepoint/soap/" =
xmlns:xsi=3D"http://www.w3.org/2001/XMLSchema-instance" =
xmlns:udcs=3D"http://schemas.microsoft.com/data/udc/soap" =
xmlns:udcxf=3D"http://schemas.microsoft.com/data/udc/xmlfile" =
xmlns:udcp2p=3D"http://schemas.microsoft.com/data/udc/parttopart" =
xmlns:st=3D"&#1;" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"City"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Times;
	panose-1:2 2 6 3 5 4 5 2 3 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:Arial;
	color:windowtext;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>This is the beginning of a =
two-week
WG Last Call, which will end July 18. The target status for this =
document is
Proposed Standard. The current document is at <a
href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-=
05">http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05</=
a>.<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'><o:p>&nbsp;</o:p></span></fo=
nt></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>If you have not read the =
document
before now, please do so. Having fresh eyes on the document often brings =
up
important issues. If you HAVE read it before, please note that there =
have been
several revisions since <st1:City w:st=3D"on"><st1:place w:st=3D"on">San =
Francisco</st1:place></st1:City>,
so you might want to read it again (plus it&#8217;s a short document). =
Send any
comments to the list, even if they are as simple as &quot;I read it and =
it
seems fine&quot;.<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'><o:p>&nbsp;</o:p></span></fo=
nt></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>Please clearly indicate the =
position
of any issue in the Internet Draft, and if possible provide alternative =
text. Please
also indicate the nature or severity of the error or correction, e.g. =
major
technical, minor technical, nit, so that we can quickly judge the extent =
of
problems with the document.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Thanks,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp; Yaron</span></font><font size=3D2 face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'><o:p></o:p></span></font></p=
>

</div>

</body>

</html>

------=_NextPart_001_018E_01C9FCF9.8C708390--

------=_NextPart_000_018D_01C9FCF9.8C708390
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_018D_01C9FCF9.8C708390--

From ynir@checkpoint.com  Sat Jul  4 14:03:34 2009
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 069773A6821 for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 14:03:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id itarfARxyS8R for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 14:03:33 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id 9BA623A67FC for <ipsec@ietf.org>; Sat,  4 Jul 2009 14:03:32 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id AB9E329C004; Sun,  5 Jul 2009 00:04:07 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 5A49E29C002; Sun,  5 Jul 2009 00:04:07 +0300 (IDT)
X-CheckPoint: {4A4FC092-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n64L3s3d024170; Sun, 5 Jul 2009 00:03:55 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Sun, 5 Jul 2009 00:03:54 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: Raj Singh <rsjenwar@gmail.com>
Date: Sun, 5 Jul 2009 00:03:53 +0300
Thread-Topic: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
Thread-Index: Acn75VLepRTKin1oSvOFjToPnEKamgBBLQMp
Message-ID: <006FEB08D9C6444AB014105C9AEB133F433539DEC6@il-ex01.ad.checkpoint.com>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com>, <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com>
In-Reply-To: <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Jul 2009 21:03:34 -0000

Hi Raj

The ordinary thing for a responder to do with unrecognized Notifies/VIDs is=
 to ignore them. So the only responder that will behave as you suggest is o=
ne that supports this extension, but is configured not to.

At least for the remote access client, it makes sense for a client that fac=
es both supporting and non-supporting gateways to have a "dummy" proposal f=
or a useless child SA, for example ICMP from the client to the gateway. It =
doesn't really matter if the proposal is accepted or rejected, because the =
client does not need the traffic.

In any case, an initiator that insists on a childless IKE SA contacting a g=
ateway that does not support the extension is a misconfiguration. I don't b=
elieve we should go to great lengths (especially the new critical payload t=
hat Yaron is proposing) to save work in such a misconfiguration case.

If we do think it's important, the "right" way is for the Initiator to send=
 the VID, for the responder to only send the VID if it (a) supports the ext=
ension *and* (b) has seen the VID from the initiator. We could even require=
 that the initiator be prepared to continue with a non-supporting gateway, =
but I'm not sure that's a good idea.

________________________________________
From: Raj Singh [rsjenwar@gmail.com]
Sent: Friday, July 03, 2009 16:51
To: Yoav Nir
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hi Yoav,

Mostly the Initiator will decide that it wants to bring UP only IKE SA with=
out child SA.
But currently there is no notify/VID from Initiator to Responder to indicat=
e that initiator wants to bring only IKE SA. Even if responder does not sup=
ports "childless IKE_AUTH", it will process IKE_SA_INIT, involding CPU inte=
nsive D-H calculations, and send IKE_SA_INIT response without "childless VI=
D" payload.

By introducing a notify/VID payload from Initiator that it wants to bring U=
P only IKE SA without child SA wil ease the processing ar Responder side. I=
f responder does not support "childless IKE_AUTH", it can send INVALID_SYNT=
AX. Then, Initiator will wait for "Child SA" info to be available to bring =
UP both IKE and child SA, normally as mentioned in RFC 4306.

Thanks,
Raj

On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir <ynir@checkpoint.com<mailto:ynir@c=
heckpoint.com>> wrote:
Hi all.

This is the fourth iteration of this draft.  New in this iteration
 - Another co-author
 - Changed the name, so that this item is considered in the rechartering di=
scussion
 - Fixed some notation and some discussion based on comments from the list

Yoav
________________________________________
From: i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org> [=
i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org>] On Beh=
alf Of Internet-Drafts@ietf.org<mailto:Internet-Drafts@ietf.org> [Internet-=
Drafts@ietf.org<mailto:Internet-Drafts@ietf.org>]
Sent: Wednesday, July 01, 2009 12:15
To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org>
Subject: I-D Action:draft-nir-ipsecme-childless-00.txt

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.

       Title           : A Childless Initiation of the IKE SA
       Author(s)       : Y. Nir, et al.
       Filename        : draft-nir-ipsecme-childless-00.txt
       Pages           : 7
       Date            : 2009-07-01

This document describes an extension to the IKEv2 protocol that
allows an IKE SA to be created and authenticated without generating a
child SA.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-00.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.



Email secured by Check Point


_______________________________________________
IPsec mailing list
IPsec@ietf.org<mailto:IPsec@ietf.org>
https://www.ietf.org/mailman/listinfo/ipsec




Scanned by Check Point Total Security Gateway.


Email secured by Check Point

From rsjenwar@gmail.com  Sat Jul  4 19:01:33 2009
Return-Path: <rsjenwar@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CEF793A6884 for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 19:01:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.468
X-Spam-Level: 
X-Spam-Status: No, score=-2.468 tagged_above=-999 required=5 tests=[AWL=0.130,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dSMY35kNrK1s for <ipsec@core3.amsl.com>; Sat,  4 Jul 2009 19:01:32 -0700 (PDT)
Received: from mail-px0-f178.google.com (mail-px0-f178.google.com [209.85.216.178]) by core3.amsl.com (Postfix) with ESMTP id 42CB93A6824 for <ipsec@ietf.org>; Sat,  4 Jul 2009 19:01:32 -0700 (PDT)
Received: by pxi8 with SMTP id 8so3664224pxi.29 for <ipsec@ietf.org>; Sat, 04 Jul 2009 19:01:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=cJAwHKayUSXYzmGgjRJOGih7qWCAxgHdzCN4NBFLyME=; b=ex/TovtT82TenJdu5TBdTOgZ4tgCPAvZKFDqLd4zFxiax+BNm6dbssC9mMZ7Xyn4xj MyUut2GbVHcXWYZ3fuzGxyGw0QCljl6TQ2JGSFTrOcM7FSfQh9eqmOnLpfMSo4TEZzAk kFfiqKIvq34K3EVhw8LPfAZ38fzU0QNLuW7S0=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=vDcM6UajUCfNmqyFwA5EP0NsiFtjrjt2hmCt1lFtZR+tZq7KM2KSvE2j+s1geFmZI/ S8/tkeK05cB1n8bqo/QjZu088EFdPsJoKaMwG+su3HkfWm3VnuENZymj+xVNj/Lb68MZ QBz1pZgtfgh8CwShTE742G3eKJWFQYuRtPLus=
MIME-Version: 1.0
Received: by 10.142.223.20 with SMTP id v20mr921061wfg.316.1246759316264; Sat,  04 Jul 2009 19:01:56 -0700 (PDT)
In-Reply-To: <006FEB08D9C6444AB014105C9AEB133F433539DEC6@il-ex01.ad.checkpoint.com>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com> <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC6@il-ex01.ad.checkpoint.com>
Date: Sun, 5 Jul 2009 07:31:56 +0530
Message-ID: <7ccecf670907041901y5ab926e8q7892ebdbd9bc109d@mail.gmail.com>
From: Raj Singh <rsjenwar@gmail.com>
To: Yoav Nir <ynir@checkpoint.com>
Content-Type: multipart/alternative; boundary=000e0cd28d4a2a9871046debc6ce
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 05 Jul 2009 02:01:33 -0000

--000e0cd28d4a2a9871046debc6ce
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Yoav,

Please find my input inline <Raj>.

With Regards,
Raj

On Sun, Jul 5, 2009 at 2:33 AM, Yoav Nir <ynir@checkpoint.com> wrote:

> Hi Raj
>
> The ordinary thing for a responder to do with unrecognized Notifies/VIDs is
> to ignore them. So the only responder that will behave as you suggest is one
> that supports this extension, but is configured not to.

<Raj> Yes, if responder understands childless IKE_AUTH from initiator, it
will behave as mentioned in my previous mail, if NOT and it does not support
childless IKE_AUTH [only responder not supporting childless extention], then
initiator will notice missing childless notify/VID and can stop the
transactions for the SA. But it will help responders, supporting this
extentions and applying policies.

>
>
> At least for the remote access client, it makes sense for a client that
> faces both supporting and non-supporting gateways to have a "dummy" proposal
> for a useless child SA, for example ICMP from the client to the gateway. It
> doesn't really matter if the proposal is accepted or rejected, because the
> client does not need the traffic.

 <Raj> What's the usecase ?

>
>
> In any case, an initiator that insists on a childless IKE SA contacting a
> gateway that does not support the extension is a misconfiguration. I don't
> believe we should go to great lengths (especially the new critical payload
> that Yaron is proposing) to save work in such a misconfiguration case.

<Raj> How it can be a misconfiguration, The gateway can put some policy to
enable/disable childless IKE_AUTH based on "load" on gateway. Yes, i agree,
new crittical payload, we can avoid.

>
>
> If we do think it's important, the "right" way is for the Initiator to send
> the VID, for the responder to only send the VID if it (a) supports the
> extension *and* (b) has seen the VID from the initiator. We could even
> require that the initiator be prepared to continue with a non-supporting
> gateway, but I'm not sure that's a good idea.

<Raj> The whole idea is:
initiator to send childless notify/VID when it want to bring up "ONLY" IKE
SA i.e. it is not hit by traffic or "dummy" payload. This will avoid
unnecessary processing of IKE_SA_INIT at responder when responder does not
support childless IKE_AUTH. This is most likely usecase of chiless IKE_AUTH
in VPN scenarios.
The behavior remains similar as mentioned in my previous mail except
"critical" bit as it needs to define new payload type which even i want to
avoid. Its just a simple notify/VID payload with no associated data and
easing the work at initiator and responder. Its can see goodness in idea.
When initiator has dummy proposal  ready, the initiator need not to send
childless notify/VID payload.

>
>
> ________________________________________
> From: Raj Singh [rsjenwar@gmail.com]
> Sent: Friday, July 03, 2009 16:51
> To: Yoav Nir
> Cc: ipsec@ietf.org
> Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
>
> Hi Yoav,
>
> Mostly the Initiator will decide that it wants to bring UP only IKE SA
> without child SA.
> But currently there is no notify/VID from Initiator to Responder to
> indicate that initiator wants to bring only IKE SA. Even if responder does
> not supports "childless IKE_AUTH", it will process IKE_SA_INIT, involding
> CPU intensive D-H calculations, and send IKE_SA_INIT response without
> "childless VID" payload.
>
> By introducing a notify/VID payload from Initiator that it wants to bring
> UP only IKE SA without child SA wil ease the processing ar Responder side.
> If responder does not support "childless IKE_AUTH", it can send
> INVALID_SYNTAX. Then, Initiator will wait for "Child SA" info to be
> available to bring UP both IKE and child SA, normally as mentioned in RFC
> 4306.
>
> Thanks,
> Raj
>
> On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir <ynir@checkpoint.com<mailto:
> ynir@checkpoint.com>> wrote:
> Hi all.
>
> This is the fourth iteration of this draft.  New in this iteration
>  - Another co-author
>  - Changed the name, so that this item is considered in the rechartering
> discussion
>  - Fixed some notation and some discussion based on comments from the list
>
> Yoav
> ________________________________________
> From: i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org>
> [i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org>] On
> Behalf Of Internet-Drafts@ietf.org<mailto:Internet-Drafts@ietf.org> [
> Internet-Drafts@ietf.org<mailto:Internet-Drafts@ietf.org>]
> Sent: Wednesday, July 01, 2009 12:15
> To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org>
> Subject: I-D Action:draft-nir-ipsecme-childless-00.txt
>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>
>       Title           : A Childless Initiation of the IKE SA
>       Author(s)       : Y. Nir, et al.
>       Filename        : draft-nir-ipsecme-childless-00.txt
>       Pages           : 7
>       Date            : 2009-07-01
>
> This document describes an extension to the IKEv2 protocol that
> allows an IKE SA to be created and authenticated without generating a
> child SA.
>
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-00.txt
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> Below is the data which will enable a MIME compliant mail reader
> implementation to automatically retrieve the ASCII version of the
> Internet-Draft.
>
>
>
> Email secured by Check Point
>
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org<mailto:IPsec@ietf.org>
> https://www.ietf.org/mailman/listinfo/ipsec
>
>
>
>
> Scanned by Check Point Total Security Gateway.
>
>
> Email secured by Check Point
>

--000e0cd28d4a2a9871046debc6ce
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Yoav,<br><br>Please find my input inline &lt;Raj&gt;.<br><br>With Regard=
s,<br>Raj<br><br><div class=3D"gmail_quote">On Sun, Jul 5, 2009 at 2:33 AM,=
 Yoav Nir <span dir=3D"ltr">&lt;<a href=3D"mailto:ynir@checkpoint.com">ynir=
@checkpoint.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"border-left: 1px solid rgb(204, =
204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">Hi Raj<br>
<br>
The ordinary thing for a responder to do with unrecognized Notifies/VIDs is=
 to ignore them. So the only responder that will behave as you suggest is o=
ne that supports this extension, but is configured not to.</blockquote>
<div>&lt;Raj&gt; Yes, if responder understands childless IKE_AUTH from init=
iator, it will behave as mentioned in my previous mail, if NOT and it does =
not support childless IKE_AUTH [only responder not supporting childless ext=
ention], then initiator will notice missing childless notify/VID and can st=
op the transactions for the SA. But it will help responders, supporting thi=
s extentions and applying policies.<br>
</div><blockquote class=3D"gmail_quote" style=3D"border-left: 1px solid rgb=
(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;"><br>
<br>
At least for the remote access client, it makes sense for a client that fac=
es both supporting and non-supporting gateways to have a &quot;dummy&quot; =
proposal for a useless child SA, for example ICMP from the client to the ga=
teway. It doesn&#39;t really matter if the proposal is accepted or rejected=
, because the client does not need the traffic.</blockquote>
<div>=C2=A0&lt;Raj&gt; What&#39;s the usecase ?<br></div><blockquote class=
=3D"gmail_quote" style=3D"border-left: 1px solid rgb(204, 204, 204); margin=
: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;"><br>
<br>
In any case, an initiator that insists on a childless IKE SA contacting a g=
ateway that does not support the extension is a misconfiguration. I don&#39=
;t believe we should go to great lengths (especially the new critical paylo=
ad that Yaron is proposing) to save work in such a misconfiguration case.</=
blockquote>
<div>&lt;Raj&gt; How it can be a misconfiguration, The gateway can put some=
 policy to enable/disable childless IKE_AUTH based on &quot;load&quot; on g=
ateway. Yes, i agree, new crittical payload, we can avoid.<br></div><blockq=
uote class=3D"gmail_quote" style=3D"border-left: 1px solid rgb(204, 204, 20=
4); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<br>
<br>
If we do think it&#39;s important, the &quot;right&quot; way is for the Ini=
tiator to send the VID, for the responder to only send the VID if it (a) su=
pports the extension *and* (b) has seen the VID from the initiator. We coul=
d even require that the initiator be prepared to continue with a non-suppor=
ting gateway, but I&#39;m not sure that&#39;s a good idea.</blockquote>
<div>&lt;Raj&gt; The whole idea is:<br>initiator to send childless notify/V=
ID when it want to bring up &quot;ONLY&quot; IKE SA i.e. it is not hit by t=
raffic or &quot;dummy&quot; payload. This will avoid unnecessary processing=
 of IKE_SA_INIT at responder when responder does not support childless IKE_=
AUTH. This is most likely usecase of chiless IKE_AUTH in VPN scenarios.<br>
The behavior remains similar as mentioned in my previous mail except &quot;=
critical&quot; bit as it needs to define new payload type which even i want=
 to avoid. Its just a simple notify/VID payload with no associated data and=
 easing the work at initiator and responder. Its can see goodness in idea.<=
br>
When initiator has dummy proposal=C2=A0 ready, the initiator need not to se=
nd childless notify/VID payload.<br></div><blockquote class=3D"gmail_quote"=
 style=3D"border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.=
8ex; padding-left: 1ex;">
<br>
<br>
________________________________________<br>
From: Raj Singh [<a href=3D"mailto:rsjenwar@gmail.com">rsjenwar@gmail.com</=
a>]<br>
<div class=3D"im">Sent: Friday, July 03, 2009 16:51<br>
To: Yoav Nir<br>
Cc: <a href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</a><br>
</div>Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.tx=
t<br>
<div class=3D"im"><br>
Hi Yoav,<br>
<br>
Mostly the Initiator will decide that it wants to bring UP only IKE SA with=
out child SA.<br>
But currently there is no notify/VID from Initiator to Responder to indicat=
e that initiator wants to bring only IKE SA. Even if responder does not sup=
ports &quot;childless IKE_AUTH&quot;, it will process IKE_SA_INIT, involdin=
g CPU intensive D-H calculations, and send IKE_SA_INIT response without &qu=
ot;childless VID&quot; payload.<br>

<br>
By introducing a notify/VID payload from Initiator that it wants to bring U=
P only IKE SA without child SA wil ease the processing ar Responder side. I=
f responder does not support &quot;childless IKE_AUTH&quot;, it can send IN=
VALID_SYNTAX. Then, Initiator will wait for &quot;Child SA&quot; info to be=
 available to bring UP both IKE and child SA, normally as mentioned in RFC =
4306.<br>

<br>
Thanks,<br>
Raj<br>
<br>
</div><div class=3D"im">On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir &lt;<a hre=
f=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&lt;mailto:<a href=
=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&gt;&gt; wrote:<br>
Hi all.<br>
<br>
This is the fourth iteration of this draft. =C2=A0New in this iteration<br>
=C2=A0- Another co-author<br>
=C2=A0- Changed the name, so that this item is considered in the recharteri=
ng discussion<br>
=C2=A0- Fixed some notation and some discussion based on comments from the =
list<br>
<br>
Yoav<br>
________________________________________<br>
</div>From: <a href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-b=
ounces@ietf.org</a>&lt;mailto:<a href=3D"mailto:i-d-announce-bounces@ietf.o=
rg">i-d-announce-bounces@ietf.org</a>&gt; [<a href=3D"mailto:i-d-announce-b=
ounces@ietf.org">i-d-announce-bounces@ietf.org</a>&lt;mailto:<a href=3D"mai=
lto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf.org</a>&gt;] O=
n Behalf Of <a href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@iet=
f.org</a>&lt;mailto:<a href=3D"mailto:Internet-Drafts@ietf.org">Internet-Dr=
afts@ietf.org</a>&gt; [<a href=3D"mailto:Internet-Drafts@ietf.org">Internet=
-Drafts@ietf.org</a>&lt;mailto:<a href=3D"mailto:Internet-Drafts@ietf.org">=
Internet-Drafts@ietf.org</a>&gt;]<br>

<div class=3D"im">Sent: Wednesday, July 01, 2009 12:15<br>
</div>To: <a href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a=
>&lt;mailto:<a href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org<=
/a>&gt;<br>
<div class=3D"im">Subject: I-D Action:draft-nir-ipsecme-childless-00.txt<br=
>
<br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
<br>
 =C2=A0 =C2=A0 =C2=A0 Title =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : A Childles=
s Initiation of the IKE SA<br>
 =C2=A0 =C2=A0 =C2=A0 Author(s) =C2=A0 =C2=A0 =C2=A0 : Y. Nir, et al.<br>
 =C2=A0 =C2=A0 =C2=A0 Filename =C2=A0 =C2=A0 =C2=A0 =C2=A0: draft-nir-ipsec=
me-childless-00.txt<br>
 =C2=A0 =C2=A0 =C2=A0 Pages =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 7<br>
 =C2=A0 =C2=A0 =C2=A0 Date =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 2009-=
07-01<br>
<br>
This document describes an extension to the IKEv2 protocol that<br>
allows an IKE SA to be created and authenticated without generating a<br>
child SA.<br>
<br>
A URL for this Internet-Draft is:<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-=
00.txt" target=3D"_blank">http://www.ietf.org/internet-drafts/draft-nir-ips=
ecme-childless-00.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br>
<br>
<br>
Email secured by Check Point<br>
<br>
<br>
_______________________________________________<br>
IPsec mailing list<br>
</div><a href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a>&lt;mailto:<a hre=
f=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a>&gt;<br>
<div class=3D"im"><a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/ipsec</a><br>
<br>
<br>
<br>
<br>
</div><div class=3D"im">Scanned by Check Point Total Security Gateway.<br>
<br>
<br>
</div><div><div></div><div class=3D"h5">Email secured by Check Point<br>
</div></div></blockquote></div><br>

--000e0cd28d4a2a9871046debc6ce--

From yaronf@checkpoint.com  Sun Jul  5 00:26:01 2009
Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 61C513A680E for <ipsec@core3.amsl.com>; Sun,  5 Jul 2009 00:26:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.97
X-Spam-Level: 
X-Spam-Status: No, score=-1.97 tagged_above=-999 required=5 tests=[AWL=-0.571,  BAYES_00=-2.599, J_CHICKENPOX_12=0.6, J_CHICKENPOX_32=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NvDXaEuR6DlW for <ipsec@core3.amsl.com>; Sun,  5 Jul 2009 00:26:00 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id C900E3A68AD for <ipsec@ietf.org>; Sun,  5 Jul 2009 00:25:59 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 45D49200E04; Sun,  5 Jul 2009 10:26:35 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 0E4F520037B; Sun,  5 Jul 2009 10:26:35 +0300 (IDT)
X-CheckPoint: {4A50526F-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n657QM3d014443; Sun, 5 Jul 2009 10:26:22 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Sun, 5 Jul 2009 10:26:22 +0300
From: Yaron Sheffer <yaronf@checkpoint.com>
To: Paul Hoffman <paul.hoffman@vpnc.org>, Scott C Moonen <smoonen@us.ibm.com>
Date: Sun, 5 Jul 2009 10:26:21 +0300
Thread-Topic: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
Thread-Index: Acn8t+XicWn2ZDxHThy4j2LRH8cbvQAh3Cwg
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59519@il-ex01.ad.checkpoint.com>
References: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com> <p062408b4c672f6178fca@[10.20.30.158]> <7D42CBF1-5BEB-4EE3-93E2-754A4BC2764A@stratussolutions.com> <p062408e0c67317806446@[10.20.30.158]> <OF3AB4DB32.79E9CCEB-ON852575E9.00403C25-852575E9.0040606B@us.ibm.com> <p06240816c6751e1439fb@[10.20.30.158]>
In-Reply-To: <p06240816c6751e1439fb@[10.20.30.158]>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_01E2_01C9FD5B.0A27EDD0"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Sean Kevin O'Keeffe <sean@stratussolutions.com>
Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 05 Jul 2009 07:26:01 -0000

------=_NextPart_000_01E2_01C9FD5B.0A27EDD0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Given that:

- There are several implementations that include Russ's errata.
- We have not heard from anybody who has *not* implemented it.
- This errata is clearly in conflict with the test vectors in the RFC.
- There are no security implications: the application of PRF in "SKEYSEED =
prf(Ni | Nr, g^ir)" takes care of extracting the entropy even if both X and
the dependent Y are included in g^ir. So either way is fine.

...I suggest that we move forward in line with Russ's errata, and develop a
new RFC that includes the errata and also corrects the relevant test
vectors. Paul, can you modify your recent errata
(http://www.rfc-editor.org/errata_search.php?eid=1800) so that implementers
are aware that there is ongoing work to resolve this issue? Otherwise we
have two errata in conflict with one another *and* with the RFC, which is
mildly confusing.

Thanks,
	Yaron

> -----Original Message-----
> From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of
> Paul Hoffman
> Sent: Saturday, July 04, 2009 17:58
> To: Scott C Moonen
> Cc: ipsec@ietf.org; Sean Kevin O'Keeffe
> Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
> 
> At 7:43 AM -0400 7/4/09, Scott C Moonen wrote:
> >What's the next step?
> 
> I have sent a message to the RFC Editor (which then gets sent to the doc
> authors and the IESG) about my concern about the correctness of the
> errata. We see how that plays out.
> 
> >If there's agreement that we need a new RFC, I'd be glad to pitch in with
> the effort.
> 
> Generally, this should be done by the authors themselves. Failing that,
> someone else could do it.
> 
> --Paul Hoffman, Director
> --VPN Consortium
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
> 
> Scanned by Check Point Total Security Gateway.

------=_NextPart_000_01E2_01C9FD5B.0A27EDD0
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_01E2_01C9FD5B.0A27EDD0--

From ynir@checkpoint.com  Mon Jul  6 01:24:13 2009
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2FF0A28C1E5 for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 01:24:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 73bpPNQ6F3-x for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 01:24:03 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id C079128C1B6 for <ipsec@ietf.org>; Mon,  6 Jul 2009 01:24:02 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 905CC200E09; Mon,  6 Jul 2009 11:23:52 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 3B218200681; Mon,  6 Jul 2009 11:23:52 +0300 (IDT)
X-CheckPoint: {4A51B14E-2-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n668Nc3e015437; Mon, 6 Jul 2009 11:23:39 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Mon, 6 Jul 2009 11:23:38 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: "'Raj Singh'" <rsjenwar@gmail.com>
Date: Mon, 6 Jul 2009 11:23:37 +0300
Thread-Topic: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
Thread-Index: Acn9FQbP1EeMUU5lQDSqyH7O4xwPyQA/LPew
Message-ID: <006FEB08D9C6444AB014105C9AEB133F433538CE31@il-ex01.ad.checkpoint.com>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com> <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC6@il-ex01.ad.checkpoint.com> <7ccecf670907041901y5ab926e8q7892ebdbd9bc109d@mail.gmail.com>
In-Reply-To: <7ccecf670907041901y5ab926e8q7892ebdbd9bc109d@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_006FEB08D9C6444AB014105C9AEB133F433538CE31ilex01adcheck_"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2009 08:24:13 -0000

--_000_006FEB08D9C6444AB014105C9AEB133F433538CE31ilex01adcheck_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Inline with <ynir>

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of R=
aj Singh
Sent: Sunday, July 05, 2009 5:02 AM
To: Yoav Nir
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hi Yoav,

Please find my input inline <Raj>.

With Regards,
Raj
On Sun, Jul 5, 2009 at 2:33 AM, Yoav Nir <ynir@checkpoint.com<mailto:ynir@c=
heckpoint.com>> wrote:
Hi Raj

The ordinary thing for a responder to do with unrecognized Notifies/VIDs is=
 to ignore them. So the only responder that will behave as you suggest is o=
ne that supports this extension, but is configured not to.
<Raj> Yes, if responder understands childless IKE_AUTH from initiator, it w=
ill behave as mentioned in my previous mail, if NOT and it does not support=
 childless IKE_AUTH [only responder not supporting childless extention], th=
en initiator will notice missing childless notify/VID and can stop the tran=
sactions for the SA. But it will help responders, supporting this extention=
s and applying policies.


At least for the remote access client, it makes sense for a client that fac=
es both supporting and non-supporting gateways to have a "dummy" proposal f=
or a useless child SA, for example ICMP from the client to the gateway. It =
doesn't really matter if the proposal is accepted or rejected, because the =
client does not need the traffic.
 <Raj> What's the usecase ?
<ynir> the usecase is that the client needs an IKE SA, but can't get it unl=
ess it negotiates a child SA - that's what you have now before implementing=
 our draft.


In any case, an initiator that insists on a childless IKE SA contacting a g=
ateway that does not support the extension is a misconfiguration. I don't b=
elieve we should go to great lengths (especially the new critical payload t=
hat Yaron is proposing) to save work in such a misconfiguration case.
<Raj> How it can be a misconfiguration, The gateway can put some policy to =
enable/disable childless IKE_AUTH based on "load" on gateway. Yes, i agree,=
 new crittical payload, we can avoid.
<ynir> Well, we could add our own "critical" bit to the notify/VID. If that=
 is on, the responder can either reply with a similar notification/VID, or =
else some error notify (NO_PROPOSAL_CHOSEN or a new one of our own)



If we do think it's important, the "right" way is for the Initiator to send=
 the VID, for the responder to only send the VID if it (a) supports the ext=
ension *and* (b) has seen the VID from the initiator. We could even require=
 that the initiator be prepared to continue with a non-supporting gateway, =
but I'm not sure that's a good idea.
<Raj> The whole idea is:
initiator to send childless notify/VID when it want to bring up "ONLY" IKE =
SA i.e. it is not hit by traffic or "dummy" payload. This will avoid unnece=
ssary processing of IKE_SA_INIT at responder when responder does not suppor=
t childless IKE_AUTH. This is most likely usecase of chiless IKE_AUTH in VP=
N scenarios.
The behavior remains similar as mentioned in my previous mail except "criti=
cal" bit as it needs to define new payload type which even i want to avoid.=
 Its just a simple notify/VID payload with no associated data and easing th=
e work at initiator and responder. Its can see goodness in idea.
When initiator has dummy proposal  ready, the initiator need not to send ch=
ildless notify/VID payload.


________________________________________
From: Raj Singh [rsjenwar@gmail.com<mailto:rsjenwar@gmail.com>]
Sent: Friday, July 03, 2009 16:51
To: Yoav Nir
Cc: ipsec@ietf.org<mailto:ipsec@ietf.org>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hi Yoav,

Mostly the Initiator will decide that it wants to bring UP only IKE SA with=
out child SA.
But currently there is no notify/VID from Initiator to Responder to indicat=
e that initiator wants to bring only IKE SA. Even if responder does not sup=
ports "childless IKE_AUTH", it will process IKE_SA_INIT, involding CPU inte=
nsive D-H calculations, and send IKE_SA_INIT response without "childless VI=
D" payload.

By introducing a notify/VID payload from Initiator that it wants to bring U=
P only IKE SA without child SA wil ease the processing ar Responder side. I=
f responder does not support "childless IKE_AUTH", it can send INVALID_SYNT=
AX. Then, Initiator will wait for "Child SA" info to be available to bring =
UP both IKE and child SA, normally as mentioned in RFC 4306.

Thanks,
Raj
On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir <ynir@checkpoint.com<mailto:ynir@c=
heckpoint.com><mailto:ynir@checkpoint.com<mailto:ynir@checkpoint.com>>> wro=
te:
Hi all.

This is the fourth iteration of this draft.  New in this iteration
 - Another co-author
 - Changed the name, so that this item is considered in the rechartering di=
scussion
 - Fixed some notation and some discussion based on comments from the list

Yoav
________________________________________
From: i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org><m=
ailto:i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org>> =
[i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org><mailto=
:i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org>>] On B=
ehalf Of Internet-Drafts@ietf.org<mailto:Internet-Drafts@ietf.org><mailto:I=
nternet-Drafts@ietf.org<mailto:Internet-Drafts@ietf.org>> [Internet-Drafts@=
ietf.org<mailto:Internet-Drafts@ietf.org><mailto:Internet-Drafts@ietf.org<m=
ailto:Internet-Drafts@ietf.org>>]
Sent: Wednesday, July 01, 2009 12:15
To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org><mailto:i-d-announce=
@ietf.org<mailto:i-d-announce@ietf.org>>
Subject: I-D Action:draft-nir-ipsecme-childless-00.txt

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.

      Title           : A Childless Initiation of the IKE SA
      Author(s)       : Y. Nir, et al.
      Filename        : draft-nir-ipsecme-childless-00.txt
      Pages           : 7
      Date            : 2009-07-01

This document describes an extension to the IKEv2 protocol that
allows an IKE SA to be created and authenticated without generating a
child SA.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-00.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.



Email secured by Check Point


_______________________________________________
IPsec mailing list
IPsec@ietf.org<mailto:IPsec@ietf.org><mailto:IPsec@ietf.org<mailto:IPsec@ie=
tf.org>>
https://www.ietf.org/mailman/listinfo/ipsec



Scanned by Check Point Total Security Gateway.

Email secured by Check Point



Scanned by Check Point Total Security Gateway.

=0D=0A
Email secured by Check Point=0D=0A

--_000_006FEB08D9C6444AB014105C9AEB133F433538CE31ilex01adcheck_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Inline with &lt;ynir&gt;<o:p></o:p></s=
pan></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <b><span
style=3D'font-weight:bold'>On Behalf Of </span></b>Raj Singh<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Sunday, July 05, 2009 =
5:02
AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Yoav Nir<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> ipsec@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] FW: I-D
Action:draft-nir-ipsecme-childless-00.txt</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>Hi Yoav,<br>
<br>
Please find my input inline &lt;Raj&gt;.<br>
<br>
With Regards,<br>
Raj<o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>On Sun, Jul 5, 2009 at 2:33 AM, Yoav Nir &lt;<a
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&gt; wrote:<o:p>=
</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Hi Raj<br>
<br>
The ordinary thing for a responder to do with unrecognized Notifies/VIDs is=
 to
ignore them. So the only responder that will behave as you suggest is one t=
hat
supports this extension, but is configured not to.<o:p></o:p></span></font>=
</p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&lt;Raj&gt; Yes, if responder understands childless IKE_AUTH from
initiator, it will behave as mentioned in my previous mail, if NOT and it d=
oes
not support childless IKE_AUTH [only responder not supporting childless
extention], then initiator will notice missing childless notify/VID and can
stop the transactions for the SA. But it will help responders, supporting t=
his
extentions and applying policies.<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;
margin-left:4.8pt;margin-right:0cm'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><br>
<br>
At least for the remote access client, it makes sense for a client that fac=
es
both supporting and non-supporting gateways to have a &quot;dummy&quot;
proposal for a useless child SA, for example ICMP from the client to the
gateway. It doesn't really matter if the proposal is accepted or rejected,
because the client does not need the traffic.<o:p></o:p></span></font></p>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;&lt;Raj&gt; What's the usecase ?<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&lt;ynir&gt; the usecase is that the
client needs an IKE SA, but can&#8217;t get it unless it negotiates a child=
 SA &#8211;
that&#8217;s what you have now before implementing our draft.<o:p></o:p></s=
pan></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;
margin-left:4.8pt;margin-right:0cm'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><br>
<br>
In any case, an initiator that insists on a childless IKE SA contacting a
gateway that does not support the extension is a misconfiguration. I don't
believe we should go to great lengths (especially the new critical payload =
that
Yaron is proposing) to save work in such a misconfiguration case.<o:p></o:p=
></span></font></p>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&lt;Raj&gt; How it can be a misconfiguration, The gateway can put s=
ome
policy to enable/disable childless IKE_AUTH based on &quot;load&quot; on
gateway. Yes, i agree, new crittical payload, we can avoid.<o:p></o:p></spa=
n></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&lt;ynir&gt; Well, we could add our ow=
n &#8220;critical&#8221;
bit to the notify/VID. If that is on, the responder can either reply with a
similar notification/VID, or else some error notify (NO_PROPOSAL_CHOSEN or =
a
new one of our own)<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;
margin-left:4.8pt;margin-right:0cm'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><br>
<br>
If we do think it's important, the &quot;right&quot; way is for the Initiat=
or
to send the VID, for the responder to only send the VID if it (a) supports =
the
extension *and* (b) has seen the VID from the initiator. We could even requ=
ire
that the initiator be prepared to continue with a non-supporting gateway, b=
ut
I'm not sure that's a good idea.<o:p></o:p></span></font></p>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&lt;Raj&gt; The whole idea is:<br>
initiator to send childless notify/VID when it want to bring up
&quot;ONLY&quot; IKE SA i.e. it is not hit by traffic or &quot;dummy&quot;
payload. This will avoid unnecessary processing of IKE_SA_INIT at responder
when responder does not support childless IKE_AUTH. This is most likely use=
case
of chiless IKE_AUTH in VPN scenarios.<br>
The behavior remains similar as mentioned in my previous mail except
&quot;critical&quot; bit as it needs to define new payload type which even =
i
want to avoid. Its just a simple notify/VID payload with no associated data=
 and
easing the work at initiator and responder. Its can see goodness in idea.<b=
r>
When initiator has dummy proposal&nbsp; ready, the initiator need not to se=
nd
childless notify/VID payload.<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;
margin-left:4.8pt;margin-right:0cm'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><br>
<br>
________________________________________<br>
From: Raj Singh [<a href=3D"mailto:rsjenwar@gmail.com">rsjenwar@gmail.com</=
a>]<o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Sent: Friday, July 03, 2009 16:51<br>
To: Yoav Nir<br>
Cc: <a href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</a><o:p></o:p></span><=
/font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.=
txt<o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
Hi Yoav,<br>
<br>
Mostly the Initiator will decide that it wants to bring UP only IKE SA with=
out
child SA.<br>
But currently there is no notify/VID from Initiator to Responder to indicat=
e
that initiator wants to bring only IKE SA. Even if responder does not suppo=
rts
&quot;childless IKE_AUTH&quot;, it will process IKE_SA_INIT, involding CPU
intensive D-H calculations, and send IKE_SA_INIT response without
&quot;childless VID&quot; payload.<br>
<br>
By introducing a notify/VID payload from Initiator that it wants to bring U=
P
only IKE SA without child SA wil ease the processing ar Responder side. If
responder does not support &quot;childless IKE_AUTH&quot;, it can send
INVALID_SYNTAX. Then, Initiator will wait for &quot;Child SA&quot; info to =
be
available to bring UP both IKE and child SA, normally as mentioned in RFC 4=
306.<br>
<br>
Thanks,<br>
Raj<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir &lt;<a
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&lt;mailto:<a
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&gt;&gt; wrote:<=
br>
Hi all.<br>
<br>
This is the fourth iteration of this draft. &nbsp;New in this iteration<br>
&nbsp;- Another co-author<br>
&nbsp;- Changed the name, so that this item is considered in the recharteri=
ng
discussion<br>
&nbsp;- Fixed some notation and some discussion based on comments from the =
list<br>
<br>
Yoav<br>
________________________________________<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>From: <a href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce=
-bounces@ietf.org</a>&lt;mailto:<a
href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf.org=
</a>&gt;
[<a href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf=
.org</a>&lt;mailto:<a
href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf.org=
</a>&gt;]
On Behalf Of <a href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ie=
tf.org</a>&lt;mailto:<a
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a>&gt; [=
<a
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a>&lt;ma=
ilto:<a
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a>&gt;]<=
o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Sent: Wednesday, July 01, 2009 12:15<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>To: <a href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org<=
/a>&lt;mailto:<a
href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a>&gt;<o:p></o=
:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Subject: I-D Action:draft-nir-ipsecme-childless-00.txt<br>
<br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
<br>
&nbsp; &nbsp; &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : A Childless
Initiation of the IKE SA<br>
&nbsp; &nbsp; &nbsp; Author(s) &nbsp; &nbsp; &nbsp; : Y. Nir, et al.<br>
&nbsp; &nbsp; &nbsp; Filename &nbsp; &nbsp; &nbsp; &nbsp;:
draft-nir-ipsecme-childless-00.txt<br>
&nbsp; &nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 7<br>
&nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 2009-0=
7-01<br>
<br>
This document describes an extension to the IKEv2 protocol that<br>
allows an IKE SA to be created and authenticated without generating a<br>
child SA.<br>
<br>
A URL for this Internet-Draft is:<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-=
00.txt"
target=3D"_blank">http://www.ietf.org/internet-drafts/draft-nir-ipsecme-chi=
ldless-00.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br>
<br>
<br>
Email secured by Check Point<br>
<br>
<br>
_______________________________________________<br>
IPsec mailing list<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><a href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a>&lt;mailto:<a
href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a>&gt;<o:p></o:p></span></fo=
nt></p>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><a
href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">http=
s://www.ietf.org/mailman/listinfo/ipsec</a><br>
<br>
<br>
<br>
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>Scanned by Check =
Point
Total Security Gateway.<br>
<br>
<o:p></o:p></span></font></p>

</div>

<div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Email secured by Check Point<o:p></o:p></span></font></p>

</div>

</div>

</blockquote>

</div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
<br>
Scanned by Check Point Total Security Gateway. <o:p></o:p></span></font></p=
>

</div>


<br>=
=0D=0A
<br>Email secured by Check Point=0D=0A
<br>
<br>=
</body>

</html>

--_000_006FEB08D9C6444AB014105C9AEB133F433538CE31ilex01adcheck_--

From raghup@cisco.com  Mon Jul  6 03:43:24 2009
Return-Path: <raghup@cisco.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7376128C2E2 for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 03:43:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ju8PpSiBVeQW for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 03:43:13 -0700 (PDT)
Received: from syd-iport-2.cisco.com (syd-iport-2.cisco.com [64.104.193.197]) by core3.amsl.com (Postfix) with ESMTP id 7037B28C309 for <ipsec@ietf.org>; Mon,  6 Jul 2009 03:43:12 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.42,355,1243814400"; d="scan'208,217";a="54882029"
Received: from hkg-dkim-1.cisco.com ([10.75.231.161]) by syd-iport-2.cisco.com with ESMTP; 06 Jul 2009 10:43:23 +0000
Received: from hkg-core-1.cisco.com (hkg-core-1.cisco.com [64.104.123.94]) by hkg-dkim-1.cisco.com (8.12.11/8.12.11) with ESMTP id n66AhKF9000431;  Mon, 6 Jul 2009 18:43:20 +0800
Received: from xbh-bgl-412.cisco.com (xbh-bgl-412.cisco.com [72.163.129.202]) by hkg-core-1.cisco.com (8.13.8/8.14.3) with ESMTP id n66AhF74017293; Mon, 6 Jul 2009 10:43:20 GMT
Received: from xmb-bgl-41e.cisco.com ([72.163.129.220]) by xbh-bgl-412.cisco.com with Microsoft SMTPSVC(6.0.3790.3959);  Mon, 6 Jul 2009 16:13:15 +0530
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9FE26.90E7C809"
Date: Mon, 6 Jul 2009 16:13:14 +0530
Message-ID: <581A2F3364E6E340B7F7F9629D223DCE6AC19C@XMB-BGL-41E.cisco.com>
In-Reply-To: <006FEB08D9C6444AB014105C9AEB133F433538CE31@il-ex01.ad.checkpoint.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
Thread-Index: Acn9FQbP1EeMUU5lQDSqyH7O4xwPyQA/LPewAAETu/A=
References: <20090701091501.2DAE328C101@core3.amsl.com><006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com><7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com><006FEB08D9C6444AB014105C9AEB133F433539DEC6@il-ex01.ad.checkpoint.com><7ccecf670907041901y5ab926e8q7892ebdbd9bc109d@mail.gmail.com> <006FEB08D9C6444AB014105C9AEB133F433538CE31@il-ex01.ad.checkpoint.com>
From: "Raghunandan P (raghup)" <raghup@cisco.com>
To: "Yoav Nir" <ynir@checkpoint.com>, "Raj Singh" <rsjenwar@gmail.com>
X-OriginalArrivalTime: 06 Jul 2009 10:43:15.0221 (UTC) FILETIME=[91081C50:01C9FE26]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=32071; t=1246877002; x=1247741002; c=relaxed/simple; s=hkgdkim1002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=raghup@cisco.com; z=From:=20=22Raghunandan=20P=20(raghup)=22=20<raghup@cisco.c om> |Subject:=20RE=3A=20[IPsec]=20FW=3A=20I-D=20Action=3Adraft- nir-ipsecme-childless-00.txt |Sender:=20; bh=denYKSXA0wYnZy6nwsP0B4C04+rRSQG0nMp+7qDyP4w=; b=IQMwxzOtvAxAXHQ54hZc0yEPiaOvuiJNM1+JhHDt98cgYhPk5oE0q3v1TJ JOQ3PRjkln82MR60asVcUsSdQj87Li6ntHPVY8odZy+MkrWzFHOcL3qs7RVu fd7kCkWKPidCb6Q48hgtsE9aaTN+SfayrGC+1tKVS/R7BII0Oa1kM=;
Authentication-Results: hkg-dkim-1; header.From=raghup@cisco.com; dkim=pass ( sig from cisco.com/hkgdkim1002 verified; ); 
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2009 10:43:24 -0000

This is a multi-part message in MIME format.

------_=_NextPart_001_01C9FE26.90E7C809
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Yoav/Raj,
=20
I think its a good idea for the initiator to announce its capabilities
about supporting just IKE SA without child SA. The responder will then
act accordingly.  Hence, this would make 4 scenarios:
[IKE_SA_ONLY] is the mode that will tell whether the device supports
bringing up IKE SA only or not.=20
=20
       Initiator                          Responder             Result
------------------------------------------------------------------------
---------------------------------
 a)  IKE_SA_ONLY              IKE_SA_ONLY                  Bring up the
IKE SA
=20
 b)  IKE_SA_ONLY            Does not support            Send a Notify
with INVALID_SYNTAX
                                           IKE_SA_ONLY
=20
c)  Does not support             IKE_SA_ONLY           IKE and child SA
would be brought UP
     IKE_SA_ONLY
=20
d) Does not support           Does not support          IKE and child SA
would be brought UP.
     IKE_SA_ONLY                  IKE_SA_ONLY
=20
My question is related to the scenario c) discussed above.
Is the result to bring up IKE and IPSec SA  or would the responder send
a Notify with INVALID_SYNTAX to the initiator since responder wants to
bring up IKE SA only and not the child SA.
=20
It might be good to add a Notify (IKE_SA_ONLY) than the VID.
=20
Regards
Raghu


________________________________

From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf
Of Yoav Nir
Sent: Monday, July 06, 2009 1:54 PM
To: 'Raj Singh'
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt



Inline with <ynir>

=20

________________________________

From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf
Of Raj Singh
Sent: Sunday, July 05, 2009 5:02 AM
To: Yoav Nir
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

=20

Hi Yoav,

Please find my input inline <Raj>.

With Regards,
Raj

On Sun, Jul 5, 2009 at 2:33 AM, Yoav Nir <ynir@checkpoint.com> wrote:

Hi Raj

The ordinary thing for a responder to do with unrecognized Notifies/VIDs
is to ignore them. So the only responder that will behave as you suggest
is one that supports this extension, but is configured not to.

<Raj> Yes, if responder understands childless IKE_AUTH from initiator,
it will behave as mentioned in my previous mail, if NOT and it does not
support childless IKE_AUTH [only responder not supporting childless
extention], then initiator will notice missing childless notify/VID and
can stop the transactions for the SA. But it will help responders,
supporting this extentions and applying policies.

=09
=09
	At least for the remote access client, it makes sense for a
client that faces both supporting and non-supporting gateways to have a
"dummy" proposal for a useless child SA, for example ICMP from the
client to the gateway. It doesn't really matter if the proposal is
accepted or rejected, because the client does not need the traffic.

 <Raj> What's the usecase ?

<ynir> the usecase is that the client needs an IKE SA, but can't get it
unless it negotiates a child SA - that's what you have now before
implementing our draft.

=09
=09
	In any case, an initiator that insists on a childless IKE SA
contacting a gateway that does not support the extension is a
misconfiguration. I don't believe we should go to great lengths
(especially the new critical payload that Yaron is proposing) to save
work in such a misconfiguration case.

<Raj> How it can be a misconfiguration, The gateway can put some policy
to enable/disable childless IKE_AUTH based on "load" on gateway. Yes, i
agree, new crittical payload, we can avoid.

<ynir> Well, we could add our own "critical" bit to the notify/VID. If
that is on, the responder can either reply with a similar
notification/VID, or else some error notify (NO_PROPOSAL_CHOSEN or a new
one of our own)

=20

=09
=09
	If we do think it's important, the "right" way is for the
Initiator to send the VID, for the responder to only send the VID if it
(a) supports the extension *and* (b) has seen the VID from the
initiator. We could even require that the initiator be prepared to
continue with a non-supporting gateway, but I'm not sure that's a good
idea.

<Raj> The whole idea is:
initiator to send childless notify/VID when it want to bring up "ONLY"
IKE SA i.e. it is not hit by traffic or "dummy" payload. This will avoid
unnecessary processing of IKE_SA_INIT at responder when responder does
not support childless IKE_AUTH. This is most likely usecase of chiless
IKE_AUTH in VPN scenarios.
The behavior remains similar as mentioned in my previous mail except
"critical" bit as it needs to define new payload type which even i want
to avoid. Its just a simple notify/VID payload with no associated data
and easing the work at initiator and responder. Its can see goodness in
idea.
When initiator has dummy proposal  ready, the initiator need not to send
childless notify/VID payload.

=09
=09
	________________________________________
	From: Raj Singh [rsjenwar@gmail.com]

	Sent: Friday, July 03, 2009 16:51
	To: Yoav Nir
	Cc: ipsec@ietf.org

	Subject: Re: [IPsec] FW: I-D
Action:draft-nir-ipsecme-childless-00.txt

=09
	Hi Yoav,
=09
	Mostly the Initiator will decide that it wants to bring UP only
IKE SA without child SA.
	But currently there is no notify/VID from Initiator to Responder
to indicate that initiator wants to bring only IKE SA. Even if responder
does not supports "childless IKE_AUTH", it will process IKE_SA_INIT,
involding CPU intensive D-H calculations, and send IKE_SA_INIT response
without "childless VID" payload.
=09
	By introducing a notify/VID payload from Initiator that it wants
to bring UP only IKE SA without child SA wil ease the processing ar
Responder side. If responder does not support "childless IKE_AUTH", it
can send INVALID_SYNTAX. Then, Initiator will wait for "Child SA" info
to be available to bring UP both IKE and child SA, normally as mentioned
in RFC 4306.
=09
	Thanks,
	Raj

	On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir
<ynir@checkpoint.com<mailto:ynir@checkpoint.com>> wrote:
	Hi all.
=09
	This is the fourth iteration of this draft.  New in this
iteration
	 - Another co-author
	 - Changed the name, so that this item is considered in the
rechartering discussion
	 - Fixed some notation and some discussion based on comments
from the list
=09
	Yoav
	________________________________________

	From:
i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org>
[i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org>] On
Behalf Of Internet-Drafts@ietf.org<mailto:Internet-Drafts@ietf.org>
[Internet-Drafts@ietf.org<mailto:Internet-Drafts@ietf.org>]

	Sent: Wednesday, July 01, 2009 12:15

	To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org>

	Subject: I-D Action:draft-nir-ipsecme-childless-00.txt
=09
	A New Internet-Draft is available from the on-line
Internet-Drafts directories.
=09
	      Title           : A Childless Initiation of the IKE SA
	      Author(s)       : Y. Nir, et al.
	      Filename        : draft-nir-ipsecme-childless-00.txt
	      Pages           : 7
	      Date            : 2009-07-01
=09
	This document describes an extension to the IKEv2 protocol that
	allows an IKE SA to be created and authenticated without
generating a
	child SA.
=09
	A URL for this Internet-Draft is:
=09
http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-00.txt
=09
	Internet-Drafts are also available by anonymous FTP at:
	ftp://ftp.ietf.org/internet-drafts/
=09
	Below is the data which will enable a MIME compliant mail reader
	implementation to automatically retrieve the ASCII version of
the
	Internet-Draft.
=09
=09
=09
	Email secured by Check Point
=09
=09
	_______________________________________________
	IPsec mailing list

	IPsec@ietf.org<mailto:IPsec@ietf.org>

	https://www.ietf.org/mailman/listinfo/ipsec
=09
=09
=09
=09

	Scanned by Check Point Total Security Gateway.
=09
=09

	Email secured by Check Point




Scanned by Check Point Total Security Gateway.=20



Email secured by Check Point=20



------_=_NextPart_001_01C9FE26.90E7C809
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D=20
"urn:schemas-microsoft-com:vml" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word"><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.2900.3562" name=3DGENERATOR><!--[if !mso]>
<STYLE>v\:* {
	BEHAVIOR: url(#default#VML)
}
o\:* {
	BEHAVIOR: url(#default#VML)
}
w\:* {
	BEHAVIOR: url(#default#VML)
}
.shape {
	BEHAVIOR: url(#default#VML)
}
</STYLE>
<![endif]-->
<STYLE>@font-face {
	font-family: Tahoma;
}
@page Section1 {size: 612.0pt 792.0pt; margin: 72.0pt 90.0pt 72.0pt =
90.0pt; }
P.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0cm 0cm 0pt; FONT-FAMILY: "Times New Roman"
}
LI.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0cm 0cm 0pt; FONT-FAMILY: "Times New Roman"
}
DIV.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0cm 0cm 0pt; FONT-FAMILY: "Times New Roman"
}
A:link {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlink {
	COLOR: blue; TEXT-DECORATION: underline
}
A:visited {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlinkFollowed {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.EmailStyle17 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal-reply
}
DIV.Section1 {
	page: Section1
}
</STYLE>
</HEAD>
<BODY lang=3DEN-US vLink=3Dblue link=3Dblue>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D089564408-06072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2>Hi Yoav/Raj,</FONT></SPAN></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D089564408-06072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D089564408-06072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2>I think its a good idea for the initiator =
to&nbsp;announce=20
its capabilities about supporting just IKE SA without child SA. The =
responder=20
will then act accordingly.&nbsp; Hence, this would make 4=20
scenarios:</FONT></SPAN></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D089564408-06072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2>[IKE_SA_ONLY] is the mode that will tell =
whether the device=20
supports bringing up IKE SA only or not. </FONT></SPAN></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D089564408-06072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial><FONT size=3D2><FONT =
color=3D#0000ff><SPAN=20
class=3D089564408-06072009>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;=20
Initiator&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;=20
Responder&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;=20
Result</SPAN></FONT></FONT></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial><FONT size=3D2><FONT =
color=3D#0000ff><SPAN=20
class=3D089564408-06072009>----------------------------------------------=
-----------------------------------------------------------</SPAN></FONT>=
</FONT></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial><FONT size=3D2><FONT =
color=3D#0000ff><SPAN=20
class=3D089564408-06072009>&nbsp;a)&nbsp;=20
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;=20
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Bring up the IKE=20
SA</SPAN></FONT></FONT></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial><FONT size=3D2><FONT =
color=3D#0000ff><SPAN=20
class=3D089564408-06072009></SPAN></FONT></FONT></FONT>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial><FONT size=3D2><FONT =
color=3D#0000ff><SPAN=20
class=3D089564408-06072009>&nbsp;b)&nbsp;=20
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;=20
Does not support&nbsp;&nbsp;&nbsp;&nbsp;=20
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Send a Notify with=20
INVALID_SYNTAX</SPAN></FONT></FONT></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial><FONT size=3D2><FONT =
color=3D#0000ff><SPAN=20
class=3D089564408-06072009>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
IKE_SA_ONLY</SPAN></FONT></FONT></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial><FONT size=3D2><FONT =
color=3D#0000ff><SPAN=20
class=3D089564408-06072009></SPAN></FONT></FONT></FONT>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial><FONT size=3D2><FONT =
color=3D#0000ff><SPAN=20
class=3D089564408-06072009>c)&nbsp; Does not=20
support&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;=20
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
IKE and=20
child SA would be brought UP</SPAN></FONT></FONT></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial><FONT size=3D2><FONT =
color=3D#0000ff><SPAN=20
class=3D089564408-06072009>&nbsp;&nbsp;&nbsp;&nbsp;=20
IKE_SA_ONLY</SPAN></FONT></FONT></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial><FONT size=3D2><FONT =
color=3D#0000ff><SPAN=20
class=3D089564408-06072009></SPAN></FONT></FONT></FONT>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial><FONT size=3D2><FONT =
color=3D#0000ff><SPAN=20
class=3D089564408-06072009>d) Does not=20
support&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Does =
not=20
support&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;IKE and =
child SA=20
would be brought UP.</SPAN></FONT></FONT></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial><FONT size=3D2><FONT =
color=3D#0000ff><SPAN=20
class=3D089564408-06072009>&nbsp;&nbsp;&nbsp;&nbsp;=20
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
IKE_SA_ONLY</SPAN></FONT></FONT></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D089564408-06072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D089564408-06072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2>My question is related to the scenario c) =
discussed=20
above.</FONT></SPAN></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D089564408-06072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2>Is the result to bring up IKE and IPSec =
SA&nbsp;&nbsp;or=20
would the responder send a Notify with INVALID_SYNTAX to the initiator =
since=20
responder wants to bring up IKE SA only and not the child=20
SA.</FONT></SPAN></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D089564408-06072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D089564408-06072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2>It might be good to add a Notify (IKE_SA_ONLY) =
than the=20
VID.</FONT></SPAN></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D089564408-06072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D089564408-06072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2>Regards</FONT></SPAN></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D089564408-06072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2>Raghu</FONT></SPAN></DIV><FONT face=3DArial =
color=3D#0000ff=20
size=3D2></FONT><FONT face=3DArial color=3D#0000ff size=3D2></FONT><BR>
<DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr align=3Dleft>
<HR tabIndex=3D-1>
<FONT face=3DTahoma size=3D2><B>From:</B> ipsec-bounces@ietf.org=20
[mailto:ipsec-bounces@ietf.org] <B>On Behalf Of </B>Yoav =
Nir<BR><B>Sent:</B>=20
Monday, July 06, 2009 1:54 PM<BR><B>To:</B> 'Raj Singh'<BR><B>Cc:</B>=20
ipsec@ietf.org<BR><B>Subject:</B> Re: [IPsec] FW: I-D=20
Action:draft-nir-ipsecme-childless-00.txt<BR></FONT><BR></DIV>
<DIV></DIV>
<DIV class=3DSection1>
<P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Inline with=20
&lt;ynir&gt;<o:p></o:p></SPAN></FONT></P>
<P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
<DIV>
<DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" align=3Dcenter><FONT =

face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt">
<HR tabIndex=3D-1 align=3Dcenter width=3D"100%" SIZE=3D2>
</SPAN></FONT></DIV>
<P class=3DMsoNormal><B><FONT face=3DTahoma size=3D2><SPAN=20
style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: =
Tahoma">From:</SPAN></FONT></B><FONT=20
face=3DTahoma size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Tahoma">=20
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <B><SPAN=20
style=3D"FONT-WEIGHT: bold">On Behalf Of </SPAN></B>Raj =
Singh<BR><B><SPAN=20
style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Sunday, July 05, 2009 5:02=20
AM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> Yoav =
Nir<BR><B><SPAN=20
style=3D"FONT-WEIGHT: bold">Cc:</SPAN></B> ipsec@ietf.org<BR><B><SPAN=20
style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [IPsec] FW: I-D=20
Action:draft-nir-ipsecme-childless-00.txt</SPAN></FONT><o:p></o:p></P></D=
IV>
<P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
<P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><FONT face=3D"Times =
New Roman"=20
size=3D3><SPAN style=3D"FONT-SIZE: 12pt">Hi Yoav,<BR><BR>Please find my =
input inline=20
&lt;Raj&gt;.<BR><BR>With Regards,<BR>Raj<o:p></o:p></SPAN></FONT></P>
<DIV>
<P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
style=3D"FONT-SIZE: 12pt">On Sun, Jul 5, 2009 at 2:33 AM, Yoav Nir =
&lt;<A=20
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</A>&gt;=20
wrote:<o:p></o:p></SPAN></FONT></P>
<P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
style=3D"FONT-SIZE: 12pt">Hi Raj<BR><BR>The ordinary thing for a =
responder to do=20
with unrecognized Notifies/VIDs is to ignore them. So the only responder =
that=20
will behave as you suggest is one that supports this extension, but is=20
configured not to.<o:p></o:p></SPAN></FONT></P>
<DIV>
<P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
style=3D"FONT-SIZE: 12pt">&lt;Raj&gt; Yes, if responder understands =
childless=20
IKE_AUTH from initiator, it will behave as mentioned in my previous =
mail, if NOT=20
and it does not support childless IKE_AUTH [only responder not =
supporting=20
childless extention], then initiator will notice missing childless =
notify/VID=20
and can stop the transactions for the SA. But it will help responders,=20
supporting this extentions and applying=20
policies.<o:p></o:p></SPAN></FONT></P></DIV>
<BLOCKQUOTE=20
style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0cm; BORDER-TOP: =
medium none; PADDING-LEFT: 6pt; PADDING-BOTTOM: 0cm; MARGIN-LEFT: 4.8pt; =
BORDER-LEFT: #cccccc 1pt solid; MARGIN-RIGHT: 0cm; PADDING-TOP: 0cm; =
BORDER-BOTTOM: medium none">
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><BR><BR>At least for the remote access =
client, it=20
  makes sense for a client that faces both supporting and non-supporting =

  gateways to have a "dummy" proposal for a useless child SA, for =
example ICMP=20
  from the client to the gateway. It doesn't really matter if the =
proposal is=20
  accepted or rejected, because the client does not need the=20
  traffic.<o:p></o:p></SPAN></FONT></P></BLOCKQUOTE>
<DIV>
<P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
style=3D"FONT-SIZE: 12pt">&nbsp;&lt;Raj&gt; What's the usecase=20
?<o:p></o:p></SPAN></FONT></P>
<P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">&lt;ynir&gt; =
the=20
usecase is that the client needs an IKE SA, but can&#8217;t get it =
unless it=20
negotiates a child SA &#8211; that&#8217;s what you have now before =
implementing our=20
draft.<o:p></o:p></SPAN></FONT></P></DIV>
<BLOCKQUOTE=20
style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0cm; BORDER-TOP: =
medium none; PADDING-LEFT: 6pt; PADDING-BOTTOM: 0cm; MARGIN-LEFT: 4.8pt; =
BORDER-LEFT: #cccccc 1pt solid; MARGIN-RIGHT: 0cm; PADDING-TOP: 0cm; =
BORDER-BOTTOM: medium none">
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><BR><BR>In any case, an initiator that =
insists on a=20
  childless IKE SA contacting a gateway that does not support the =
extension is a=20
  misconfiguration. I don't believe we should go to great lengths =
(especially=20
  the new critical payload that Yaron is proposing) to save work in such =
a=20
  misconfiguration case.<o:p></o:p></SPAN></FONT></P></BLOCKQUOTE>
<DIV>
<P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
style=3D"FONT-SIZE: 12pt">&lt;Raj&gt; How it can be a misconfiguration, =
The=20
gateway can put some policy to enable/disable childless IKE_AUTH based =
on "load"=20
on gateway. Yes, i agree, new crittical payload, we can=20
avoid.<o:p></o:p></SPAN></FONT></P>
<P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">&lt;ynir&gt; =
Well, we=20
could add our own &#8220;critical&#8221; bit to the notify/VID. If that =
is on, the responder=20
can either reply with a similar notification/VID, or else some error =
notify=20
(NO_PROPOSAL_CHOSEN or a new one of our =
own)<o:p></o:p></SPAN></FONT></P>
<P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P></DIV>
<BLOCKQUOTE=20
style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0cm; BORDER-TOP: =
medium none; PADDING-LEFT: 6pt; PADDING-BOTTOM: 0cm; MARGIN-LEFT: 4.8pt; =
BORDER-LEFT: #cccccc 1pt solid; MARGIN-RIGHT: 0cm; PADDING-TOP: 0cm; =
BORDER-BOTTOM: medium none">
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><BR><BR>If we do think it's important, the =
"right" way=20
  is for the Initiator to send the VID, for the responder to only send =
the VID=20
  if it (a) supports the extension *and* (b) has seen the VID from the=20
  initiator. We could even require that the initiator be prepared to =
continue=20
  with a non-supporting gateway, but I'm not sure that's a good=20
  idea.<o:p></o:p></SPAN></FONT></P></BLOCKQUOTE>
<DIV>
<P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
style=3D"FONT-SIZE: 12pt">&lt;Raj&gt; The whole idea is:<BR>initiator to =
send=20
childless notify/VID when it want to bring up "ONLY" IKE SA i.e. it is =
not hit=20
by traffic or "dummy" payload. This will avoid unnecessary processing of =

IKE_SA_INIT at responder when responder does not support childless =
IKE_AUTH.=20
This is most likely usecase of chiless IKE_AUTH in VPN scenarios.<BR>The =

behavior remains similar as mentioned in my previous mail except =
"critical" bit=20
as it needs to define new payload type which even i want to avoid. Its =
just a=20
simple notify/VID payload with no associated data and easing the work at =

initiator and responder. Its can see goodness in idea.<BR>When initiator =
has=20
dummy proposal&nbsp; ready, the initiator need not to send childless =
notify/VID=20
payload.<o:p></o:p></SPAN></FONT></P></DIV>
<BLOCKQUOTE=20
style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0cm; BORDER-TOP: =
medium none; PADDING-LEFT: 6pt; PADDING-BOTTOM: 0cm; MARGIN-LEFT: 4.8pt; =
BORDER-LEFT: #cccccc 1pt solid; MARGIN-RIGHT: 0cm; PADDING-TOP: 0cm; =
BORDER-BOTTOM: medium none">
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: =
12pt"><BR><BR>________________________________________<BR>From:=20
  Raj Singh [<A=20
  =
href=3D"mailto:rsjenwar@gmail.com">rsjenwar@gmail.com</A>]<o:p></o:p></SP=
AN></FONT></P>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">Sent: Friday, July 03, 2009 16:51<BR>To: =
Yoav=20
  Nir<BR>Cc: <A=20
  =
href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A><o:p></o:p></SPAN></FONT=
></P></DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">Subject: Re: [IPsec] FW: I-D=20
  Action:draft-nir-ipsecme-childless-00.txt<o:p></o:p></SPAN></FONT></P>
  <DIV>
  <P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><FONT face=3D"Times =
New Roman"=20
  size=3D3><SPAN style=3D"FONT-SIZE: 12pt"><BR>Hi Yoav,<BR><BR>Mostly =
the Initiator=20
  will decide that it wants to bring UP only IKE SA without child =
SA.<BR>But=20
  currently there is no notify/VID from Initiator to Responder to =
indicate that=20
  initiator wants to bring only IKE SA. Even if responder does not =
supports=20
  "childless IKE_AUTH", it will process IKE_SA_INIT, involding CPU =
intensive D-H=20
  calculations, and send IKE_SA_INIT response without "childless VID"=20
  payload.<BR><BR>By introducing a notify/VID payload from Initiator =
that it=20
  wants to bring UP only IKE SA without child SA wil ease the processing =
ar=20
  Responder side. If responder does not support "childless IKE_AUTH", it =
can=20
  send INVALID_SYNTAX. Then, Initiator will wait for "Child SA" info to =
be=20
  available to bring UP both IKE and child SA, normally as mentioned in =
RFC=20
  4306.<BR><BR>Thanks,<BR>Raj<o:p></o:p></SPAN></FONT></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir =
&lt;<A=20
  =
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</A>&lt;mailto:<A =

  href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</A>&gt;&gt; =
wrote:<BR>Hi=20
  all.<BR><BR>This is the fourth iteration of this draft. &nbsp;New in =
this=20
  iteration<BR>&nbsp;- Another co-author<BR>&nbsp;- Changed the name, so =
that=20
  this item is considered in the rechartering discussion<BR>&nbsp;- =
Fixed some=20
  notation and some discussion based on comments from the=20
  =
list<BR><BR>Yoav<BR>________________________________________<o:p></o:p></=
SPAN></FONT></P></DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">From: <A=20
  =
href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf.o=
rg</A>&lt;mailto:<A=20
  =
href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf.o=
rg</A>&gt;=20
  [<A=20
  =
href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf.o=
rg</A>&lt;mailto:<A=20
  =
href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf.o=
rg</A>&gt;]=20
  On Behalf Of <A=20
  =
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</A>&lt;=
mailto:<A=20
  =
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</A>&gt;=
 [<A=20
  =
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</A>&lt;=
mailto:<A=20
  =
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</A>&gt;=
]<o:p></o:p></SPAN></FONT></P>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">Sent: Wednesday, July 01, 2009=20
  12:15<o:p></o:p></SPAN></FONT></P></DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">To: <A=20
  =
href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</A>&lt;mailto=
:<A=20
  =
href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</A>&gt;<o:p><=
/o:p></SPAN></FONT></P>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">Subject: I-D=20
  Action:draft-nir-ipsecme-childless-00.txt<BR><BR>A New Internet-Draft =
is=20
  available from the on-line Internet-Drafts directories.<BR><BR>&nbsp; =
&nbsp;=20
  &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : A Childless =
Initiation of=20
  the IKE SA<BR>&nbsp; &nbsp; &nbsp; Author(s) &nbsp; &nbsp; &nbsp; : Y. =
Nir, et=20
  al.<BR>&nbsp; &nbsp; &nbsp; Filename &nbsp; &nbsp; &nbsp; &nbsp;:=20
  draft-nir-ipsecme-childless-00.txt<BR>&nbsp; &nbsp; &nbsp; Pages =
&nbsp; &nbsp;=20
  &nbsp; &nbsp; &nbsp; : 7<BR>&nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; =
&nbsp;=20
  &nbsp; &nbsp; &nbsp;: 2009-07-01<BR><BR>This document describes an =
extension=20
  to the IKEv2 protocol that<BR>allows an IKE SA to be created and =
authenticated=20
  without generating a<BR>child SA.<BR><BR>A URL for this Internet-Draft =

  is:<BR><A=20
  =
href=3D"http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-0=
0.txt"=20
  =
target=3D_blank>http://www.ietf.org/internet-drafts/draft-nir-ipsecme-chi=
ldless-00.txt</A><BR><BR>Internet-Drafts=20
  are also available by anonymous FTP at:<BR><A=20
  href=3D"ftp://ftp.ietf.org/internet-drafts/"=20
  target=3D_blank>ftp://ftp.ietf.org/internet-drafts/</A><BR><BR>Below =
is the data=20
  which will enable a MIME compliant mail reader<BR>implementation to=20
  automatically retrieve the ASCII version of=20
  the<BR>Internet-Draft.<BR><BR><BR><BR>Email secured by Check=20
  =
Point<BR><BR><BR>_______________________________________________<BR>IPsec=
=20
  mailing list<o:p></o:p></SPAN></FONT></P></DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><A=20
  href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</A>&lt;mailto:<A=20
  =
href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</A>&gt;<o:p></o:p></SPAN></=
FONT></P>
  <DIV>
  <P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><FONT face=3D"Times =
New Roman"=20
  size=3D3><SPAN style=3D"FONT-SIZE: 12pt"><A=20
  href=3D"https://www.ietf.org/mailman/listinfo/ipsec"=20
  =
target=3D_blank>https://www.ietf.org/mailman/listinfo/ipsec</A><BR><BR><B=
R><BR><o:p></o:p></SPAN></FONT></P></DIV>
  <DIV>
  <P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><FONT face=3D"Times =
New Roman"=20
  size=3D3><SPAN style=3D"FONT-SIZE: 12pt">Scanned by Check Point Total =
Security=20
  Gateway.<BR><BR><o:p></o:p></SPAN></FONT></P></DIV>
  <DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">Email secured by Check=20
  Point<o:p></o:p></SPAN></FONT></P></DIV></DIV></BLOCKQUOTE></DIV>
<P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><FONT face=3D"Times =
New Roman"=20
size=3D3><SPAN style=3D"FONT-SIZE: 12pt"><BR><BR><BR>Scanned by Check =
Point Total=20
Security Gateway. <o:p></o:p></SPAN></FONT></P></DIV><BR><BR>Email =
secured by=20
Check Point <BR><BR></BODY></HTML>

------_=_NextPart_001_01C9FE26.90E7C809--

From ynir@checkpoint.com  Mon Jul  6 06:16:35 2009
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 401D228C261 for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 06:16:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id INdgUB0+fo7c for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 06:16:24 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id E683E28C255 for <ipsec@ietf.org>; Mon,  6 Jul 2009 06:16:22 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 475DF200E09; Mon,  6 Jul 2009 16:14:50 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id CB782200681; Mon,  6 Jul 2009 16:14:49 +0300 (IDT)
X-CheckPoint: {4A51F57D-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n66DEa3d001088; Mon, 6 Jul 2009 16:14:37 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Mon, 6 Jul 2009 16:14:36 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: "'Raghunandan P (raghup)'" <raghup@cisco.com>, Raj Singh <rsjenwar@gmail.com>
Date: Mon, 6 Jul 2009 16:14:35 +0300
Thread-Topic: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
Thread-Index: Acn9FQbP1EeMUU5lQDSqyH7O4xwPyQA/LPewAAETu/AACQkZsA==
Message-ID: <006FEB08D9C6444AB014105C9AEB133F433538CE39@il-ex01.ad.checkpoint.com>
References: <20090701091501.2DAE328C101@core3.amsl.com><006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com><7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com><006FEB08D9C6444AB014105C9AEB133F433539DEC6@il-ex01.ad.checkpoint.com><7ccecf670907041901y5ab926e8q7892ebdbd9bc109d@mail.gmail.com> <006FEB08D9C6444AB014105C9AEB133F433538CE31@il-ex01.ad.checkpoint.com> <581A2F3364E6E340B7F7F9629D223DCE6AC19C@XMB-BGL-41E.cisco.com>
In-Reply-To: <581A2F3364E6E340B7F7F9629D223DCE6AC19C@XMB-BGL-41E.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_006FEB08D9C6444AB014105C9AEB133F433538CE39ilex01adcheck_"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2009 13:16:35 -0000

--_000_006FEB08D9C6444AB014105C9AEB133F433538CE39ilex01adcheck_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Raghu

I think in scenario (c) the initiator will propose a full child SA proposal=
, and the responder will accept the IKE SA and reply with a NO_PROPOSAL_CHO=
SEN for the child SA.



________________________________
From: Raghunandan P (raghup) [mailto:raghup@cisco.com]
Sent: Monday, July 06, 2009 1:43 PM
To: Yoav Nir; Raj Singh
Cc: ipsec@ietf.org
Subject: RE: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hi Yoav/Raj,

I think its a good idea for the initiator to announce its capabilities abou=
t supporting just IKE SA without child SA. The responder will then act acco=
rdingly.  Hence, this would make 4 scenarios:
[IKE_SA_ONLY] is the mode that will tell whether the device supports bringi=
ng up IKE SA only or not.

       Initiator                          Responder             Result
---------------------------------------------------------------------------=
------------------------------
 a)  IKE_SA_ONLY              IKE_SA_ONLY                  Bring up the IKE=
 SA

 b)  IKE_SA_ONLY            Does not support            Send a Notify with =
INVALID_SYNTAX
                                           IKE_SA_ONLY

c)  Does not support             IKE_SA_ONLY           IKE and child SA wou=
ld be brought UP
     IKE_SA_ONLY

d) Does not support           Does not support          IKE and child SA wo=
uld be brought UP.
     IKE_SA_ONLY                  IKE_SA_ONLY

My question is related to the scenario c) discussed above.
Is the result to bring up IKE and IPSec SA  or would the responder send a N=
otify with INVALID_SYNTAX to the initiator since responder wants to bring u=
p IKE SA only and not the child SA.

It might be good to add a Notify (IKE_SA_ONLY) than the VID.

Regards
Raghu

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Y=
oav Nir
Sent: Monday, July 06, 2009 1:54 PM
To: 'Raj Singh'
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
Inline with <ynir>

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of R=
aj Singh
Sent: Sunday, July 05, 2009 5:02 AM
To: Yoav Nir
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hi Yoav,

Please find my input inline <Raj>.

With Regards,
Raj
On Sun, Jul 5, 2009 at 2:33 AM, Yoav Nir <ynir@checkpoint.com<mailto:ynir@c=
heckpoint.com>> wrote:
Hi Raj

The ordinary thing for a responder to do with unrecognized Notifies/VIDs is=
 to ignore them. So the only responder that will behave as you suggest is o=
ne that supports this extension, but is configured not to.
<Raj> Yes, if responder understands childless IKE_AUTH from initiator, it w=
ill behave as mentioned in my previous mail, if NOT and it does not support=
 childless IKE_AUTH [only responder not supporting childless extention], th=
en initiator will notice missing childless notify/VID and can stop the tran=
sactions for the SA. But it will help responders, supporting this extention=
s and applying policies.


At least for the remote access client, it makes sense for a client that fac=
es both supporting and non-supporting gateways to have a "dummy" proposal f=
or a useless child SA, for example ICMP from the client to the gateway. It =
doesn't really matter if the proposal is accepted or rejected, because the =
client does not need the traffic.
 <Raj> What's the usecase ?
<ynir> the usecase is that the client needs an IKE SA, but can't get it unl=
ess it negotiates a child SA - that's what you have now before implementing=
 our draft.


In any case, an initiator that insists on a childless IKE SA contacting a g=
ateway that does not support the extension is a misconfiguration. I don't b=
elieve we should go to great lengths (especially the new critical payload t=
hat Yaron is proposing) to save work in such a misconfiguration case.
<Raj> How it can be a misconfiguration, The gateway can put some policy to =
enable/disable childless IKE_AUTH based on "load" on gateway. Yes, i agree,=
 new crittical payload, we can avoid.
<ynir> Well, we could add our own "critical" bit to the notify/VID. If that=
 is on, the responder can either reply with a similar notification/VID, or =
else some error notify (NO_PROPOSAL_CHOSEN or a new one of our own)



If we do think it's important, the "right" way is for the Initiator to send=
 the VID, for the responder to only send the VID if it (a) supports the ext=
ension *and* (b) has seen the VID from the initiator. We could even require=
 that the initiator be prepared to continue with a non-supporting gateway, =
but I'm not sure that's a good idea.
<Raj> The whole idea is:
initiator to send childless notify/VID when it want to bring up "ONLY" IKE =
SA i.e. it is not hit by traffic or "dummy" payload. This will avoid unnece=
ssary processing of IKE_SA_INIT at responder when responder does not suppor=
t childless IKE_AUTH. This is most likely usecase of chiless IKE_AUTH in VP=
N scenarios.
The behavior remains similar as mentioned in my previous mail except "criti=
cal" bit as it needs to define new payload type which even i want to avoid.=
 Its just a simple notify/VID payload with no associated data and easing th=
e work at initiator and responder. Its can see goodness in idea.
When initiator has dummy proposal  ready, the initiator need not to send ch=
ildless notify/VID payload.


________________________________________
From: Raj Singh [rsjenwar@gmail.com<mailto:rsjenwar@gmail.com>]
Sent: Friday, July 03, 2009 16:51
To: Yoav Nir
Cc: ipsec@ietf.org<mailto:ipsec@ietf.org>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hi Yoav,

Mostly the Initiator will decide that it wants to bring UP only IKE SA with=
out child SA.
But currently there is no notify/VID from Initiator to Responder to indicat=
e that initiator wants to bring only IKE SA. Even if responder does not sup=
ports "childless IKE_AUTH", it will process IKE_SA_INIT, involding CPU inte=
nsive D-H calculations, and send IKE_SA_INIT response without "childless VI=
D" payload.

By introducing a notify/VID payload from Initiator that it wants to bring U=
P only IKE SA without child SA wil ease the processing ar Responder side. I=
f responder does not support "childless IKE_AUTH", it can send INVALID_SYNT=
AX. Then, Initiator will wait for "Child SA" info to be available to bring =
UP both IKE and child SA, normally as mentioned in RFC 4306.

Thanks,
Raj
On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir <ynir@checkpoint.com<mailto:ynir@c=
heckpoint.com><mailto:ynir@checkpoint.com<mailto:ynir@checkpoint.com>>> wro=
te:
Hi all.

This is the fourth iteration of this draft.  New in this iteration
 - Another co-author
 - Changed the name, so that this item is considered in the rechartering di=
scussion
 - Fixed some notation and some discussion based on comments from the list

Yoav
________________________________________
From: i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org><m=
ailto:i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org>> =
[i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org><mailto=
:i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org>>] On B=
ehalf Of Internet-Drafts@ietf.org<mailto:Internet-Drafts@ietf.org><mailto:I=
nternet-Drafts@ietf.org<mailto:Internet-Drafts@ietf.org>> [Internet-Drafts@=
ietf.org<mailto:Internet-Drafts@ietf.org><mailto:Internet-Drafts@ietf.org<m=
ailto:Internet-Drafts@ietf.org>>]
Sent: Wednesday, July 01, 2009 12:15
To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org><mailto:i-d-announce=
@ietf.org<mailto:i-d-announce@ietf.org>>
Subject: I-D Action:draft-nir-ipsecme-childless-00.txt

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.

      Title           : A Childless Initiation of the IKE SA
      Author(s)       : Y. Nir, et al.
      Filename        : draft-nir-ipsecme-childless-00.txt
      Pages           : 7
      Date            : 2009-07-01

This document describes an extension to the IKEv2 protocol that
allows an IKE SA to be created and authenticated without generating a
child SA.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-00.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.



Email secured by Check Point


_______________________________________________
IPsec mailing list
IPsec@ietf.org<mailto:IPsec@ietf.org><mailto:IPsec@ietf.org<mailto:IPsec@ie=
tf.org>>
https://www.ietf.org/mailman/listinfo/ipsec


Scanned by Check Point Total Security Gateway.
Email secured by Check Point



Scanned by Check Point Total Security Gateway.


Email secured by Check Point

=0D=0A
Email secured by Check Point=0D=0A

--_000_006FEB08D9C6444AB014105C9AEB133F433538CE39ilex01adcheck_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:Arial;
	color:navy;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
 /* List Definitions */
 @list l0
	{mso-list-id:338627165;
	mso-list-type:hybrid;
	mso-list-template-ids:1800435694 67698689 67698691 67698693 67698689 67698=
691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l1
	{mso-list-id:1132865659;
	mso-list-type:hybrid;
	mso-list-template-ids:1851059982 67698689 67698691 67698693 67698689 67698=
691 67698693 67698689 67698691 67698693;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Hi Raghu<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I think in scenario (c) the initiator =
will
propose a full child SA proposal, and the responder will accept the IKE SA =
and
reply with a NO_PROPOSAL_CHOSEN for the child SA.</span></font><font size=
=3D2
color=3Dnavy face=3D"Courier New"><span style=3D'font-size:10.0pt;font-fami=
ly:"Courier New";
color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Courier New"><span
style=3D'font-size:10.0pt;font-family:"Courier New";color:navy'><o:p>&nbsp;=
</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Courier New"><span
style=3D'font-size:10.0pt;font-family:"Courier New";color:navy'><o:p>&nbsp;=
</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> Raghunan=
dan P
(raghup) [mailto:raghup@cisco.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Monday, July 06, 2009 =
1:43
PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Yoav Nir; Raj Singh<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> ipsec@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> RE: [IPsec] FW: I-D
Action:draft-nir-ipsecme-childless-00.txt</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Hi Yoav/Raj,</span></font><o:p></o:p><=
/p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>I think its a good idea for the initia=
tor
to&nbsp;announce its capabilities about supporting just IKE SA without chil=
d
SA. The responder will then act accordingly.&nbsp; Hence, this would make 4
scenarios:</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>[IKE_SA_ONLY] is the mode that will te=
ll
whether the device supports bringing up IKE SA only or not. </span></font><=
o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;
Initiator&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;
Responder&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;
Result</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>--------------------------------------=
-------------------------------------------------------------------</span><=
/font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>&nbsp;a)&nbsp;
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Bring up the IKE SA</span></font><o:p>=
</o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>&nbsp;b)&nbsp;
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;
Does not support&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;Send
a Notify with INVALID_SYNTAX</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
IKE_SA_ONLY</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>c)&nbsp; Does not
support&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IKE=
 and
child SA would be brought UP</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>&nbsp;&nbsp;&nbsp;&nbsp; IKE_SA_ONLY</=
span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>d) Does not
support&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Does no=
t
support&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;IKE and child=
 SA
would be brought UP.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>&nbsp;&nbsp;&nbsp;&nbsp;
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
IKE_SA_ONLY</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>My question is related to the scenario=
 c)
discussed above.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Is the result to bring up IKE and IPSe=
c
SA&nbsp;&nbsp;or would the responder send a Notify with INVALID_SYNTAX to t=
he
initiator since responder wants to bring up IKE SA only and not the child S=
A.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>It might be good to add a Notify
(IKE_SA_ONLY) than the VID.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Regards</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Raghu</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><b><font size=3D2 face=
=3DTahoma><span
style=3D'font-size:10.0pt;font-family:Tahoma;font-weight:bold'>From:</span>=
</font></b><font
size=3D2 face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <b><span
style=3D'font-weight:bold'>On Behalf Of </span></b>Yoav Nir<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Monday, July 06, 2009 =
1:54
PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> 'Raj Singh'<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> ipsec@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] FW: I-D
Action:draft-nir-ipsecme-childless-00.txt</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Inline with &lt;ynir&gt;<o:p></o:p></s=
pan></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <b><span
style=3D'font-weight:bold'>On Behalf Of </span></b>Raj Singh<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Sunday, July 05, 2009 =
5:02
AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Yoav Nir<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> ipsec@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] FW: I-D
Action:draft-nir-ipsecme-childless-00.txt</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>Hi Yoav,<br>
<br>
Please find my input inline &lt;Raj&gt;.<br>
<br>
With Regards,<br>
Raj<o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>On Sun, Jul 5, 2009 at 2:33 AM, Yoav Nir &lt;<a
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&gt; wrote:<o:p>=
</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Hi Raj<br>
<br>
The ordinary thing for a responder to do with unrecognized Notifies/VIDs is=
 to
ignore them. So the only responder that will behave as you suggest is one t=
hat
supports this extension, but is configured not to.<o:p></o:p></span></font>=
</p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&lt;Raj&gt; Yes, if responder understands childless IKE_AUTH from
initiator, it will behave as mentioned in my previous mail, if NOT and it d=
oes
not support childless IKE_AUTH [only responder not supporting childless
extention], then initiator will notice missing childless notify/VID and can
stop the transactions for the SA. But it will help responders, supporting t=
his
extentions and applying policies.<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><br>
<br>
At least for the remote access client, it makes sense for a client that fac=
es both
supporting and non-supporting gateways to have a &quot;dummy&quot; proposal=
 for
a useless child SA, for example ICMP from the client to the gateway. It doe=
sn't
really matter if the proposal is accepted or rejected, because the client d=
oes
not need the traffic.<o:p></o:p></span></font></p>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;&lt;Raj&gt; What's the usecase ?<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&lt;ynir&gt; the usecase is that the
client needs an IKE SA, but can&#8217;t get it unless it negotiates a child=
 SA
&#8211; that&#8217;s what you have now before implementing our draft.<o:p><=
/o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><br>
<br>
In any case, an initiator that insists on a childless IKE SA contacting a
gateway that does not support the extension is a misconfiguration. I don't
believe we should go to great lengths (especially the new critical payload =
that
Yaron is proposing) to save work in such a misconfiguration case.<o:p></o:p=
></span></font></p>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&lt;Raj&gt; How it can be a misconfiguration, The gateway can put s=
ome
policy to enable/disable childless IKE_AUTH based on &quot;load&quot; on
gateway. Yes, i agree, new crittical payload, we can avoid.<o:p></o:p></spa=
n></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&lt;ynir&gt; Well, we could add our ow=
n
&#8220;critical&#8221; bit to the notify/VID. If that is on, the responder =
can
either reply with a similar notification/VID, or else some error notify
(NO_PROPOSAL_CHOSEN or a new one of our own)<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><br>
<br>
If we do think it's important, the &quot;right&quot; way is for the Initiat=
or
to send the VID, for the responder to only send the VID if it (a) supports =
the
extension *and* (b) has seen the VID from the initiator. We could even requ=
ire
that the initiator be prepared to continue with a non-supporting gateway, b=
ut
I'm not sure that's a good idea.<o:p></o:p></span></font></p>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&lt;Raj&gt; The whole idea is:<br>
initiator to send childless notify/VID when it want to bring up
&quot;ONLY&quot; IKE SA i.e. it is not hit by traffic or &quot;dummy&quot;
payload. This will avoid unnecessary processing of IKE_SA_INIT at responder
when responder does not support childless IKE_AUTH. This is most likely use=
case
of chiless IKE_AUTH in VPN scenarios.<br>
The behavior remains similar as mentioned in my previous mail except
&quot;critical&quot; bit as it needs to define new payload type which even =
i
want to avoid. Its just a simple notify/VID payload with no associated data=
 and
easing the work at initiator and responder. Its can see goodness in idea.<b=
r>
When initiator has dummy proposal&nbsp; ready, the initiator need not to se=
nd
childless notify/VID payload.<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><br>
<br>
________________________________________<br>
From: Raj Singh [<a href=3D"mailto:rsjenwar@gmail.com">rsjenwar@gmail.com</=
a>]<o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Sent: Friday, July 03, 2009 16:51<br>
To: Yoav Nir<br>
Cc: <a href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</a><o:p></o:p></span><=
/font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.=
txt<o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
Hi Yoav,<br>
<br>
Mostly the Initiator will decide that it wants to bring UP only IKE SA with=
out
child SA.<br>
But currently there is no notify/VID from Initiator to Responder to indicat=
e
that initiator wants to bring only IKE SA. Even if responder does not suppo=
rts
&quot;childless IKE_AUTH&quot;, it will process IKE_SA_INIT, involding CPU
intensive D-H calculations, and send IKE_SA_INIT response without
&quot;childless VID&quot; payload.<br>
<br>
By introducing a notify/VID payload from Initiator that it wants to bring U=
P
only IKE SA without child SA wil ease the processing ar Responder side. If
responder does not support &quot;childless IKE_AUTH&quot;, it can send
INVALID_SYNTAX. Then, Initiator will wait for &quot;Child SA&quot; info to =
be
available to bring UP both IKE and child SA, normally as mentioned in RFC 4=
306.<br>
<br>
Thanks,<br>
Raj<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir &lt;<a
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&lt;mailto:<a
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&gt;&gt; wrote:<=
br>
Hi all.<br>
<br>
This is the fourth iteration of this draft. &nbsp;New in this iteration<br>
&nbsp;- Another co-author<br>
&nbsp;- Changed the name, so that this item is considered in the recharteri=
ng
discussion<br>
&nbsp;- Fixed some notation and some discussion based on comments from the =
list<br>
<br>
Yoav<br>
________________________________________<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>From: <a href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce=
-bounces@ietf.org</a>&lt;mailto:<a
href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf.org=
</a>&gt;
[<a href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf=
.org</a>&lt;mailto:<a
href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf.org=
</a>&gt;]
On Behalf Of <a href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ie=
tf.org</a>&lt;mailto:<a
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a>&gt; [=
<a
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a>&lt;ma=
ilto:<a
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a>&gt;]<=
o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Sent: Wednesday, July 01, 2009 12:15<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>To: <a href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org<=
/a>&lt;mailto:<a
href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a>&gt;<o:p></o=
:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Subject: I-D Action:draft-nir-ipsecme-childless-00.txt<br>
<br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
<br>
&nbsp; &nbsp; &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : A Childless
Initiation of the IKE SA<br>
&nbsp; &nbsp; &nbsp; Author(s) &nbsp; &nbsp; &nbsp; : Y. Nir, et al.<br>
&nbsp; &nbsp; &nbsp; Filename &nbsp; &nbsp; &nbsp; &nbsp;:
draft-nir-ipsecme-childless-00.txt<br>
&nbsp; &nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 7<br>
&nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 2009-0=
7-01<br>
<br>
This document describes an extension to the IKEv2 protocol that<br>
allows an IKE SA to be created and authenticated without generating a<br>
child SA.<br>
<br>
A URL for this Internet-Draft is:<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-=
00.txt"
target=3D"_blank">http://www.ietf.org/internet-drafts/draft-nir-ipsecme-chi=
ldless-00.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br>
<br>
<br>
Email secured by Check Point<br>
<br>
<br>
_______________________________________________<br>
IPsec mailing list<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><a href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a>&lt;mailto:<a
href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a>&gt;<o:p></o:p></span></fo=
nt></p>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><a
href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">http=
s://www.ietf.org/mailman/listinfo/ipsec</a><br>
<br>
<br>
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>Scanned by Check =
Point
Total Security Gateway.<o:p></o:p></span></font></p>

</div>

<div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Email secured by Check Point<o:p></o:p></span></font></p>

</div>

</div>

</blockquote>

</div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
<br>
Scanned by Check Point Total Security Gateway. <o:p></o:p></span></font></p=
>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
Email secured by Check Point <o:p></o:p></span></font></p>

</div>


<br>=
=0D=0A
<br>Email secured by Check Point=0D=0A
<br>
<br>=
</body>

</html>

--_000_006FEB08D9C6444AB014105C9AEB133F433538CE39ilex01adcheck_--

From root@core3.amsl.com  Mon Jul  6 08:45:01 2009
Return-Path: <root@core3.amsl.com>
X-Original-To: ipsec@ietf.org
Delivered-To: ipsec@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 0) id E82DF28C168; Mon,  6 Jul 2009 08:45:01 -0700 (PDT)
From: Internet-Drafts@ietf.org
To: i-d-announce@ietf.org
Content-Type: Multipart/Mixed; Boundary="NextPart"
Mime-Version: 1.0
Message-Id: <20090706154501.E82DF28C168@core3.amsl.com>
Date: Mon,  6 Jul 2009 08:45:01 -0700 (PDT)
Cc: ipsec@ietf.org
Subject: [IPsec] I-D Action:draft-ietf-ipsecme-roadmap-02.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2009 15:45:02 -0000

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Security Maintenance and Extensions Working Group of the IETF.


	Title           : IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap
	Author(s)       : S. Frankel, S. Krishnan
	Filename        : draft-ietf-ipsecme-roadmap-02.txt
	Pages           : 55
	Date            : 2009-07-03

Over the past few years, the number of RFCs that define and use IPsec
and IKE has greatly proliferated.  This is complicated by the fact
that these RFCs originate from numerous IETF working groups: the
original IPsec WG, its various spin-offs, and other WGs that use
IPsec and/or IKE to protect their protocols' traffic.

This document is a snapshot of IPsec- and IKE-related RFCs.  It
includes a brief description of each RFC, along with background
information explaining the motivation and context of IPsec's
outgrowths and extensions.  It obsoletes the previous IPsec Document
Roadmap [RFC2411].

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-roadmap-02.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Message/External-body;
	name="draft-ietf-ipsecme-roadmap-02.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2009-07-06083922.I-D@ietf.org>


--NextPart--

From paul.hoffman@vpnc.org  Mon Jul  6 08:45:06 2009
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CB4C13A6D13 for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 08:45:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level: 
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[AWL=-0.100, BAYES_00=-2.599, J_CHICKENPOX_33=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ydUsxlxjmDIn for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 08:45:06 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id CC9493A6D0F for <ipsec@ietf.org>; Mon,  6 Jul 2009 08:45:05 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n66FjRRE064835 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Mon, 6 Jul 2009 08:45:28 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06240817c677cb85e9e8@[10.20.30.158]>
Date: Mon, 6 Jul 2009 08:45:25 -0700
To: IPsecme WG <ipsec@ietf.org>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Subject: [IPsec] WG Last Calls in progress
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2009 15:45:06 -0000

Greetings again. I am a bit concerned that the discussion about non-WG drafts is causing people to forget that we have two WG Last Calls in process.

- draft-ietf-ipsecme-ikev2-ipv6-config is in WG Last Call that will end soon. We have heard very little from anyone, even after we prodded the ipv6ops mailing list. This could *really* use more WG attention.

- draft-ietf-ipsecme-traffic-visibility went into WG Last Call the other day and has gotten zero responses. This is a mainline WG document slated for Standards Track, and needs review.

In the IETF (and other parts of our lives), finishing is often harder but even more often more important than starting.

--Paul Hoffman, Director
--VPN Consortium

From smoonen@us.ibm.com  Mon Jul  6 08:45:24 2009
Return-Path: <smoonen@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 434033A6D1E for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 08:45:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.781
X-Spam-Level: 
X-Spam-Status: No, score=-5.781 tagged_above=-999 required=5 tests=[AWL=-0.383, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_12=0.6, J_CHICKENPOX_32=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VJ9wCNK-9B2o for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 08:45:23 -0700 (PDT)
Received: from e38.co.us.ibm.com (e38.co.us.ibm.com [32.97.110.159]) by core3.amsl.com (Postfix) with ESMTP id 609CE3A6D19 for <ipsec@ietf.org>; Mon,  6 Jul 2009 08:45:18 -0700 (PDT)
Received: from d03relay04.boulder.ibm.com (d03relay04.boulder.ibm.com [9.17.195.106]) by e38.co.us.ibm.com (8.13.1/8.13.1) with ESMTP id n66DfOGs029050 for <ipsec@ietf.org>; Mon, 6 Jul 2009 07:41:24 -0600
Received: from d03av02.boulder.ibm.com (d03av02.boulder.ibm.com [9.17.195.168]) by d03relay04.boulder.ibm.com (8.13.8/8.13.8/NCO v9.2) with ESMTP id n66DiNLS142866 for <ipsec@ietf.org>; Mon, 6 Jul 2009 07:44:26 -0600
Received: from d03av02.boulder.ibm.com (loopback [127.0.0.1]) by d03av02.boulder.ibm.com (8.12.11.20060308/8.13.3) with ESMTP id n66DiNnj014417 for <ipsec@ietf.org>; Mon, 6 Jul 2009 07:44:23 -0600
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av02.boulder.ibm.com (8.12.11.20060308/8.12.11) with ESMTP id n66DiNMq014409; Mon, 6 Jul 2009 07:44:23 -0600
In-Reply-To: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59519@il-ex01.ad.checkpoint.com>
References: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com>	<p062408b4c672f6178fca@[10.20.30.158]> <7D42CBF1-5BEB-4EE3-93E2-754A4BC2764A@stratussolutions.com>	<p062408e0c67317806446@[10.20.30.158]> <OF3AB4DB32.79E9CCEB-ON852575E9.00403C25-852575E9.0040606B@us.ibm.com> <p06240816c6751e1439fb@[10.20.30.158]> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59519@il-ex01.ad.checkpoint.com>
To: Yaron Sheffer <yaronf@checkpoint.com>
MIME-Version: 1.0
X-KeepSent: EB21CFE2:BB00FE8F-852575EB:00496D17; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2 HF623 January 16, 2009
From: Scott C Moonen <smoonen@us.ibm.com>
Message-ID: <OFEB21CFE2.BB00FE8F-ON852575EB.00496D17-852575EB.004B782D@us.ibm.com>
Date: Mon, 6 Jul 2009 09:44:22 -0400
X-MIMETrack: Serialize by Router on D03NM118/03/M/IBM(Release 8.5|December 05, 2008) at 07/06/2009 07:44:22, Serialize complete at 07/06/2009 07:44:22
Content-Type: multipart/alternative; boundary="=_alternative 004B6FE4852575EB_="
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Sean Kevin O'Keeffe <sean@stratussolutions.com>, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [IPsec] IKE's DH groups 19-21
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2009 15:45:24 -0000

This is a multipart message in MIME format.
--=_alternative 004B6FE4852575EB_=
Content-Type: text/plain; charset="US-ASCII"

> - There are no security implications: the application of PRF in 
"SKEYSEED =
> prf(Ni | Nr, g^ir)" takes care of extracting the entropy even if both X 
and
> the dependent Y are included in g^ir. So either way is fine.

Agreed, but as long as it's up in the air, the clincher for me is that 
few, if any, crypto providers seem to externalize the y coordinate of the 
derived point.  E.g., OpenSSL, smart cards, etc.  This is certainly a good 
"best practice" for crypto providers, because returning the y coordinate 
only gives the illusion of extra degrees of freedom.  But it also means 
that to require IKE to use the y coordinate as part of the shared secret 
is creating a very onerous burden for many implementations.


Scott Moonen (smoonen@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://scott.andstuff.org/
http://www.linkedin.com/in/smoonen



From:
Yaron Sheffer <yaronf@checkpoint.com>
To:
Paul Hoffman <paul.hoffman@vpnc.org>, Scott C Moonen/Raleigh/IBM@IBMUS
Cc:
"ipsec@ietf.org" <ipsec@ietf.org>, "Sean Kevin O'Keeffe" 
<sean@stratussolutions.com>
Date:
07/05/2009 03:26 AM
Subject:
RE: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.



Given that:

- There are several implementations that include Russ's errata.
- We have not heard from anybody who has *not* implemented it.
- This errata is clearly in conflict with the test vectors in the RFC.
- There are no security implications: the application of PRF in "SKEYSEED 
=
prf(Ni | Nr, g^ir)" takes care of extracting the entropy even if both X 
and
the dependent Y are included in g^ir. So either way is fine.

...I suggest that we move forward in line with Russ's errata, and develop 
a
new RFC that includes the errata and also corrects the relevant test
vectors. Paul, can you modify your recent errata
(http://www.rfc-editor.org/errata_search.php?eid=1800) so that 
implementers
are aware that there is ongoing work to resolve this issue? Otherwise we
have two errata in conflict with one another *and* with the RFC, which is
mildly confusing.

Thanks,
                 Yaron

> -----Original Message-----
> From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf 
Of
> Paul Hoffman
> Sent: Saturday, July 04, 2009 17:58
> To: Scott C Moonen
> Cc: ipsec@ietf.org; Sean Kevin O'Keeffe
> Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
> 
> At 7:43 AM -0400 7/4/09, Scott C Moonen wrote:
> >What's the next step?
> 
> I have sent a message to the RFC Editor (which then gets sent to the doc
> authors and the IESG) about my concern about the correctness of the
> errata. We see how that plays out.
> 
> >If there's agreement that we need a new RFC, I'd be glad to pitch in 
with
> the effort.
> 
> Generally, this should be done by the authors themselves. Failing that,
> someone else could do it.
> 
> --Paul Hoffman, Director
> --VPN Consortium
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
> 
> Scanned by Check Point Total Security Gateway.



--=_alternative 004B6FE4852575EB_=
Content-Type: text/html; charset="US-ASCII"


<br><tt><font size=2>&gt; - There are no security implications: the application
of PRF in &quot;SKEYSEED =<br>
&gt; prf(Ni | Nr, g^ir)&quot; takes care of extracting the entropy even
if both X and<br>
&gt; the dependent Y are included in g^ir. So either way is fine.</font></tt>
<br>
<br><font size=2 face="sans-serif">Agreed, but as long as it's up in the
air, the clincher for me is that few, if any, crypto providers seem to
externalize the y coordinate of the derived point. &nbsp;E.g., OpenSSL,
smart cards, etc. &nbsp;This is certainly a good &quot;best practice&quot;
for crypto providers, because returning the y coordinate only gives the
illusion of extra degrees of freedom. &nbsp;But it also means that to require
IKE to use the y coordinate as part of the shared secret is creating a
very onerous burden for many implementations.</font>
<br>
<br><font size=2 face="sans-serif"><br>
Scott Moonen (smoonen@us.ibm.com)<br>
z/OS Communications Server TCP/IP Development<br>
</font><a href=http://scott.andstuff.org/><font size=2 face="sans-serif">http://scott.andstuff.org/</font></a><font size=2 face="sans-serif"><br>
</font><a href=http://www.linkedin.com/in/smoonen><font size=2 face="sans-serif">http://www.linkedin.com/in/smoonen</font></a>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">From:</font>
<td><font size=1 face="sans-serif">Yaron Sheffer &lt;yaronf@checkpoint.com&gt;</font>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">To:</font>
<td><font size=1 face="sans-serif">Paul Hoffman &lt;paul.hoffman@vpnc.org&gt;,
Scott C Moonen/Raleigh/IBM@IBMUS</font>
<tr>
<td valign=top><font size=1 color=#5f5f5f face="sans-serif">Cc:</font>
<td><font size=1 face="sans-serif">&quot;ipsec@ietf.org&quot; &lt;ipsec@ietf.org&gt;,
&quot;Sean Kevin O'Keeffe&quot; &lt;sean@stratussolutions.com&gt;</font>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">Date:</font>
<td><font size=1 face="sans-serif">07/05/2009 03:26 AM</font>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">Subject:</font>
<td><font size=1 face="sans-serif">RE: [IPsec] IKE's DH groups 19-21, NIST,
FIPS 140-2, etc.</font></table>
<br>
<hr noshade>
<br>
<br>
<br><tt><font size=2>Given that:<br>
<br>
- There are several implementations that include Russ's errata.<br>
- We have not heard from anybody who has *not* implemented it.<br>
- This errata is clearly in conflict with the test vectors in the RFC.<br>
- There are no security implications: the application of PRF in &quot;SKEYSEED
=<br>
prf(Ni | Nr, g^ir)&quot; takes care of extracting the entropy even if both
X and<br>
the dependent Y are included in g^ir. So either way is fine.<br>
<br>
...I suggest that we move forward in line with Russ's errata, and develop
a<br>
new RFC that includes the errata and also corrects the relevant test<br>
vectors. Paul, can you modify your recent errata<br>
(</font></tt><a href="http://www.rfc-editor.org/errata_search.php?eid=1800"><tt><font size=2>http://www.rfc-editor.org/errata_search.php?eid=1800</font></tt></a><tt><font size=2>)
so that implementers<br>
are aware that there is ongoing work to resolve this issue? Otherwise we<br>
have two errata in conflict with one another *and* with the RFC, which
is<br>
mildly confusing.<br>
<br>
Thanks,<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
Yaron<br>
<br>
&gt; -----Original Message-----<br>
&gt; From: ipsec-bounces@ietf.org [</font></tt><a href="mailto:ipsec-bounces@ietf.org"><tt><font size=2>mailto:ipsec-bounces@ietf.org</font></tt></a><tt><font size=2>]
On Behalf Of<br>
&gt; Paul Hoffman<br>
&gt; Sent: Saturday, July 04, 2009 17:58<br>
&gt; To: Scott C Moonen<br>
&gt; Cc: ipsec@ietf.org; Sean Kevin O'Keeffe<br>
&gt; Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.<br>
&gt; <br>
&gt; At 7:43 AM -0400 7/4/09, Scott C Moonen wrote:<br>
&gt; &gt;What's the next step?<br>
&gt; <br>
&gt; I have sent a message to the RFC Editor (which then gets sent to the
doc<br>
&gt; authors and the IESG) about my concern about the correctness of the<br>
&gt; errata. We see how that plays out.<br>
&gt; <br>
&gt; &gt;If there's agreement that we need a new RFC, I'd be glad to pitch
in with<br>
&gt; the effort.<br>
&gt; <br>
&gt; Generally, this should be done by the authors themselves. Failing
that,<br>
&gt; someone else could do it.<br>
&gt; <br>
&gt; --Paul Hoffman, Director<br>
&gt; --VPN Consortium<br>
&gt; _______________________________________________<br>
&gt; IPsec mailing list<br>
&gt; IPsec@ietf.org<br>
&gt; </font></tt><a href=https://www.ietf.org/mailman/listinfo/ipsec><tt><font size=2>https://www.ietf.org/mailman/listinfo/ipsec</font></tt></a><tt><font size=2><br>
&gt; <br>
&gt; Scanned by Check Point Total Security Gateway.<br>
</font></tt>
<br>
<br>
--=_alternative 004B6FE4852575EB_=--

From jasolin@orion.ncsc.mil  Mon Jul  6 10:44:54 2009
Return-Path: <jasolin@orion.ncsc.mil>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BC86428C319 for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 10:44:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FDRMKCDugiR7 for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 10:44:54 -0700 (PDT)
Received: from msux-gh1-uea01.nsa.gov (msux-gh1-uea01.nsa.gov [63.239.67.1]) by core3.amsl.com (Postfix) with ESMTP id 019743A6D13 for <ipsec@ietf.org>; Mon,  6 Jul 2009 10:44:53 -0700 (PDT)
Received: from tarius.tycho.ncsc.mil (localhost [127.0.0.1]) by msux-gh1-uea01.nsa.gov (8.12.10/8.12.10) with ESMTP id n66HhA5G010965 for <ipsec@ietf.org>; Mon, 6 Jul 2009 17:43:11 GMT
Received: from [144.51.26.44] (moss-warsteiner [144.51.26.44]) by tarius.tycho.ncsc.mil (8.13.1/8.13.1) with ESMTP id n66HhGok030178 for <ipsec@ietf.org>; Mon, 6 Jul 2009 13:43:17 -0400
Message-ID: <4A5237B4.7030304@orion.ncsc.mil>
Date: Mon, 06 Jul 2009 13:43:16 -0400
From: "Jerome A. Solinas" <jasolin@orion.ncsc.mil>
User-Agent: Thunderbird 1.5.0.12 (X11/20090624)
MIME-Version: 1.0
To: ipsec@ietf.org
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [IPsec] IKE's DH groups 19-21
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2009 17:44:54 -0000

I would like to call attention to the proposed revision of RFC 4753 at

http://www.ietf.org/internet-drafts/draft-solinas-rfc4753bis-00.txt

This was an attempt to address the issues raised in this thread.  
Comments on this are welcomed.

-- Jerome A. Solinas


From housley@vigilsec.com  Mon Jul  6 11:06:28 2009
Return-Path: <housley@vigilsec.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B87E13A6D35 for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 11:06:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.248
X-Spam-Level: 
X-Spam-Status: No, score=-101.248 tagged_above=-999 required=5 tests=[AWL=-1.307, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_12=0.6, J_CHICKENPOX_32=0.6, MIME_HTML_ONLY=1.457, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yTM2sZ3etjS6 for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 11:06:27 -0700 (PDT)
Received: from odin.smetech.net (mail.smetech.net [208.254.26.82]) by core3.amsl.com (Postfix) with ESMTP id B8AE73A69D5 for <ipsec@ietf.org>; Mon,  6 Jul 2009 11:06:27 -0700 (PDT)
Received: from localhost (unknown [208.254.26.81]) by odin.smetech.net (Postfix) with ESMTP id DA21AF2400E; Mon,  6 Jul 2009 14:05:45 -0400 (EDT)
X-Virus-Scanned: amavisd-new at smetech.net
Received: from odin.smetech.net ([208.254.26.82]) by localhost (ronin.smetech.net [208.254.26.81]) (amavisd-new, port 10024) with ESMTP id 6rEFrTNxf0Pd; Mon,  6 Jul 2009 14:05:21 -0400 (EDT)
Received: from THINKPADR52.vigilsec.com (pool-96-241-154-102.washdc.fios.verizon.net [96.241.154.102]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id C3BDD9A4772; Mon,  6 Jul 2009 14:05:44 -0400 (EDT)
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Mon, 06 Jul 2009 13:55:07 -0400
To: Scott C Moonen <smoonen@us.ibm.com>
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <OFEB21CFE2.BB00FE8F-ON852575EB.00496D17-852575EB.004B782D@ us.ibm.com>
References: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com> <p062408b4c672f6178fca@[10.20.30.158]> <7D42CBF1-5BEB-4EE3-93E2-754A4BC2764A@stratussolutions.com> <p062408e0c67317806446@[10.20.30.158]> <OF3AB4DB32.79E9CCEB-ON852575E9.00403C25-852575E9.0040606B@us.ibm.com> <p06240816c6751e1439fb@[10.20.30.158]> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59519@il-ex01.ad.checkpoint.com> <OFEB21CFE2.BB00FE8F-ON852575EB.00496D17-852575EB.004B782D@us.ibm.com>
Mime-Version: 1.0
Content-Type: text/html; charset="us-ascii"
Message-Id: <20090706180544.C3BDD9A4772@odin.smetech.net>
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] IKE's DH groups 19-21
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2009 18:06:28 -0000

<html>
<body>
I agree.&nbsp; The Y coordinate should not be part of the
calculation.<br><br>
Russ<br><br>
At 09:44 AM 7/6/2009, Scott C Moonen wrote:<br><br>
<blockquote type=cite class=cite cite=""><tt>
<font face="Courier New, Courier" size=2>&gt; - There are no security
implications: the application of PRF in &quot;SKEYSEED =<br>
&gt; prf(Ni | Nr, g^ir)&quot; takes care of extracting the entropy even
if both X and<br>
&gt; the dependent Y are included in g^ir. So either way is
fine.</font></tt> <br><br>
<font size=2>Agreed, but as long as it's up in the air, the clincher for
me is that few, if any, crypto providers seem to externalize the y
coordinate of the derived point.&nbsp; E.g., OpenSSL, smart cards,
etc.&nbsp; This is certainly a good &quot;best practice&quot; for crypto
providers, because returning the y coordinate only gives the illusion of
extra degrees of freedom.&nbsp; But it also means that to require IKE to
use the y coordinate as part of the shared secret is creating a very
onerous burden for many implementations.</font> <br><br>
<font size=2><br>
Scott Moonen (smoonen@us.ibm.com)<br>
z/OS Communications Server TCP/IP Development<br>
<a href="http://scott.andstuff.org/">http://scott.andstuff.org/</a><br>
<a href="http://www.linkedin.com/in/smoonen" eudora="autourl">
http://www.linkedin.com/in/smoonen</a></font> <br><br>
<br>
<font size=1 color="#5F5F5F">From:</font> <font size=1>Yaron Sheffer
&lt;yaronf@checkpoint.com&gt;</font> <br>
<font size=1 color="#5F5F5F">To:</font> <font size=1>Paul Hoffman
&lt;paul.hoffman@vpnc.org&gt;, Scott C Moonen/Raleigh/IBM@IBMUS</font>
<br>
<font size=1 color="#5F5F5F">Cc:</font>
<font size=1>&quot;ipsec@ietf.org&quot; &lt;ipsec@ietf.org&gt;,
&quot;Sean Kevin O'Keeffe&quot; &lt;sean@stratussolutions.com&gt;</font>
<br>
<font size=1 color="#5F5F5F">Date:</font> <font size=1>07/05/2009 03:26
AM</font> <br>
<font size=1 color="#5F5F5F">Subject:</font> <font size=1>RE: [IPsec]
IKE's DH groups 19-21, NIST, FIPS 140-2, etc.</font> <br>
<br>
<br><br>
<br>
<tt><font face="Courier New, Courier" size=2>Given that:<br><br>
- There are several implementations that include Russ's errata.<br>
- We have not heard from anybody who has *not* implemented it.<br>
- This errata is clearly in conflict with the test vectors in the
RFC.<br>
- There are no security implications: the application of PRF in
&quot;SKEYSEED =<br>
prf(Ni | Nr, g^ir)&quot; takes care of extracting the entropy even if
both X and<br>
the dependent Y are included in g^ir. So either way is fine.<br><br>
...I suggest that we move forward in line with Russ's errata, and develop
a<br>
new RFC that includes the errata and also corrects the relevant test<br>
vectors. Paul, can you modify your recent errata<br>
(<a href="http://www.rfc-editor.org/errata_search.php?eid=1800">
http://www.rfc-editor.org/errata_search.php?eid=1800</a>) so that
implementers<br>
are aware that there is ongoing work to resolve this issue? Otherwise
we<br>
have two errata in conflict with one another *and* with the RFC, which
is<br>
mildly confusing.<br><br>
Thanks,<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
Yaron<br><br>
&gt; -----Original Message-----<br>
&gt; From: ipsec-bounces@ietf.org
[<a href="mailto:ipsec-bounces@ietf.org">mailto:ipsec-bounces@ietf.org</a>
] On Behalf Of<br>
&gt; Paul Hoffman<br>
&gt; Sent: Saturday, July 04, 2009 17:58<br>
&gt; To: Scott C Moonen<br>
&gt; Cc: ipsec@ietf.org; Sean Kevin O'Keeffe<br>
&gt; Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2,
etc.<br>
&gt; <br>
&gt; At 7:43 AM -0400 7/4/09, Scott C Moonen wrote:<br>
&gt; &gt;What's the next step?<br>
&gt; <br>
&gt; I have sent a message to the RFC Editor (which then gets sent to the
doc<br>
&gt; authors and the IESG) about my concern about the correctness of
the<br>
&gt; errata. We see how that plays out.<br>
&gt; <br>
&gt; &gt;If there's agreement that we need a new RFC, I'd be glad to
pitch in with<br>
&gt; the effort.<br>
&gt; <br>
&gt; Generally, this should be done by the authors themselves. Failing
that,<br>
&gt; someone else could do it.<br>
&gt; <br>
&gt; --Paul Hoffman, Director<br>
&gt; --VPN Consortium<br>
&gt; _______________________________________________<br>
&gt; IPsec mailing list<br>
&gt; IPsec@ietf.org<br>
&gt;
<a href="https://www.ietf.org/mailman/listinfo/ipsec">
https://www.ietf.org/mailman/listinfo/ipsec</a><br>
&gt; <br>
&gt; Scanned by Check Point Total Security Gateway.<br>
</font></tt><br>
<br>
_______________________________________________<br>
IPsec mailing list<br>
IPsec@ietf.org<br>
<a href="https://www.ietf.org/mailman/listinfo/ipsec" eudora="autourl">
https://www.ietf.org/mailman/listinfo/ipsec</a></blockquote></body>
</html>


From housley@vigilsec.com  Mon Jul  6 13:15:53 2009
Return-Path: <housley@vigilsec.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 623D228C2D1 for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 13:15:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.557
X-Spam-Level: 
X-Spam-Status: No, score=-102.557 tagged_above=-999 required=5 tests=[AWL=0.042, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N9z+l-gGxlUM for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 13:15:52 -0700 (PDT)
Received: from odin.smetech.net (mail.smetech.net [208.254.26.82]) by core3.amsl.com (Postfix) with ESMTP id 95F1C3A68A2 for <ipsec@ietf.org>; Mon,  6 Jul 2009 13:15:52 -0700 (PDT)
Received: from localhost (unknown [208.254.26.81]) by odin.smetech.net (Postfix) with ESMTP id 6575DF24003; Mon,  6 Jul 2009 16:16:12 -0400 (EDT)
X-Virus-Scanned: amavisd-new at smetech.net
Received: from odin.smetech.net ([208.254.26.82]) by localhost (ronin.smetech.net [208.254.26.81]) (amavisd-new, port 10024) with ESMTP id zvDdBCizMLqd; Mon,  6 Jul 2009 16:16:01 -0400 (EDT)
Received: from THINKPADR52.vigilsec.com (pool-96-241-154-102.washdc.fios.verizon.net [96.241.154.102]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id 049289A4772; Mon,  6 Jul 2009 16:16:09 -0400 (EDT)
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Mon, 06 Jul 2009 16:15:58 -0400
To: Yaron Sheffer <yaronf@checkpoint.com>
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59519@il-ex01.ad.chec kpoint.com>
References: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com> <p062408b4c672f6178fca@[10.20.30.158]> <7D42CBF1-5BEB-4EE3-93E2-754A4BC2764A@stratussolutions.com> <p062408e0c67317806446@[10.20.30.158]> <OF3AB4DB32.79E9CCEB-ON852575E9.00403C25-852575E9.0040606B@us.ibm.com> <p06240816c6751e1439fb@[10.20.30.158]> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59519@il-ex01.ad.checkpoint.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Message-Id: <20090706201610.049289A4772@odin.smetech.net>
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2009 20:15:53 -0000

I think a fix is already in the works:
https://datatracker.ietf.org/doc/draft-solinas-rfc4753bis/


From suresh.krishnan@ericsson.com  Mon Jul  6 16:11:53 2009
Return-Path: <suresh.krishnan@ericsson.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C20F93A6BCC for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 16:11:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.542
X-Spam-Level: 
X-Spam-Status: No, score=-6.542 tagged_above=-999 required=5 tests=[AWL=0.057,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZNeyxnfY9px8 for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 16:11:52 -0700 (PDT)
Received: from imr1.ericy.com (imr1.ericy.com [198.24.6.9]) by core3.amsl.com (Postfix) with ESMTP id D4EDD3A6A38 for <ipsec@ietf.org>; Mon,  6 Jul 2009 16:11:52 -0700 (PDT)
Received: from eusrcmw750.eamcs.ericsson.se (eusrcmw750.exu.ericsson.se [138.85.77.50]) by imr1.ericy.com (8.13.1/8.13.1) with ESMTP id n66LxD2R010546 for <ipsec@ietf.org>; Mon, 6 Jul 2009 16:59:14 -0500
Received: from eusrcmw750.eamcs.ericsson.se ([138.85.77.53]) by eusrcmw750.eamcs.ericsson.se with Microsoft SMTPSVC(6.0.3790.1830);  Mon, 6 Jul 2009 16:58:44 -0500
Received: from [142.133.10.113] ([142.133.10.113]) by eusrcmw750.eamcs.ericsson.se with Microsoft SMTPSVC(6.0.3790.1830);  Mon, 6 Jul 2009 16:58:44 -0500
Message-ID: <4A527351.5090503@ericsson.com>
Date: Mon, 06 Jul 2009 17:57:37 -0400
From: Suresh Krishnan <suresh.krishnan@ericsson.com>
User-Agent: Thunderbird 2.0.0.22 (X11/20090608)
MIME-Version: 1.0
To: IPsecme WG <ipsec@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 06 Jul 2009 21:58:44.0091 (UTC) FILETIME=[EE1EE4B0:01C9FE84]
Subject: [IPsec] New version of the roadmap draft available
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2009 23:11:53 -0000

Hi Folks,
   We have published a new version of the roadmap draft. Pleae take a 
look at it and let us know if you have any comments or suggestions.

http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-roadmap-02.txt

Thanks
Sheila and Suresh

From kohn.jack@gmail.com  Mon Jul  6 16:22:11 2009
Return-Path: <kohn.jack@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CEADD28C37C for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 16:22:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GCpo8bI6KI8A for <ipsec@core3.amsl.com>; Mon,  6 Jul 2009 16:22:11 -0700 (PDT)
Received: from mail-vw0-f184.google.com (mail-vw0-f184.google.com [209.85.212.184]) by core3.amsl.com (Postfix) with ESMTP id B923C3A6C08 for <ipsec@ietf.org>; Mon,  6 Jul 2009 16:22:10 -0700 (PDT)
Received: by vwj14 with SMTP id 14so3078262vwj.29 for <ipsec@ietf.org>; Mon, 06 Jul 2009 16:21:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=w149aguA13hVUUKEVT06oM5WfD3//TEefWfNndsL/DM=; b=kWWG81eGcLaTZocugofgachYM2TaWptPqrbVu3Foz0pwpf4gZxva9nKYcDrgyZW4k6 9xColSw4OJGE9b91r0qf7C0OLlSpFFccjIgynlKpUTWHDCSVZeD1gdoAytC784SRCP74 68C2dUrW9yKIH7E9o1ysZtAnvdXdM0Xn3Y+io=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=ID6K2DL+vp4x+J+Z77jLz6DhYuMFnoROaNwNRFjDa6V19A+J9mY1dpDtSvSVYfarWB RiwBRvFkPODqA3eQMZ54zBAN57n5Mcl/ZE+jDJ1cOlCrXE4OOnO2VXvsY35ZAgrAlnKP kyGtKJL4kAdF4zVpucBuA85CLfVQEuXUGGk2g=
MIME-Version: 1.0
Received: by 10.220.90.199 with SMTP id j7mr10834694vcm.24.1246922512132; Mon,  06 Jul 2009 16:21:52 -0700 (PDT)
In-Reply-To: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594E4@il-ex01.ad.checkpoint.com>
References: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594E4@il-ex01.ad.checkpoint.com>
Date: Tue, 7 Jul 2009 04:51:52 +0530
Message-ID: <dc8fd0140907061621n31bb5960pc709987a13abbe29@mail.gmail.com>
From: Jack Kohn <kohn.jack@gmail.com>
To: Yaron Sheffer <yaronf@checkpoint.com>
Content-Type: multipart/alternative; boundary=0016e645b9be65efcc046e11c5e7
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2009 23:22:11 -0000

--0016e645b9be65efcc046e11c5e7
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Support

Jack

On Sun, Jul 5, 2009 at 1:18 AM, Yaron Sheffer <yaronf@checkpoint.com> wrote=
:

>  This is the beginning of a two-week WG Last Call, which will end July 18=
.
> The target status for this document is Proposed Standard. The current
> document is at
> http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05.
>
>
>
> If you have not read the document before now, please do so. Having fresh
> eyes on the document often brings up important issues. If you HAVE read i=
t
> before, please note that there have been several revisions since San
> Francisco, so you might want to read it again (plus it=92s a short docume=
nt).
> Send any comments to the list, even if they are as simple as "I read it a=
nd
> it seems fine".
>
>
>
> Please clearly indicate the position of any issue in the Internet Draft,
> and if possible provide alternative text. Please also indicate the nature=
 or
> severity of the error or correction, e.g. major technical, minor technica=
l,
> nit, so that we can quickly judge the extent of problems with the documen=
t.
>
>
>
> Thanks,
>
>             Yaron
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
>

--0016e645b9be65efcc046e11c5e7
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Support<br><br>Jack<br><br><div class=3D"gmail_quote">On Sun, Jul 5, 2009 a=
t 1:18 AM, Yaron Sheffer <span dir=3D"ltr">&lt;<a href=3D"mailto:yaronf@che=
ckpoint.com">yaronf@checkpoint.com</a>&gt;</span> wrote:<br><blockquote cla=
ss=3D"gmail_quote" style=3D"border-left: 1px solid rgb(204, 204, 204); marg=
in: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">












<div link=3D"blue" vlink=3D"purple" lang=3D"EN-US">

<div>

<p style=3D""><font face=3D"Arial" size=3D"2"><span style=3D"font-size: 10p=
t; font-family: Arial;">This is the beginning of a two-week
WG Last Call, which will end July 18. The target status for this document i=
s
Proposed Standard. The current document is at <a href=3D"http://tools.ietf.=
org/html/draft-ietf-ipsecme-traffic-visibility-05" target=3D"_blank">http:/=
/tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05</a>.</span></=
font></p>


<p style=3D""><font face=3D"Arial" size=3D"2"><span style=3D"font-size: 10p=
t; font-family: Arial;">=A0</span></font></p>

<p style=3D""><font face=3D"Arial" size=3D"2"><span style=3D"font-size: 10p=
t; font-family: Arial;">If you have not read the document
before now, please do so. Having fresh eyes on the document often brings up
important issues. If you HAVE read it before, please note that there have b=
een
several revisions since San Francisco,
so you might want to read it again (plus it=92s a short document). Send any
comments to the list, even if they are as simple as &quot;I read it and it
seems fine&quot;.</span></font></p>

<p style=3D""><font face=3D"Arial" size=3D"2"><span style=3D"font-size: 10p=
t; font-family: Arial;">=A0</span></font></p>

<p style=3D""><font face=3D"Arial" size=3D"2"><span style=3D"font-size: 10p=
t; font-family: Arial;">Please clearly indicate the position
of any issue in the Internet Draft, and if possible provide alternative tex=
t. Please
also indicate the nature or severity of the error or correction, e.g. major
technical, minor technical, nit, so that we can quickly judge the extent of
problems with the document.</span></font></p>

<p><font face=3D"Arial" size=3D"2"><span style=3D"font-size: 10pt; font-fam=
ily: Arial;">=A0</span></font></p>

<p><font face=3D"Arial" size=3D"2"><span style=3D"font-size: 10pt; font-fam=
ily: Arial;">Thanks,</span></font></p>

<p><font face=3D"Arial" size=3D"2"><span style=3D"font-size: 10pt; font-fam=
ily: Arial;">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Yaron</span></font><font fac=
e=3D"Arial" size=3D"2"><span style=3D"font-size: 10pt; font-family: Arial;"=
></span></font></p>

</div>

</div>


<br>_______________________________________________<br>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/ipsec</a><br>
<br></blockquote></div><br>

--0016e645b9be65efcc046e11c5e7--

From ynir@checkpoint.com  Tue Jul  7 05:30:46 2009
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 106383A67CC for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 05:30:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DPuHd1T7q-Em for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 05:30:41 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id 67A013A6A99 for <ipsec@ietf.org>; Tue,  7 Jul 2009 05:30:40 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 8473F200E0E; Tue,  7 Jul 2009 14:35:34 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 47A50200E06 for <ipsec@ietf.org>; Tue,  7 Jul 2009 14:35:34 +0300 (IDT)
X-CheckPoint: {4A532FAD-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n67BZL3d009859 for <ipsec@ietf.org>; Tue, 7 Jul 2009 14:35:21 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Tue, 7 Jul 2009 14:35:20 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: Yaron Sheffer <yaronf@checkpoint.com>, "ipsec@ietf.org" <ipsec@ietf.org>
Date: Tue, 7 Jul 2009 14:35:19 +0300
Thread-Topic: WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
Thread-Index: Acn84GccXdkwAkW2QlWsL8kxCqVagwCFSphw
Message-ID: <006FEB08D9C6444AB014105C9AEB133F433538CE3E@il-ex01.ad.checkpoint.com>
References: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594E4@il-ex01.ad.checkpoint.com>
In-Reply-To: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594E4@il-ex01.ad.checkpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_006FEB08D9C6444AB014105C9AEB133F433538CE3Eilex01adcheck_"
MIME-Version: 1.0
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jul 2009 12:30:46 -0000

--_000_006FEB08D9C6444AB014105C9AEB133F433538CE3Eilex01adcheck_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I've read it again, and it seems fine.  One minor issue, though.

Section 2 describes the WESP header format. It has the following:

   HdrLen, 8 bits: Offset to the beginning of the Payload Data in

   octets. The receiver MUST ensure that this field matches with

   the header offset computed from using the negotiated SA and MUST

   drop the packet in case it doesn't match.

I think I know what they mean, but it's entirely not clear what this field =
is supposed to hold.  Is it the size of the existing ESP header?  Is it tha=
t + 4?  How about "the combined length of all the ESP fields that precede t=
he "Payload Data" field" in ESP" ?



________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Y=
aron Sheffer
Sent: Saturday, July 04, 2009 10:48 PM
To: ipsec@ietf.org
Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

This is the beginning of a two-week WG Last Call, which will end July 18. T=
he target status for this document is Proposed Standard. The current docume=
nt is at http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-0=
5.

If you have not read the document before now, please do so. Having fresh ey=
es on the document often brings up important issues. If you HAVE read it be=
fore, please note that there have been several revisions since San Francisc=
o, so you might want to read it again (plus it's a short document). Send an=
y comments to the list, even if they are as simple as "I read it and it see=
ms fine".

Please clearly indicate the position of any issue in the Internet Draft, an=
d if possible provide alternative text. Please also indicate the nature or =
severity of the error or correction, e.g. major technical, minor technical,=
 nit, so that we can quickly judge the extent of problems with the document=
.

Thanks,
            Yaron

=0D=0A
Email secured by Check Point=0D=0A

--_000_006FEB08D9C6444AB014105C9AEB133F433538CE3Eilex01adcheck_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:p=3D"urn:schemas-m=
icrosoft-com:office:powerpoint" xmlns:a=3D"urn:schemas-microsoft-com:office=
:access" xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s=3D"=
uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs=3D"urn:schemas-microsof=
t-com:rowset" xmlns:z=3D"#RowsetSchema" xmlns:b=3D"urn:schemas-microsoft-co=
m:office:publisher" xmlns:ss=3D"urn:schemas-microsoft-com:office:spreadshee=
t" xmlns:c=3D"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns=
:odc=3D"urn:schemas-microsoft-com:office:odc" xmlns:oa=3D"urn:schemas-micro=
soft-com:office:activation" xmlns:html=3D"http://www.w3.org/TR/REC-html40" =
xmlns:q=3D"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc=3D"http://m=
icrosoft.com/officenet/conferencing" xmlns:D=3D"DAV:" xmlns:Repl=3D"http://=
schemas.microsoft.com/repl/" xmlns:mt=3D"http://schemas.microsoft.com/share=
point/soap/meetings/" xmlns:x2=3D"http://schemas.microsoft.com/office/excel=
/2003/xml" xmlns:ppda=3D"http://www.passport.com/NameSpace.xsd" xmlns:ois=
=3D"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir=3D"http://=
schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds=3D"http://www.w3=
.org/2000/09/xmldsig#" xmlns:dsp=3D"http://schemas.microsoft.com/sharepoint=
/dsp" xmlns:udc=3D"http://schemas.microsoft.com/data/udc" xmlns:xsd=3D"http=
://www.w3.org/2001/XMLSchema" xmlns:sub=3D"http://schemas.microsoft.com/sha=
repoint/soap/2002/1/alerts/" xmlns:ec=3D"http://www.w3.org/2001/04/xmlenc#"=
 xmlns:sp=3D"http://schemas.microsoft.com/sharepoint/" xmlns:sps=3D"http://=
schemas.microsoft.com/sharepoint/soap/" xmlns:xsi=3D"http://www.w3.org/2001=
/XMLSchema-instance" xmlns:udcs=3D"http://schemas.microsoft.com/data/udc/so=
ap" xmlns:udcxf=3D"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udc=
p2p=3D"http://schemas.microsoft.com/data/udc/parttopart" xmlns:st=3D"&#1;" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" xmlns=3D"http://ww=
w.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" name=3D"City"/=
>
<o:SmartTagType namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
pre
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Courier New";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:Arial;
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I&#8217;ve read it again, and it seems
fine. &nbsp;One minor issue, though.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Section 2 describes the WESP header
format. It has the following:<o:p></o:p></span></font></p>

<pre style=3D'page-break-before:always'><font size=3D3 face=3D"Courier New"=
><span
lang=3DEN style=3D'font-size:12.0pt'>&nbsp;&nbsp; HdrLen, 8 bits: Offset to=
 the beginning of the Payload Data in<o:p></o:p></span></font></pre><pre
style=3D'page-break-before:always'><font size=3D3 face=3D"Courier New"><spa=
n lang=3DEN
style=3D'font-size:12.0pt'>&nbsp;&nbsp; octets. The receiver MUST ensure th=
at this field matches with<o:p></o:p></span></font></pre><pre
style=3D'page-break-before:always'><font size=3D3 face=3D"Courier New"><spa=
n lang=3DEN
style=3D'font-size:12.0pt'>&nbsp;&nbsp; the header offset computed from usi=
ng the negotiated SA and MUST<o:p></o:p></span></font></pre><pre
style=3D'page-break-before:always'><font size=3D3 face=3D"Courier New"><spa=
n lang=3DEN
style=3D'font-size:12.0pt'>&nbsp;&nbsp; drop the packet in case it doesn't =
match.<o:p></o:p></span></font></pre>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span lang=3D=
EN
style=3D'font-size:10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></=
span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I think I know what they mean, but it&=
#8217;s
entirely not clear what this field is supposed to hold. &nbsp;Is it the siz=
e of
the existing ESP header?&nbsp; Is it that + 4?&nbsp; How about &#8220;the c=
ombined
length of all the ESP fields that precede the &#8220;Payload Data&#8221; fi=
eld&#8221;
in ESP&#8221; ? &nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span lang=3D=
EN
style=3D'font-size:10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></=
span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <b><span
style=3D'font-weight:bold'>On Behalf Of </span></b>Yaron Sheffer<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Saturday, July 04, 200=
9
10:48 PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> ipsec@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> [IPsec] WG Last Cal=
l:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 face=3DAr=
ial><span
style=3D'font-size:10.0pt;font-family:Arial'>This is the beginning of a two=
-week
WG Last Call, which will end July 18. The target status for this document i=
s
Proposed Standard. The current document is at <a
href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05=
">http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05</a>.<=
o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 face=3DAr=
ial><span
style=3D'font-size:10.0pt;font-family:Arial'><o:p>&nbsp;</o:p></span></font=
></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 face=3DAr=
ial><span
style=3D'font-size:10.0pt;font-family:Arial'>If you have not read the docum=
ent
before now, please do so. Having fresh eyes on the document often brings up=
 important
issues. If you HAVE read it before, please note that there have been severa=
l
revisions since <st1:place w:st=3D"on"><st1:City w:st=3D"on">San Francisco<=
/st1:City></st1:place>,
so you might want to read it again (plus it&#8217;s a short document). Send=
 any
comments to the list, even if they are as simple as &quot;I read it and it
seems fine&quot;.<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 face=3DAr=
ial><span
style=3D'font-size:10.0pt;font-family:Arial'><o:p>&nbsp;</o:p></span></font=
></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 face=3DAr=
ial><span
style=3D'font-size:10.0pt;font-family:Arial'>Please clearly indicate the po=
sition
of any issue in the Internet Draft, and if possible provide alternative tex=
t.
Please also indicate the nature or severity of the error or correction, e.g=
.
major technical, minor technical, nit, so that we can quickly judge the ext=
ent
of problems with the document.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Thanks,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;
Yaron<o:p></o:p></span></font></p>

</div>


<br>=
=0D=0A
<br>Email secured by Check Point=0D=0A
<br>
<br>=
</body>

</html>

--_000_006FEB08D9C6444AB014105C9AEB133F433538CE3Eilex01adcheck_--

From smoonen@us.ibm.com  Tue Jul  7 08:39:14 2009
Return-Path: <smoonen@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 774B928C29E for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 08:39:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.327
X-Spam-Level: 
X-Spam-Status: No, score=-6.327 tagged_above=-999 required=5 tests=[AWL=0.272,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tcoDqApaqocH for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 08:39:13 -0700 (PDT)
Received: from e36.co.us.ibm.com (e36.co.us.ibm.com [32.97.110.154]) by core3.amsl.com (Postfix) with ESMTP id C2D483A6CA8 for <ipsec@ietf.org>; Tue,  7 Jul 2009 08:39:12 -0700 (PDT)
Received: from d03relay02.boulder.ibm.com (d03relay02.boulder.ibm.com [9.17.195.227]) by e36.co.us.ibm.com (8.13.1/8.13.1) with ESMTP id n67FFSE5008482 for <ipsec@ietf.org>; Tue, 7 Jul 2009 09:15:28 -0600
Received: from d03av06.boulder.ibm.com (d03av06.boulder.ibm.com [9.17.195.245]) by d03relay02.boulder.ibm.com (8.13.8/8.13.8/NCO v9.2) with ESMTP id n67FGxA9239048 for <ipsec@ietf.org>; Tue, 7 Jul 2009 09:16:59 -0600
Received: from d03av06.boulder.ibm.com (loopback [127.0.0.1]) by d03av06.boulder.ibm.com (8.13.1/8.13.3) with ESMTP id n67FHj90019721 for <ipsec@ietf.org>; Tue, 7 Jul 2009 09:17:45 -0600
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av06.boulder.ibm.com (8.13.1/8.12.11) with ESMTP id n67FHjO7019718 for <ipsec@ietf.org>; Tue, 7 Jul 2009 09:17:45 -0600
To: ipsec@ietf.org
MIME-Version: 1.0
X-KeepSent: 64B37372:AF72323C-852575EC:0052D4A5; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2 HF623 January 16, 2009
From: Scott C Moonen <smoonen@us.ibm.com>
X-MIMETrack: S/MIME Sign by Notes Client on Scott C Moonen/Raleigh/IBM(Release 8.0.2 HF623|January 16, 2009) at 07/07/2009 11:16:43 AM, Serialize by Notes Client on Scott C Moonen/Raleigh/IBM(Release 8.0.2 HF623|January 16, 2009) at 07/07/2009 11:16:43 AM, Serialize complete at 07/07/2009 11:16:43 AM, S/MIME Sign failed at 07/07/2009 11:16:43 AM: The cryptographic key was not found, Serialize by Router on D03NM118/03/M/IBM(Release 8.5|December 05, 2008) at 07/07/2009 09:16:58, Serialize complete at 07/07/2009 09:16:58
Message-ID: <OF64B37372.AF72323C-ON852575EC.0052D4A5-852575EC.0053F3C5@us.ibm.com>
Date: Tue, 7 Jul 2009 11:16:58 -0400
Content-Type: multipart/alternative; boundary="=_alternative 0053ED98852575EC_="
Subject: [IPsec] question about the use of AES-XCBC in IKEv1 for NAT-D payloads
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jul 2009 15:39:14 -0000

This is a multipart message in MIME format.
--=_alternative 0053ED98852575EC_=
Content-Type: text/plain; charset="US-ASCII"

Generally, for authentication and PRF purposes, IKEv1 uses HMAC forms of 
authentication algorithms.  For most algorithms (e.g., MD5, SHA1, etc.) 
there is both a non-keyed form of the hash and also a keyed HMAC form. 
This doesn't seem to be true for AES-XCBC, which is explicitly defined as 
a keyed hash function.

RFC 3947 documents the use of a non-keyed hash for generating a NAT-D 
payload.  It says that "this uses the negotiated HASH algorithm".  What 
hash algorithm should one use if AES-XCBC is being used for 
authentication?

(Fortunately, IKEv2 does not have this problem; it explicitly specifies 
the use of SHA-1 for the NAT_DETECTION_* payloads.)


Scott Moonen (smoonen@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://scott.andstuff.org/
http://www.linkedin.com/in/smoonen
--=_alternative 0053ED98852575EC_=
Content-Type: text/html; charset="US-ASCII"


<br><font size=2 face="sans-serif">Generally, for authentication and PRF
purposes, IKEv1 uses HMAC forms of authentication algorithms. &nbsp;For
most algorithms (e.g., MD5, SHA1, etc.) there is both a non-keyed form
of the hash and also a keyed HMAC form. &nbsp;This doesn't seem to be true
for AES-XCBC, which is explicitly defined as a keyed hash function.</font>
<br>
<br><font size=2 face="sans-serif">RFC 3947 documents the use of a non-keyed
hash for generating a NAT-D payload. &nbsp;It says that &quot;this uses
the negotiated HASH algorithm&quot;. &nbsp;What hash algorithm should one
use if AES-XCBC is being used for authentication?</font>
<br>
<br><font size=2 face="sans-serif">(Fortunately, IKEv2 does not have this
problem; it explicitly specifies the use of SHA-1 for the NAT_DETECTION_*
payloads.)</font>
<br>
<br><font size=2 face="sans-serif"><br>
Scott Moonen (smoonen@us.ibm.com)<br>
z/OS Communications Server TCP/IP Development<br>
</font><a href=http://scott.andstuff.org/><font size=2 face="sans-serif">http://scott.andstuff.org/</font></a><font size=2 face="sans-serif"><br>
</font><a href=http://www.linkedin.com/in/smoonen><font size=2 face="sans-serif">http://www.linkedin.com/in/smoonen</font></a>
--=_alternative 0053ED98852575EC_=--

From turners@ieca.com  Tue Jul  7 08:49:57 2009
Return-Path: <turners@ieca.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EB2BB3A6977 for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 08:49:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oaK7mYqw7+fP for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 08:49:57 -0700 (PDT)
Received: from smtp104.biz.mail.re2.yahoo.com (smtp104.biz.mail.re2.yahoo.com [206.190.52.173]) by core3.amsl.com (Postfix) with SMTP id DCC7A3A67A8 for <ipsec@ietf.org>; Tue,  7 Jul 2009 08:49:56 -0700 (PDT)
Received: (qmail 67662 invoked from network); 7 Jul 2009 15:49:28 -0000
Received: from unknown (HELO thunderfish.local) (turners@71.191.1.139 with plain) by smtp104.biz.mail.re2.yahoo.com with SMTP; 7 Jul 2009 15:49:26 -0000
X-Yahoo-SMTP: qPTWNAeswBAtDTSn9GKlmmL3C90ke7grn_5n9To-
X-YMail-OSG: UOWanLEVM1nVXPiJ0bSw_TG9SBqik0.KuRWpZXoJ3Sub35.QEd9pM1k7U0jUME_6CRtHnC5FMgqMVSFqt4kyZcfMdPcDuiW7aYJZTAfCON_umafb7iQFQdzrq6tZAuSdg4ZYewW3Sw0mBzoHymRVMQ1wKxe1CPIt669dhImnNjCv5g76O_AwIr292FzFWejuuCHxB64jmOGHc82itiBFJE57.Bv.06ElLlIxj69V86UiM2FzUClI9Gj7b4g4D1Li3WLF1jJKk1C_MgIb.vBBKvQ_ugrIXmPxGk69V8A9b9ldrcHmAd92qGmD982SUCEhOCJFC06zUxQrB4m7Z8YCVUXCQxFOUGCGG3s-
X-Yahoo-Newman-Property: ymail-3
Message-ID: <4A536E85.5060604@ieca.com>
Date: Tue, 07 Jul 2009 11:49:25 -0400
From: Sean Turner <turners@ieca.com>
User-Agent: Thunderbird 2.0.0.22 (Macintosh/20090605)
MIME-Version: 1.0
To: Suresh Krishnan <suresh.krishnan@ericsson.com>
References: <4A527351.5090503@ericsson.com>
In-Reply-To: <4A527351.5090503@ericsson.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: IPsecme WG <ipsec@ietf.org>
Subject: Re: [IPsec] New version of the roadmap draft available
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jul 2009 15:49:58 -0000

Suresh,

I think the last recommendation in 5.3.1 wrt the hashing algorithms in 
PKIX certificates needs to be reworded: r/for PKIX certificates signed 
with HMAC-SHA-256, -384, and -512./for PKIX certificates hashed with 
SHA-256, -384, and -512.

spt

Suresh Krishnan wrote:
> Hi Folks,
>   We have published a new version of the roadmap draft. Pleae take a 
> look at it and let us know if you have any comments or suggestions.
> 
> http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-roadmap-02.txt
> 
> Thanks
> Sheila and Suresh
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
> 

From cakulev@alcatel-lucent.com  Tue Jul  7 09:01:11 2009
Return-Path: <cakulev@alcatel-lucent.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8723C3A6E42 for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 09:01:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n2aC-res1Lky for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 09:01:10 -0700 (PDT)
Received: from ihemail2.lucent.com (ihemail2.lucent.com [135.245.0.35]) by core3.amsl.com (Postfix) with ESMTP id 713F43A6977 for <ipsec@ietf.org>; Tue,  7 Jul 2009 09:01:10 -0700 (PDT)
Received: from ihrh1.emsr.lucent.com (h135-1-218-53.lucent.com [135.1.218.53]) by ihemail2.lucent.com (8.13.8/IER-o) with ESMTP id n67G1PeJ008611 for <ipsec@ietf.org>; Tue, 7 Jul 2009 11:01:25 -0500 (CDT)
Received: from USNAVSXCHHUB01.ndc.alcatel-lucent.com (usnavsxchhub01.ndc.alcatel-lucent.com [135.3.39.110]) by ihrh1.emsr.lucent.com (8.13.8/emsr) with ESMTP id n67G1Omi011671 for <ipsec@ietf.org>; Tue, 7 Jul 2009 11:01:24 -0500 (CDT)
Received: from USNAVSXCHMBSA3.ndc.alcatel-lucent.com ([135.3.39.124]) by USNAVSXCHHUB01.ndc.alcatel-lucent.com ([135.3.39.110]) with mapi; Tue, 7 Jul 2009 11:01:24 -0500
From: "Cakulev, Violeta (Violeta)" <cakulev@alcatel-lucent.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Date: Tue, 7 Jul 2009 11:01:23 -0500
Thread-Topic: New Version Notification for draft-cakulev-ikev2-psk-diameter-00 
Thread-Index: Acn7IxN5DOMsP0niTn6jWuTD4hnCZADNcrLgADDPQXA=
Message-ID: <AAE76B481E7A0E4C96610790A852B9A624EC10A5DD@USNAVSXCHMBSA3.ndc.alcatel-lucent.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.35
Subject: [IPsec] FW: New Version Notification for draft-cakulev-ikev2-psk-diameter-00
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jul 2009 16:04:14 -0000

All,
Below is an I-D that might be of interest to this group.


-Violeta

-----Original Message-----
From: IETF I-D Submission Tool [mailto:idsubmission@ietf.org]
Sent: Thursday, July 02, 2009 10:40 AM
To: Cakulev, Violeta (Violeta)
Cc: avi@bridgewatersystems.com
Subject: New Version Notification for draft-cakulev-ikev2-psk-diameter-00


A new version of I-D, draft-cakulev-ikev2-psk-diameter-00.txt has been succ=
essfuly submitted by Violeta Cakulev and posted to the IETF repository.

Filename:        draft-cakulev-ikev2-psk-diameter
Revision:        00
Title:           Diameter IKEv2: Support for Interaction between IKEv2 Serv=
er and Diameter Server
Creation_date:   2009-07-02
WG ID:           Independent Submission
Number_of_pages: 19

Abstract:
Internet Key Exchange is a component of IPsec used for performing mutual au=
thentication as well as establishing and maintaining security associations =
(SAs) between two parties such as a user and a network entity.  Internet Ke=
y Exchange v2 (IKEv2) protocol allows several different mechanisms for auth=
enticating a user, namely the Extensible Authentication Protocol, certifica=
tes, and pre-shared secrets.  To authenticate and/or authorize the user, th=
e network element such as the Access Gateway may need to dynamically bootst=
rap a security association based on interaction with the Diameter server.
This document specifies the interaction between the Access Gateway and Diam=
eter server for the IKEv2 based on pre-shared secrets.



The IETF Secretariat.



From kivinen@iki.fi  Tue Jul  7 12:32:14 2009
Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 59A903A6A88 for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 12:32:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.418
X-Spam-Level: 
X-Spam-Status: No, score=-2.418 tagged_above=-999 required=5 tests=[AWL=0.181,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JRUH0UfLUCWt for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 12:32:13 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) by core3.amsl.com (Postfix) with ESMTP id 0D0B23A69B4 for <ipsec@ietf.org>; Tue,  7 Jul 2009 12:32:12 -0700 (PDT)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.14.3/8.13.8) with ESMTP id n67JU3YX006165 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 7 Jul 2009 22:30:03 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.14.3/8.12.11) id n67JU3pX020414; Tue, 7 Jul 2009 22:30:03 +0300 (EEST)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <19027.41530.987118.492735@fireball.kivinen.iki.fi>
Date: Tue, 7 Jul 2009 22:30:02 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Raj Singh <rsjenwar@gmail.com>
In-Reply-To: <7ccecf670907040336t51b15b1t790284952459069a@mail.gmail.com>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com> <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594C4@il-ex01.ad.checkpoint.com> <7ccecf670907040336t51b15b1t790284952459069a@mail.gmail.com>
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 9 min
X-Total-Time: 10 min
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Yoav Nir <ynir@checkpoint.com>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jul 2009 19:32:14 -0000

Raj Singh writes:
> Your suggestion of having "critical" bit set on childless notify/VID payload
> from initiator in IKE_SA_INIT exchange will define the bahavior as mentioned
> below.

That is not correct way of using critical bit. Critical bit means that
if it is set and the PAYLOAD TYPE is not understood, then
UNSUPPORTED_CRITICAL_PAYLOAD error is reported. Every implementation
will understand Notify and Vendor ID payloads, thus they will never
return UNSUPPORTED_CRITICAL_PAYLOAD regardless what the contents of
those payloads are.

> If initiator want to childless IKE_AUTH, it will send  CHILDLESS_IKE_AUTH
> notify/VID payload having "critical" flag SET in IKE_SA_INIT request.

And complient implentation will do what to do as RFC4306 says ie:

      ... MUST be ignored by the recipient if the recipient
      understands the payload type code. MUST be set to zero for
      payload types defined in this document. Note that the critical
      bit applies to the current payload rather than the "next"
      payload whose type code appears in the first octet. The
      reasoning behind not setting the critical bit for payloads
      defined in this document is that all implementations MUST
      understand all payload types defined in this document and
      therefore must ignore the Critical bit's value. Skipped payloads
      are expected to have valid Next Payload and Payload Length
      fields.

The correct way to do is to make new exchange type for this new
childless IKE_SA_INIT & IKE_AUTH. That way old implenentations will
then know that they do not understand this new type and will drop the
packets. This is if you really want the property that if responder
does not understand chieldless IKE_AUTH you do not want to continue at
all. 

I have not yet read the draft, as I have been too busy with working
group drafts already, and I still do not know if this is really needed
at all...
-- 
kivinen@iki.fi

From kivinen@iki.fi  Tue Jul  7 12:41:02 2009
Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9D1FB28C4DF for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 12:41:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.444
X-Spam-Level: 
X-Spam-Status: No, score=-2.444 tagged_above=-999 required=5 tests=[AWL=0.155,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TiSfx4F0KA3v for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 12:41:01 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) by core3.amsl.com (Postfix) with ESMTP id 7AB3528C2FF for <ipsec@ietf.org>; Tue,  7 Jul 2009 12:41:01 -0700 (PDT)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.14.3/8.13.8) with ESMTP id n67JaliG022652 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 7 Jul 2009 22:36:47 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.14.3/8.12.11) id n67Jakib000479; Tue, 7 Jul 2009 22:36:46 +0300 (EEST)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <19027.41934.936260.472789@fireball.kivinen.iki.fi>
Date: Tue, 7 Jul 2009 22:36:46 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <p06240802c6680d03083c@[10.20.30.158]>
References: <20090416140001.4BD833A6B6E@core3.amsl.com> <p06240802c6680d03083c@[10.20.30.158]>
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 6 min
X-Total-Time: 6 min
Cc: ipsec@ietf.org
Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-esp-null-heuristics-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jul 2009 19:41:02 -0000

Paul Hoffman writes:
> >	Title           : Heuristics for Detecting ESP-NULL packets
> Soooo, that was two months ago, and there has been no discussion.
> Has anyone other than the document authors (and the WESP authors)
> read the document? Does the WG find this to be useful? 
> 
> Tero and Dan: have you found anything that you want to change?

We did receive few comments that might be added to the draft, those
were about the GCM IV (i.e. they might not be random, but might be
counter, which means they might have lots of zeroes in the beginning,
and that might affect the heuristics a bit), and another were about
adding some section about how end-nodes can make small changes to make
the heuristics more efficient (i.e. use more than minimal number of
padding, for first few packets for new SA, and make sure GCM IVs look
random enough, so they cannot be confused for TCP or UDP headers). 

I have not made those changes, as I am not sure if we want to even add
both of them. I was mostly waiting for more comments and then think
again about whether to add those or not.

Ps. I am currently on vacation until IETF, so I am reading my emails
very randomly...
-- 
kivinen@iki.fi

From kivinen@iki.fi  Tue Jul  7 13:09:49 2009
Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E78433A6A88 for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 13:09:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.464
X-Spam-Level: 
X-Spam-Status: No, score=-2.464 tagged_above=-999 required=5 tests=[AWL=0.135,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZPh0SeWD+uLD for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 13:09:48 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) by core3.amsl.com (Postfix) with ESMTP id 311A93A6967 for <ipsec@ietf.org>; Tue,  7 Jul 2009 13:09:47 -0700 (PDT)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.14.3/8.13.8) with ESMTP id n67K3kru018514 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 7 Jul 2009 23:03:46 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.14.3/8.12.11) id n67K3jtA018834; Tue, 7 Jul 2009 23:03:45 +0300 (EEST)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <19027.43553.775159.973458@fireball.kivinen.iki.fi>
Date: Tue, 7 Jul 2009 23:03:45 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Scott C Moonen <smoonen@us.ibm.com>
In-Reply-To: <OF64B37372.AF72323C-ON852575EC.0052D4A5-852575EC.0053F3C5@us.ibm.com>
References: <OF64B37372.AF72323C-ON852575EC.0052D4A5-852575EC.0053F3C5@us.ibm.com>
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 7 min
X-Total-Time: 8 min
Cc: ipsec@ietf.org
Subject: [IPsec] question about the use of AES-XCBC in IKEv1 for NAT-D	payloads
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jul 2009 20:09:50 -0000

Scott C Moonen writes:
> Generally, for authentication and PRF purposes, IKEv1 uses HMAC forms of 
> authentication algorithms.  For most algorithms (e.g., MD5, SHA1, etc.) 
> there is both a non-keyed form of the hash and also a keyed HMAC form. 
> This doesn't seem to be true for AES-XCBC, which is explicitly defined as 
> a keyed hash function.

AES-XCBC cannot be used with IKEv1. It can be used for ESP/AH as
http://www.iana.org/assignments/isakmp-registry registry has values
for it, but http://www.iana.org/assignments/ipsec-registry registry
which is used for IKEv1 SA itself does not have any entries for
AES-XCBC. 

> RFC 3947 documents the use of a non-keyed hash for generating a NAT-D 
> payload.  It says that "this uses the negotiated HASH algorithm".  What 
> hash algorithm should one use if AES-XCBC is being used for 
> authentication?

As AES-XCBC cannot be used for IKEv1 SA itself, you use the normal
negotiated Hash algorithm for that IKEv1 SA. If AES-XCBC would be
added for IKEv1 SAs also, then it would be added as PRF not as Hash
algorith, and then IKEv1 SAs using it would have one Hash algorithm
(MD5, Sha1 or similar) and one PRF negotiated. Hash algorithm would be
used for example when generating the NAT-D payloads, and PRF would be
used for generating key material and calculating message
authentication codes for the IKEv1 packets.

Of course I might be remembering wrong, as writing comments about
protocol obsoleted 4 years ago while on vacation might cause that...
-- 
kivinen@iki.fi

From yaronf@checkpoint.com  Tue Jul  7 13:13:33 2009
Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C66373A6EBF for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 13:13:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.034
X-Spam-Level: 
X-Spam-Status: No, score=-3.034 tagged_above=-999 required=5 tests=[AWL=0.565,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gsLjxs28q7M5 for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 13:13:33 -0700 (PDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by core3.amsl.com (Postfix) with ESMTP id 8AB463A6A8B for <ipsec@ietf.org>; Tue,  7 Jul 2009 13:13:32 -0700 (PDT)
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n67KD33d017921; Tue, 7 Jul 2009 23:13:04 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Tue, 7 Jul 2009 23:13:03 +0300
From: Yaron Sheffer <yaronf@checkpoint.com>
To: Tero Kivinen <kivinen@iki.fi>, Paul Hoffman <paul.hoffman@vpnc.org>
Date: Tue, 7 Jul 2009 23:13:02 +0300
Thread-Topic: [IPsec] I-D Action:draft-ietf-ipsecme-esp-null-heuristics-00.txt
Thread-Index: Acn/Ou8whNmgDiLUSh2RPRQVQ10l3gAAzyKQ
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD599F5@il-ex01.ad.checkpoint.com>
References: <20090416140001.4BD833A6B6E@core3.amsl.com> <p06240802c6680d03083c@[10.20.30.158]> <19027.41934.936260.472789@fireball.kivinen.iki.fi>
In-Reply-To: <19027.41934.936260.472789@fireball.kivinen.iki.fi>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0064_01C9FF58.79BDB310"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-esp-null-heuristics-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jul 2009 20:13:33 -0000

------=_NextPart_000_0064_01C9FF58.79BDB310
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi Tero,

We have one working group draft dealing with new ESP-null implementations.
We have another draft dealing with unchanged ESP-null implementations. I
suggest we don't confuse everybody by adding a third category:
just-a-little-tiny-bit changed implementations. In other words, I think the
second change is *not* a good idea.

Thanks,
	Yaron

> -----Original Message-----
> From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of
> Tero Kivinen
> Sent: Tuesday, July 07, 2009 22:37
> To: Paul Hoffman
> Cc: ipsec@ietf.org
> Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-esp-null-heuristics-
> 00.txt
> 
> Paul Hoffman writes:
> > >	Title           : Heuristics for Detecting ESP-NULL packets
> > Soooo, that was two months ago, and there has been no discussion.
> > Has anyone other than the document authors (and the WESP authors)
> > read the document? Does the WG find this to be useful?
> >
> > Tero and Dan: have you found anything that you want to change?
> 
> We did receive few comments that might be added to the draft, those
> were about the GCM IV (i.e. they might not be random, but might be
> counter, which means they might have lots of zeroes in the beginning,
> and that might affect the heuristics a bit), and another were about
> adding some section about how end-nodes can make small changes to make
> the heuristics more efficient (i.e. use more than minimal number of
> padding, for first few packets for new SA, and make sure GCM IVs look
> random enough, so they cannot be confused for TCP or UDP headers).
> 
> I have not made those changes, as I am not sure if we want to even add
> both of them. I was mostly waiting for more comments and then think
> again about whether to add those or not.
> 
> Ps. I am currently on vacation until IETF, so I am reading my emails
> very randomly...
> --
> kivinen@iki.fi
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
> 
> Scanned by Check Point Total Security Gateway.

------=_NextPart_000_0064_01C9FF58.79BDB310
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_0064_01C9FF58.79BDB310--

From kivinen@iki.fi  Tue Jul  7 13:41:31 2009
Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E93413A68DC for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 13:41:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.479
X-Spam-Level: 
X-Spam-Status: No, score=-2.479 tagged_above=-999 required=5 tests=[AWL=0.120,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J+gOu9oamBI5 for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 13:41:31 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) by core3.amsl.com (Postfix) with ESMTP id C3DD228C2FF for <ipsec@ietf.org>; Tue,  7 Jul 2009 13:41:30 -0700 (PDT)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.14.3/8.13.8) with ESMTP id n67KduPS026535 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 7 Jul 2009 23:39:56 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.14.3/8.12.11) id n67KdsTm004098; Tue, 7 Jul 2009 23:39:54 +0300 (EEST)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <19027.45722.920389.913886@fireball.kivinen.iki.fi>
Date: Tue, 7 Jul 2009 23:39:54 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Yaron Sheffer <yaronf@checkpoint.com>
In-Reply-To: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD599F5@il-ex01.ad.checkpoint.com>
References: <20090416140001.4BD833A6B6E@core3.amsl.com> <p06240802c6680d03083c@[10.20.30.158]> <19027.41934.936260.472789@fireball.kivinen.iki.fi> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD599F5@il-ex01.ad.checkpoint.com>
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 4 min
X-Total-Time: 3 min
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-esp-null-heuristics-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jul 2009 20:41:32 -0000

Yaron Sheffer writes:
> We have one working group draft dealing with new ESP-null implementations.
> We have another draft dealing with unchanged ESP-null implementations. I
> suggest we don't confuse everybody by adding a third category:
> just-a-little-tiny-bit changed implementations. In other words, I think the
> second change is *not* a good idea.

Partly agree, which is why I have not yet added that to the document.

On the other hand "just-a-little-tiny-bit" change is something that
does not break interoperability, i.e. even if sender does those
changes, complient recipients will be able to process packets
normally, as they are still completely valid ESP packets, only
difference is that sender decided to use the option in ESP where you
can add more padding if you want, and/or decided to select GCM IVs in
a way which makes them look like random. Both of those implementation
hints would be something that would not require any changes for the
recipient. That is why I haven't already completely ruled out adding
that kind of implementation hints for sender section to future drafts.
-- 
kivinen@iki.fi

From paul.hoffman@vpnc.org  Tue Jul  7 13:50:30 2009
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9C1403A68D5 for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 13:50:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.382
X-Spam-Level: 
X-Spam-Status: No, score=-2.382 tagged_above=-999 required=5 tests=[AWL=0.217,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3+vNA7AvMhzJ for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 13:50:29 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 77FAF3A6804 for <ipsec@ietf.org>; Tue,  7 Jul 2009 13:50:29 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n67KoldW074049 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 7 Jul 2009 13:50:48 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06240846c6796598533e@[10.20.30.158]>
In-Reply-To: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD599F5@il-ex01.ad.checkpoint.com>
References: <20090416140001.4BD833A6B6E@core3.amsl.com> <p06240802c6680d03083c@[10.20.30.158]> <19027.41934.936260.472789@fireball.kivinen.iki.fi> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD599F5@il-ex01.ad.checkpoint.com>
Date: Tue, 7 Jul 2009 13:50:46 -0700
To: Yaron Sheffer <yaronf@checkpoint.com>, Tero Kivinen <kivinen@iki.fi>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-esp-null-heuristics-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jul 2009 20:50:30 -0000

At 11:13 PM +0300 7/7/09, Yaron Sheffer wrote:
>Content-Language: en-US
>We have one working group draft dealing with new ESP-null implementations.
>We have another draft dealing with unchanged ESP-null implementations. I
>suggest we don't confuse everybody by adding a third category:
>just-a-little-tiny-bit changed implementations. In other words, I think the
>second change is *not* a good idea.

Fully agree.

--Paul Hoffman, Director
--VPN Consortium

From smoonen@us.ibm.com  Tue Jul  7 13:52:40 2009
Return-Path: <smoonen@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4CA4B3A6804 for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 13:52:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.36
X-Spam-Level: 
X-Spam-Status: No, score=-6.36 tagged_above=-999 required=5 tests=[AWL=0.238,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 71VIbRyPa55E for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 13:52:39 -0700 (PDT)
Received: from e34.co.us.ibm.com (e34.co.us.ibm.com [32.97.110.152]) by core3.amsl.com (Postfix) with ESMTP id AF3983A6967 for <ipsec@ietf.org>; Tue,  7 Jul 2009 13:52:38 -0700 (PDT)
Received: from d03relay04.boulder.ibm.com (d03relay04.boulder.ibm.com [9.17.195.106]) by e34.co.us.ibm.com (8.13.1/8.13.1) with ESMTP id n67Kmnuc009512 for <ipsec@ietf.org>; Tue, 7 Jul 2009 14:48:49 -0600
Received: from d03av05.boulder.ibm.com (d03av05.boulder.ibm.com [9.17.195.85]) by d03relay04.boulder.ibm.com (8.13.8/8.13.8/NCO v9.2) with ESMTP id n67KqBNc210040 for <ipsec@ietf.org>; Tue, 7 Jul 2009 14:52:11 -0600
Received: from d03av05.boulder.ibm.com (loopback [127.0.0.1]) by d03av05.boulder.ibm.com (8.13.1/8.13.3) with ESMTP id n67KqAEn001337 for <ipsec@ietf.org>; Tue, 7 Jul 2009 14:52:10 -0600
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av05.boulder.ibm.com (8.13.1/8.12.11) with ESMTP id n67KqAhc001334; Tue, 7 Jul 2009 14:52:10 -0600
In-Reply-To: <19027.43553.775159.973458@fireball.kivinen.iki.fi>
References: <OF64B37372.AF72323C-ON852575EC.0052D4A5-852575EC.0053F3C5@us.ibm.com> <19027.43553.775159.973458@fireball.kivinen.iki.fi>
To: Tero Kivinen <kivinen@iki.fi>
MIME-Version: 1.0
X-KeepSent: FBC4CE02:700C9D29-852575EC:0072273E; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2 HF623 January 16, 2009
From: Scott C Moonen <smoonen@us.ibm.com>
X-MIMETrack: S/MIME Sign by Notes Client on Scott C Moonen/Raleigh/IBM(Release 8.0.2 HF623|January 16, 2009) at 07/07/2009 04:51:37 PM, Serialize by Notes Client on Scott C Moonen/Raleigh/IBM(Release 8.0.2 HF623|January 16, 2009) at 07/07/2009 04:51:37 PM, Serialize complete at 07/07/2009 04:51:37 PM, S/MIME Sign failed at 07/07/2009 04:51:37 PM: The cryptographic key was not found, Serialize by Router on D03NM118/03/M/IBM(Release 8.5|December 05, 2008) at 07/07/2009 14:52:10, Serialize complete at 07/07/2009 14:52:10
Message-ID: <OFFBC4CE02.700C9D29-ON852575EC.0072273E-852575EC.0072A390@us.ibm.com>
Date: Tue, 7 Jul 2009 16:52:09 -0400
Content-Type: multipart/alternative; boundary="=_alternative 007296E9852575EC_="
Cc: ipsec@ietf.org
Subject: Re: [IPsec] question about the use of AES-XCBC in IKEv1 for NAT-D	payloads
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jul 2009 20:52:40 -0000

This is a multipart message in MIME format.
--=_alternative 007296E9852575EC_=
Content-Type: text/plain; charset="US-ASCII"

Tero,

> AES-XCBC cannot be used with IKEv1. It can be used for ESP/AH as
> http://www.iana.org/assignments/isakmp-registry registry has values
> for it, but http://www.iana.org/assignments/ipsec-registry registry
> which is used for IKEv1 SA itself does not have any entries for
> AES-XCBC. 

Aah, ok, I think I was confusing the isakmp and ipsec registries.  Thank 
you.

I was going to say that RFC 4308 is therefore incoherent.  But I now see 
that Paul wrote an erratum documenting the use of SHA-1 for IKEv1.


Scott Moonen (smoonen@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://scott.andstuff.org/
http://www.linkedin.com/in/smoonen



From:
Tero Kivinen <kivinen@iki.fi>
To:
Scott C Moonen/Raleigh/IBM@IBMUS
Cc:
ipsec@ietf.org
Date:
07/07/2009 04:09 PM
Subject:
[IPsec] question about the use of AES-XCBC in IKEv1 for NAT-D   payloads



Scott C Moonen writes:
> Generally, for authentication and PRF purposes, IKEv1 uses HMAC forms of 

> authentication algorithms.  For most algorithms (e.g., MD5, SHA1, etc.) 
> there is both a non-keyed form of the hash and also a keyed HMAC form. 
> This doesn't seem to be true for AES-XCBC, which is explicitly defined 
as 
> a keyed hash function.

AES-XCBC cannot be used with IKEv1. It can be used for ESP/AH as
http://www.iana.org/assignments/isakmp-registry registry has values
for it, but http://www.iana.org/assignments/ipsec-registry registry
which is used for IKEv1 SA itself does not have any entries for
AES-XCBC. 

> RFC 3947 documents the use of a non-keyed hash for generating a NAT-D 
> payload.  It says that "this uses the negotiated HASH algorithm".  What 
> hash algorithm should one use if AES-XCBC is being used for 
> authentication?

As AES-XCBC cannot be used for IKEv1 SA itself, you use the normal
negotiated Hash algorithm for that IKEv1 SA. If AES-XCBC would be
added for IKEv1 SAs also, then it would be added as PRF not as Hash
algorith, and then IKEv1 SAs using it would have one Hash algorithm
(MD5, Sha1 or similar) and one PRF negotiated. Hash algorithm would be
used for example when generating the NAT-D payloads, and PRF would be
used for generating key material and calculating message
authentication codes for the IKEv1 packets.

Of course I might be remembering wrong, as writing comments about
protocol obsoleted 4 years ago while on vacation might cause that...
-- 
kivinen@iki.fi



--=_alternative 007296E9852575EC_=
Content-Type: text/html; charset="US-ASCII"


<br><font size=2 face="sans-serif">Tero,</font>
<br>
<br><tt><font size=2>&gt; AES-XCBC cannot be used with IKEv1. It can be
used for ESP/AH as<br>
&gt; </font></tt><a href="http://www.iana.org/assignments/isakmp-registry"><tt><font size=2>http://www.iana.org/assignments/isakmp-registry</font></tt></a><tt><font size=2>
registry has values<br>
&gt; for it, but </font></tt><a href="http://www.iana.org/assignments/ipsec-registry"><tt><font size=2>http://www.iana.org/assignments/ipsec-registry</font></tt></a><tt><font size=2>
registry<br>
&gt; which is used for IKEv1 SA itself does not have any entries for<br>
&gt; AES-XCBC. </font></tt>
<br>
<br><font size=2 face="sans-serif">Aah, ok, I think I was confusing the
isakmp and ipsec registries. &nbsp;Thank you.</font>
<br>
<br><font size=2 face="sans-serif">I was going to say that RFC 4308 is
therefore incoherent. &nbsp;But I now see that Paul wrote an erratum documenting
the use of SHA-1 for IKEv1.</font>
<br>
<br><font size=2 face="sans-serif"><br>
Scott Moonen (smoonen@us.ibm.com)<br>
z/OS Communications Server TCP/IP Development<br>
</font><a href=http://scott.andstuff.org/><font size=2 face="sans-serif">http://scott.andstuff.org/</font></a><font size=2 face="sans-serif"><br>
</font><a href=http://www.linkedin.com/in/smoonen><font size=2 face="sans-serif">http://www.linkedin.com/in/smoonen</font></a>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">From:</font>
<td><font size=1 face="sans-serif">Tero Kivinen &lt;kivinen@iki.fi&gt;</font>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">To:</font>
<td><font size=1 face="sans-serif">Scott C Moonen/Raleigh/IBM@IBMUS</font>
<tr>
<td valign=top><font size=1 color=#5f5f5f face="sans-serif">Cc:</font>
<td><font size=1 face="sans-serif">ipsec@ietf.org</font>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">Date:</font>
<td><font size=1 face="sans-serif">07/07/2009 04:09 PM</font>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">Subject:</font>
<td><font size=1 face="sans-serif">[IPsec] question about the use of AES-XCBC
in IKEv1 for NAT-D &nbsp; &nbsp; &nbsp; &nbsp;payloads</font></table>
<br>
<hr noshade>
<br>
<br>
<br><tt><font size=2>Scott C Moonen writes:<br>
&gt; Generally, for authentication and PRF purposes, IKEv1 uses HMAC forms
of <br>
&gt; authentication algorithms. &nbsp;For most algorithms (e.g., MD5, SHA1,
etc.) <br>
&gt; there is both a non-keyed form of the hash and also a keyed HMAC form.
<br>
&gt; This doesn't seem to be true for AES-XCBC, which is explicitly defined
as <br>
&gt; a keyed hash function.<br>
<br>
AES-XCBC cannot be used with IKEv1. It can be used for ESP/AH as<br>
</font></tt><a href="http://www.iana.org/assignments/isakmp-registry"><tt><font size=2>http://www.iana.org/assignments/isakmp-registry</font></tt></a><tt><font size=2>
registry has values<br>
for it, but </font></tt><a href="http://www.iana.org/assignments/ipsec-registry"><tt><font size=2>http://www.iana.org/assignments/ipsec-registry</font></tt></a><tt><font size=2>
registry<br>
which is used for IKEv1 SA itself does not have any entries for<br>
AES-XCBC. <br>
<br>
&gt; RFC 3947 documents the use of a non-keyed hash for generating a NAT-D
<br>
&gt; payload. &nbsp;It says that &quot;this uses the negotiated HASH algorithm&quot;.
&nbsp;What <br>
&gt; hash algorithm should one use if AES-XCBC is being used for <br>
&gt; authentication?<br>
<br>
As AES-XCBC cannot be used for IKEv1 SA itself, you use the normal<br>
negotiated Hash algorithm for that IKEv1 SA. If AES-XCBC would be<br>
added for IKEv1 SAs also, then it would be added as PRF not as Hash<br>
algorith, and then IKEv1 SAs using it would have one Hash algorithm<br>
(MD5, Sha1 or similar) and one PRF negotiated. Hash algorithm would be<br>
used for example when generating the NAT-D payloads, and PRF would be<br>
used for generating key material and calculating message<br>
authentication codes for the IKEv1 packets.<br>
<br>
Of course I might be remembering wrong, as writing comments about<br>
protocol obsoleted 4 years ago while on vacation might cause that...<br>
-- <br>
kivinen@iki.fi<br>
</font></tt>
<br>
<br>
--=_alternative 007296E9852575EC_=--

From suresh.krishnan@ericsson.com  Tue Jul  7 15:29:24 2009
Return-Path: <suresh.krishnan@ericsson.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4EBAD3A6E70 for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 15:29:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.546
X-Spam-Level: 
X-Spam-Status: No, score=-6.546 tagged_above=-999 required=5 tests=[AWL=0.054,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LSuunC0LO7bn for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 15:29:23 -0700 (PDT)
Received: from imr1.ericy.com (imr1.ericy.com [198.24.6.9]) by core3.amsl.com (Postfix) with ESMTP id 7B0543A68A1 for <ipsec@ietf.org>; Tue,  7 Jul 2009 15:29:23 -0700 (PDT)
Received: from eusrcmw751.eamcs.ericsson.se (eusrcmw751.exu.ericsson.se [138.85.77.51]) by imr1.ericy.com (8.13.1/8.13.1) with ESMTP id n67MSeFW002470; Tue, 7 Jul 2009 17:28:43 -0500
Received: from eusrcmw751.eamcs.ericsson.se ([138.85.77.56]) by eusrcmw751.eamcs.ericsson.se with Microsoft SMTPSVC(6.0.3790.1830);  Tue, 7 Jul 2009 17:28:32 -0500
Received: from [142.133.10.113] ([142.133.10.113]) by eusrcmw751.eamcs.ericsson.se with Microsoft SMTPSVC(6.0.3790.1830);  Tue, 7 Jul 2009 17:28:32 -0500
Message-ID: <4A53CBCF.3020201@ericsson.com>
Date: Tue, 07 Jul 2009 18:27:27 -0400
From: Suresh Krishnan <suresh.krishnan@ericsson.com>
User-Agent: Thunderbird 2.0.0.22 (X11/20090608)
MIME-Version: 1.0
To: Sean Turner <turners@ieca.com>
References: <4A527351.5090503@ericsson.com> <4A536E85.5060604@ieca.com>
In-Reply-To: <4A536E85.5060604@ieca.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 07 Jul 2009 22:28:32.0679 (UTC) FILETIME=[429D8370:01C9FF52]
Cc: IPsecme WG <ipsec@ietf.org>
Subject: Re: [IPsec] New version of the roadmap draft available
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jul 2009 22:29:24 -0000

Hi Sean,
   Sounds good. We will make the change in the next revision.

Thanks
Suresh

On 09-07-07 11:49 AM, Sean Turner wrote:
> Suresh,
> 
> I think the last recommendation in 5.3.1 wrt the hashing algorithms in 
> PKIX certificates needs to be reworded: r/for PKIX certificates signed 
> with HMAC-SHA-256, -384, and -512./for PKIX certificates hashed with 
> SHA-256, -384, and -512.
> 
> spt
> 
> Suresh Krishnan wrote:
>> Hi Folks,
>>   We have published a new version of the roadmap draft. Pleae take a 
>> look at it and let us know if you have any comments or suggestions.
>>
>> http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-roadmap-02.txt
>>
>> Thanks
>> Sheila and Suresh
>> _______________________________________________
>> IPsec mailing list
>> IPsec@ietf.org
>> https://www.ietf.org/mailman/listinfo/ipsec
>>


From rsjenwar@gmail.com  Tue Jul  7 21:17:45 2009
Return-Path: <rsjenwar@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 147A93A6830 for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 21:17:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.48
X-Spam-Level: 
X-Spam-Status: No, score=-2.48 tagged_above=-999 required=5 tests=[AWL=0.118,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8I24KxhJPeDf for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 21:17:44 -0700 (PDT)
Received: from mail-px0-f175.google.com (mail-px0-f175.google.com [209.85.216.175]) by core3.amsl.com (Postfix) with ESMTP id 0C3663A67A3 for <ipsec@ietf.org>; Tue,  7 Jul 2009 21:17:43 -0700 (PDT)
Received: by pxi5 with SMTP id 5so1085443pxi.29 for <ipsec@ietf.org>; Tue, 07 Jul 2009 21:18:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=d4jpCpwdAlEQ1/TjWB06U9YRJm60nhiZT9oTCJQkt3o=; b=FXfMlDQb7Ys9JQFBAmIMrpjH5PHHKNHYUJ84ByDvSi9IMABkgDTpQIiEJ5Lvjc910o eL9MgwPmZa+cBNQ/fbwwj5eF2swDXO/B0e06fUiTaxg3QfU7HIvyJza55PH5wAN6HjXq LULeG3S2zrng3ZltVI2vbI+v90plRc867PFdI=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=pS15qA46LoOzv/tJtnL+1TSWcG6XPxNhRjByyWp4edNod8suf9qDGjtdwe94hxJah9 G/BXvkNmxz/0VZmxFo9KHLmBkg48bdYcti786UWVRgkGc0KuI2jHP+5WP56TVrhPTlyc Ej2yCVIyvqNASq2mQHup4x7lWohL1iuQK9x6E=
MIME-Version: 1.0
Received: by 10.142.155.13 with SMTP id c13mr2372940wfe.211.1247026682764;  Tue, 07 Jul 2009 21:18:02 -0700 (PDT)
In-Reply-To: <19027.41530.987118.492735@fireball.kivinen.iki.fi>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com> <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594C4@il-ex01.ad.checkpoint.com> <7ccecf670907040336t51b15b1t790284952459069a@mail.gmail.com> <19027.41530.987118.492735@fireball.kivinen.iki.fi>
Date: Wed, 8 Jul 2009 09:48:02 +0530
Message-ID: <7ccecf670907072118l2cad6e24i6de6aadfc023604a@mail.gmail.com>
From: Raj Singh <rsjenwar@gmail.com>
To: Tero Kivinen <kivinen@iki.fi>
Content-Type: multipart/alternative; boundary=000e0cd2e45873b1c3046e2a061c
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Yoav Nir <ynir@checkpoint.com>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Jul 2009 04:17:45 -0000

--000e0cd2e45873b1c3046e2a061c
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Tero,

Thanks for your valuable inputs.
Please find re inputs inline. <Raj>

On Wed, Jul 8, 2009 at 1:00 AM, Tero Kivinen <kivinen@iki.fi> wrote:

> Raj Singh writes:
> > Your suggestion of having "critical" bit set on childless notify/VID
> payload
> > from initiator in IKE_SA_INIT exchange will define the bahavior as
> mentioned
> > below.
>
> That is not correct way of using critical bit. Critical bit means that
> if it is set and the PAYLOAD TYPE is not understood, then
> UNSUPPORTED_CRITICAL_PAYLOAD error is reported. Every implementation
> will understand Notify and Vendor ID payloads, thus they will never
> return UNSUPPORTED_CRITICAL_PAYLOAD regardless what the contents of
> those payloads are.

<Raj>
I  was under impression that we can have "critical" bit in childless
IKE_AUTH notify/VID.
Even Yaron also clarified in same thread that we need new exchange type to
have "critical" bit on it.

>
>
> > If initiator want to childless IKE_AUTH, it will send  CHILDLESS_IKE_AUTH
> > notify/VID payload having "critical" flag SET in IKE_SA_INIT request.
>
> And complient implentation will do what to do as RFC4306 says ie:
>
>      ... MUST be ignored by the recipient if the recipient
>      understands the payload type code. MUST be set to zero for
>      payload types defined in this document. Note that the critical
>      bit applies to the current payload rather than the "next"
>      payload whose type code appears in the first octet. The
>      reasoning behind not setting the critical bit for payloads
>      defined in this document is that all implementations MUST
>      understand all payload types defined in this document and
>      therefore must ignore the Critical bit's value. Skipped payloads
>      are expected to have valid Next Payload and Payload Length
>      fields.
>
> The correct way to do is to make new exchange type for this new
> childless IKE_SA_INIT & IKE_AUTH. That way old implenentations will
> then know that they do not understand this new type and will drop the
> packets. This is if you really want the property that if responder
> does not understand chieldless IKE_AUTH you do not want to continue at
> all.
>
> I have not yet read the draft, as I have been too busy with working
> group drafts already, and I still do not know if this is really needed
> at all...

<Raj>
If we can't have "critical" bit inside associated data of childless
notify/VID,  then
new exchange type is a near possibility.
Please have a look at the use cases in the draft for need of this draft.

>
> --
> kivinen@iki.fi
>

With Regards,
Raj

--000e0cd2e45873b1c3046e2a061c
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Tero,<br><br>Thanks for your valuable inputs.<br>Please find re inputs i=
nline. &lt;Raj&gt;<br><br><div class=3D"gmail_quote">On Wed, Jul 8, 2009 at=
 1:00 AM, Tero Kivinen <span dir=3D"ltr">&lt;<a href=3D"mailto:kivinen@iki.=
fi">kivinen@iki.fi</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"border-left: 1px solid rgb(204, =
204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;"><div class=3D"im"=
>Raj Singh writes:<br>
&gt; Your suggestion of having &quot;critical&quot; bit set on childless no=
tify/VID payload<br>
&gt; from initiator in IKE_SA_INIT exchange will define the bahavior as men=
tioned<br>
&gt; below.<br>
<br>
</div>That is not correct way of using critical bit. Critical bit means tha=
t<br>
if it is set and the PAYLOAD TYPE is not understood, then<br>
UNSUPPORTED_CRITICAL_PAYLOAD error is reported. Every implementation<br>
will understand Notify and Vendor ID payloads, thus they will never<br>
return UNSUPPORTED_CRITICAL_PAYLOAD regardless what the contents of<br>
those payloads are.</blockquote><div>&lt;Raj&gt; <br></div><div>I=C2=A0 was=
 under impression that we can have &quot;critical&quot; bit in childless IK=
E_AUTH notify/VID.<br>Even Yaron also clarified in same thread that we need=
 new exchange type to have &quot;critical&quot; bit on it.<br>
</div><blockquote class=3D"gmail_quote" style=3D"border-left: 1px solid rgb=
(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;"><br>
<div class=3D"im"><br>
&gt; If initiator want to childless IKE_AUTH, it will send =C2=A0CHILDLESS_=
IKE_AUTH<br>
&gt; notify/VID payload having &quot;critical&quot; flag SET in IKE_SA_INIT=
 request.<br>
<br>
</div>And complient implentation will do what to do as RFC4306 says ie:<br>
<br>
 =C2=A0 =C2=A0 =C2=A0... MUST be ignored by the recipient if the recipient<=
br>
 =C2=A0 =C2=A0 =C2=A0understands the payload type code. MUST be set to zero=
 for<br>
 =C2=A0 =C2=A0 =C2=A0payload types defined in this document. Note that the =
critical<br>
 =C2=A0 =C2=A0 =C2=A0bit applies to the current payload rather than the &qu=
ot;next&quot;<br>
 =C2=A0 =C2=A0 =C2=A0payload whose type code appears in the first octet. Th=
e<br>
 =C2=A0 =C2=A0 =C2=A0reasoning behind not setting the critical bit for payl=
oads<br>
 =C2=A0 =C2=A0 =C2=A0defined in this document is that all implementations M=
UST<br>
 =C2=A0 =C2=A0 =C2=A0understand all payload types defined in this document =
and<br>
 =C2=A0 =C2=A0 =C2=A0therefore must ignore the Critical bit&#39;s value. Sk=
ipped payloads<br>
 =C2=A0 =C2=A0 =C2=A0are expected to have valid Next Payload and Payload Le=
ngth<br>
 =C2=A0 =C2=A0 =C2=A0fields.<br>
<br>
The correct way to do is to make new exchange type for this new<br>
childless IKE_SA_INIT &amp; IKE_AUTH. That way old implenentations will<br>
then know that they do not understand this new type and will drop the<br>
packets. This is if you really want the property that if responder<br>
does not understand chieldless IKE_AUTH you do not want to continue at<br>
all.<br>
<br>
I have not yet read the draft, as I have been too busy with working<br>
group drafts already, and I still do not know if this is really needed<br>
at all...</blockquote><div>&lt;Raj&gt; <br></div><div>If we can&#39;t have =
&quot;critical&quot; bit inside associated data of childless notify/VID,=C2=
=A0 then <br>new exchange type is a near possibility. <br>Please have a loo=
k at the use cases in the draft for need of this draft.<br>
</div><blockquote class=3D"gmail_quote" style=3D"border-left: 1px solid rgb=
(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;"><br>
<font color=3D"#888888">--<br>
<a href=3D"mailto:kivinen@iki.fi">kivinen@iki.fi</a><br>
</font></blockquote></div><br>With Regards,<br>Raj<br>

--000e0cd2e45873b1c3046e2a061c--

From ynir@checkpoint.com  Tue Jul  7 22:49:41 2009
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0153A3A6CCF for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 22:49:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.098
X-Spam-Level: 
X-Spam-Status: No, score=-3.098 tagged_above=-999 required=5 tests=[AWL=0.500,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EHF8V+bdVTUW for <ipsec@core3.amsl.com>; Tue,  7 Jul 2009 22:49:33 -0700 (PDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by core3.amsl.com (Postfix) with ESMTP id 4D28C3A6C64 for <ipsec@ietf.org>; Tue,  7 Jul 2009 22:49:33 -0700 (PDT)
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n685nu3d015293; Wed, 8 Jul 2009 08:49:56 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Wed, 8 Jul 2009 08:49:56 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: "'Raj Singh'" <rsjenwar@gmail.com>, Tero Kivinen <kivinen@iki.fi>
Date: Wed, 8 Jul 2009 08:49:54 +0300
Thread-Topic: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
Thread-Index: Acn/gxgMsLaBO5gHSgu1nTSfGNXrcAACzUFQ
Message-ID: <006FEB08D9C6444AB014105C9AEB133F433538CE42@il-ex01.ad.checkpoint.com>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com> <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594C4@il-ex01.ad.checkpoint.com> <7ccecf670907040336t51b15b1t790284952459069a@mail.gmail.com> <19027.41530.987118.492735@fireball.kivinen.iki.fi> <7ccecf670907072118l2cad6e24i6de6aadfc023604a@mail.gmail.com>
In-Reply-To: <7ccecf670907072118l2cad6e24i6de6aadfc023604a@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_006FEB08D9C6444AB014105C9AEB133F433538CE42ilex01adcheck_"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Jul 2009 05:49:41 -0000

--_000_006FEB08D9C6444AB014105C9AEB133F433538CE42ilex01adcheck_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Raj

What Yaron suggested, was to create a new payload type, and mark that as cr=
itical.

I don't like either Yaron's or Tero's suggestions, as both lead to a kind o=
f "take it or leave it" behavior. The initiator proposes doing "childless",=
 and if the responder does not agree, the IKE SA breaks.

At least for the remote access case, where we want a stand-by IKE SA so tha=
t eventually we can have child SAs, this does not make sense. If the respon=
der does not support childless, the initiator can still propose universal s=
electors, and the responder will narrow them down to a (possibly useless) v=
alid SA.

I think a better option is to have a notify/VID payload, with flags indicat=
ing whether a childless exchange is wanted, required or prohibited, and whe=
ther subsequent child SAs should be permitted.  This does still have a prob=
lem where the initiator requires that the IKE_AUTH be childless and the res=
ponder does not support the extension.

Alternatively, we could adopt Yaron's suggestion, and make a new payload, w=
ith a critical bit turned on or off according to requirement level. I don't=
 like having empty payloads, but I can't back up this dislike with any good=
 argument.

Maybe when we make version 2.1 of IKE, we can add a "critical type" bit to =
the notification payload.
________________________________
From: Raj Singh [mailto:rsjenwar@gmail.com]
Sent: Wednesday, July 08, 2009 7:18 AM
To: Tero Kivinen
Cc: Yaron Sheffer; ipsec@ietf.org; Yoav Nir
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hi Tero,

Thanks for your valuable inputs.
Please find re inputs inline. <Raj>
On Wed, Jul 8, 2009 at 1:00 AM, Tero Kivinen <kivinen@iki.fi<mailto:kivinen=
@iki.fi>> wrote:
Raj Singh writes:
> Your suggestion of having "critical" bit set on childless notify/VID payl=
oad
> from initiator in IKE_SA_INIT exchange will define the bahavior as mentio=
ned
> below.
That is not correct way of using critical bit. Critical bit means that
if it is set and the PAYLOAD TYPE is not understood, then
UNSUPPORTED_CRITICAL_PAYLOAD error is reported. Every implementation
will understand Notify and Vendor ID payloads, thus they will never
return UNSUPPORTED_CRITICAL_PAYLOAD regardless what the contents of
those payloads are.
<Raj>
I  was under impression that we can have "critical" bit in childless IKE_AU=
TH notify/VID.
Even Yaron also clarified in same thread that we need new exchange type to =
have "critical" bit on it.


> If initiator want to childless IKE_AUTH, it will send  CHILDLESS_IKE_AUTH
> notify/VID payload having "critical" flag SET in IKE_SA_INIT request.
And complient implentation will do what to do as RFC4306 says ie:

     ... MUST be ignored by the recipient if the recipient
     understands the payload type code. MUST be set to zero for
     payload types defined in this document. Note that the critical
     bit applies to the current payload rather than the "next"
     payload whose type code appears in the first octet. The
     reasoning behind not setting the critical bit for payloads
     defined in this document is that all implementations MUST
     understand all payload types defined in this document and
     therefore must ignore the Critical bit's value. Skipped payloads
     are expected to have valid Next Payload and Payload Length
     fields.

The correct way to do is to make new exchange type for this new
childless IKE_SA_INIT & IKE_AUTH. That way old implenentations will
then know that they do not understand this new type and will drop the
packets. This is if you really want the property that if responder
does not understand chieldless IKE_AUTH you do not want to continue at
all.

I have not yet read the draft, as I have been too busy with working
group drafts already, and I still do not know if this is really needed
at all...
<Raj>
If we can't have "critical" bit inside associated data of childless notify/=
VID,  then
new exchange type is a near possibility.
Please have a look at the use cases in the draft for need of this draft.

--
kivinen@iki.fi<mailto:kivinen@iki.fi>

With Regards,
Raj

--_000_006FEB08D9C6444AB014105C9AEB133F433538CE42ilex01adcheck_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Hi Raj<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>What Yaron suggested, was to create a =
new
payload type, and mark that as critical.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I don&#8217;t like either Yaron&#8217;=
s or
Tero&#8217;s suggestions, as both lead to a kind of &#8220;take it or leave=
 it&#8221;
behavior. The initiator proposes doing &#8220;childless&#8221;, and if the
responder does not agree, the IKE SA breaks.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>At least for the remote access case, w=
here
we want a stand-by IKE SA so that eventually we can have child SAs, this do=
es
not make sense. If the responder does not support childless, the initiator =
can
still propose universal selectors, and the responder will narrow them down =
to a
(possibly useless) valid SA.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I think a better option is to have a
notify/VID payload, with flags indicating whether a childless exchange is
wanted, required or prohibited, and whether subsequent child SAs should be
permitted. &nbsp;This does still have a problem where the initiator require=
s
that the IKE_AUTH be childless and the responder does not support the
extension.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Alternatively, we could adopt Yaron&#8=
217;s
suggestion, and make a new payload, with a critical bit turned on or off
according to requirement level. I don&#8217;t like having empty payloads, b=
ut I
can&#8217;t back up this dislike with any good argument. <o:p></o:p></span>=
</font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Maybe when we make version 2.1 of IKE,=
 we
can add a &#8220;critical type&#8221; bit to the notification payload.<o:p>=
</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> Raj Sing=
h
[mailto:rsjenwar@gmail.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Wednesday, July 08, 20=
09
7:18 AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Tero Kivinen<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> Yaron Sheffer; ipsec@iet=
f.org;
Yoav Nir<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] FW: I-D
Action:draft-nir-ipsecme-childless-00.txt</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>Hi Tero,<br>
<br>
Thanks for your valuable inputs.<br>
Please find re inputs inline. &lt;Raj&gt;<o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>On Wed, Jul 8, 2009 at 1:00 AM, Tero Kivinen &lt;<a
href=3D"mailto:kivinen@iki.fi">kivinen@iki.fi</a>&gt; wrote:<o:p></o:p></sp=
an></font></p>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>Raj Singh writes:=
<br>
&gt; Your suggestion of having &quot;critical&quot; bit set on childless
notify/VID payload<br>
&gt; from initiator in IKE_SA_INIT exchange will define the bahavior as
mentioned<br>
&gt; below.<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>That is not correct way of using critical bit. Critical bit means t=
hat<br>
if it is set and the PAYLOAD TYPE is not understood, then<br>
UNSUPPORTED_CRITICAL_PAYLOAD error is reported. Every implementation<br>
will understand Notify and Vendor ID payloads, thus they will never<br>
return UNSUPPORTED_CRITICAL_PAYLOAD regardless what the contents of<br>
those payloads are.<o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&lt;Raj&gt; <o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>I&nbsp; was under impression that we can have &quot;critical&quot; =
bit
in childless IKE_AUTH notify/VID.<br>
Even Yaron also clarified in same thread that we need new exchange type to =
have
&quot;critical&quot; bit on it.<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;
margin-left:4.8pt;margin-right:0cm'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
&gt; If initiator want to childless IKE_AUTH, it will send
&nbsp;CHILDLESS_IKE_AUTH<br>
&gt; notify/VID payload having &quot;critical&quot; flag SET in IKE_SA_INIT
request.<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>And complient implentation will do what to do as RFC4306 says ie:<b=
r>
<br>
&nbsp; &nbsp; &nbsp;... MUST be ignored by the recipient if the recipient<b=
r>
&nbsp; &nbsp; &nbsp;understands the payload type code. MUST be set to zero =
for<br>
&nbsp; &nbsp; &nbsp;payload types defined in this document. Note that the
critical<br>
&nbsp; &nbsp; &nbsp;bit applies to the current payload rather than the
&quot;next&quot;<br>
&nbsp; &nbsp; &nbsp;payload whose type code appears in the first octet. The=
<br>
&nbsp; &nbsp; &nbsp;reasoning behind not setting the critical bit for paylo=
ads<br>
&nbsp; &nbsp; &nbsp;defined in this document is that all implementations MU=
ST<br>
&nbsp; &nbsp; &nbsp;understand all payload types defined in this document a=
nd<br>
&nbsp; &nbsp; &nbsp;therefore must ignore the Critical bit's value. Skipped
payloads<br>
&nbsp; &nbsp; &nbsp;are expected to have valid Next Payload and Payload Len=
gth<br>
&nbsp; &nbsp; &nbsp;fields.<br>
<br>
The correct way to do is to make new exchange type for this new<br>
childless IKE_SA_INIT &amp; IKE_AUTH. That way old implenentations will<br>
then know that they do not understand this new type and will drop the<br>
packets. This is if you really want the property that if responder<br>
does not understand chieldless IKE_AUTH you do not want to continue at<br>
all.<br>
<br>
I have not yet read the draft, as I have been too busy with working<br>
group drafts already, and I still do not know if this is really needed<br>
at all...<o:p></o:p></span></font></p>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&lt;Raj&gt; <o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>If we can't have &quot;critical&quot; bit inside associated data of
childless notify/VID,&nbsp; then <br>
new exchange type is a near possibility. <br>
Please have a look at the use cases in the draft for need of this draft.<o:=
p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;
margin-left:4.8pt;margin-right:0cm'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><br>
<font color=3D"#888888"><span style=3D'color:#888888'>--<br>
<a href=3D"mailto:kivinen@iki.fi">kivinen@iki.fi</a></span></font><o:p></o:=
p></span></font></p>

</blockquote>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><br>
With Regards,<br>
Raj<o:p></o:p></span></font></p>

</div>

</body>

</html>

--_000_006FEB08D9C6444AB014105C9AEB133F433538CE42ilex01adcheck_--

From root@core3.amsl.com  Wed Jul  8 15:00:01 2009
Return-Path: <root@core3.amsl.com>
X-Original-To: ipsec@ietf.org
Delivered-To: ipsec@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 0) id E3CBD3A6FB6; Wed,  8 Jul 2009 15:00:01 -0700 (PDT)
From: Internet-Drafts@ietf.org
To: i-d-announce@ietf.org
Content-Type: Multipart/Mixed; Boundary="NextPart"
Mime-Version: 1.0
Message-Id: <20090708220001.E3CBD3A6FB6@core3.amsl.com>
Date: Wed,  8 Jul 2009 15:00:01 -0700 (PDT)
Cc: ipsec@ietf.org
Subject: [IPsec] I-D Action:draft-ietf-ipsecme-ikev2bis-04.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Jul 2009 22:00:02 -0000

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Security Maintenance and Extensions Working Group of the IETF.


	Title           : Internet Key Exchange Protocol: IKEv2
	Author(s)       : C. Kaufman, et al.
	Filename        : draft-ietf-ipsecme-ikev2bis-04.txt
	Pages           : 141
	Date            : 2009-07-08

This document describes version 2 of the Internet Key Exchange (IKE)
protocol.  IKE is a component of IPsec used for performing mutual
authentication and establishing and maintaining security associations
(SAs).  It replaces and updates RFC 4306, and includes all of the
clarifications from RFC 4718.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-ikev2bis-04.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Message/External-body;
	name="draft-ietf-ipsecme-ikev2bis-04.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2009-07-08145754.I-D@ietf.org>


--NextPart--

From rsjenwar@gmail.com  Wed Jul  8 20:33:00 2009
Return-Path: <rsjenwar@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 96C203A6A89 for <ipsec@core3.amsl.com>; Wed,  8 Jul 2009 20:33:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.49
X-Spam-Level: 
X-Spam-Status: No, score=-2.49 tagged_above=-999 required=5 tests=[AWL=0.108,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PsHqwixasYUA for <ipsec@core3.amsl.com>; Wed,  8 Jul 2009 20:32:59 -0700 (PDT)
Received: from mail-px0-f186.google.com (mail-px0-f186.google.com [209.85.216.186]) by core3.amsl.com (Postfix) with ESMTP id 36F743A6FEF for <ipsec@ietf.org>; Wed,  8 Jul 2009 20:32:59 -0700 (PDT)
Received: by pxi16 with SMTP id 16so361088pxi.29 for <ipsec@ietf.org>; Wed, 08 Jul 2009 20:33:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=/Bd71x6rmTvoC3GcgZich9sgAguFFD7yr+ZyXaSlz7M=; b=C+QjYZupQh5wgmGM1y7BX12ar6Kw+HkO9gI5htBP50kx3BDe3a8g2uqpJg+Xy1+QIM YHpsKQZKzpn31GqTZYWsX++ci9WTiRdX1SP1YEsALYD7I+3arE6rdt8T+HUg1P51s8H6 IFhX+j5Fgc7OTJyhsTXtnf2a8+W+Z50IQoEd4=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=mWJa/nXog5ERt6glZI4iAw0AYrk/nozHDmWURkSr+n9lLGEOqv0JyuNiH2CNtaRB91 fm/1R5yAkQdehqKz1GZWBMC/p9qm3LoNJ1u9HOqnGO63NzAYIJ99fV46sEjip6yJ5fq8 mN52X2EKQY1T93RsGjOgz2+UqFPub5HMw6oG8=
MIME-Version: 1.0
Received: by 10.142.238.9 with SMTP id l9mr84059wfh.205.1247110404782; Wed, 08  Jul 2009 20:33:24 -0700 (PDT)
In-Reply-To: <006FEB08D9C6444AB014105C9AEB133F433538CE42@il-ex01.ad.checkpoint.com>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com> <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594C4@il-ex01.ad.checkpoint.com> <7ccecf670907040336t51b15b1t790284952459069a@mail.gmail.com> <19027.41530.987118.492735@fireball.kivinen.iki.fi> <7ccecf670907072118l2cad6e24i6de6aadfc023604a@mail.gmail.com> <006FEB08D9C6444AB014105C9AEB133F433538CE42@il-ex01.ad.checkpoint.com>
Date: Thu, 9 Jul 2009 09:03:24 +0530
Message-ID: <7ccecf670907082033o42ba8c86y763075f820a7f42c@mail.gmail.com>
From: Raj Singh <rsjenwar@gmail.com>
To: Yoav Nir <ynir@checkpoint.com>
Content-Type: multipart/alternative; boundary=000e0cd2421cac3e26046e3d845d
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Tero Kivinen <kivinen@iki.fi>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jul 2009 03:33:00 -0000

--000e0cd2421cac3e26046e3d845d
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Yoav,

So, we have 2 solutions:

1. New "Childless" payload with "critical" bit send by initiator
   Pros:
        i. Helps initiator and responder to have finer policy to allow/deny
childless IKE_AUTH.
        ii. Responder will not process IKE_SA_INIT if Initiator wants only
childless IKE_AUTH.
        iii. Backward compatible.

   Cons:
        i. Requires a NEW payload with NOT MUCH data in it.

2. New "childless" notify/VID with "critial" bit in associated data.
   Pros:
        i. No need for NEW payload type.
   Cons:
        i. NOT backward compatible.

The solution 1 looks GOOD to me.

With regards,
Raj

On Wed, Jul 8, 2009 at 11:19 AM, Yoav Nir <ynir@checkpoint.com> wrote:

>  Hi Raj
>
>
>
> What Yaron suggested, was to create a new payload type, and mark that as
> critical.
>
>  I don=E2=80=99t like either Yaron=E2=80=99s or Tero=E2=80=99s suggestion=
s, as both lead to a kind
> of =E2=80=9Ctake it or leave it=E2=80=9D behavior. The initiator proposes=
 doing =E2=80=9Cchildless=E2=80=9D,
> and if the responder does not agree, the IKE SA breaks.
>

>
> At least for the remote access case, where we want a stand-by IKE SA so
> that eventually we can have child SAs, this does not make sense. If the
> responder does not support childless, the initiator can still propose
> universal selectors, and the responder will narrow them down to a (possib=
ly
> useless) valid SA.
>
>
>
> I think a better option is to have a notify/VID payload, with flags
> indicating whether a childless exchange is wanted, required or prohibited=
,
> and whether subsequent child SAs should be permitted.  This does still ha=
ve
> a problem where the initiator requires that the IKE_AUTH be childless and
> the responder does not support the extension.
>
>
>
> Alternatively, we could adopt Yaron=E2=80=99s suggestion, and make a new =
payload,
> with a critical bit turned on or off according to requirement level. I do=
n=E2=80=99t
> like having empty payloads, but I can=E2=80=99t back up this dislike with=
 any good
> argument.
>
>
>
> Maybe when we make version 2.1 of IKE, we can add a =E2=80=9Ccritical typ=
e=E2=80=9D bit to
> the notification payload.
>  ------------------------------
>
> *From:* Raj Singh [mailto:rsjenwar@gmail.com]
> *Sent:* Wednesday, July 08, 2009 7:18 AM
> *To:* Tero Kivinen
> *Cc:* Yaron Sheffer; ipsec@ietf.org; Yoav Nir
> *Subject:* Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
>
>
>
> Hi Tero,
>
>
> Thanks for your valuable inputs.
> Please find re inputs inline. <Raj>
>
> On Wed, Jul 8, 2009 at 1:00 AM, Tero Kivinen <kivinen@iki.fi> wrote:
>
> Raj Singh writes:
> > Your suggestion of having "critical" bit set on childless notify/VID
> payload
> > from initiator in IKE_SA_INIT exchange will define the bahavior as
> mentioned
> > below.
>
> That is not correct way of using critical bit. Critical bit means that
> if it is set and the PAYLOAD TYPE is not understood, then
> UNSUPPORTED_CRITICAL_PAYLOAD error is reported. Every implementation
> will understand Notify and Vendor ID payloads, thus they will never
> return UNSUPPORTED_CRITICAL_PAYLOAD regardless what the contents of
> those payloads are.
>
> <Raj>
>
> I  was under impression that we can have "critical" bit in childless
> IKE_AUTH notify/VID.
> Even Yaron also clarified in same thread that we need new exchange type t=
o
> have "critical" bit on it.
>
>
>
>
> > If initiator want to childless IKE_AUTH, it will send  CHILDLESS_IKE_AU=
TH
> > notify/VID payload having "critical" flag SET in IKE_SA_INIT request.
>
> And complient implentation will do what to do as RFC4306 says ie:
>
>      ... MUST be ignored by the recipient if the recipient
>      understands the payload type code. MUST be set to zero for
>      payload types defined in this document. Note that the critical
>      bit applies to the current payload rather than the "next"
>      payload whose type code appears in the first octet. The
>      reasoning behind not setting the critical bit for payloads
>      defined in this document is that all implementations MUST
>      understand all payload types defined in this document and
>      therefore must ignore the Critical bit's value. Skipped payloads
>      are expected to have valid Next Payload and Payload Length
>      fields.
>
> The correct way to do is to make new exchange type for this new
> childless IKE_SA_INIT & IKE_AUTH. That way old implenentations will
> then know that they do not understand this new type and will drop the
> packets. This is if you really want the property that if responder
> does not understand chieldless IKE_AUTH you do not want to continue at
> all.
>
> I have not yet read the draft, as I have been too busy with working
> group drafts already, and I still do not know if this is really needed
> at all...
>
>  <Raj>
>
> If we can't have "critical" bit inside associated data of childless
> notify/VID,  then
> new exchange type is a near possibility.
> Please have a look at the use cases in the draft for need of this draft.
>
>
> --
> kivinen@iki.fi
>
>
> With Regards,
> Raj
>

--000e0cd2421cac3e26046e3d845d
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<font size=3D"2"><font face=3D"tahoma,sans-serif"><font face=3D"courier new=
,monospace"><font size=3D"4">Hi Yoav,<br><br>So, we have 2 solutions:<br><b=
r>1. New &quot;Childless&quot; payload with &quot;critical&quot; bit send b=
y initiator<br>

=C2=A0=C2=A0 Pros:<br>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 i. Helps i=
nitiator and responder to have finer policy to allow/deny childless IKE_AUT=
H.<br>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ii. Responder will not pro=
cess IKE_SA_INIT if Initiator wants only childless IKE_AUTH.<br>=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 iii. Backward compatible.<br>

<br>=C2=A0=C2=A0 Cons:<br>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 i. Req=
uires a NEW payload with NOT MUCH data in it.<br><br>2. New &quot;childless=
&quot; notify/VID with &quot;critial&quot; bit in associated data.<br>=C2=
=A0=C2=A0 Pros:<br>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 i. No need fo=
r NEW payload type.<br>
=C2=A0=C2=A0 Cons:<br>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 i. NOT bac=
kward compatible.<br>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 <br>The solution 1 look=
s GOOD to me.<br><br>With regards,<br>Raj<br>=C2=A0 </font></font></font></=
font><br><div class=3D"gmail_quote">On Wed, Jul 8, 2009 at 11:19 AM, Yoav N=
ir <span dir=3D"ltr">&lt;<a href=3D"mailto:ynir@checkpoint.com" target=3D"_=
blank">ynir@checkpoint.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"border-left: 1px solid rgb(204, =
204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">











<div link=3D"blue" vlink=3D"blue" lang=3D"EN-US">

<div>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">Hi Raj</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">What Yaron suggested, was to creat=
e a new
payload type, and mark that as critical.</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0I don=E2=80=99t like either =
Yaron=E2=80=99s or
Tero=E2=80=99s suggestions, as both lead to a kind of =E2=80=9Ctake it or l=
eave it=E2=80=9D
behavior. The initiator proposes doing =E2=80=9Cchildless=E2=80=9D, and if =
the
responder does not agree, the IKE SA breaks.</span></font></p></div></div><=
/blockquote><blockquote class=3D"gmail_quote" style=3D"border-left: 1px sol=
id rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;"><div =
link=3D"blue" vlink=3D"blue" lang=3D"EN-US">


<div><p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-=
size: 10pt; font-family: Arial; color: navy;"></span></font></p>



<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">At least for the remote access cas=
e, where
we want a stand-by IKE SA so that eventually we can have child SAs, this do=
es
not make sense. If the responder does not support childless, the initiator =
can
still propose universal selectors, and the responder will narrow them down =
to a
(possibly useless) valid SA.</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">I think a better option is to have=
 a
notify/VID payload, with flags indicating whether a childless exchange is
wanted, required or prohibited, and whether subsequent child SAs should be
permitted. =C2=A0This does still have a problem where the initiator require=
s
that the IKE_AUTH be childless and the responder does not support the
extension.</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">Alternatively, we could adopt Yaro=
n=E2=80=99s
suggestion, and make a new payload, with a critical bit turned on or off
according to requirement level. I don=E2=80=99t like having empty payloads,=
 but I
can=E2=80=99t back up this dislike with any good argument. </span></font></=
p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">Maybe when we make version 2.1 of =
IKE, we
can add a =E2=80=9Ccritical type=E2=80=9D bit to the notification payload.<=
/span></font></p>

<div>

<div style=3D"text-align: center;" align=3D"center"><font size=3D"3" face=
=3D"Times New Roman"><span style=3D"font-size: 12pt;">

<hr size=3D"2" width=3D"100%" align=3D"center">

</span></font></div>

<p><b><font size=3D"2" face=3D"Tahoma"><span style=3D"font-size: 10pt; font=
-family: Tahoma; font-weight: bold;">From:</span></font></b><font size=3D"2=
" face=3D"Tahoma"><span style=3D"font-size: 10pt; font-family: Tahoma;"> Ra=
j Singh
[mailto:<a href=3D"mailto:rsjenwar@gmail.com" target=3D"_blank">rsjenwar@gm=
ail.com</a>] <br>
<b><span style=3D"font-weight: bold;">Sent:</span></b> Wednesday, July 08, =
2009
7:18 AM<br>
<b><span style=3D"font-weight: bold;">To:</span></b> Tero Kivinen<br>
<b><span style=3D"font-weight: bold;">Cc:</span></b> Yaron Sheffer; <a href=
=3D"mailto:ipsec@ietf.org" target=3D"_blank">ipsec@ietf.org</a>;
Yoav Nir<div><br>
<b><span style=3D"font-weight: bold;">Subject:</span></b> Re: [IPsec] FW: I=
-D
Action:draft-nir-ipsecme-childless-00.txt</div></span></font></p>

</div>

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">=C2=A0</span></font></p>

<p style=3D"margin-bottom: 12pt;"><font size=3D"3" face=3D"Times New Roman"=
><span style=3D"font-size: 12pt;">Hi Tero,<div><div></div><div><br>
<br>
Thanks for your valuable inputs.<br>
Please find re inputs inline. &lt;Raj&gt;</div></div></span></font></p><div=
><div></div><div>

<div>

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">On Wed, Jul 8, 2009 at 1:00 AM, Tero Kivinen &lt;<a href=3D"mailto:kivin=
en@iki.fi" target=3D"_blank">kivinen@iki.fi</a>&gt; wrote:</span></font></p=
>

<div>

<p style=3D"margin-bottom: 12pt;"><font size=3D"3" face=3D"Times New Roman"=
><span style=3D"font-size: 12pt;">Raj Singh writes:<br>
&gt; Your suggestion of having &quot;critical&quot; bit set on childless
notify/VID payload<br>
&gt; from initiator in IKE_SA_INIT exchange will define the bahavior as
mentioned<br>
&gt; below.</span></font></p>

</div>

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">That is not correct way of using critical bit. Critical bit means that<b=
r>
if it is set and the PAYLOAD TYPE is not understood, then<br>
UNSUPPORTED_CRITICAL_PAYLOAD error is reported. Every implementation<br>
will understand Notify and Vendor ID payloads, thus they will never<br>
return UNSUPPORTED_CRITICAL_PAYLOAD regardless what the contents of<br>
those payloads are.</span></font></p>

<div>

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">&lt;Raj&gt; </span></font></p>

</div>

<div>

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">I=C2=A0 was under impression that we can have &quot;critical&quot; bit
in childless IKE_AUTH notify/VID.<br>
Even Yaron also clarified in same thread that we need new exchange type to =
have
&quot;critical&quot; bit on it.</span></font></p>

</div>

<blockquote style=3D"border-style: none none none solid; border-color: -moz=
-use-text-color -moz-use-text-color -moz-use-text-color rgb(204, 204, 204);=
 border-width: medium medium medium 1pt; padding: 0cm 0cm 0cm 6pt; margin-l=
eft: 4.8pt; margin-right: 0cm;">




<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">=C2=A0</span></font></p>

<div>

<p style=3D"margin-bottom: 12pt;"><font size=3D"3" face=3D"Times New Roman"=
><span style=3D"font-size: 12pt;"><br>
&gt; If initiator want to childless IKE_AUTH, it will send
=C2=A0CHILDLESS_IKE_AUTH<br>
&gt; notify/VID payload having &quot;critical&quot; flag SET in IKE_SA_INIT
request.</span></font></p>

</div>

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">And complient implentation will do what to do as RFC4306 says ie:<br>
<br>
=C2=A0 =C2=A0 =C2=A0... MUST be ignored by the recipient if the recipient<b=
r>
=C2=A0 =C2=A0 =C2=A0understands the payload type code. MUST be set to zero =
for<br>
=C2=A0 =C2=A0 =C2=A0payload types defined in this document. Note that the
critical<br>
=C2=A0 =C2=A0 =C2=A0bit applies to the current payload rather than the
&quot;next&quot;<br>
=C2=A0 =C2=A0 =C2=A0payload whose type code appears in the first octet. The=
<br>
=C2=A0 =C2=A0 =C2=A0reasoning behind not setting the critical bit for paylo=
ads<br>
=C2=A0 =C2=A0 =C2=A0defined in this document is that all implementations MU=
ST<br>
=C2=A0 =C2=A0 =C2=A0understand all payload types defined in this document a=
nd<br>
=C2=A0 =C2=A0 =C2=A0therefore must ignore the Critical bit&#39;s value. Ski=
pped
payloads<br>
=C2=A0 =C2=A0 =C2=A0are expected to have valid Next Payload and Payload Len=
gth<br>
=C2=A0 =C2=A0 =C2=A0fields.<br>
<br>
The correct way to do is to make new exchange type for this new<br>
childless IKE_SA_INIT &amp; IKE_AUTH. That way old implenentations will<br>
then know that they do not understand this new type and will drop the<br>
packets. This is if you really want the property that if responder<br>
does not understand chieldless IKE_AUTH you do not want to continue at<br>
all.<br>
<br>
I have not yet read the draft, as I have been too busy with working<br>
group drafts already, and I still do not know if this is really needed<br>
at all...</span></font></p>

</blockquote>

<div>

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">&lt;Raj&gt; </span></font></p>

</div>

<div>

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">If we can&#39;t have &quot;critical&quot; bit inside associated data of
childless notify/VID,=C2=A0 then <br>
new exchange type is a near possibility. <br>
Please have a look at the use cases in the draft for need of this draft.</s=
pan></font></p>

</div>

<blockquote style=3D"border-style: none none none solid; border-color: -moz=
-use-text-color -moz-use-text-color -moz-use-text-color rgb(204, 204, 204);=
 border-width: medium medium medium 1pt; padding: 0cm 0cm 0cm 6pt; margin-l=
eft: 4.8pt; margin-right: 0cm;">




<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;"><br>
<font color=3D"#888888"><span style=3D"color: rgb(136, 136, 136);">--<br>
<a href=3D"mailto:kivinen@iki.fi" target=3D"_blank">kivinen@iki.fi</a></spa=
n></font></span></font></p>

</blockquote>

</div>

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;"><br>
With Regards,<br>
Raj</span></font></p>

</div></div></div>

</div>


</blockquote></div><br>

--000e0cd2421cac3e26046e3d845d--

From gpoothia@microsoft.com  Wed Jul  8 21:56:28 2009
Return-Path: <gpoothia@microsoft.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3FF403A6BF9 for <ipsec@core3.amsl.com>; Wed,  8 Jul 2009 21:56:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yGnIrRSuh+d9 for <ipsec@core3.amsl.com>; Wed,  8 Jul 2009 21:56:15 -0700 (PDT)
Received: from smtp.microsoft.com (mail3.microsoft.com [131.107.115.214]) by core3.amsl.com (Postfix) with ESMTP id E7BF33A6BEE for <ipsec@ietf.org>; Wed,  8 Jul 2009 21:56:14 -0700 (PDT)
Received: from TK5EX14HUBC101.redmond.corp.microsoft.com (157.54.7.153) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.99.4; Wed, 8 Jul 2009 21:56:42 -0700
Received: from TK5EX14MBXC114.redmond.corp.microsoft.com ([157.54.91.49]) by TK5EX14HUBC101.redmond.corp.microsoft.com ([157.54.7.153]) with mapi; Wed, 8 Jul 2009 21:56:42 -0700
From: Gaurav Poothia <gpoothia@microsoft.com>
To: Yoav Nir <ynir@checkpoint.com>, "'Raghunandan P (raghup)'" <raghup@cisco.com>, Raj Singh <rsjenwar@gmail.com>
Thread-Topic: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
Thread-Index: Acn6LIMxjVVhQIC5ReqPq7jkohYKQAAW8ZWrAGXsCgAAQWiWgAAKaMYAAD+fHoAABOBFAAAFSS2AAHYBMKA=
Date: Thu, 9 Jul 2009 04:56:40 +0000
Message-ID: <B69601AD18064F4BBA2D61CA82AEAFA91739F5@TK5EX14MBXC114.redmond.corp.microsoft.com>
References: <20090701091501.2DAE328C101@core3.amsl.com><006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com><7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com><006FEB08D9C6444AB014105C9AEB133F433539DEC6@il-ex01.ad.checkpoint.com><7ccecf670907041901y5ab926e8q7892ebdbd9bc109d@mail.gmail.com> <006FEB08D9C6444AB014105C9AEB133F433538CE31@il-ex01.ad.checkpoint.com> <581A2F3364E6E340B7F7F9629D223DCE6AC19C@XMB-BGL-41E.cisco.com> <006FEB08D9C6444AB014105C9AEB133F433538CE39@il-ex01.ad.checkpoint.com>
In-Reply-To: <006FEB08D9C6444AB014105C9AEB133F433538CE39@il-ex01.ad.checkpoint.com>
Accept-Language: en-CA, en-US
Content-Language: en-CA
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: multipart/alternative; boundary="_000_B69601AD18064F4BBA2D61CA82AEAFA91739F5TK5EX14MBXC114red_"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jul 2009 04:56:28 -0000

--_000_B69601AD18064F4BBA2D61CA82AEAFA91739F5TK5EX14MBXC114red_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hello Yoav,
Are you suggesting that in this scenario the initiator will not tear down t=
he IKE SA on getting a CHILD SA specific error (NO_PROPOSAL_CHOSEN) for the=
 AUTH exchange response ?
Shouldn't the IKE SA also be torn down because while the error notify doesn=
't explicitly fail the AUTH there is no explicit indication of success eith=
er.
Or did you have a response in mind that had all the relevant IKE SA related=
 payloads intact and a single error notify for the CHILD SA?


BTW perhaps the authors should consider motivating scenario ( c ) where it =
is the responder that wants a childless IKE SA instead of the initiator, wi=
th usage scenarios or alternatively consider making it an explicit non-goal=
.
I was under the impression it's the initiator that requests this feature an=
d the responder might/might not oblige based on whether it implements the e=
xtension.

From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Y=
oav Nir
Sent: Monday, July 06, 2009 6:15 AM
To: 'Raghunandan P (raghup)'; Raj Singh
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hi Raghu

I think in scenario (c) the initiator will propose a full child SA proposal=
, and the responder will accept the IKE SA and reply with a NO_PROPOSAL_CHO=
SEN for the child SA.



________________________________
From: Raghunandan P (raghup) [mailto:raghup@cisco.com]
Sent: Monday, July 06, 2009 1:43 PM
To: Yoav Nir; Raj Singh
Cc: ipsec@ietf.org
Subject: RE: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hi Yoav/Raj,

I think its a good idea for the initiator to announce its capabilities abou=
t supporting just IKE SA without child SA. The responder will then act acco=
rdingly.  Hence, this would make 4 scenarios:
[IKE_SA_ONLY] is the mode that will tell whether the device supports bringi=
ng up IKE SA only or not.

       Initiator                          Responder             Result
---------------------------------------------------------------------------=
------------------------------
 a)  IKE_SA_ONLY              IKE_SA_ONLY                  Bring up the IKE=
 SA

 b)  IKE_SA_ONLY            Does not support            Send a Notify with =
INVALID_SYNTAX
                                           IKE_SA_ONLY

c)  Does not support             IKE_SA_ONLY           IKE and child SA wou=
ld be brought UP
     IKE_SA_ONLY

d) Does not support           Does not support          IKE and child SA wo=
uld be brought UP.
     IKE_SA_ONLY                  IKE_SA_ONLY

My question is related to the scenario c) discussed above.
Is the result to bring up IKE and IPSec SA  or would the responder send a N=
otify with INVALID_SYNTAX to the initiator since responder wants to bring u=
p IKE SA only and not the child SA.

It might be good to add a Notify (IKE_SA_ONLY) than the VID.

Regards
Raghu

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Y=
oav Nir
Sent: Monday, July 06, 2009 1:54 PM
To: 'Raj Singh'
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
Inline with <ynir>

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of R=
aj Singh
Sent: Sunday, July 05, 2009 5:02 AM
To: Yoav Nir
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hi Yoav,

Please find my input inline <Raj>.

With Regards,
Raj
On Sun, Jul 5, 2009 at 2:33 AM, Yoav Nir <ynir@checkpoint.com<mailto:ynir@c=
heckpoint.com>> wrote:
Hi Raj

The ordinary thing for a responder to do with unrecognized Notifies/VIDs is=
 to ignore them. So the only responder that will behave as you suggest is o=
ne that supports this extension, but is configured not to.
<Raj> Yes, if responder understands childless IKE_AUTH from initiator, it w=
ill behave as mentioned in my previous mail, if NOT and it does not support=
 childless IKE_AUTH [only responder not supporting childless extention], th=
en initiator will notice missing childless notify/VID and can stop the tran=
sactions for the SA. But it will help responders, supporting this extention=
s and applying policies.


At least for the remote access client, it makes sense for a client that fac=
es both supporting and non-supporting gateways to have a "dummy" proposal f=
or a useless child SA, for example ICMP from the client to the gateway. It =
doesn't really matter if the proposal is accepted or rejected, because the =
client does not need the traffic.
 <Raj> What's the usecase ?
<ynir> the usecase is that the client needs an IKE SA, but can't get it unl=
ess it negotiates a child SA - that's what you have now before implementing=
 our draft.


In any case, an initiator that insists on a childless IKE SA contacting a g=
ateway that does not support the extension is a misconfiguration. I don't b=
elieve we should go to great lengths (especially the new critical payload t=
hat Yaron is proposing) to save work in such a misconfiguration case.
<Raj> How it can be a misconfiguration, The gateway can put some policy to =
enable/disable childless IKE_AUTH based on "load" on gateway. Yes, i agree,=
 new crittical payload, we can avoid.
<ynir> Well, we could add our own "critical" bit to the notify/VID. If that=
 is on, the responder can either reply with a similar notification/VID, or =
else some error notify (NO_PROPOSAL_CHOSEN or a new one of our own)



If we do think it's important, the "right" way is for the Initiator to send=
 the VID, for the responder to only send the VID if it (a) supports the ext=
ension *and* (b) has seen the VID from the initiator. We could even require=
 that the initiator be prepared to continue with a non-supporting gateway, =
but I'm not sure that's a good idea.
<Raj> The whole idea is:
initiator to send childless notify/VID when it want to bring up "ONLY" IKE =
SA i.e. it is not hit by traffic or "dummy" payload. This will avoid unnece=
ssary processing of IKE_SA_INIT at responder when responder does not suppor=
t childless IKE_AUTH. This is most likely usecase of chiless IKE_AUTH in VP=
N scenarios.
The behavior remains similar as mentioned in my previous mail except "criti=
cal" bit as it needs to define new payload type which even i want to avoid.=
 Its just a simple notify/VID payload with no associated data and easing th=
e work at initiator and responder. Its can see goodness in idea.
When initiator has dummy proposal  ready, the initiator need not to send ch=
ildless notify/VID payload.


________________________________________
From: Raj Singh [rsjenwar@gmail.com<mailto:rsjenwar@gmail.com>]
Sent: Friday, July 03, 2009 16:51
To: Yoav Nir
Cc: ipsec@ietf.org<mailto:ipsec@ietf.org>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hi Yoav,

Mostly the Initiator will decide that it wants to bring UP only IKE SA with=
out child SA.
But currently there is no notify/VID from Initiator to Responder to indicat=
e that initiator wants to bring only IKE SA. Even if responder does not sup=
ports "childless IKE_AUTH", it will process IKE_SA_INIT, involding CPU inte=
nsive D-H calculations, and send IKE_SA_INIT response without "childless VI=
D" payload.

By introducing a notify/VID payload from Initiator that it wants to bring U=
P only IKE SA without child SA wil ease the processing ar Responder side. I=
f responder does not support "childless IKE_AUTH", it can send INVALID_SYNT=
AX. Then, Initiator will wait for "Child SA" info to be available to bring =
UP both IKE and child SA, normally as mentioned in RFC 4306.

Thanks,
Raj
On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir <ynir@checkpoint.com<mailto:ynir@c=
heckpoint.com><mailto:ynir@checkpoint.com<mailto:ynir@checkpoint.com>>> wro=
te:
Hi all.

This is the fourth iteration of this draft.  New in this iteration
 - Another co-author
 - Changed the name, so that this item is considered in the rechartering di=
scussion
 - Fixed some notation and some discussion based on comments from the list

Yoav
________________________________________
From: i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org><m=
ailto:i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org>> =
[i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org><mailto=
:i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org>>] On B=
ehalf Of Internet-Drafts@ietf.org<mailto:Internet-Drafts@ietf.org><mailto:I=
nternet-Drafts@ietf.org<mailto:Internet-Drafts@ietf.org>> [Internet-Drafts@=
ietf.org<mailto:Internet-Drafts@ietf.org><mailto:Internet-Drafts@ietf.org<m=
ailto:Internet-Drafts@ietf.org>>]
Sent: Wednesday, July 01, 2009 12:15
To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org><mailto:i-d-announce=
@ietf.org<mailto:i-d-announce@ietf.org>>
Subject: I-D Action:draft-nir-ipsecme-childless-00.txt

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.

      Title           : A Childless Initiation of the IKE SA
      Author(s)       : Y. Nir, et al.
      Filename        : draft-nir-ipsecme-childless-00.txt
      Pages           : 7
      Date            : 2009-07-01

This document describes an extension to the IKEv2 protocol that
allows an IKE SA to be created and authenticated without generating a
child SA.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-00.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.



Email secured by Check Point


_______________________________________________
IPsec mailing list
IPsec@ietf.org<mailto:IPsec@ietf.org><mailto:IPsec@ietf.org<mailto:IPsec@ie=
tf.org>>
https://www.ietf.org/mailman/listinfo/ipsec

Scanned by Check Point Total Security Gateway.
Email secured by Check Point



Scanned by Check Point Total Security Gateway.


Email secured by Check Point


Email secured by Check Point

--_000_B69601AD18064F4BBA2D61CA82AEAFA91739F5TK5EX14MBXC114red_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:p=3D"urn:schemas-m=
icrosoft-com:office:powerpoint" xmlns:a=3D"urn:schemas-microsoft-com:office=
:access" xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s=3D"=
uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs=3D"urn:schemas-microsof=
t-com:rowset" xmlns:z=3D"#RowsetSchema" xmlns:b=3D"urn:schemas-microsoft-co=
m:office:publisher" xmlns:ss=3D"urn:schemas-microsoft-com:office:spreadshee=
t" xmlns:c=3D"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns=
:odc=3D"urn:schemas-microsoft-com:office:odc" xmlns:oa=3D"urn:schemas-micro=
soft-com:office:activation" xmlns:html=3D"http://www.w3.org/TR/REC-html40" =
xmlns:q=3D"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc=3D"http://m=
icrosoft.com/officenet/conferencing" xmlns:D=3D"DAV:" xmlns:Repl=3D"http://=
schemas.microsoft.com/repl/" xmlns:mt=3D"http://schemas.microsoft.com/share=
point/soap/meetings/" xmlns:x2=3D"http://schemas.microsoft.com/office/excel=
/2003/xml" xmlns:ppda=3D"http://www.passport.com/NameSpace.xsd" xmlns:ois=
=3D"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir=3D"http://=
schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds=3D"http://www.w3=
.org/2000/09/xmldsig#" xmlns:dsp=3D"http://schemas.microsoft.com/sharepoint=
/dsp" xmlns:udc=3D"http://schemas.microsoft.com/data/udc" xmlns:xsd=3D"http=
://www.w3.org/2001/XMLSchema" xmlns:sub=3D"http://schemas.microsoft.com/sha=
repoint/soap/2002/1/alerts/" xmlns:ec=3D"http://www.w3.org/2001/04/xmlenc#"=
 xmlns:sp=3D"http://schemas.microsoft.com/sharepoint/" xmlns:sps=3D"http://=
schemas.microsoft.com/sharepoint/soap/" xmlns:xsi=3D"http://www.w3.org/2001=
/XMLSchema-instance" xmlns:udcs=3D"http://schemas.microsoft.com/data/udc/so=
ap" xmlns:udcxf=3D"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udc=
p2p=3D"http://schemas.microsoft.com/data/udc/parttopart" xmlns:wf=3D"http:/=
/schemas.microsoft.com/sharepoint/soap/workflow/" xmlns:dsss=3D"http://sche=
mas.microsoft.com/office/2006/digsig-setup" xmlns:dssi=3D"http://schemas.mi=
crosoft.com/office/2006/digsig" xmlns:mdssi=3D"http://schemas.openxmlformat=
s.org/package/2006/digital-signature" xmlns:mver=3D"http://schemas.openxmlf=
ormats.org/markup-compatibility/2006" xmlns:m=3D"http://schemas.microsoft.c=
om/office/2004/12/omml" xmlns:mrels=3D"http://schemas.openxmlformats.org/pa=
ckage/2006/relationships" xmlns:spwp=3D"http://microsoft.com/sharepoint/web=
partpages" xmlns:ex12t=3D"http://schemas.microsoft.com/exchange/services/20=
06/types" xmlns:ex12m=3D"http://schemas.microsoft.com/exchange/services/200=
6/messages" xmlns:pptsl=3D"http://schemas.microsoft.com/sharepoint/soap/Sli=
deLibrary/" xmlns:spsl=3D"http://microsoft.com/webservices/SharePointPortal=
Server/PublishedLinksService" xmlns:Z=3D"urn:schemas-microsoft-com:" xmlns:=
st=3D"&#1;" xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 12 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Arial","sans-serif";
	color:navy;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Arial","sans-serif";
	color:navy;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>Hello Yoav, <o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>Are you suggesting that in this scenario the initiator will =
not tear
down the IKE SA on getting a CHILD SA specific error (NO_PROPOSAL_CHOSEN) f=
or
the AUTH exchange response ?<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>Shouldn&#8217;t the IKE SA also be torn down because while t=
he
error notify doesn&#8217;t explicitly fail the AUTH there is no explicit
indication of success either.<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>Or did you have a response in mind that had all the relevant=
 IKE
SA related payloads intact and a single error notify for the CHILD SA?<o:p>=
</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>BTW perhaps the authors should consider motivating scenario =
( c
) where it is the responder that wants a childless IKE SA instead of the in=
itiator,
with usage scenarios or alternatively consider making it an explicit non-go=
al.<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>I was under the impression it&#8217;s the initiator that req=
uests
this feature and the responder might/might not oblige based on whether it
implements the extension.<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<div>

<div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'>

<p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma=
","sans-serif"'>From:</span></b><span
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <b>On Behalf Of </b>=
Yoav
Nir<br>
<b>Sent:</b> Monday, July 06, 2009 6:15 AM<br>
<b>To:</b> 'Raghunandan P (raghup)'; Raj Singh<br>
<b>Cc:</b> ipsec@ietf.org<br>
<b>Subject:</b> Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.t=
xt<o:p></o:p></span></p>

</div>

</div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:navy'>Hi Raghu<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:navy'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:navy'>I think in scenario (c) the initiator will propose a full child=
 SA
proposal, and the responder will accept the IKE SA and reply with a
NO_PROPOSAL_CHOSEN for the child SA.</span><span style=3D'font-size:10.0pt;
font-family:"Courier New";color:navy'><o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Courier N=
ew";
color:navy'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Courier N=
ew";
color:navy'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:navy'><o:p>&nbsp;</o:p></span></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</div>

<p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma=
","sans-serif"'>From:</span></b><span
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> Raghunandan P
(raghup) [mailto:raghup@cisco.com] <br>
<b>Sent:</b> Monday, July 06, 2009 1:43 PM<br>
<b>To:</b> Yoav Nir; Raj Singh<br>
<b>Cc:</b> ipsec@ietf.org<br>
<b>Subject:</b> RE: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.t=
xt</span><o:p></o:p></p>

</div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>Hi Yoav/Raj,</span><o:p></o:p></p>

<p class=3DMsoNormal>&nbsp;<o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>I think its a good idea for the initiator to&nbsp;announce its
capabilities about supporting just IKE SA without child SA. The responder w=
ill
then act accordingly.&nbsp; Hence, this would make 4 scenarios:</span><o:p>=
</o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>[IKE_SA_ONLY] is the mode that will tell whether the device
supports bringing up IKE SA only or not. </span><o:p></o:p></p>

<p class=3DMsoNormal>&nbsp;<o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;
Initiator&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;
Responder&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;
Result</span><o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>---------------------------------------------------------------=
------------------------------------------</span><o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>&nbsp;a)&nbsp;
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Bring up the IKE SA</span><o:p></o:p><=
/p>

<p class=3DMsoNormal>&nbsp;<o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>&nbsp;b)&nbsp;
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;
Does not support&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Send a Notify with INVALID_SYNTAX=
</span><o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
IKE_SA_ONLY</span><o:p></o:p></p>

<p class=3DMsoNormal>&nbsp;<o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>c)&nbsp; Does not
support&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IKE=
 and
child SA would be brought UP</span><o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>&nbsp;&nbsp;&nbsp;&nbsp; IKE_SA_ONLY</span><o:p></o:p></p>

<p class=3DMsoNormal>&nbsp;<o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>d) Does not
support&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Does no=
t
support&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;IKE and child=
 SA
would be brought UP.</span><o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>&nbsp;&nbsp;&nbsp;&nbsp;
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
IKE_SA_ONLY</span><o:p></o:p></p>

<p class=3DMsoNormal>&nbsp;<o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>My question is related to the scenario c) discussed above.</spa=
n><o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>Is the result to bring up IKE and IPSec SA&nbsp;&nbsp;or would =
the
responder send a Notify with INVALID_SYNTAX to the initiator since responde=
r
wants to bring up IKE SA only and not the child SA.</span><o:p></o:p></p>

<p class=3DMsoNormal>&nbsp;<o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>It might be good to add a Notify (IKE_SA_ONLY) than the VID.</s=
pan><o:p></o:p></p>

<p class=3DMsoNormal>&nbsp;<o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>Regards</span><o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:blue'>Raghu</span><o:p></o:p></p>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><b><span style=3D'font-=
size:10.0pt;
font-family:"Tahoma","sans-serif"'>From:</span></b><span style=3D'font-size=
:10.0pt;
font-family:"Tahoma","sans-serif"'> ipsec-bounces@ietf.org
[mailto:ipsec-bounces@ietf.org] <b>On Behalf Of </b>Yoav Nir<br>
<b>Sent:</b> Monday, July 06, 2009 1:54 PM<br>
<b>To:</b> 'Raj Singh'<br>
<b>Cc:</b> ipsec@ietf.org<br>
<b>Subject:</b> Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.t=
xt</span><o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:navy'>Inline with &lt;ynir&gt;<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:navy'><o:p>&nbsp;</o:p></span></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</div>

<p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma=
","sans-serif"'>From:</span></b><span
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <b>On Behalf Of </b>=
Raj
Singh<br>
<b>Sent:</b> Sunday, July 05, 2009 5:02 AM<br>
<b>To:</b> Yoav Nir<br>
<b>Cc:</b> ipsec@ietf.org<br>
<b>Subject:</b> Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.t=
xt</span><o:p></o:p></p>

</div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'>Hi Yoav,<br>
<br>
Please find my input inline &lt;Raj&gt;.<br>
<br>
With Regards,<br>
Raj<o:p></o:p></p>

<div>

<p class=3DMsoNormal>On Sun, Jul 5, 2009 at 2:33 AM, Yoav Nir &lt;<a
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&gt; wrote:<o:p>=
</o:p></p>

<p class=3DMsoNormal>Hi Raj<br>
<br>
The ordinary thing for a responder to do with unrecognized Notifies/VIDs is=
 to
ignore them. So the only responder that will behave as you suggest is one t=
hat
supports this extension, but is configured not to.<o:p></o:p></p>

<div>

<p class=3DMsoNormal>&lt;Raj&gt; Yes, if responder understands childless IK=
E_AUTH
from initiator, it will behave as mentioned in my previous mail, if NOT and=
 it
does not support childless IKE_AUTH [only responder not supporting childles=
s
extention], then initiator will notice missing childless notify/VID and can
stop the transactions for the SA. But it will help responders, supporting t=
his
extentions and applying policies.<o:p></o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<p class=3DMsoNormal><br>
<br>
At least for the remote access client, it makes sense for a client that fac=
es
both supporting and non-supporting gateways to have a &quot;dummy&quot;
proposal for a useless child SA, for example ICMP from the client to the
gateway. It doesn't really matter if the proposal is accepted or rejected,
because the client does not need the traffic.<o:p></o:p></p>

</blockquote>

<div>

<p class=3DMsoNormal>&nbsp;&lt;Raj&gt; What's the usecase ?<o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:navy'>&lt;ynir&gt; the usecase is that the client needs an IKE SA, bu=
t
can&#8217;t get it unless it negotiates a child SA &#8211; that&#8217;s wha=
t
you have now before implementing our draft.<o:p></o:p></span></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<p class=3DMsoNormal><br>
<br>
In any case, an initiator that insists on a childless IKE SA contacting a
gateway that does not support the extension is a misconfiguration. I don't
believe we should go to great lengths (especially the new critical payload =
that
Yaron is proposing) to save work in such a misconfiguration case.<o:p></o:p=
></p>

</blockquote>

<div>

<p class=3DMsoNormal>&lt;Raj&gt; How it can be a misconfiguration, The gate=
way
can put some policy to enable/disable childless IKE_AUTH based on
&quot;load&quot; on gateway. Yes, i agree, new crittical payload, we can av=
oid.<o:p></o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:navy'>&lt;ynir&gt; Well, we could add our own &#8220;critical&#8221; =
bit
to the notify/VID. If that is on, the responder can either reply with a sim=
ilar
notification/VID, or else some error notify (NO_PROPOSAL_CHOSEN or a new on=
e of
our own)<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial","s=
ans-serif";
color:navy'><o:p>&nbsp;</o:p></span></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<p class=3DMsoNormal><br>
<br>
If we do think it's important, the &quot;right&quot; way is for the Initiat=
or
to send the VID, for the responder to only send the VID if it (a) supports =
the
extension *and* (b) has seen the VID from the initiator. We could even requ=
ire
that the initiator be prepared to continue with a non-supporting gateway, b=
ut
I'm not sure that's a good idea.<o:p></o:p></p>

</blockquote>

<div>

<p class=3DMsoNormal>&lt;Raj&gt; The whole idea is:<br>
initiator to send childless notify/VID when it want to bring up
&quot;ONLY&quot; IKE SA i.e. it is not hit by traffic or &quot;dummy&quot;
payload. This will avoid unnecessary processing of IKE_SA_INIT at responder
when responder does not support childless IKE_AUTH. This is most likely use=
case
of chiless IKE_AUTH in VPN scenarios.<br>
The behavior remains similar as mentioned in my previous mail except
&quot;critical&quot; bit as it needs to define new payload type which even =
i
want to avoid. Its just a simple notify/VID payload with no associated data=
 and
easing the work at initiator and responder. Its can see goodness in idea.<b=
r>
When initiator has dummy proposal&nbsp; ready, the initiator need not to se=
nd
childless notify/VID payload.<o:p></o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<p class=3DMsoNormal><br>
<br>
________________________________________<br>
From: Raj Singh [<a href=3D"mailto:rsjenwar@gmail.com">rsjenwar@gmail.com</=
a>]<o:p></o:p></p>

<div>

<p class=3DMsoNormal>Sent: Friday, July 03, 2009 16:51<br>
To: Yoav Nir<br>
Cc: <a href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</a><o:p></o:p></p>

</div>

<p class=3DMsoNormal>Subject: Re: [IPsec] FW: I-D
Action:draft-nir-ipsecme-childless-00.txt<o:p></o:p></p>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><br>
Hi Yoav,<br>
<br>
Mostly the Initiator will decide that it wants to bring UP only IKE SA with=
out
child SA.<br>
But currently there is no notify/VID from Initiator to Responder to indicat=
e
that initiator wants to bring only IKE SA. Even if responder does not suppo=
rts
&quot;childless IKE_AUTH&quot;, it will process IKE_SA_INIT, involding CPU
intensive D-H calculations, and send IKE_SA_INIT response without
&quot;childless VID&quot; payload.<br>
<br>
By introducing a notify/VID payload from Initiator that it wants to bring U=
P
only IKE SA without child SA wil ease the processing ar Responder side. If
responder does not support &quot;childless IKE_AUTH&quot;, it can send
INVALID_SYNTAX. Then, Initiator will wait for &quot;Child SA&quot; info to =
be
available to bring UP both IKE and child SA, normally as mentioned in RFC 4=
306.<br>
<br>
Thanks,<br>
Raj<o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal>On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir &lt;<a
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&lt;mailto:<a
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&gt;&gt; wrote:<=
br>
Hi all.<br>
<br>
This is the fourth iteration of this draft. &nbsp;New in this iteration<br>
&nbsp;- Another co-author<br>
&nbsp;- Changed the name, so that this item is considered in the recharteri=
ng
discussion<br>
&nbsp;- Fixed some notation and some discussion based on comments from the =
list<br>
<br>
Yoav<br>
________________________________________<o:p></o:p></p>

</div>

<p class=3DMsoNormal>From: <a href=3D"mailto:i-d-announce-bounces@ietf.org"=
>i-d-announce-bounces@ietf.org</a>&lt;mailto:<a
href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf.org=
</a>&gt;
[<a href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf=
.org</a>&lt;mailto:<a
href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf.org=
</a>&gt;]
On Behalf Of <a href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ie=
tf.org</a>&lt;mailto:<a
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a>&gt; [=
<a
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a>&lt;ma=
ilto:<a
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a>&gt;]<=
o:p></o:p></p>

<div>

<p class=3DMsoNormal>Sent: Wednesday, July 01, 2009 12:15<o:p></o:p></p>

</div>

<p class=3DMsoNormal>To: <a href=3D"mailto:i-d-announce@ietf.org">i-d-annou=
nce@ietf.org</a>&lt;mailto:<a
href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a>&gt;<o:p></o=
:p></p>

<div>

<p class=3DMsoNormal>Subject: I-D Action:draft-nir-ipsecme-childless-00.txt=
<br>
<br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
<br>
&nbsp; &nbsp; &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : A Childless
Initiation of the IKE SA<br>
&nbsp; &nbsp; &nbsp; Author(s) &nbsp; &nbsp; &nbsp; : Y. Nir, et al.<br>
&nbsp; &nbsp; &nbsp; Filename &nbsp; &nbsp; &nbsp; &nbsp;:
draft-nir-ipsecme-childless-00.txt<br>
&nbsp; &nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 7<br>
&nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 2009-0=
7-01<br>
<br>
This document describes an extension to the IKEv2 protocol that<br>
allows an IKE SA to be created and authenticated without generating a<br>
child SA.<br>
<br>
A URL for this Internet-Draft is:<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-=
00.txt"
target=3D"_blank">http://www.ietf.org/internet-drafts/draft-nir-ipsecme-chi=
ldless-00.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br>
<br>
<br>
Email secured by Check Point<br>
<br>
<br>
_______________________________________________<br>
IPsec mailing list<o:p></o:p></p>

</div>

<p class=3DMsoNormal><a href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a>&l=
t;mailto:<a
href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a>&gt;<o:p></o:p></p>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><a
href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">http=
s://www.ietf.org/mailman/listinfo/ipsec</a><br>
<br>
<o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'>Scanned by Check Point =
Total
Security Gateway.<o:p></o:p></p>

</div>

<div>

<div>

<p class=3DMsoNormal>Email secured by Check Point<o:p></o:p></p>

</div>

</div>

</blockquote>

</div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><br>
<br>
<br>
Scanned by Check Point Total Security Gateway. <o:p></o:p></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><br>
<br>
Email secured by Check Point <o:p></o:p></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><br>
<br>
Email secured by Check Point <o:p></o:p></p>

</div>

</body>

</html>

--_000_B69601AD18064F4BBA2D61CA82AEAFA91739F5TK5EX14MBXC114red_--

From ynir@checkpoint.com  Wed Jul  8 22:07:54 2009
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DD8D93A689C for <ipsec@core3.amsl.com>; Wed,  8 Jul 2009 22:07:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.648
X-Spam-Level: 
X-Spam-Status: No, score=-2.648 tagged_above=-999 required=5 tests=[AWL=-0.050, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QVbsS4vLqS3P for <ipsec@core3.amsl.com>; Wed,  8 Jul 2009 22:07:39 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id B4D163A6452 for <ipsec@ietf.org>; Wed,  8 Jul 2009 22:07:38 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 749BF29C002; Thu,  9 Jul 2009 08:08:18 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 12B63200681; Thu,  9 Jul 2009 08:08:18 +0300 (IDT)
X-CheckPoint: {4A557AD5-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n695843d010860; Thu, 9 Jul 2009 08:08:04 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Thu, 9 Jul 2009 08:08:04 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: "'Gaurav Poothia'" <gpoothia@microsoft.com>, "'Raghunandan P (raghup)'" <raghup@cisco.com>, Raj Singh <rsjenwar@gmail.com>
Date: Thu, 9 Jul 2009 08:08:02 +0300
Thread-Topic: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
Thread-Index: Acn6LIMxjVVhQIC5ReqPq7jkohYKQAAW8ZWrAGXsCgAAQWiWgAAKaMYAAD+fHoAABOBFAAAFSS2AAHYBMKAAAPo7gA==
Message-ID: <006FEB08D9C6444AB014105C9AEB133F433538CE48@il-ex01.ad.checkpoint.com>
References: <20090701091501.2DAE328C101@core3.amsl.com><006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com><7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com><006FEB08D9C6444AB014105C9AEB133F433539DEC6@il-ex01.ad.checkpoint.com><7ccecf670907041901y5ab926e8q7892ebdbd9bc109d@mail.gmail.com> <006FEB08D9C6444AB014105C9AEB133F433538CE31@il-ex01.ad.checkpoint.com> <581A2F3364E6E340B7F7F9629D223DCE6AC19C@XMB-BGL-41E.cisco.com> <006FEB08D9C6444AB014105C9AEB133F433538CE39@il-ex01.ad.checkpoint.com> <B69601AD18064F4BBA2D61CA82AEAFA91739F5@TK5EX14MBXC114.redmond.corp.microsoft.com>
In-Reply-To: <B69601AD18064F4BBA2D61CA82AEAFA91739F5@TK5EX14MBXC114.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_006FEB08D9C6444AB014105C9AEB133F433538CE48ilex01adcheck_"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jul 2009 05:07:55 -0000

--_000_006FEB08D9C6444AB014105C9AEB133F433538CE48ilex01adcheck_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

As it is, RFC 4306 mandates that if the problem is only with the CHILD SA p=
ayloads, then all the IKE SA payloads (including the AUTH and CFG) should b=
e returned, followed by a child SA error (like NO_PROPOSAL_CHOSEN) which fa=
ils only the child SA.

I agree that scenario (c) is not really solvable, because the policies actu=
ally conflict.

________________________________
From: Gaurav Poothia [mailto:gpoothia@microsoft.com]
Sent: Thursday, July 09, 2009 7:57 AM
To: Yoav Nir; 'Raghunandan P (raghup)'; Raj Singh
Cc: ipsec@ietf.org
Subject: RE: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hello Yoav,
Are you suggesting that in this scenario the initiator will not tear down t=
he IKE SA on getting a CHILD SA specific error (NO_PROPOSAL_CHOSEN) for the=
 AUTH exchange response ?
Shouldn't the IKE SA also be torn down because while the error notify doesn=
't explicitly fail the AUTH there is no explicit indication of success eith=
er.
Or did you have a response in mind that had all the relevant IKE SA related=
 payloads intact and a single error notify for the CHILD SA?


BTW perhaps the authors should consider motivating scenario ( c ) where it =
is the responder that wants a childless IKE SA instead of the initiator, wi=
th usage scenarios or alternatively consider making it an explicit non-goal=
.
I was under the impression it's the initiator that requests this feature an=
d the responder might/might not oblige based on whether it implements the e=
xtension.

From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Y=
oav Nir
Sent: Monday, July 06, 2009 6:15 AM
To: 'Raghunandan P (raghup)'; Raj Singh
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hi Raghu

I think in scenario (c) the initiator will propose a full child SA proposal=
, and the responder will accept the IKE SA and reply with a NO_PROPOSAL_CHO=
SEN for the child SA.



________________________________
From: Raghunandan P (raghup) [mailto:raghup@cisco.com]
Sent: Monday, July 06, 2009 1:43 PM
To: Yoav Nir; Raj Singh
Cc: ipsec@ietf.org
Subject: RE: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hi Yoav/Raj,

I think its a good idea for the initiator to announce its capabilities abou=
t supporting just IKE SA without child SA. The responder will then act acco=
rdingly.  Hence, this would make 4 scenarios:
[IKE_SA_ONLY] is the mode that will tell whether the device supports bringi=
ng up IKE SA only or not.

       Initiator                          Responder             Result
---------------------------------------------------------------------------=
------------------------------
 a)  IKE_SA_ONLY              IKE_SA_ONLY                  Bring up the IKE=
 SA

 b)  IKE_SA_ONLY            Does not support            Send a Notify with =
INVALID_SYNTAX
                                           IKE_SA_ONLY

c)  Does not support             IKE_SA_ONLY           IKE and child SA wou=
ld be brought UP
     IKE_SA_ONLY

d) Does not support           Does not support          IKE and child SA wo=
uld be brought UP.
     IKE_SA_ONLY                  IKE_SA_ONLY

My question is related to the scenario c) discussed above.
Is the result to bring up IKE and IPSec SA  or would the responder send a N=
otify with INVALID_SYNTAX to the initiator since responder wants to bring u=
p IKE SA only and not the child SA.

It might be good to add a Notify (IKE_SA_ONLY) than the VID.

Regards
Raghu

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Y=
oav Nir
Sent: Monday, July 06, 2009 1:54 PM
To: 'Raj Singh'
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
Inline with <ynir>

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of R=
aj Singh
Sent: Sunday, July 05, 2009 5:02 AM
To: Yoav Nir
Cc: ipsec@ietf.org
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hi Yoav,

Please find my input inline <Raj>.

With Regards,
Raj
On Sun, Jul 5, 2009 at 2:33 AM, Yoav Nir <ynir@checkpoint.com<mailto:ynir@c=
heckpoint.com>> wrote:
Hi Raj

The ordinary thing for a responder to do with unrecognized Notifies/VIDs is=
 to ignore them. So the only responder that will behave as you suggest is o=
ne that supports this extension, but is configured not to.
<Raj> Yes, if responder understands childless IKE_AUTH from initiator, it w=
ill behave as mentioned in my previous mail, if NOT and it does not support=
 childless IKE_AUTH [only responder not supporting childless extention], th=
en initiator will notice missing childless notify/VID and can stop the tran=
sactions for the SA. But it will help responders, supporting this extention=
s and applying policies.


At least for the remote access client, it makes sense for a client that fac=
es both supporting and non-supporting gateways to have a "dummy" proposal f=
or a useless child SA, for example ICMP from the client to the gateway. It =
doesn't really matter if the proposal is accepted or rejected, because the =
client does not need the traffic.
 <Raj> What's the usecase ?
<ynir> the usecase is that the client needs an IKE SA, but can't get it unl=
ess it negotiates a child SA - that's what you have now before implementing=
 our draft.


In any case, an initiator that insists on a childless IKE SA contacting a g=
ateway that does not support the extension is a misconfiguration. I don't b=
elieve we should go to great lengths (especially the new critical payload t=
hat Yaron is proposing) to save work in such a misconfiguration case.
<Raj> How it can be a misconfiguration, The gateway can put some policy to =
enable/disable childless IKE_AUTH based on "load" on gateway. Yes, i agree,=
 new crittical payload, we can avoid.
<ynir> Well, we could add our own "critical" bit to the notify/VID. If that=
 is on, the responder can either reply with a similar notification/VID, or =
else some error notify (NO_PROPOSAL_CHOSEN or a new one of our own)



If we do think it's important, the "right" way is for the Initiator to send=
 the VID, for the responder to only send the VID if it (a) supports the ext=
ension *and* (b) has seen the VID from the initiator. We could even require=
 that the initiator be prepared to continue with a non-supporting gateway, =
but I'm not sure that's a good idea.
<Raj> The whole idea is:
initiator to send childless notify/VID when it want to bring up "ONLY" IKE =
SA i.e. it is not hit by traffic or "dummy" payload. This will avoid unnece=
ssary processing of IKE_SA_INIT at responder when responder does not suppor=
t childless IKE_AUTH. This is most likely usecase of chiless IKE_AUTH in VP=
N scenarios.
The behavior remains similar as mentioned in my previous mail except "criti=
cal" bit as it needs to define new payload type which even i want to avoid.=
 Its just a simple notify/VID payload with no associated data and easing th=
e work at initiator and responder. Its can see goodness in idea.
When initiator has dummy proposal  ready, the initiator need not to send ch=
ildless notify/VID payload.


________________________________________
From: Raj Singh [rsjenwar@gmail.com<mailto:rsjenwar@gmail.com>]
Sent: Friday, July 03, 2009 16:51
To: Yoav Nir
Cc: ipsec@ietf.org<mailto:ipsec@ietf.org>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt

Hi Yoav,

Mostly the Initiator will decide that it wants to bring UP only IKE SA with=
out child SA.
But currently there is no notify/VID from Initiator to Responder to indicat=
e that initiator wants to bring only IKE SA. Even if responder does not sup=
ports "childless IKE_AUTH", it will process IKE_SA_INIT, involding CPU inte=
nsive D-H calculations, and send IKE_SA_INIT response without "childless VI=
D" payload.

By introducing a notify/VID payload from Initiator that it wants to bring U=
P only IKE SA without child SA wil ease the processing ar Responder side. I=
f responder does not support "childless IKE_AUTH", it can send INVALID_SYNT=
AX. Then, Initiator will wait for "Child SA" info to be available to bring =
UP both IKE and child SA, normally as mentioned in RFC 4306.

Thanks,
Raj
On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir <ynir@checkpoint.com<mailto:ynir@c=
heckpoint.com><mailto:ynir@checkpoint.com<mailto:ynir@checkpoint.com>>> wro=
te:
Hi all.

This is the fourth iteration of this draft.  New in this iteration
 - Another co-author
 - Changed the name, so that this item is considered in the rechartering di=
scussion
 - Fixed some notation and some discussion based on comments from the list

Yoav
________________________________________
From: i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org><m=
ailto:i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org>> =
[i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org><mailto=
:i-d-announce-bounces@ietf.org<mailto:i-d-announce-bounces@ietf.org>>] On B=
ehalf Of Internet-Drafts@ietf.org<mailto:Internet-Drafts@ietf.org><mailto:I=
nternet-Drafts@ietf.org<mailto:Internet-Drafts@ietf.org>> [Internet-Drafts@=
ietf.org<mailto:Internet-Drafts@ietf.org><mailto:Internet-Drafts@ietf.org<m=
ailto:Internet-Drafts@ietf.org>>]
Sent: Wednesday, July 01, 2009 12:15
To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org><mailto:i-d-announce=
@ietf.org<mailto:i-d-announce@ietf.org>>
Subject: I-D Action:draft-nir-ipsecme-childless-00.txt

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.

      Title           : A Childless Initiation of the IKE SA
      Author(s)       : Y. Nir, et al.
      Filename        : draft-nir-ipsecme-childless-00.txt
      Pages           : 7
      Date            : 2009-07-01

This document describes an extension to the IKEv2 protocol that
allows an IKE SA to be created and authenticated without generating a
child SA.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-00.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.



Email secured by Check Point


_______________________________________________
IPsec mailing list
IPsec@ietf.org<mailto:IPsec@ietf.org><mailto:IPsec@ietf.org<mailto:IPsec@ie=
tf.org>>
https://www.ietf.org/mailman/listinfo/ipsec
Scanned by Check Point Total Security Gateway.
Email secured by Check Point



Scanned by Check Point Total Security Gateway.


Email secured by Check Point


Email secured by Check Point


Scanned by Check Point Total Security Gateway.

=0D=0A
Email secured by Check Point=0D=0A

--_000_006FEB08D9C6444AB014105C9AEB133F433538CE48ilex01adcheck_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:p=3D"urn:schemas-m=
icrosoft-com:office:powerpoint" xmlns:a=3D"urn:schemas-microsoft-com:office=
:access" xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s=3D"=
uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs=3D"urn:schemas-microsof=
t-com:rowset" xmlns:z=3D"#RowsetSchema" xmlns:b=3D"urn:schemas-microsoft-co=
m:office:publisher" xmlns:ss=3D"urn:schemas-microsoft-com:office:spreadshee=
t" xmlns:c=3D"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns=
:odc=3D"urn:schemas-microsoft-com:office:odc" xmlns:oa=3D"urn:schemas-micro=
soft-com:office:activation" xmlns:html=3D"http://www.w3.org/TR/REC-html40" =
xmlns:q=3D"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc=3D"http://m=
icrosoft.com/officenet/conferencing" xmlns:D=3D"DAV:" xmlns:Repl=3D"http://=
schemas.microsoft.com/repl/" xmlns:mt=3D"http://schemas.microsoft.com/share=
point/soap/meetings/" xmlns:x2=3D"http://schemas.microsoft.com/office/excel=
/2003/xml" xmlns:ppda=3D"http://www.passport.com/NameSpace.xsd" xmlns:ois=
=3D"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir=3D"http://=
schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds=3D"http://www.w3=
.org/2000/09/xmldsig#" xmlns:dsp=3D"http://schemas.microsoft.com/sharepoint=
/dsp" xmlns:udc=3D"http://schemas.microsoft.com/data/udc" xmlns:xsd=3D"http=
://www.w3.org/2001/XMLSchema" xmlns:sub=3D"http://schemas.microsoft.com/sha=
repoint/soap/2002/1/alerts/" xmlns:ec=3D"http://www.w3.org/2001/04/xmlenc#"=
 xmlns:sp=3D"http://schemas.microsoft.com/sharepoint/" xmlns:sps=3D"http://=
schemas.microsoft.com/sharepoint/soap/" xmlns:xsi=3D"http://www.w3.org/2001=
/XMLSchema-instance" xmlns:udcs=3D"http://schemas.microsoft.com/data/udc/so=
ap" xmlns:udcxf=3D"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udc=
p2p=3D"http://schemas.microsoft.com/data/udc/parttopart" xmlns:st=3D"&#1;" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" xmlns=3D"http://ww=
w.w3.org/TR/REC-html40"
xmlns:ns1=3D"http://schemas.microsoft.com/sharepoint/soap/workflow/"
xmlns:ns2=3D"http://schemas.microsoft.com/office/2006/digsig-setup"
xmlns:ns3=3D"http://schemas.microsoft.com/office/2006/digsig"
xmlns:ns4=3D"http://schemas.openxmlformats.org/package/2006/digital-signatu=
re"
xmlns:ns5=3D"http://schemas.openxmlformats.org/markup-compatibility/2006"
xmlns:ns6=3D"http://schemas.microsoft.com/office/2004/12/omml"
xmlns:ns7=3D"http://schemas.openxmlformats.org/package/2006/relationships"
xmlns:ns8=3D"http://microsoft.com/sharepoint/webpartpages"
xmlns:ns9=3D"http://schemas.microsoft.com/exchange/services/2006/types"
xmlns:ns10=3D"http://schemas.microsoft.com/exchange/services/2006/messages"
xmlns:ns11=3D"http://schemas.microsoft.com/sharepoint/soap/SlideLibrary/"
xmlns:ns12=3D"http://microsoft.com/webservices/SharePointPortalServer/Publi=
shedLinksService"
xmlns:ns13=3D"urn:schemas-microsoft-com:">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" name=3D"Person=
Name"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--a:link
	{mso-style-priority:99;}
span.MSOHYPERLINK
	{mso-style-priority:99;}
a:visited
	{mso-style-priority:99;}
span.MSOHYPERLINKFOLLOWED
	{mso-style-priority:99;}

 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Calibri;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:Arial;
	color:navy;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:Arial;
	color:navy;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:Calibri;
	color:#1F497D;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>As it is, RFC 4306 mandates that if th=
e problem
is only with the CHILD SA payloads, then all the IKE SA payloads (including=
 the
AUTH and CFG) should be returned, followed by a child SA error (like NO_PRO=
POSAL_CHOSEN)
which fails only the child SA.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I agree that scenario (c) is not reall=
y solvable,
because the policies actually conflict.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> Gaurav P=
oothia
[mailto:gpoothia@microsoft.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Thursday, July 09, 200=
9 7:57
AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Yoav Nir; 'Raghunandan P
(raghup)'; Raj Singh<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> <st1:PersonName w:st=3D"=
on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> RE: [IPsec] FW: I-D
Action:draft-nir-ipsecme-childless-00.txt</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3D"#1f497d" face=3DCalibri><span
style=3D'font-size:11.0pt;font-family:Calibri;color:#1F497D'>Hello Yoav, <o=
:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3D"#1f497d" face=3DCalibri><span
style=3D'font-size:11.0pt;font-family:Calibri;color:#1F497D'>Are you sugges=
ting
that in this scenario the initiator will not tear down the IKE SA on gettin=
g a
CHILD SA specific error (NO_PROPOSAL_CHOSEN) for the AUTH exchange response=
 ?<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3D"#1f497d" face=3DCalibri><span
style=3D'font-size:11.0pt;font-family:Calibri;color:#1F497D'>Shouldn&#8217;=
t the
IKE SA also be torn down because while the error notify doesn&#8217;t
explicitly fail the AUTH there is no explicit indication of success either.=
<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3D"#1f497d" face=3DCalibri><span
style=3D'font-size:11.0pt;font-family:Calibri;color:#1F497D'>Or did you hav=
e a
response in mind that had all the relevant IKE SA related payloads intact a=
nd a
single error notify for the CHILD SA?<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3D"#1f497d" face=3DCalibri><span
style=3D'font-size:11.0pt;font-family:Calibri;color:#1F497D'><o:p>&nbsp;</o=
:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3D"#1f497d" face=3DCalibri><span
style=3D'font-size:11.0pt;font-family:Calibri;color:#1F497D'><o:p>&nbsp;</o=
:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3D"#1f497d" face=3DCalibri><span
style=3D'font-size:11.0pt;font-family:Calibri;color:#1F497D'>BTW perhaps th=
e
authors should consider motivating scenario ( c ) where it is the responder
that wants a childless IKE SA instead of the initiator, with usage scenario=
s or
alternatively consider making it an explicit non-goal.<o:p></o:p></span></f=
ont></p>

<p class=3DMsoNormal><font size=3D2 color=3D"#1f497d" face=3DCalibri><span
style=3D'font-size:11.0pt;font-family:Calibri;color:#1F497D'>I was under th=
e
impression it&#8217;s the initiator that requests this feature and the
responder might/might not oblige based on whether it implements the extensi=
on.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3D"#1f497d" face=3DCalibri><span
style=3D'font-size:11.0pt;font-family:Calibri;color:#1F497D'><o:p>&nbsp;</o=
:p></span></font></p>

<div>

<div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm'>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <b><span
style=3D'font-weight:bold'>On Behalf Of </span></b>Yoav Nir<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Monday, July 06, 2009 =
6:15
AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> 'Raghunandan P (raghup)'=
; Raj
Singh<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> <st1:PersonName w:st=3D"=
on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] FW: I-D
Action:draft-nir-ipsecme-childless-00.txt<o:p></o:p></span></font></p>

</div>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Hi Raghu<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I think in scenario (c) the initiator =
will
propose a full child SA proposal, and the responder will accept the IKE SA =
and
reply with a NO_PROPOSAL_CHOSEN for the child SA.</span></font><font size=
=3D2
color=3Dnavy face=3D"Courier New"><span style=3D'font-size:10.0pt;font-fami=
ly:"Courier New";
color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Courier New"><span
style=3D'font-size:10.0pt;font-family:"Courier New";color:navy'><o:p>&nbsp;=
</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Courier New"><span
style=3D'font-size:10.0pt;font-family:"Courier New";color:navy'><o:p>&nbsp;=
</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> Raghunan=
dan P
(raghup) [mailto:raghup@cisco.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Monday, July 06, 2009 =
1:43
PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Yoav Nir; Raj Singh<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> <st1:PersonName w:st=3D"=
on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> RE: [IPsec] FW: I-D
Action:draft-nir-ipsecme-childless-00.txt</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Hi Yoav/Raj,</span></font><o:p></o:p><=
/p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>I think its a good idea for the initia=
tor
to&nbsp;announce its capabilities about supporting just IKE SA without chil=
d
SA. The responder will then act accordingly.&nbsp; Hence, this would make 4
scenarios:</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>[IKE_SA_ONLY] is the mode that will te=
ll
whether the device supports bringing up IKE SA only or not. </span></font><=
o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;
Initiator&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;
Responder&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;
Result</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>--------------------------------------=
-------------------------------------------------------------------</span><=
/font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>&nbsp;a)&nbsp; IKE_SA_ONLY&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Bring up the IKE SA</span></font><o:p>=
</o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>&nbsp;b)&nbsp;
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;
Does not support&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Send a Notify with INVALID_SYNTAX=
</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
IKE_SA_ONLY</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>c)&nbsp; Does not
support&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IKE=
 and
child SA would be brought UP</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>&nbsp;&nbsp;&nbsp;&nbsp; IKE_SA_ONLY</=
span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>d) Does not
support&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Does no=
t
support&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;IKE and child=
 SA
would be brought UP.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>&nbsp;&nbsp;&nbsp;&nbsp;
IKE_SA_ONLY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
IKE_SA_ONLY</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>My question is related to the scenario=
 c)
discussed above.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Is the result to bring up IKE and IPSe=
c
SA&nbsp;&nbsp;or would the responder send a Notify with INVALID_SYNTAX to t=
he
initiator since responder wants to bring up IKE SA only and not the child S=
A.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>It might be good to add a Notify
(IKE_SA_ONLY) than the VID.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Regards</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Raghu</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><b><font size=3D2 face=
=3DTahoma><span
style=3D'font-size:10.0pt;font-family:Tahoma;font-weight:bold'>From:</span>=
</font></b><font
size=3D2 face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <b><span
style=3D'font-weight:bold'>On Behalf Of </span></b>Yoav Nir<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Monday, July 06, 2009 =
1:54
PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> 'Raj Singh'<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> <st1:PersonName w:st=3D"=
on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] FW: I-D
Action:draft-nir-ipsecme-childless-00.txt</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Inline with &lt;ynir&gt;<o:p></o:p></s=
pan></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <b><span
style=3D'font-weight:bold'>On Behalf Of </span></b>Raj Singh<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Sunday, July 05, 2009 =
5:02
AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Yoav Nir<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> <st1:PersonName w:st=3D"=
on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] FW: I-D
Action:draft-nir-ipsecme-childless-00.txt</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>Hi Yoav,<br>
<br>
Please find my input inline &lt;Raj&gt;.<br>
<br>
With Regards,<br>
Raj<o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>On Sun, Jul 5, 2009 at 2:33 AM, Yoav Nir &lt;<a
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&gt; wrote:<o:p>=
</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Hi Raj<br>
<br>
The ordinary thing for a responder to do with unrecognized Notifies/VIDs is=
 to
ignore them. So the only responder that will behave as you suggest is one t=
hat
supports this extension, but is configured not to.<o:p></o:p></span></font>=
</p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&lt;Raj&gt; Yes, if responder understands childless IKE_AUTH from
initiator, it will behave as mentioned in my previous mail, if NOT and it d=
oes
not support childless IKE_AUTH [only responder not supporting childless
extention], then initiator will notice missing childless notify/VID and can
stop the transactions for the SA. But it will help responders, supporting t=
his
extentions and applying policies.<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><br>
<br>
At least for the remote access client, it makes sense for a client that fac=
es
both supporting and non-supporting gateways to have a &quot;dummy&quot; pro=
posal
for a useless child SA, for example ICMP from the client to the gateway. It
doesn't really matter if the proposal is accepted or rejected, because the
client does not need the traffic.<o:p></o:p></span></font></p>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;&lt;Raj&gt; What's the usecase ?<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&lt;ynir&gt; the usecase is that the c=
lient
needs an IKE SA, but can&#8217;t get it unless it negotiates a child SA &#8=
211;
that&#8217;s what you have now before implementing our draft.<o:p></o:p></s=
pan></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><br>
<br>
In any case, an initiator that insists on a childless IKE SA contacting a
gateway that does not support the extension is a misconfiguration. I don't
believe we should go to great lengths (especially the new critical payload =
that
Yaron is proposing) to save work in such a misconfiguration case.<o:p></o:p=
></span></font></p>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&lt;Raj&gt; How it can be a misconfiguration, The gateway can put s=
ome
policy to enable/disable childless IKE_AUTH based on &quot;load&quot; on
gateway. Yes, i agree, new crittical payload, we can avoid.<o:p></o:p></spa=
n></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&lt;ynir&gt; Well, we could add our ow=
n
&#8220;critical&#8221; bit to the notify/VID. If that is on, the responder =
can
either reply with a similar notification/VID, or else some error notify
(NO_PROPOSAL_CHOSEN or a new one of our own)<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><br>
<br>
If we do think it's important, the &quot;right&quot; way is for the Initiat=
or
to send the VID, for the responder to only send the VID if it (a) supports =
the
extension *and* (b) has seen the VID from the initiator. We could even requ=
ire
that the initiator be prepared to continue with a non-supporting gateway, b=
ut
I'm not sure that's a good idea.<o:p></o:p></span></font></p>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&lt;Raj&gt; The whole idea is:<br>
initiator to send childless notify/VID when it want to bring up
&quot;ONLY&quot; IKE SA i.e. it is not hit by traffic or &quot;dummy&quot;
payload. This will avoid unnecessary processing of IKE_SA_INIT at responder
when responder does not support childless IKE_AUTH. This is most likely use=
case
of chiless IKE_AUTH in VPN scenarios.<br>
The behavior remains similar as mentioned in my previous mail except
&quot;critical&quot; bit as it needs to define new payload type which even =
i
want to avoid. Its just a simple notify/VID payload with no associated data=
 and
easing the work at initiator and responder. Its can see goodness in idea.<b=
r>
When initiator has dummy proposal&nbsp; ready, the initiator need not to se=
nd
childless notify/VID payload.<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><br>
<br>
________________________________________<br>
From: Raj Singh [<a href=3D"mailto:rsjenwar@gmail.com">rsjenwar@gmail.com</=
a>]<o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Sent: Friday, July 03, 2009 16:51<br>
To: Yoav Nir<br>
Cc: <a href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</a><o:p></o:p></span><=
/font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.=
txt<o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
Hi Yoav,<br>
<br>
Mostly the Initiator will decide that it wants to bring UP only IKE SA with=
out
child SA.<br>
But currently there is no notify/VID from Initiator to Responder to indicat=
e
that initiator wants to bring only IKE SA. Even if responder does not suppo=
rts
&quot;childless IKE_AUTH&quot;, it will process IKE_SA_INIT, involding CPU
intensive D-H calculations, and send IKE_SA_INIT response without
&quot;childless VID&quot; payload.<br>
<br>
By introducing a notify/VID payload from Initiator that it wants to bring U=
P
only IKE SA without child SA wil ease the processing ar Responder side. If
responder does not support &quot;childless IKE_AUTH&quot;, it can send
INVALID_SYNTAX. Then, Initiator will wait for &quot;Child SA&quot; info to =
be
available to bring UP both IKE and child SA, normally as mentioned in RFC 4=
306.<br>
<br>
Thanks,<br>
Raj<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>On Thu, Jul 2, 2009 at 1:42 AM, Yoav Nir &lt;<a
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&lt;mailto:<a
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&gt;&gt; wrote:<=
br>
Hi all.<br>
<br>
This is the fourth iteration of this draft. &nbsp;New in this iteration<br>
&nbsp;- Another co-author<br>
&nbsp;- Changed the name, so that this item is considered in the recharteri=
ng
discussion<br>
&nbsp;- Fixed some notation and some discussion based on comments from the =
list<br>
<br>
Yoav<br>
________________________________________<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>From: <a href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce=
-bounces@ietf.org</a>&lt;mailto:<a
href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf.org=
</a>&gt;
[<a href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf=
.org</a>&lt;mailto:<a
href=3D"mailto:i-d-announce-bounces@ietf.org">i-d-announce-bounces@ietf.org=
</a>&gt;]
On Behalf Of <a href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ie=
tf.org</a>&lt;mailto:<a
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a>&gt; [=
<a
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a>&lt;ma=
ilto:<a
href=3D"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a>&gt;]<=
o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Sent: Wednesday, July 01, 2009 12:15<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>To: <a href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org<=
/a>&lt;mailto:<a
href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a>&gt;<o:p></o=
:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Subject: I-D Action:draft-nir-ipsecme-childless-00.txt<br>
<br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
<br>
&nbsp; &nbsp; &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : A Childless
Initiation of the IKE SA<br>
&nbsp; &nbsp; &nbsp; Author(s) &nbsp; &nbsp; &nbsp; : Y. Nir, et al.<br>
&nbsp; &nbsp; &nbsp; Filename &nbsp; &nbsp; &nbsp; &nbsp;:
draft-nir-ipsecme-childless-00.txt<br>
&nbsp; &nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 7<br>
&nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 2009-0=
7-01<br>
<br>
This document describes an extension to the IKEv2 protocol that<br>
allows an IKE SA to be created and authenticated without generating a<br>
child SA.<br>
<br>
A URL for this Internet-Draft is:<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-nir-ipsecme-childless-=
00.txt"
target=3D"_blank">http://www.ietf.org/internet-drafts/draft-nir-ipsecme-chi=
ldless-00.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br>
<br>
<br>
Email secured by Check Point<br>
<br>
<br>
_______________________________________________<br>
IPsec mailing list<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><a href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a>&lt;mailto:<a
href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a>&gt;<o:p></o:p></span></fo=
nt></p>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><a
href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=3D"_blank">http=
s://www.ietf.org/mailman/listinfo/ipsec</a><o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>Scanned by Check =
Point
Total Security Gateway.<o:p></o:p></span></font></p>

</div>

<div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Email secured by Check Point<o:p></o:p></span></font></p>

</div>

</div>

</blockquote>

</div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
<br>
Scanned by Check Point Total Security Gateway. <o:p></o:p></span></font></p=
>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
Email secured by Check Point <o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
Email secured by Check Point <o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
Scanned by Check Point Total Security Gateway. <o:p></o:p></span></font></p=
>

</div>


<br>=
=0D=0A
<br>Email secured by Check Point=0D=0A
<br>
<br>=
</body>

</html>

--_000_006FEB08D9C6444AB014105C9AEB133F433538CE48ilex01adcheck_--

From svanru@gmail.com  Thu Jul  9 00:42:49 2009
Return-Path: <svanru@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 01A533A6C68 for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 00:42:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4Q+OvN+urEZC for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 00:42:47 -0700 (PDT)
Received: from mail-ew0-f226.google.com (mail-ew0-f226.google.com [209.85.219.226]) by core3.amsl.com (Postfix) with ESMTP id 6EB633A6831 for <ipsec@ietf.org>; Thu,  9 Jul 2009 00:42:47 -0700 (PDT)
Received: by ewy26 with SMTP id 26so2312579ewy.37 for <ipsec@ietf.org>; Thu, 09 Jul 2009 00:43:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=4IZ+s91Kvwq0Aog9JtKHLJkanYWoK7w/qeT2Id5LW9w=; b=Y0LJ8GkgZnVg87ZP69JgfsPpTMGW+pPUBm9ZOKRtQY6pvCd0f8iYxs5WW6CqJqcXEr yi5dmjJbM+cXjngB57SivGtmci98gVfIVn1HRPck2neDjZjOkDLD34QRwpPN+QEeUrLh 9ngf2vBRWHfhVGtDo4Szj5lR3J8imHAOFs7Fs=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=DT3Lunbj2odRhWlK8+rgK7fcpo4u0CX5nP1lBpPGv+J+zavQX2njQqdrpXQ4aaUD0R Wt5Ix/JIE0jFH6WBeVsJqN5lRkmKS/5Slo8uIZhP+RuxoyQAEdfHKWPimvdZbAL3HULb COYaaMOOd7CA7q7Q899zGiLlLIxlkoBhOXCzw=
MIME-Version: 1.0
Received: by 10.216.39.85 with SMTP id c63mr130458web.103.1247125392083; Thu,  09 Jul 2009 00:43:12 -0700 (PDT)
In-Reply-To: <006FEB08D9C6444AB014105C9AEB133F433538CE42@il-ex01.ad.checkpoint.com>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com> <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594C4@il-ex01.ad.checkpoint.com> <7ccecf670907040336t51b15b1t790284952459069a@mail.gmail.com> <19027.41530.987118.492735@fireball.kivinen.iki.fi> <7ccecf670907072118l2cad6e24i6de6aadfc023604a@mail.gmail.com> <006FEB08D9C6444AB014105C9AEB133F433538CE42@il-ex01.ad.checkpoint.com>
Date: Thu, 9 Jul 2009 11:43:11 +0400
Message-ID: <3d7da440907090043w571fdb87g5a3a2e5211a62eb2@mail.gmail.com>
From: Valery Smyslov <svanru@gmail.com>
To: Yoav Nir <ynir@checkpoint.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Tero Kivinen <kivinen@iki.fi>, Raj Singh <rsjenwar@gmail.com>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jul 2009 07:42:49 -0000

Hi all,

I think, adding new payload or exchange type is a real overkill for
such a small extension.
IKE has well defined mechanism for advertising/negotiating new
extensions via VID or Notify.
Other extensions (like MOBIKE) use it, so why multiply entities unnecessarily?

Then, I'd rather leave a decision whether to proceed with childless or
full versions
of IKE_AUTH exchange completely at initiator's discretion. After all,
it is he/she, who
knows what happened - either user pressed "connect" button or there
was a real packet.
I think, responder should not have any policy on this - just capability.
How could, for example, he/she insist on childless IKE SA if initiator
has a real
packet to protect? In this case it will either lead to denial of communication
or initiator will probably create childless IKE SA following by CREATE_CHILD_SA,
increasing unnecessary load on responder. Prohibiting childless IKE SA
by responder
doesn't make much sense either - nothing prevents initiator from following
current behaviour - creating dummy IPsec SA and immediately deleting it.
All responder has in this case is again unnecessary load on herself/himself.

>From my point of view, childless mode is just a usefull protocol optimization,
and it is initiator, who must decide whether to use it. For this purpose
peers must exchange VID/Notify payloads during IKE_SA_INIT, claiming their
capabilities to proceed with childless IKE_AUTH. Then, if both
sides support it, initiator decides whether to use it. In this case responder
must be prepared to both versions of IKE_AUTH. If responder doesn't
support this extension, it naturally doesn't send corresponding VID/Notify.
At this point initiator must either proceed with current behaviour - dummy IPsec
proposal (if she/he really wants IKE SA) or terminate exchange if she/he
doesn't support current behaviour (in which case it is a misconfiguration).

Regards,
Valery Smyslov.


2009/7/8, Yoav Nir <ynir@checkpoint.com>:
> Hi Raj
>
> What Yaron suggested, was to create a new payload type, and mark that as
> critical.
>
> I don't like either Yaron's or Tero's suggestions, as both lead to a kind of
> "take it or leave it" behavior. The initiator proposes doing "childless",
> and if the responder does not agree, the IKE SA breaks.
>
> At least for the remote access case, where we want a stand-by IKE SA so that
> eventually we can have child SAs, this does not make sense. If the responder
> does not support childless, the initiator can still propose universal
> selectors, and the responder will narrow them down to a (possibly useless)
> valid SA.
>
> I think a better option is to have a notify/VID payload, with flags
> indicating whether a childless exchange is wanted, required or prohibited,
> and whether subsequent child SAs should be permitted.  This does still have
> a problem where the initiator requires that the IKE_AUTH be childless and
> the responder does not support the extension.
>
> Alternatively, we could adopt Yaron's suggestion, and make a new payload,
> with a critical bit turned on or off according to requirement level. I don't
> like having empty payloads, but I can't back up this dislike with any good
> argument.
>
> Maybe when we make version 2.1 of IKE, we can add a "critical type" bit to
> the notification payload.
> ________________________________
> From: Raj Singh [mailto:rsjenwar@gmail.com]
> Sent: Wednesday, July 08, 2009 7:18 AM
> To: Tero Kivinen
> Cc: Yaron Sheffer; ipsec@ietf.org; Yoav Nir
> Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
>
> Hi Tero,
>
> Thanks for your valuable inputs.
> Please find re inputs inline. <Raj>
> On Wed, Jul 8, 2009 at 1:00 AM, Tero Kivinen
> <kivinen@iki.fi<mailto:kivinen@iki.fi>> wrote:
> Raj Singh writes:
>> Your suggestion of having "critical" bit set on childless notify/VID
>> payload
>> from initiator in IKE_SA_INIT exchange will define the bahavior as
>> mentioned
>> below.
> That is not correct way of using critical bit. Critical bit means that
> if it is set and the PAYLOAD TYPE is not understood, then
> UNSUPPORTED_CRITICAL_PAYLOAD error is reported. Every implementation
> will understand Notify and Vendor ID payloads, thus they will never
> return UNSUPPORTED_CRITICAL_PAYLOAD regardless what the contents of
> those payloads are.
> <Raj>
> I  was under impression that we can have "critical" bit in childless
> IKE_AUTH notify/VID.
> Even Yaron also clarified in same thread that we need new exchange type to
> have "critical" bit on it.
>
>
>> If initiator want to childless IKE_AUTH, it will send  CHILDLESS_IKE_AUTH
>> notify/VID payload having "critical" flag SET in IKE_SA_INIT request.
> And complient implentation will do what to do as RFC4306 says ie:
>
>      ... MUST be ignored by the recipient if the recipient
>      understands the payload type code. MUST be set to zero for
>      payload types defined in this document. Note that the critical
>      bit applies to the current payload rather than the "next"
>      payload whose type code appears in the first octet. The
>      reasoning behind not setting the critical bit for payloads
>      defined in this document is that all implementations MUST
>      understand all payload types defined in this document and
>      therefore must ignore the Critical bit's value. Skipped payloads
>      are expected to have valid Next Payload and Payload Length
>      fields.
>
> The correct way to do is to make new exchange type for this new
> childless IKE_SA_INIT & IKE_AUTH. That way old implenentations will
> then know that they do not understand this new type and will drop the
> packets. This is if you really want the property that if responder
> does not understand chieldless IKE_AUTH you do not want to continue at
> all.
>
> I have not yet read the draft, as I have been too busy with working
> group drafts already, and I still do not know if this is really needed
> at all...
> <Raj>
> If we can't have "critical" bit inside associated data of childless
> notify/VID,  then
> new exchange type is a near possibility.
> Please have a look at the use cases in the draft for need of this draft.
>
> --
> kivinen@iki.fi<mailto:kivinen@iki.fi>
>
> With Regards,
> Raj
>

From rsjenwar@gmail.com  Thu Jul  9 01:54:59 2009
Return-Path: <rsjenwar@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6FEC93A6A31 for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 01:54:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.976
X-Spam-Level: 
X-Spam-Status: No, score=-1.976 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5s5U-XoQljkt for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 01:54:57 -0700 (PDT)
Received: from mail-pz0-f198.google.com (mail-pz0-f198.google.com [209.85.222.198]) by core3.amsl.com (Postfix) with ESMTP id D4DA73A6988 for <ipsec@ietf.org>; Thu,  9 Jul 2009 01:54:57 -0700 (PDT)
Received: by pzk36 with SMTP id 36so6146pzk.29 for <ipsec@ietf.org>; Thu, 09 Jul 2009 01:55:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:sender:received:in-reply-to :references:date:x-google-sender-auth:message-id:subject:from:to:cc :content-type; bh=AM90uEEPQ9E4fydzF83Lg8ok1UCpywjdtwu2GegOow0=; b=AHSiq5nDuoKhNU+RMbToijg3JdAg9YpGIFPwMuiM1J//yPPMAKSGsryZ1fsPckT8wy R6Ki49J6BeeVh5ngtK07vsSU5uptqQsHvG7Xa4lfIiXXaMW78GcqgeDd7oWndgZo3uGD ZdQUgdzsC32g/vpDY6cuJdqMumEuKK+xMAFrk=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; b=qmXDvoVipylQqz2p+hxi2NzDggM4ww2hBItdiIFdwDXTIBaq6NuNi4pLC42gqQ8JD2 Psq18su0cw8du/qnQXFNH2GV+KZNk1oz9U+6wyx2d3lW9hYhp/e4VZxiB/mku6+Ew95S EOZrXmlxncxtkvbkNI/gQ3rFRmi5tr8BuTkrk=
MIME-Version: 1.0
Sender: rsjenwar@gmail.com
Received: by 10.142.177.13 with SMTP id z13mr177909wfe.9.1247129723954; Thu,  09 Jul 2009 01:55:23 -0700 (PDT)
In-Reply-To: <3d7da440907090043w571fdb87g5a3a2e5211a62eb2@mail.gmail.com>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com> <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594C4@il-ex01.ad.checkpoint.com> <7ccecf670907040336t51b15b1t790284952459069a@mail.gmail.com> <19027.41530.987118.492735@fireball.kivinen.iki.fi> <7ccecf670907072118l2cad6e24i6de6aadfc023604a@mail.gmail.com> <006FEB08D9C6444AB014105C9AEB133F433538CE42@il-ex01.ad.checkpoint.com> <3d7da440907090043w571fdb87g5a3a2e5211a62eb2@mail.gmail.com>
Date: Thu, 9 Jul 2009 14:25:23 +0530
X-Google-Sender-Auth: ca26d12557f0ca9d
Message-ID: <7ccecf670907090155g2753aef4xfc7846fa287f2ed9@mail.gmail.com>
From: Raj Singh <rsj@cisco.com>
To: Valery Smyslov <svanru@gmail.com>
Content-Type: multipart/alternative; boundary=000e0cd173d22f68e4046e420406
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Yoav Nir <ynir@checkpoint.com>, Tero Kivinen <kivinen@iki.fi>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jul 2009 08:54:59 -0000

--000e0cd173d22f68e4046e420406
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Valery,

On Thu, Jul 9, 2009 at 1:13 PM, Valery Smyslov <svanru@gmail.com> wrote:

> Hi all,
>
> I think, adding new payload or exchange type is a real overkill for
> such a small extension.
> IKE has well defined mechanism for advertising/negotiating new
> extensions via VID or Notify.
> Other extensions (like MOBIKE) use it, so why multiply entities
> unnecessarily?
>
> Then, I'd rather leave a decision whether to proceed with childless or
> full versions
> of IKE_AUTH exchange completely at initiator's discretion. After all,
> it is he/she, who
> knows what happened - either user pressed "connect" button or there
> was a real packet.
> I think, responder should not have any policy on this - just capability.
> How could, for example, he/she insist on childless IKE SA if initiator
> has a real
> packet to protect? In this case it will either lead to denial of
> communication
> or initiator will probably create childless IKE SA following by
> CREATE_CHILD_SA,
> increasing unnecessary load on responder. Prohibiting childless IKE SA
> by responder
> doesn't make much sense either - nothing prevents initiator from following
> current behaviour - creating dummy IPsec SA and immediately deleting it.
> All responder has in this case is again unnecessary load on
> herself/himself.
>
> From my point of view, childless mode is just a usefull protocol
> optimization,
> and it is initiator, who must decide whether to use it. For this purpose
> peers must exchange VID/Notify payloads during IKE_SA_INIT, claiming their
> capabilities to proceed with childless IKE_AUTH. Then, if both
> sides support it, initiator decides whether to use it. In this case
> responder
> must be prepared to both versions of IKE_AUTH. If responder doesn't
> support this extension, it naturally doesn't send corresponding VID/Notify.
> At this point initiator must either proceed with current behaviour - dummy
> IPsec
> proposal (if she/he really wants IKE SA) or terminate exchange if she/he
> doesn't support current behaviour (in which case it is a misconfiguration).

The problem with this approach is if responder does not support this
extension,
then also it will process IKE_SA_INIT, (involving CPU intensive D-H
calculation)
which will be eventually dropped by initiator, if initiator wants to do only
childless IKE_AUTH.
Its good to be backward compatible.

>
>
> Regards,
> Valery Smyslov.
>
With Regards,
Raj

>
>
> 2009/7/8, Yoav Nir <ynir@checkpoint.com>:
> > Hi Raj
> >
> > What Yaron suggested, was to create a new payload type, and mark that as
> > critical.
> >
> > I don't like either Yaron's or Tero's suggestions, as both lead to a kind
> of
> > "take it or leave it" behavior. The initiator proposes doing "childless",
> > and if the responder does not agree, the IKE SA breaks.
> >
> > At least for the remote access case, where we want a stand-by IKE SA so
> that
> > eventually we can have child SAs, this does not make sense. If the
> responder
> > does not support childless, the initiator can still propose universal
> > selectors, and the responder will narrow them down to a (possibly
> useless)
> > valid SA.
> >
> > I think a better option is to have a notify/VID payload, with flags
> > indicating whether a childless exchange is wanted, required or
> prohibited,
> > and whether subsequent child SAs should be permitted.  This does still
> have
> > a problem where the initiator requires that the IKE_AUTH be childless and
> > the responder does not support the extension.
> >
> > Alternatively, we could adopt Yaron's suggestion, and make a new payload,
> > with a critical bit turned on or off according to requirement level. I
> don't
> > like having empty payloads, but I can't back up this dislike with any
> good
> > argument.
> >
> > Maybe when we make version 2.1 of IKE, we can add a "critical type" bit
> to
> > the notification payload.
> > ________________________________
> > From: Raj Singh [mailto:rsjenwar@gmail.com]
> > Sent: Wednesday, July 08, 2009 7:18 AM
> > To: Tero Kivinen
> > Cc: Yaron Sheffer; ipsec@ietf.org; Yoav Nir
> > Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
> >
> > Hi Tero,
> >
> > Thanks for your valuable inputs.
> > Please find re inputs inline. <Raj>
> > On Wed, Jul 8, 2009 at 1:00 AM, Tero Kivinen
> > <kivinen@iki.fi<mailto:kivinen@iki.fi>> wrote:
> > Raj Singh writes:
> >> Your suggestion of having "critical" bit set on childless notify/VID
> >> payload
> >> from initiator in IKE_SA_INIT exchange will define the bahavior as
> >> mentioned
> >> below.
> > That is not correct way of using critical bit. Critical bit means that
> > if it is set and the PAYLOAD TYPE is not understood, then
> > UNSUPPORTED_CRITICAL_PAYLOAD error is reported. Every implementation
> > will understand Notify and Vendor ID payloads, thus they will never
> > return UNSUPPORTED_CRITICAL_PAYLOAD regardless what the contents of
> > those payloads are.
> > <Raj>
> > I  was under impression that we can have "critical" bit in childless
> > IKE_AUTH notify/VID.
> > Even Yaron also clarified in same thread that we need new exchange type
> to
> > have "critical" bit on it.
> >
> >
> >> If initiator want to childless IKE_AUTH, it will send
>  CHILDLESS_IKE_AUTH
> >> notify/VID payload having "critical" flag SET in IKE_SA_INIT request.
> > And complient implentation will do what to do as RFC4306 says ie:
> >
> >      ... MUST be ignored by the recipient if the recipient
> >      understands the payload type code. MUST be set to zero for
> >      payload types defined in this document. Note that the critical
> >      bit applies to the current payload rather than the "next"
> >      payload whose type code appears in the first octet. The
> >      reasoning behind not setting the critical bit for payloads
> >      defined in this document is that all implementations MUST
> >      understand all payload types defined in this document and
> >      therefore must ignore the Critical bit's value. Skipped payloads
> >      are expected to have valid Next Payload and Payload Length
> >      fields.
> >
> > The correct way to do is to make new exchange type for this new
> > childless IKE_SA_INIT & IKE_AUTH. That way old implenentations will
> > then know that they do not understand this new type and will drop the
> > packets. This is if you really want the property that if responder
> > does not understand chieldless IKE_AUTH you do not want to continue at
> > all.
> >
> > I have not yet read the draft, as I have been too busy with working
> > group drafts already, and I still do not know if this is really needed
> > at all...
> > <Raj>
> > If we can't have "critical" bit inside associated data of childless
> > notify/VID,  then
> > new exchange type is a near possibility.
> > Please have a look at the use cases in the draft for need of this draft.
> >
> > --
> > kivinen@iki.fi<mailto:kivinen@iki.fi>
> >
> > With Regards,
> > Raj
> >
>

--000e0cd173d22f68e4046e420406
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Valery,<br><br><div class=3D"gmail_quote">On Thu, Jul 9, 2009 at 1:13 PM=
, Valery Smyslov <span dir=3D"ltr">&lt;<a href=3D"mailto:svanru@gmail.com">=
svanru@gmail.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote"=
 style=3D"border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.=
8ex; padding-left: 1ex;">
Hi all,<br>
<br>
I think, adding new payload or exchange type is a real overkill for<br>
such a small extension.<br>
IKE has well defined mechanism for advertising/negotiating new<br>
extensions via VID or Notify.<br>
Other extensions (like MOBIKE) use it, so why multiply entities unnecessari=
ly?<br>
<br>
Then, I&#39;d rather leave a decision whether to proceed with childless or<=
br>
full versions<br>
of IKE_AUTH exchange completely at initiator&#39;s discretion. After all,<b=
r>
it is he/she, who<br>
knows what happened - either user pressed &quot;connect&quot; button or the=
re<br>
was a real packet.<br>
I think, responder should not have any policy on this - just capability.<br=
>
How could, for example, he/she insist on childless IKE SA if initiator<br>
has a real<br>
packet to protect? In this case it will either lead to denial of communicat=
ion<br>
or initiator will probably create childless IKE SA following by CREATE_CHIL=
D_SA,<br>
increasing unnecessary load on responder. Prohibiting childless IKE SA<br>
by responder<br>
doesn&#39;t make much sense either - nothing prevents initiator from follow=
ing<br>
current behaviour - creating dummy IPsec SA and immediately deleting it.<br=
>
All responder has in this case is again unnecessary load on herself/himself=
.<br>
<br>
>From my point of view, childless mode is just a usefull protocol optimizati=
on,<br>
and it is initiator, who must decide whether to use it. For this purpose<br=
>
peers must exchange VID/Notify payloads during IKE_SA_INIT, claiming their<=
br>
capabilities to proceed with childless IKE_AUTH. Then, if both<br>
sides support it, initiator decides whether to use it. In this case respond=
er<br>
must be prepared to both versions of IKE_AUTH. If responder doesn&#39;t<br>
support this extension, it naturally doesn&#39;t send corresponding VID/Not=
ify.<br>
At this point initiator must either proceed with current behaviour - dummy =
IPsec<br>
proposal (if she/he really wants IKE SA) or terminate exchange if she/he<br=
>
doesn&#39;t support current behaviour (in which case it is a misconfigurati=
on).</blockquote><div>The problem with this approach is if responder does n=
ot support this extension,<br>then also it will process IKE_SA_INIT, (invol=
ving CPU intensive D-H calculation)<br>
which will be eventually dropped by initiator, if initiator wants to do onl=
y childless IKE_AUTH.<br>Its good to be backward compatible.<br></div><bloc=
kquote class=3D"gmail_quote" style=3D"border-left: 1px solid rgb(204, 204, =
204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<br>
<br>
Regards,<br>
Valery Smyslov.<br>
</blockquote><div>With Regards,<br>Raj <br></div><blockquote class=3D"gmail=
_quote" style=3D"border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt=
 0pt 0.8ex; padding-left: 1ex;"><br>
<br>
2009/7/8, Yoav Nir &lt;<a href=3D"mailto:ynir@checkpoint.com">ynir@checkpoi=
nt.com</a>&gt;:<br>
<div><div></div><div class=3D"h5">&gt; Hi Raj<br>
&gt;<br>
&gt; What Yaron suggested, was to create a new payload type, and mark that =
as<br>
&gt; critical.<br>
&gt;<br>
&gt; I don&#39;t like either Yaron&#39;s or Tero&#39;s suggestions, as both=
 lead to a kind of<br>
&gt; &quot;take it or leave it&quot; behavior. The initiator proposes doing=
 &quot;childless&quot;,<br>
&gt; and if the responder does not agree, the IKE SA breaks.<br>
&gt;<br>
&gt; At least for the remote access case, where we want a stand-by IKE SA s=
o that<br>
&gt; eventually we can have child SAs, this does not make sense. If the res=
ponder<br>
&gt; does not support childless, the initiator can still propose universal<=
br>
&gt; selectors, and the responder will narrow them down to a (possibly usel=
ess)<br>
&gt; valid SA.<br>
&gt;<br>
&gt; I think a better option is to have a notify/VID payload, with flags<br=
>
&gt; indicating whether a childless exchange is wanted, required or prohibi=
ted,<br>
&gt; and whether subsequent child SAs should be permitted. =C2=A0This does =
still have<br>
&gt; a problem where the initiator requires that the IKE_AUTH be childless =
and<br>
&gt; the responder does not support the extension.<br>
&gt;<br>
&gt; Alternatively, we could adopt Yaron&#39;s suggestion, and make a new p=
ayload,<br>
&gt; with a critical bit turned on or off according to requirement level. I=
 don&#39;t<br>
&gt; like having empty payloads, but I can&#39;t back up this dislike with =
any good<br>
&gt; argument.<br>
&gt;<br>
&gt; Maybe when we make version 2.1 of IKE, we can add a &quot;critical typ=
e&quot; bit to<br>
&gt; the notification payload.<br>
&gt; ________________________________<br>
&gt; From: Raj Singh [mailto:<a href=3D"mailto:rsjenwar@gmail.com">rsjenwar=
@gmail.com</a>]<br>
&gt; Sent: Wednesday, July 08, 2009 7:18 AM<br>
&gt; To: Tero Kivinen<br>
&gt; Cc: Yaron Sheffer; <a href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</a=
>; Yoav Nir<br>
&gt; Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt=
<br>
&gt;<br>
&gt; Hi Tero,<br>
&gt;<br>
&gt; Thanks for your valuable inputs.<br>
&gt; Please find re inputs inline. &lt;Raj&gt;<br>
&gt; On Wed, Jul 8, 2009 at 1:00 AM, Tero Kivinen<br>
</div></div><div><div></div><div class=3D"h5">&gt; &lt;<a href=3D"mailto:ki=
vinen@iki.fi">kivinen@iki.fi</a>&lt;mailto:<a href=3D"mailto:kivinen@iki.fi=
">kivinen@iki.fi</a>&gt;&gt; wrote:<br>
&gt; Raj Singh writes:<br>
&gt;&gt; Your suggestion of having &quot;critical&quot; bit set on childles=
s notify/VID<br>
&gt;&gt; payload<br>
&gt;&gt; from initiator in IKE_SA_INIT exchange will define the bahavior as=
<br>
&gt;&gt; mentioned<br>
&gt;&gt; below.<br>
&gt; That is not correct way of using critical bit. Critical bit means that=
<br>
&gt; if it is set and the PAYLOAD TYPE is not understood, then<br>
&gt; UNSUPPORTED_CRITICAL_PAYLOAD error is reported. Every implementation<b=
r>
&gt; will understand Notify and Vendor ID payloads, thus they will never<br=
>
&gt; return UNSUPPORTED_CRITICAL_PAYLOAD regardless what the contents of<br=
>
&gt; those payloads are.<br>
&gt; &lt;Raj&gt;<br>
&gt; I =C2=A0was under impression that we can have &quot;critical&quot; bit=
 in childless<br>
&gt; IKE_AUTH notify/VID.<br>
&gt; Even Yaron also clarified in same thread that we need new exchange typ=
e to<br>
&gt; have &quot;critical&quot; bit on it.<br>
&gt;<br>
&gt;<br>
&gt;&gt; If initiator want to childless IKE_AUTH, it will send =C2=A0CHILDL=
ESS_IKE_AUTH<br>
&gt;&gt; notify/VID payload having &quot;critical&quot; flag SET in IKE_SA_=
INIT request.<br>
&gt; And complient implentation will do what to do as RFC4306 says ie:<br>
&gt;<br>
&gt; =C2=A0 =C2=A0 =C2=A0... MUST be ignored by the recipient if the recipi=
ent<br>
&gt; =C2=A0 =C2=A0 =C2=A0understands the payload type code. MUST be set to =
zero for<br>
&gt; =C2=A0 =C2=A0 =C2=A0payload types defined in this document. Note that =
the critical<br>
&gt; =C2=A0 =C2=A0 =C2=A0bit applies to the current payload rather than the=
 &quot;next&quot;<br>
&gt; =C2=A0 =C2=A0 =C2=A0payload whose type code appears in the first octet=
. The<br>
&gt; =C2=A0 =C2=A0 =C2=A0reasoning behind not setting the critical bit for =
payloads<br>
&gt; =C2=A0 =C2=A0 =C2=A0defined in this document is that all implementatio=
ns MUST<br>
&gt; =C2=A0 =C2=A0 =C2=A0understand all payload types defined in this docum=
ent and<br>
&gt; =C2=A0 =C2=A0 =C2=A0therefore must ignore the Critical bit&#39;s value=
. Skipped payloads<br>
&gt; =C2=A0 =C2=A0 =C2=A0are expected to have valid Next Payload and Payloa=
d Length<br>
&gt; =C2=A0 =C2=A0 =C2=A0fields.<br>
&gt;<br>
&gt; The correct way to do is to make new exchange type for this new<br>
&gt; childless IKE_SA_INIT &amp; IKE_AUTH. That way old implenentations wil=
l<br>
&gt; then know that they do not understand this new type and will drop the<=
br>
&gt; packets. This is if you really want the property that if responder<br>
&gt; does not understand chieldless IKE_AUTH you do not want to continue at=
<br>
&gt; all.<br>
&gt;<br>
&gt; I have not yet read the draft, as I have been too busy with working<br=
>
&gt; group drafts already, and I still do not know if this is really needed=
<br>
&gt; at all...<br>
&gt; &lt;Raj&gt;<br>
&gt; If we can&#39;t have &quot;critical&quot; bit inside associated data o=
f childless<br>
&gt; notify/VID, =C2=A0then<br>
&gt; new exchange type is a near possibility.<br>
&gt; Please have a look at the use cases in the draft for need of this draf=
t.<br>
&gt;<br>
&gt; --<br>
</div></div>&gt; <a href=3D"mailto:kivinen@iki.fi">kivinen@iki.fi</a>&lt;ma=
ilto:<a href=3D"mailto:kivinen@iki.fi">kivinen@iki.fi</a>&gt;<br>
&gt;<br>
&gt; With Regards,<br>
&gt; Raj<br>
&gt;<br>
</blockquote></div><br>

--000e0cd173d22f68e4046e420406--

From svanru@gmail.com  Thu Jul  9 02:09:35 2009
Return-Path: <svanru@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F0FDF3A6A31 for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 02:09:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zZe7esQLS0Bh for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 02:09:34 -0700 (PDT)
Received: from mail-fx0-f218.google.com (mail-fx0-f218.google.com [209.85.220.218]) by core3.amsl.com (Postfix) with ESMTP id 1C23A28C20C for <ipsec@ietf.org>; Thu,  9 Jul 2009 02:09:18 -0700 (PDT)
Received: by fxm18 with SMTP id 18so13836fxm.37 for <ipsec@ietf.org>; Thu, 09 Jul 2009 02:09:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:from:to:cc :references:subject:date:mime-version:content-type:x-priority :x-msmail-priority:x-mailer:x-mimeole; bh=Fkm0XmX4SFFBLZLqc7NV0GFpqNZnCcHj+nQP2XU0SM8=; b=rkE3RtI/BmZlBXZLdDkuDIJ/NYtViJzKwSlO+6IWxBaaqV8c8bTVCmdCwuxAZKisjd JOXePcZNKF0x01KuyoXroBJ+EYH2sdDGXcG3Mi5img0ySDQauv0/WxVL3kT+wI2RIc7p agKqbdrH6I04vyNH81JULsEXvG+O9fd9H6TIE=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:from:to:cc:references:subject:date:mime-version :content-type:x-priority:x-msmail-priority:x-mailer:x-mimeole; b=ZuQgquqDYaxZiHs04rB5OyUqnwWXjJ4/iDuisrFa5zs5TY+XsDoEfeiWIWtSIOx7Au /ex9AGesCzAvlXIURIgD+59PLzHef1alvKvguAiHj0fzUnmALmPDKUgbwqzqpMWhT1kn y2625ijRocdr0QOh+Yk0cGuhbesPkW8flneKg=
Received: by 10.204.72.129 with SMTP id m1mr517898bkj.61.1247130584326; Thu, 09 Jul 2009 02:09:44 -0700 (PDT)
Received: from chichi (ppp85-141-166-28.pppoe.mtu-net.ru [85.141.166.28]) by mx.google.com with ESMTPS id 1sm17728957fkt.27.2009.07.09.02.09.42 (version=SSLv3 cipher=RC4-MD5); Thu, 09 Jul 2009 02:09:43 -0700 (PDT)
Message-ID: <F63E431504EC496CB2AF93E0E8C3BA07@chichi>
From: "Valery Smyslov" <svanru@gmail.com>
To: "Raj Singh" <rsj@cisco.com>
References: <20090701091501.2DAE328C101@core3.amsl.com> <006FEB08D9C6444AB014105C9AEB133F433539DEC2@il-ex01.ad.checkpoint.com> <7ccecf670907030651uec406e4ha9fa9adc027f8335@mail.gmail.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594C4@il-ex01.ad.checkpoint.com> <7ccecf670907040336t51b15b1t790284952459069a@mail.gmail.com> <19027.41530.987118.492735@fireball.kivinen.iki.fi> <7ccecf670907072118l2cad6e24i6de6aadfc023604a@mail.gmail.com> <006FEB08D9C6444AB014105C9AEB133F433538CE42@il-ex01.ad.checkpoint.com> <3d7da440907090043w571fdb87g5a3a2e5211a62eb2@mail.gmail.com> <7ccecf670907090155g2753aef4xfc7846fa287f2ed9@mail.gmail.com>
Date: Thu, 9 Jul 2009 13:09:27 +0400
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0009_01CA0096.7D221340"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.5512
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579
Cc: ipsec@ietf.org, Yoav Nir <ynir@checkpoint.com>, Tero Kivinen <kivinen@iki.fi>
Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jul 2009 09:09:36 -0000

This is a multi-part message in MIME format.

------=_NextPart_000_0009_01CA0096.7D221340
Content-Type: text/plain;
	charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Raj,

if responder doesn't support this extension, initiator will determine it =
after IKE_SA_INIT
and continue with current approach (dummy IPsec proposals). If initiator =
cannot
do it, they won't communicate anyway. In this case initiator is broken, =
because
it cannot deal with old (unsupported) responders.

Again, I think that this extension is just a minor protocol optimization =
for such
situations, when child SA is not really necessary. Supporting this =
extension
for initiator doesn't mean that current approach must be fully =
abandoned.

Regards,
Valery Smyslov.
  ----- Original Message -----=20
  From: Raj Singh=20
  To: Valery Smyslov=20
  Cc: Yoav Nir ; Tero Kivinen ; ipsec@ietf.org=20
  Sent: Thursday, July 09, 2009 12:55 PM
  Subject: Re: [IPsec] FW: I-D Action:draft-nir-ipsecme-childless-00.txt


  Hi Valery,


  On Thu, Jul 9, 2009 at 1:13 PM, Valery Smyslov <svanru@gmail.com> =
wrote:

    Hi all,

    I think, adding new payload or exchange type is a real overkill for
    such a small extension.
    IKE has well defined mechanism for advertising/negotiating new
    extensions via VID or Notify.
    Other extensions (like MOBIKE) use it, so why multiply entities =
unnecessarily?

    Then, I'd rather leave a decision whether to proceed with childless =
or
    full versions
    of IKE_AUTH exchange completely at initiator's discretion. After =
all,
    it is he/she, who
    knows what happened - either user pressed "connect" button or there
    was a real packet.
    I think, responder should not have any policy on this - just =
capability.
    How could, for example, he/she insist on childless IKE SA if =
initiator
    has a real
    packet to protect? In this case it will either lead to denial of =
communication
    or initiator will probably create childless IKE SA following by =
CREATE_CHILD_SA,
    increasing unnecessary load on responder. Prohibiting childless IKE =
SA
    by responder
    doesn't make much sense either - nothing prevents initiator from =
following
    current behaviour - creating dummy IPsec SA and immediately deleting =
it.
    All responder has in this case is again unnecessary load on =
herself/himself.

    From my point of view, childless mode is just a usefull protocol =
optimization,
    and it is initiator, who must decide whether to use it. For this =
purpose
    peers must exchange VID/Notify payloads during IKE_SA_INIT, claiming =
their
    capabilities to proceed with childless IKE_AUTH. Then, if both
    sides support it, initiator decides whether to use it. In this case =
responder
    must be prepared to both versions of IKE_AUTH. If responder doesn't
    support this extension, it naturally doesn't send corresponding =
VID/Notify.
    At this point initiator must either proceed with current behaviour - =
dummy IPsec
    proposal (if she/he really wants IKE SA) or terminate exchange if =
she/he
    doesn't support current behaviour (in which case it is a =
misconfiguration).
  The problem with this approach is if responder does not support this =
extension,
  then also it will process IKE_SA_INIT, (involving CPU intensive D-H =
calculation)
  which will be eventually dropped by initiator, if initiator wants to =
do only childless IKE_AUTH.
  Its good to be backward compatible.



    Regards,
    Valery Smyslov.

  With Regards,
  Raj=20



    2009/7/8, Yoav Nir <ynir@checkpoint.com>:

    > Hi Raj
    >
    > What Yaron suggested, was to create a new payload type, and mark =
that as
    > critical.
    >
    > I don't like either Yaron's or Tero's suggestions, as both lead to =
a kind of
    > "take it or leave it" behavior. The initiator proposes doing =
"childless",
    > and if the responder does not agree, the IKE SA breaks.
    >
    > At least for the remote access case, where we want a stand-by IKE =
SA so that
    > eventually we can have child SAs, this does not make sense. If the =
responder
    > does not support childless, the initiator can still propose =
universal
    > selectors, and the responder will narrow them down to a (possibly =
useless)
    > valid SA.
    >
    > I think a better option is to have a notify/VID payload, with =
flags
    > indicating whether a childless exchange is wanted, required or =
prohibited,
    > and whether subsequent child SAs should be permitted.  This does =
still have
    > a problem where the initiator requires that the IKE_AUTH be =
childless and
    > the responder does not support the extension.
    >
    > Alternatively, we could adopt Yaron's suggestion, and make a new =
payload,
    > with a critical bit turned on or off according to requirement =
level. I don't
    > like having empty payloads, but I can't back up this dislike with =
any good
    > argument.
    >
    > Maybe when we make version 2.1 of IKE, we can add a "critical =
type" bit to
    > the notification payload.
    > ________________________________
    > From: Raj Singh [mailto:rsjenwar@gmail.com]
    > Sent: Wednesday, July 08, 2009 7:18 AM
    > To: Tero Kivinen
    > Cc: Yaron Sheffer; ipsec@ietf.org; Yoav Nir
    > Subject: Re: [IPsec] FW: I-D =
Action:draft-nir-ipsecme-childless-00.txt
    >
    > Hi Tero,
    >
    > Thanks for your valuable inputs.
    > Please find re inputs inline. <Raj>
    > On Wed, Jul 8, 2009 at 1:00 AM, Tero Kivinen

    > <kivinen@iki.fi<mailto:kivinen@iki.fi>> wrote:
    > Raj Singh writes:
    >> Your suggestion of having "critical" bit set on childless =
notify/VID
    >> payload
    >> from initiator in IKE_SA_INIT exchange will define the bahavior =
as
    >> mentioned
    >> below.
    > That is not correct way of using critical bit. Critical bit means =
that
    > if it is set and the PAYLOAD TYPE is not understood, then
    > UNSUPPORTED_CRITICAL_PAYLOAD error is reported. Every =
implementation
    > will understand Notify and Vendor ID payloads, thus they will =
never
    > return UNSUPPORTED_CRITICAL_PAYLOAD regardless what the contents =
of
    > those payloads are.
    > <Raj>
    > I  was under impression that we can have "critical" bit in =
childless
    > IKE_AUTH notify/VID.
    > Even Yaron also clarified in same thread that we need new exchange =
type to
    > have "critical" bit on it.
    >
    >
    >> If initiator want to childless IKE_AUTH, it will send  =
CHILDLESS_IKE_AUTH
    >> notify/VID payload having "critical" flag SET in IKE_SA_INIT =
request.
    > And complient implentation will do what to do as RFC4306 says ie:
    >
    >      ... MUST be ignored by the recipient if the recipient
    >      understands the payload type code. MUST be set to zero for
    >      payload types defined in this document. Note that the =
critical
    >      bit applies to the current payload rather than the "next"
    >      payload whose type code appears in the first octet. The
    >      reasoning behind not setting the critical bit for payloads
    >      defined in this document is that all implementations MUST
    >      understand all payload types defined in this document and
    >      therefore must ignore the Critical bit's value. Skipped =
payloads
    >      are expected to have valid Next Payload and Payload Length
    >      fields.
    >
    > The correct way to do is to make new exchange type for this new
    > childless IKE_SA_INIT & IKE_AUTH. That way old implenentations =
will
    > then know that they do not understand this new type and will drop =
the
    > packets. This is if you really want the property that if responder
    > does not understand chieldless IKE_AUTH you do not want to =
continue at
    > all.
    >
    > I have not yet read the draft, as I have been too busy with =
working
    > group drafts already, and I still do not know if this is really =
needed
    > at all...
    > <Raj>
    > If we can't have "critical" bit inside associated data of =
childless
    > notify/VID,  then
    > new exchange type is a near possibility.
    > Please have a look at the use cases in the draft for need of this =
draft.
    >
    > --

    > kivinen@iki.fi<mailto:kivinen@iki.fi>
    >
    > With Regards,
    > Raj
    >



------=_NextPart_000_0009_01CA0096.7D221340
Content-Type: text/html;
	charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

=EF=BB=BF<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content=3D"text/html; charset=3Dutf-8" http-equiv=3DContent-Type>
<META name=3DGENERATOR content=3D"MSHTML 8.00.6001.18783">
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT size=3D2>Hi Raj,</FONT></DIV>
<DIV><FONT size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2>if responder doesn't support this extension, =
initiator will=20
determine it after IKE_SA_INIT</FONT></DIV>
<DIV><FONT size=3D2>and </FONT><FONT size=3D2>continue with current =
approach (dummy=20
IPsec proposals). If initiator cannot</FONT></DIV>
<DIV><FONT size=3D2>do it, they won't communicate anyway. In this case =
initiator=20
is broken, because</FONT></DIV>
<DIV><FONT size=3D2>it cannot deal with old (unsupported) =
responders.</FONT></DIV>
<DIV><FONT size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2>Again, I think that this extension is just a minor =
protocol=20
optimization for such</FONT></DIV>
<DIV><FONT size=3D2>situations, when child SA is not really necessary. =
Supporting=20
this extension</FONT></DIV>
<DIV><FONT size=3D2>for initiator doesn't mean that current approach =
must be fully=20
abandoned.</FONT></DIV>
<DIV><FONT size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2>Regards,</FONT></DIV>
<DIV><FONT size=3D2>Valery Smyslov.</FONT></DIV>
<BLOCKQUOTE=20
style=3D"BORDER-LEFT: #000000 2px solid; PADDING-LEFT: 5px; =
PADDING-RIGHT: 0px; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px">
  <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV>
  <DIV=20
  style=3D"FONT: 10pt arial; BACKGROUND: #e4e4e4; font-color: =
black"><B>From:</B>=20
  <A title=3Drsj@cisco.com href=3D"mailto:rsj@cisco.com">Raj Singh</A> =
</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A title=3Dsvanru@gmail.com =

  href=3D"mailto:svanru@gmail.com">Valery Smyslov</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Cc:</B> <A =
title=3Dynir@checkpoint.com=20
  href=3D"mailto:ynir@checkpoint.com">Yoav Nir</A> ; <A =
title=3Dkivinen@iki.fi=20
  href=3D"mailto:kivinen@iki.fi">Tero Kivinen</A> ; <A =
title=3Dipsec@ietf.org=20
  href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Thursday, July 09, 2009 =
12:55=20
  PM</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> Re: [IPsec] FW: I-D=20
  Action:draft-nir-ipsecme-childless-00.txt</DIV>
  <DIV><BR></DIV>Hi Valery,<BR><BR>
  <DIV class=3Dgmail_quote>On Thu, Jul 9, 2009 at 1:13 PM, Valery =
Smyslov <SPAN=20
  dir=3Dltr>&lt;<A =
href=3D"mailto:svanru@gmail.com">svanru@gmail.com</A>&gt;</SPAN>=20
  wrote:<BR>
  <BLOCKQUOTE=20
  style=3D"BORDER-LEFT: rgb(204,204,204) 1px solid; MARGIN: 0pt 0pt 0pt =
0.8ex; PADDING-LEFT: 1ex"=20
  class=3Dgmail_quote>Hi all,<BR><BR>I think, adding new payload or =
exchange=20
    type is a real overkill for<BR>such a small extension.<BR>IKE has =
well=20
    defined mechanism for advertising/negotiating new<BR>extensions via =
VID or=20
    Notify.<BR>Other extensions (like MOBIKE) use it, so why multiply =
entities=20
    unnecessarily?<BR><BR>Then, I'd rather leave a decision whether to =
proceed=20
    with childless or<BR>full versions<BR>of IKE_AUTH exchange =
completely at=20
    initiator's discretion. After all,<BR>it is he/she, who<BR>knows =
what=20
    happened - either user pressed "connect" button or there<BR>was a =
real=20
    packet.<BR>I think, responder should not have any policy on this - =
just=20
    capability.<BR>How could, for example, he/she insist on childless =
IKE SA if=20
    initiator<BR>has a real<BR>packet to protect? In this case it will =
either=20
    lead to denial of communication<BR>or initiator will probably create =

    childless IKE SA following by CREATE_CHILD_SA,<BR>increasing =
unnecessary=20
    load on responder. Prohibiting childless IKE SA<BR>by =
responder<BR>doesn't=20
    make much sense either - nothing prevents initiator from=20
    following<BR>current behaviour - creating dummy IPsec SA and =
immediately=20
    deleting it.<BR>All responder has in this case is again unnecessary =
load on=20
    herself/himself.<BR><BR>From my point of view, childless mode is =
just a=20
    usefull protocol optimization,<BR>and it is initiator, who must =
decide=20
    whether to use it. For this purpose<BR>peers must exchange =
VID/Notify=20
    payloads during IKE_SA_INIT, claiming their<BR>capabilities to =
proceed with=20
    childless IKE_AUTH. Then, if both<BR>sides support it, initiator =
decides=20
    whether to use it. In this case responder<BR>must be prepared to =
both=20
    versions of IKE_AUTH. If responder doesn't<BR>support this =
extension, it=20
    naturally doesn't send corresponding VID/Notify.<BR>At this point =
initiator=20
    must either proceed with current behaviour - dummy IPsec<BR>proposal =
(if=20
    she/he really wants IKE SA) or terminate exchange if =
she/he<BR>doesn't=20
    support current behaviour (in which case it is a=20
  misconfiguration).</BLOCKQUOTE>
  <DIV>The problem with this approach is if responder does not support =
this=20
  extension,<BR>then also it will process IKE_SA_INIT, (involving CPU =
intensive=20
  D-H calculation)<BR>which will be eventually dropped by initiator, if=20
  initiator wants to do only childless IKE_AUTH.<BR>Its good to be =
backward=20
  compatible.<BR></DIV>
  <BLOCKQUOTE=20
  style=3D"BORDER-LEFT: rgb(204,204,204) 1px solid; MARGIN: 0pt 0pt 0pt =
0.8ex; PADDING-LEFT: 1ex"=20
  class=3Dgmail_quote><BR><BR>Regards,<BR>Valery =
Smyslov.<BR></BLOCKQUOTE>
  <DIV>With Regards,<BR>Raj <BR></DIV>
  <BLOCKQUOTE=20
  style=3D"BORDER-LEFT: rgb(204,204,204) 1px solid; MARGIN: 0pt 0pt 0pt =
0.8ex; PADDING-LEFT: 1ex"=20
  class=3Dgmail_quote><BR><BR>2009/7/8, Yoav Nir &lt;<A=20
    href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</A>&gt;:<BR>
    <DIV>
    <DIV></DIV>
    <DIV class=3Dh5>&gt; Hi Raj<BR>&gt;<BR>&gt; What Yaron suggested, =
was to=20
    create a new payload type, and mark that as<BR>&gt;=20
    critical.<BR>&gt;<BR>&gt; I don't like either Yaron's or Tero's =
suggestions,=20
    as both lead to a kind of<BR>&gt; "take it or leave it" behavior. =
The=20
    initiator proposes doing "childless",<BR>&gt; and if the responder =
does not=20
    agree, the IKE SA breaks.<BR>&gt;<BR>&gt; At least for the remote =
access=20
    case, where we want a stand-by IKE SA so that<BR>&gt; eventually we =
can have=20
    child SAs, this does not make sense. If the responder<BR>&gt; does =
not=20
    support childless, the initiator can still propose universal<BR>&gt; =

    selectors, and the responder will narrow them down to a (possibly=20
    useless)<BR>&gt; valid SA.<BR>&gt;<BR>&gt; I think a better option =
is to=20
    have a notify/VID payload, with flags<BR>&gt; indicating whether a =
childless=20
    exchange is wanted, required or prohibited,<BR>&gt; and whether =
subsequent=20
    child SAs should be permitted. &nbsp;This does still have<BR>&gt; a =
problem=20
    where the initiator requires that the IKE_AUTH be childless =
and<BR>&gt; the=20
    responder does not support the extension.<BR>&gt;<BR>&gt; =
Alternatively, we=20
    could adopt Yaron's suggestion, and make a new payload,<BR>&gt; with =
a=20
    critical bit turned on or off according to requirement level. I=20
    don't<BR>&gt; like having empty payloads, but I can't back up this =
dislike=20
    with any good<BR>&gt; argument.<BR>&gt;<BR>&gt; Maybe when we make =
version=20
    2.1 of IKE, we can add a "critical type" bit to<BR>&gt; the =
notification=20
    payload.<BR>&gt; ________________________________<BR>&gt; From: Raj =
Singh=20
    [mailto:<A =
href=3D"mailto:rsjenwar@gmail.com">rsjenwar@gmail.com</A>]<BR>&gt;=20
    Sent: Wednesday, July 08, 2009 7:18 AM<BR>&gt; To: Tero =
Kivinen<BR>&gt; Cc:=20
    Yaron Sheffer; <A href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A>; =
Yoav=20
    Nir<BR>&gt; Subject: Re: [IPsec] FW: I-D=20
    Action:draft-nir-ipsecme-childless-00.txt<BR>&gt;<BR>&gt; Hi=20
    Tero,<BR>&gt;<BR>&gt; Thanks for your valuable inputs.<BR>&gt; =
Please find=20
    re inputs inline. &lt;Raj&gt;<BR>&gt; On Wed, Jul 8, 2009 at 1:00 =
AM, Tero=20
    Kivinen<BR></DIV></DIV>
    <DIV>
    <DIV></DIV>
    <DIV class=3Dh5>&gt; &lt;<A=20
    href=3D"mailto:kivinen@iki.fi">kivinen@iki.fi</A>&lt;mailto:<A=20
    href=3D"mailto:kivinen@iki.fi">kivinen@iki.fi</A>&gt;&gt; =
wrote:<BR>&gt; Raj=20
    Singh writes:<BR>&gt;&gt; Your suggestion of having "critical" bit =
set on=20
    childless notify/VID<BR>&gt;&gt; payload<BR>&gt;&gt; from initiator =
in=20
    IKE_SA_INIT exchange will define the bahavior as<BR>&gt;&gt;=20
    mentioned<BR>&gt;&gt; below.<BR>&gt; That is not correct way of =
using=20
    critical bit. Critical bit means that<BR>&gt; if it is set and the =
PAYLOAD=20
    TYPE is not understood, then<BR>&gt; UNSUPPORTED_CRITICAL_PAYLOAD =
error is=20
    reported. Every implementation<BR>&gt; will understand Notify and =
Vendor ID=20
    payloads, thus they will never<BR>&gt; return =
UNSUPPORTED_CRITICAL_PAYLOAD=20
    regardless what the contents of<BR>&gt; those payloads are.<BR>&gt;=20
    &lt;Raj&gt;<BR>&gt; I &nbsp;was under impression that we can have =
"critical"=20
    bit in childless<BR>&gt; IKE_AUTH notify/VID.<BR>&gt; Even Yaron =
also=20
    clarified in same thread that we need new exchange type to<BR>&gt; =
have=20
    "critical" bit on it.<BR>&gt;<BR>&gt;<BR>&gt;&gt; If initiator want =
to=20
    childless IKE_AUTH, it will send =
&nbsp;CHILDLESS_IKE_AUTH<BR>&gt;&gt;=20
    notify/VID payload having "critical" flag SET in IKE_SA_INIT=20
    request.<BR>&gt; And complient implentation will do what to do as =
RFC4306=20
    says ie:<BR>&gt;<BR>&gt; &nbsp; &nbsp; &nbsp;... MUST be ignored by =
the=20
    recipient if the recipient<BR>&gt; &nbsp; &nbsp; &nbsp;understands =
the=20
    payload type code. MUST be set to zero for<BR>&gt; &nbsp; &nbsp;=20
    &nbsp;payload types defined in this document. Note that the =
critical<BR>&gt;=20
    &nbsp; &nbsp; &nbsp;bit applies to the current payload rather than =
the=20
    "next"<BR>&gt; &nbsp; &nbsp; &nbsp;payload whose type code appears =
in the=20
    first octet. The<BR>&gt; &nbsp; &nbsp; &nbsp;reasoning behind not =
setting=20
    the critical bit for payloads<BR>&gt; &nbsp; &nbsp; &nbsp;defined in =
this=20
    document is that all implementations MUST<BR>&gt; &nbsp; &nbsp;=20
    &nbsp;understand all payload types defined in this document =
and<BR>&gt;=20
    &nbsp; &nbsp; &nbsp;therefore must ignore the Critical bit's value. =
Skipped=20
    payloads<BR>&gt; &nbsp; &nbsp; &nbsp;are expected to have valid Next =
Payload=20
    and Payload Length<BR>&gt; &nbsp; &nbsp; =
&nbsp;fields.<BR>&gt;<BR>&gt; The=20
    correct way to do is to make new exchange type for this new<BR>&gt;=20
    childless IKE_SA_INIT &amp; IKE_AUTH. That way old implenentations=20
    will<BR>&gt; then know that they do not understand this new type and =
will=20
    drop the<BR>&gt; packets. This is if you really want the property =
that if=20
    responder<BR>&gt; does not understand chieldless IKE_AUTH you do not =
want to=20
    continue at<BR>&gt; all.<BR>&gt;<BR>&gt; I have not yet read the =
draft, as I=20
    have been too busy with working<BR>&gt; group drafts already, and I =
still do=20
    not know if this is really needed<BR>&gt; at all...<BR>&gt;=20
    &lt;Raj&gt;<BR>&gt; If we can't have "critical" bit inside =
associated data=20
    of childless<BR>&gt; notify/VID, &nbsp;then<BR>&gt; new exchange =
type is a=20
    near possibility.<BR>&gt; Please have a look at the use cases in the =
draft=20
    for need of this draft.<BR>&gt;<BR>&gt; --<BR></DIV></DIV>&gt; <A=20
    href=3D"mailto:kivinen@iki.fi">kivinen@iki.fi</A>&lt;mailto:<A=20
    =
href=3D"mailto:kivinen@iki.fi">kivinen@iki.fi</A>&gt;<BR>&gt;<BR>&gt; =
With=20
    Regards,<BR>&gt;=20
Raj<BR>&gt;<BR></BLOCKQUOTE></DIV><BR></BLOCKQUOTE></BODY></HTML>

------=_NextPart_000_0009_01CA0096.7D221340--


From yaronf@checkpoint.com  Thu Jul  9 07:44:42 2009
Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 116A63A6C41 for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 07:44:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.134
X-Spam-Level: 
X-Spam-Status: No, score=-2.134 tagged_above=-999 required=5 tests=[AWL=-0.405, BAYES_00=-2.599, SARE_MLH_Stock1=0.87]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oXrcBMIbdATE for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 07:44:41 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id E9F6328C117 for <ipsec@ietf.org>; Thu,  9 Jul 2009 07:44:18 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id ED04C200E0C; Thu,  9 Jul 2009 17:44:58 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id A69E3200681 for <ipsec@ietf.org>; Thu,  9 Jul 2009 17:44:58 +0300 (IDT)
X-CheckPoint: {4A5601F8-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n69Ehu3e010484 for <ipsec@ietf.org>; Thu, 9 Jul 2009 17:44:45 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Thu, 9 Jul 2009 17:44:08 +0300
From: Yaron Sheffer <yaronf@checkpoint.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Date: Thu, 9 Jul 2009 17:44:06 +0300
Thread-Topic: Stockholm meeting - call for agenda items
Thread-Index: Acn6bwYUpAHD6lr6T8KQYgSUo/cmEwAFIu4wAYdtatA=
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59D59@il-ex01.ad.checkpoint.com>
References: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59351@il-ex01.ad.checkpoint.com>
In-Reply-To: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59351@il-ex01.ad.checkpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_01BE_01CA00BC.DB0FAE10"
MIME-Version: 1.0
Subject: Re: [IPsec] Stockholm meeting - call for agenda items
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jul 2009 14:44:42 -0000

------=_NextPart_000_01BE_01CA00BC.DB0FAE10
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

This is a gentle reminder that we are dedicating part of the Stockholm
meeting to proposed work items, as a preparation for the rechartering
process soon after Stockholm. Please send me and Paul requests for
presentation slots on this discussion by July 17.

Thanks,
	Yaron

> -----Original Message-----
> From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of
> Yaron Sheffer
> Sent: Wednesday, July 01, 2009 22:45
> To: ipsec@ietf.org
> Subject: [IPsec] Stockholm meeting - call for agenda items
> 
> Hi everyone,
> 
> First, some background: We will not start the formal rechartering process
> until after the face-to-face meeting, when enough documents have made
> sufficient progress. However we wanted to use the meeting for short
> presentations of documents that you believe should be included in the new
> charter. We are planning to add 2-3 such documents in the near future, as
> the existing work items move closer to publication.
> 
> As always: the actual rechartering discussion will be on the mailing list.
> Presenting your draft in Stockholm is *not* a prerequisite to proposing it
> for the new charter.
> 
> We are proposing the following agenda for Stockholm. Please let us know if
> you'd like to have a presentation slot. There will be *very* strong
> preference to work items that are already published as Internet Drafts.
> 
> - WG status (10 mins.)
> - Very short reports on ongoing WG docs (40 mins.):
>   - IKEv2-bis
>   - Roadmap
>   - WESP
>   - Heuristics (?)
>   - Resumption
>   - Redirect
> - RFC publication and the rechartering process (Paul, 10 mins.)
> - 10 minutes on each proposed work item: 5 on technology and 5 on "why
> this
> needs to be a working group document, rather than an individual or
> independent submission."
> - If time allows, 30 minutes on IKEv2-bis Issue #12
> (http://trac.tools.ietf.org/wg/ipsecme/trac/ticket/12).
> 
> Thanks,
> 	Yaron
> 
> 
> Scanned by Check Point Total Security Gateway.

------=_NextPart_000_01BE_01CA00BC.DB0FAE10
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_01BE_01CA00BC.DB0FAE10--

From paav.cisco@gmail.com  Thu Jul  9 07:53:34 2009
Return-Path: <paav.cisco@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AAB4328C19E for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 07:53:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.995
X-Spam-Level: 
X-Spam-Status: No, score=-1.995 tagged_above=-999 required=5 tests=[AWL=0.603,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5ISJMb17otqY for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 07:53:33 -0700 (PDT)
Received: from mail-bw0-f225.google.com (mail-bw0-f225.google.com [209.85.218.225]) by core3.amsl.com (Postfix) with ESMTP id 3DA103A67FD for <ipsec@ietf.org>; Thu,  9 Jul 2009 07:53:33 -0700 (PDT)
Received: by bwz25 with SMTP id 25so226692bwz.37 for <ipsec@ietf.org>; Thu, 09 Jul 2009 07:53:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:content-type; bh=M52vSLOqaGQduBML8D4NUck/4jPku8fe6YD/tC+Zrvc=; b=Yg3gntsG4aswaCMSkbKAgUIR0qxsreuAXGPujFrlZFK/Txvtfd9k4Iuf2GZeAAxQyQ E0tQUdrZz/xFh1i/dyPSSeay6ZlScWi0hTddKcyZz9htjQ8NMu2FxFWRrzFy0hX3UBLV rzVGisbJ9eskwkTEvQoEo2tstj8nbeEApfl0Y=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; b=B3gCYD+hQxgSWeQWTMgqdwDD+OO2s2d98vj/rGVxqR3z0YWoVZWdcCTOoOZT8eAeK8 MqsRPdOQBMtiVKKKofLw1sRTo8XlDPlGWBE9sbVzqqkYghBQB6dazCam4xO3iJri54vt 2Qgiqov6ZVdiG7ZQdz3/0HiSr4RoHsUuhFGds=
MIME-Version: 1.0
Received: by 10.223.114.68 with SMTP id d4mr380296faq.86.1247151237991; Thu,  09 Jul 2009 07:53:57 -0700 (PDT)
In-Reply-To: <85A9BBD7AEEA8F4ABE056A20AB06B94B9A7322@XMB-BGL-419.cisco.com>
References: <85A9BBD7AEEA8F4ABE056A20AB06B94B9A7322@XMB-BGL-419.cisco.com>
Date: Thu, 9 Jul 2009 20:23:57 +0530
Message-ID: <40e68ca20907090753y43cfb8fes552c685f6434c866@mail.gmail.com>
From: Padmakumar AV <paav.cisco@gmail.com>
To: ipsec@ietf.org
Content-Type: multipart/alternative; boundary=001636c5b184858f9b046e470696
Subject: [IPsec] Fwd: FW: New Version Notification for draft-padmakumar-ikev2-redirect-and-auth-offload-00
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jul 2009 14:53:34 -0000

--001636c5b184858f9b046e470696
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

Hi All,

I submitted a new draft draft-padmakumar-ikev2-redirect-and-auth-offload-00
(
http://www.ietf.org/internet-drafts/draft-padmakumar-ikev2-redirect-and-auth-offload-00.txt
).

This draft discuss IKEv2 redirect based mechanism to offload Authenication
related work to a trusted third party.

I'd like to have comments on this.

Thanks and Regards,
Padmakumar



-----Original Message-----
From: IETF I-D Submission Tool [mailto:idsubmission@ietf.org]
Sent: Thursday, July 09, 2009 7:28 PM
To: Padmakumar Av (paav)
Cc: Manikchand Bafna (manikrb); Pratima Sethi (psethi)
Subject: New Version Notification for
draft-padmakumar-ikev2-redirect-and-auth-offload-00


A new version of I-D,
draft-padmakumar-ikev2-redirect-and-auth-offload-00.txt has been successfuly
submitted by A Padmakumar and posted to the IETF repository.

Filename:        draft-padmakumar-ikev2-redirect-and-auth-offload
Revision:        00
Title:           IKEv2 Redirect and Authentication Offload
Creation_date:   2009-07-09
WG ID:           Independent Submission
Number_of_pages: 14

Abstract:
IKEv2 is a component of IPsec used for performing mutual
authentication and establishing and maintaining security associations
(SAs).  Redirect Mechanism for IKEv2 proposes a mechanism for IKEv2
that enables a VPN gateway to redirect the VPN client to another VPN
gateway, for example, based on the load condition.

Redirect mechanism can also be used to redirect a client to another
router (Trust Anchor) to do mutual authentication on behalf of the
server.  After mutual authentication Trust Anchor can redirect the
client back to the server with an Access Token which can be used as a
pre-shared key between the server and client for password based
IKE_AUTH exchange.  This document describes a mechanism to use IKEv2
redirects to offload such verifications to another trusted third
party.



The IETF Secretariat.

--001636c5b184858f9b046e470696
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div class=3D"gmail_quote"><div class=3D"gmail_quote">Hi All,</div><div cla=
ss=3D"gmail_quote"><br></div><div class=3D"gmail_quote">I submitted a new d=
raft draft-padmakumar-ikev2-redirect-and-auth-offload-00 (<a href=3D"http:/=
/www.ietf.org/internet-drafts/draft-padmakumar-ikev2-redirect-and-auth-offl=
oad-00.txt">http://www.ietf.org/internet-drafts/draft-padmakumar-ikev2-redi=
rect-and-auth-offload-00.txt</a>).</div>
<div class=3D"gmail_quote"><br></div><div class=3D"gmail_quote">This draft =
discuss IKEv2 redirect based mechanism to offload Authenication related wor=
k to a trusted third party.</div><div class=3D"gmail_quote"><br></div><div =
class=3D"gmail_quote">
I&#39;d like to have comments on this.</div><div class=3D"gmail_quote"><br>=
</div><div class=3D"gmail_quote">Thanks and Regards,</div><div class=3D"gma=
il_quote">Padmakumar</div><div><br></div></div><div class=3D"gmail_quote"><=
br><br>
-----Original Message-----<br>
From: IETF I-D Submission Tool [mailto:<a href=3D"mailto:idsubmission@ietf.=
org">idsubmission@ietf.org</a>]<br>
Sent: Thursday, July 09, 2009 7:28 PM<br>
To: Padmakumar Av (paav)<br>
Cc: Manikchand Bafna (manikrb); Pratima Sethi (psethi)<br>
Subject: New Version Notification for draft-padmakumar-ikev2-redirect-and-a=
uth-offload-00<br>
<br>
<br>
A new version of I-D, draft-padmakumar-ikev2-redirect-and-auth-offload-00.t=
xt has been successfuly submitted by A Padmakumar and posted to the IETF re=
pository.<br>
<br>
Filename: =A0 =A0 =A0 =A0draft-padmakumar-ikev2-redirect-and-auth-offload<b=
r>
Revision: =A0 =A0 =A0 =A000<br>
Title: =A0 =A0 =A0 =A0 =A0 IKEv2 Redirect and Authentication Offload<br>
Creation_date: =A0 2009-07-09<br>
WG ID: =A0 =A0 =A0 =A0 =A0 Independent Submission<br>
Number_of_pages: 14<br>
<br>
Abstract:<br>
IKEv2 is a component of IPsec used for performing mutual<br>
authentication and establishing and maintaining security associations<br>
(SAs). =A0Redirect Mechanism for IKEv2 proposes a mechanism for IKEv2<br>
that enables a VPN gateway to redirect the VPN client to another VPN<br>
gateway, for example, based on the load condition.<br>
<br>
Redirect mechanism can also be used to redirect a client to another<br>
router (Trust Anchor) to do mutual authentication on behalf of the<br>
server. =A0After mutual authentication Trust Anchor can redirect the<br>
client back to the server with an Access Token which can be used as a<br>
pre-shared key between the server and client for password based<br>
IKE_AUTH exchange. =A0This document describes a mechanism to use IKEv2<br>
redirects to offload such verifications to another trusted third<br>
party.<br>
<br>
<br>
<br>
The IETF Secretariat.<br>
<br>
<br>
</div><br>

--001636c5b184858f9b046e470696--

From paul.hoffman@vpnc.org  Thu Jul  9 15:29:17 2009
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9ACDD28C267 for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 15:29:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.382
X-Spam-Level: 
X-Spam-Status: No, score=-2.382 tagged_above=-999 required=5 tests=[AWL=0.217,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5mT3-6T9EiRF for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 15:29:16 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 8239128C287 for <ipsec@ietf.org>; Thu,  9 Jul 2009 15:29:05 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n69MTUN6069283 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Thu, 9 Jul 2009 15:29:31 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06240828c67c1fab51c3@[10.20.30.158]>
Date: Thu, 9 Jul 2009 15:29:29 -0700
To: IPsecme WG <ipsec@ietf.org>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Subject: [IPsec] Fwd: Last Call: draft-solinas-rfc4753bis (ECP Groups for IKE and
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jul 2009 22:29:17 -0000

>IKEv2) to Informational RFC
>
>The IESG has received a request from an individual submitter to consider
>the following document:
>
>- 'ECP Groups for IKE and IKEv2 '
>   <draft-solinas-rfc4753bis-00.txt> as an Informational RFC
>
>The IESG plans to make a decision in the next few weeks, and solicits
>final comments on this action.  Please send substantive comments to the
>ietf@ietf.org mailing lists by 2009-08-06. Exceptionally,
>comments may be sent to iesg@ietf.org instead. In either case, please
>retain the beginning of the Subject line to allow automated sorting.
>
>The file can be obtained via
>http://www.ietf.org/internet-drafts/draft-solinas-rfc4753bis-00.txt
>
>
>IESG discussion can be tracked via
>https://datatracker.ietf.org/public/pidtracker.cgi?command=view_id&dTag=18680&rfc_flag=0

--Paul Hoffman, Director
--VPN Consortium

From paul.hoffman@vpnc.org  Thu Jul  9 15:47:07 2009
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C612D28C214 for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 15:47:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.394
X-Spam-Level: 
X-Spam-Status: No, score=-2.394 tagged_above=-999 required=5 tests=[AWL=0.205,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kkhbGmpBurmN for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 15:47:07 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id A3C8028C20B for <ipsec@ietf.org>; Thu,  9 Jul 2009 15:47:06 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n69MlVj9070269 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 9 Jul 2009 15:47:32 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p0624082ec67c23c046bd@[10.20.30.158]>
In-Reply-To: <p06240828c67c1fab51c3@[10.20.30.158]>
References: <p06240828c67c1fab51c3@[10.20.30.158]>
Date: Thu, 9 Jul 2009 15:47:30 -0700
To: IPsecme WG <ipsec@ietf.org>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Cc: Tim Polk <wpolk@nist.gov>
Subject: Re: [IPsec] Fwd: Last Call: draft-solinas-rfc4753bis (ECP Groups for IKE and
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jul 2009 22:47:07 -0000

At 3:29 PM -0700 7/9/09, Paul Hoffman wrote:
> >IKEv2) to Informational RFC
> >
>>The IESG has received a request from an individual submitter to consider
>>the following document:
>>
>>- 'ECP Groups for IKE and IKEv2 '
>>   <draft-solinas-rfc4753bis-00.txt> as an Informational RFC
>>
>>The IESG plans to make a decision in the next few weeks, and solicits
>>final comments on this action.  Please send substantive comments to the
>>ietf@ietf.org mailing lists by 2009-08-06. Exceptionally,
>>comments may be sent to iesg@ietf.org instead. In either case, please
>>retain the beginning of the Subject line to allow automated sorting.
> >
>>The file can be obtained via
> >http://www.ietf.org/internet-drafts/draft-solinas-rfc4753bis-00.txt
>>
>>
>>IESG discussion can be tracked via
> >https://datatracker.ietf.org/public/pidtracker.cgi?command=view_id&dTag=18680&rfc_flag=0

I have reviewed the diffs between draft-solinas-rfc4753bis-00.txt and RFC 4753 and agree that they fully fix the issue that was brought to the IPsecME WG last week.

--Paul Hoffman, Director
--VPN Consortium

From smoonen@us.ibm.com  Thu Jul  9 17:15:42 2009
Return-Path: <smoonen@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BA84B3A6D36; Thu,  9 Jul 2009 17:15:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.387
X-Spam-Level: 
X-Spam-Status: No, score=-6.387 tagged_above=-999 required=5 tests=[AWL=0.211,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YtSWHsGiaJyY; Thu,  9 Jul 2009 17:15:41 -0700 (PDT)
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.149]) by core3.amsl.com (Postfix) with ESMTP id AB05428C31F; Thu,  9 Jul 2009 17:15:19 -0700 (PDT)
Received: from d03relay02.boulder.ibm.com (d03relay02.boulder.ibm.com [9.17.195.227]) by e31.co.us.ibm.com (8.13.1/8.13.1) with ESMTP id n6A0Awmp020336; Thu, 9 Jul 2009 18:10:58 -0600
Received: from d03av05.boulder.ibm.com (d03av05.boulder.ibm.com [9.17.195.85]) by d03relay02.boulder.ibm.com (8.13.8/8.13.8/NCO v9.2) with ESMTP id n6A0Fktn262152; Thu, 9 Jul 2009 18:15:46 -0600
Received: from d03av05.boulder.ibm.com (loopback [127.0.0.1]) by d03av05.boulder.ibm.com (8.13.1/8.13.3) with ESMTP id n6A0FkEU024880; Thu, 9 Jul 2009 18:15:46 -0600
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av05.boulder.ibm.com (8.13.1/8.12.11) with ESMTP id n6A0FkC5024877; Thu, 9 Jul 2009 18:15:46 -0600
In-Reply-To: <p0624082ec67c23c046bd@[10.20.30.158]>
References: <p06240828c67c1fab51c3@[10.20.30.158]> <p0624082ec67c23c046bd@[10.20.30.158]>
To: Paul Hoffman <paul.hoffman@vpnc.org>
MIME-Version: 1.0
X-KeepSent: 2FD6E8D9:6B18D0D4-852575EF:00015CD5; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2 HF623 January 16, 2009
From: Scott C Moonen <smoonen@us.ibm.com>
X-MIMETrack: S/MIME Sign by Notes Client on Scott C Moonen/Raleigh/IBM(Release 8.0.2 HF623|January 16, 2009) at 07/09/2009 08:15:22 PM, Serialize by Notes Client on Scott C Moonen/Raleigh/IBM(Release 8.0.2 HF623|January 16, 2009) at 07/09/2009 08:15:22 PM, Serialize complete at 07/09/2009 08:15:22 PM, S/MIME Sign failed at 07/09/2009 08:15:22 PM: The cryptographic key was not found, Serialize by Router on D03NM118/03/M/IBM(Release 8.5|December 05, 2008) at 07/09/2009 18:15:45, Serialize complete at 07/09/2009 18:15:45
Message-ID: <OF2FD6E8D9.6B18D0D4-ON852575EF.00015CD5-852575EF.000170B2@us.ibm.com>
Date: Thu, 9 Jul 2009 20:15:45 -0400
Content-Type: multipart/alternative; boundary="=_alternative 0001686D852575EF_="
Cc: IPsecme WG <ipsec@ietf.org>, ipsec-bounces@ietf.org, Tim Polk <wpolk@nist.gov>
Subject: Re: [IPsec] Fwd: Last Call: draft-solinas-rfc4753bis (ECP Groups for IKE and
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jul 2009 00:15:42 -0000

This is a multipart message in MIME format.
--=_alternative 0001686D852575EF_=
Content-Type: text/plain; charset="US-ASCII"

> I have reviewed the diffs between draft-solinas-rfc4753bis-00.txt and 
RFC 4753 and agree that they fully fix the issue that was brought to the > 
IPsecME WG last week.

Agreed; support.


Scott Moonen (smoonen@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://scott.andstuff.org/
http://www.linkedin.com/in/smoonen



From:
Paul Hoffman <paul.hoffman@vpnc.org>
To:
IPsecme WG <ipsec@ietf.org>
Cc:
Tim Polk <wpolk@nist.gov>
Date:
07/09/2009 06:51 PM
Subject:
Re: [IPsec] Fwd: Last Call: draft-solinas-rfc4753bis (ECP Groups for IKE 
and



At 3:29 PM -0700 7/9/09, Paul Hoffman wrote:
> >IKEv2) to Informational RFC
> >
>>The IESG has received a request from an individual submitter to consider
>>the following document:
>>
>>- 'ECP Groups for IKE and IKEv2 '
>>   <draft-solinas-rfc4753bis-00.txt> as an Informational RFC
>>
>>The IESG plans to make a decision in the next few weeks, and solicits
>>final comments on this action.  Please send substantive comments to the
>>ietf@ietf.org mailing lists by 2009-08-06. Exceptionally,
>>comments may be sent to iesg@ietf.org instead. In either case, please
>>retain the beginning of the Subject line to allow automated sorting.
> >
>>The file can be obtained via
> >http://www.ietf.org/internet-drafts/draft-solinas-rfc4753bis-00.txt
>>
>>
>>IESG discussion can be tracked via
> >
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_id&dTag=18680&rfc_flag=0


I have reviewed the diffs between draft-solinas-rfc4753bis-00.txt and RFC 
4753 and agree that they fully fix the issue that was brought to the 
IPsecME WG last week.

--Paul Hoffman, Director
--VPN Consortium
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec



--=_alternative 0001686D852575EF_=
Content-Type: text/html; charset="US-ASCII"


<br><tt><font size=2>&gt; I have reviewed the diffs between draft-solinas-rfc4753bis-00.txt
and RFC 4753 and agree that they fully fix the issue that was brought to
the &gt; IPsecME WG last week.</font></tt>
<br>
<br><font size=2 face="sans-serif">Agreed; support.</font>
<br>
<br><font size=2 face="sans-serif"><br>
Scott Moonen (smoonen@us.ibm.com)<br>
z/OS Communications Server TCP/IP Development<br>
</font><a href=http://scott.andstuff.org/><font size=2 face="sans-serif">http://scott.andstuff.org/</font></a><font size=2 face="sans-serif"><br>
</font><a href=http://www.linkedin.com/in/smoonen><font size=2 face="sans-serif">http://www.linkedin.com/in/smoonen</font></a>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">From:</font>
<td><font size=1 face="sans-serif">Paul Hoffman &lt;paul.hoffman@vpnc.org&gt;</font>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">To:</font>
<td><font size=1 face="sans-serif">IPsecme WG &lt;ipsec@ietf.org&gt;</font>
<tr>
<td valign=top><font size=1 color=#5f5f5f face="sans-serif">Cc:</font>
<td><font size=1 face="sans-serif">Tim Polk &lt;wpolk@nist.gov&gt;</font>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">Date:</font>
<td><font size=1 face="sans-serif">07/09/2009 06:51 PM</font>
<tr valign=top>
<td><font size=1 color=#5f5f5f face="sans-serif">Subject:</font>
<td><font size=1 face="sans-serif">Re: [IPsec] Fwd: Last Call: draft-solinas-rfc4753bis
(ECP Groups for IKE and</font></table>
<br>
<hr noshade>
<br>
<br>
<br><tt><font size=2>At 3:29 PM -0700 7/9/09, Paul Hoffman wrote:<br>
&gt; &gt;IKEv2) to Informational RFC<br>
&gt; &gt;<br>
&gt;&gt;The IESG has received a request from an individual submitter to
consider<br>
&gt;&gt;the following document:<br>
&gt;&gt;<br>
&gt;&gt;- 'ECP Groups for IKE and IKEv2 '<br>
&gt;&gt; &nbsp; &lt;draft-solinas-rfc4753bis-00.txt&gt; as an Informational
RFC<br>
&gt;&gt;<br>
&gt;&gt;The IESG plans to make a decision in the next few weeks, and solicits<br>
&gt;&gt;final comments on this action. &nbsp;Please send substantive comments
to the<br>
&gt;&gt;ietf@ietf.org mailing lists by 2009-08-06. Exceptionally,<br>
&gt;&gt;comments may be sent to iesg@ietf.org instead. In either case,
please<br>
&gt;&gt;retain the beginning of the Subject line to allow automated sorting.<br>
&gt; &gt;<br>
&gt;&gt;The file can be obtained via<br>
&gt; &gt;</font></tt><a href="http://www.ietf.org/internet-drafts/draft-solinas-rfc4753bis-00.txt"><tt><font size=2>http://www.ietf.org/internet-drafts/draft-solinas-rfc4753bis-00.txt</font></tt></a><tt><font size=2><br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;IESG discussion can be tracked via<br>
&gt; &gt;</font></tt><a href="https://datatracker.ietf.org/public/pidtracker.cgi?command=view_id&amp;dTag=18680&amp;rfc_flag=0"><tt><font size=2>https://datatracker.ietf.org/public/pidtracker.cgi?command=view_id&amp;dTag=18680&amp;rfc_flag=0</font></tt></a><tt><font size=2><br>
<br>
I have reviewed the diffs between draft-solinas-rfc4753bis-00.txt and RFC
4753 and agree that they fully fix the issue that was brought to the IPsecME
WG last week.<br>
<br>
--Paul Hoffman, Director<br>
--VPN Consortium<br>
_______________________________________________<br>
IPsec mailing list<br>
IPsec@ietf.org<br>
</font></tt><a href=https://www.ietf.org/mailman/listinfo/ipsec><tt><font size=2>https://www.ietf.org/mailman/listinfo/ipsec</font></tt></a><tt><font size=2><br>
</font></tt>
<br>
<br>
--=_alternative 0001686D852575EF_=--

From dharkins@lounge.org  Thu Jul  9 18:26:55 2009
Return-Path: <dharkins@lounge.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CF4783A6AC4 for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 18:26:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.235
X-Spam-Level: 
X-Spam-Status: No, score=-6.235 tagged_above=-999 required=5 tests=[AWL=0.030,  BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HR3MM6RW4xYB for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 18:26:55 -0700 (PDT)
Received: from colo.trepanning.net (colo.trepanning.net [69.55.226.174]) by core3.amsl.com (Postfix) with ESMTP id 181BB3A6870 for <ipsec@ietf.org>; Thu,  9 Jul 2009 18:26:55 -0700 (PDT)
Received: from www.trepanning.net (localhost [127.0.0.1]) by colo.trepanning.net (Postfix) with ESMTP id D0D7B10224074; Thu,  9 Jul 2009 18:27:22 -0700 (PDT)
Received: from 69.12.173.8 (SquirrelMail authenticated user dharkins@lounge.org) by www.trepanning.net with HTTP; Thu, 9 Jul 2009 18:27:22 -0700 (PDT)
Message-ID: <19d0f0d561d7f5968851c362136ba194.squirrel@www.trepanning.net>
In-Reply-To: <20090706201610.049289A4772@odin.smetech.net>
References: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com> <p062408b4c672f6178fca@[10.20.30.158]> <7D42CBF1-5BEB-4EE3-93E2-754A4BC2764A@stratussolutions.com> <p062408e0c67317806446@[10.20.30.158]> <OF3AB4DB32.79E9CCEB-ON852575E9.00403C25-852575E9.0040606B@us.ibm.com> <p06240816c6751e1439fb@[10.20.30.158]> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59519@il-ex01.ad.checkpoint.com> <20090706201610.049289A4772@odin.smetech.net>
Date: Thu, 9 Jul 2009 18:27:22 -0700 (PDT)
From: "Dan Harkins" <dharkins@lounge.org>
To: "Russ Housley" <housley@vigilsec.com>
User-Agent: SquirrelMail/1.4.14 [SVN]
MIME-Version: 1.0
Content-Type: text/plain;charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jul 2009 01:26:55 -0000

  Hi,

  RFC 5114 claims it defines new ECP groups 19, 20, and 21 for IKE but
so does RFC 4753. Interestingly the curve definitions are different but
the orders are the same (maybe it's just interesting because I don't
understand why). RFC 5114 also defines some new MODP groups but RFC 4753
does not.

  One nice thing about RFC 5114 is that it updates the IANA repositories
for TLS, SSH, and SMIME as well as IKE so these groups can be used by
other IETF protocols that require them. RFC 4753 only defines their use
in IKE.

  If there is no cryptographic difference between ECP curve 19 (20 and 21)
as defined in RFC 5114 and RFC 4753 then can some mention be made in this
draft to that effect? And can it then obsolete RFC 5114 as well as RFC
4753? It just seems strange to have two RFCs defining the same group
differently. And can this I-D also include IANA considerations for TLS,
SSH, and SMIME if it's going to obsolete RFC 5114?

  regards,

  Dan.

On Mon, July 6, 2009 1:15 pm, Russ Housley wrote:
> I think a fix is already in the works:
> https://datatracker.ietf.org/doc/draft-solinas-rfc4753bis/
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>



From ssmurthy.nittala@freescale.com  Thu Jul  9 22:48:43 2009
Return-Path: <ssmurthy.nittala@freescale.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 21E183A6A57 for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 22:48:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z1g4WrTaGtdm for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 22:48:42 -0700 (PDT)
Received: from az33egw02.freescale.net (az33egw02.freescale.net [192.88.158.103]) by core3.amsl.com (Postfix) with ESMTP id 3E16C3A68FB for <ipsec@ietf.org>; Thu,  9 Jul 2009 22:48:42 -0700 (PDT)
Received: from az33smr01.freescale.net (az33smr01.freescale.net [10.64.34.199]) by az33egw02.freescale.net (8.14.3/az33egw02) with ESMTP id n6A5n9vr004365 for <ipsec@ietf.org>; Thu, 9 Jul 2009 22:49:10 -0700 (MST)
Received: from nsmurthy.freescale.com ([10.232.113.68]) by az33smr01.freescale.net (8.13.1/8.13.0) with ESMTP id n6A5n5fa001173 for <ipsec@ietf.org>; Fri, 10 Jul 2009 00:49:08 -0500 (CDT)
Message-Id: <200907100549.n6A5n5fa001173@az33smr01.freescale.net>
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Fri, 10 Jul 2009 11:28:12 +0530
To: "ipsec@ietf.org" <ipsec@ietf.org>
From: nsmurthy <ssmurthy.nittala@freescale.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="=====================_6576093==.ALT"
X-Brightmail-Tracker: AAAAAQAAAWE=
Subject: [IPsec] Submission of draft-ipsecme-aes-ctr-ikev2-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jul 2009 05:48:43 -0000

--=====================_6576093==.ALT
Content-Type: text/plain; charset="us-ascii"; format=flowed


Hi ,

A new draft 
<http://mirror.switch.ch/cgi-bin/search//ftp/mirror/internet-drafts/draft-ipsecme-aes-ctr-ikev2-00.txt>draft-ipsecme-aes-ctr-ikev2-00.txt 
is submitted by NSS Murthy, S.Shen and Y.Mao.
Please send your comments.We wish to release the next version by 20th 
of this month.

Abstract
   This document describes the usage of Advanced Encryption Standard
   Counter Mode (AES-CTR), with an explicit initialization vector, by
   IKEv2 for encrypting IKE-SA and Child-SA negotiations.


Thank youns murthy
   
--=====================_6576093==.ALT
Content-Type: text/html; charset="us-ascii"

<html>
<body>
<br>
Hi ,<br><br>
A new draft
<a href="http://mirror.switch.ch/cgi-bin/search//ftp/mirror/internet-drafts/draft-ipsecme-aes-ctr-ikev2-00.txt">
draft-ipsecme-aes-ctr-ikev2-00.txt</a>  is submitted by NSS Murthy,
S.Shen and Y.Mao.<br>
Please send your comments.We wish to release the next version by 20th of
this month.<br><br>
<pre>Abstract
&nbsp; This document describes the usage of Advanced Encryption Standard
&nbsp; Counter Mode (AES-CTR), with an explicit initialization vector,
by
&nbsp; IKEv2 for encrypting IKE-SA and Child-SA negotiations.


</pre>Thank youns murthy<br>
&nbsp;</body>
</html>

--=====================_6576093==.ALT--



From ssmurthy.nittala@freescale.com  Thu Jul  9 23:09:15 2009
Return-Path: <ssmurthy.nittala@freescale.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 97A963A6D82 for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 23:09:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nAUDTbkkFqmH for <ipsec@core3.amsl.com>; Thu,  9 Jul 2009 23:09:14 -0700 (PDT)
Received: from az33egw02.freescale.net (az33egw02.freescale.net [192.88.158.103]) by core3.amsl.com (Postfix) with ESMTP id 2B7943A6D89 for <ipsec@ietf.org>; Thu,  9 Jul 2009 23:09:11 -0700 (PDT)
Received: from az33smr01.freescale.net (az33smr01.freescale.net [10.64.34.199]) by az33egw02.freescale.net (8.14.3/az33egw02) with ESMTP id n6A69YQF009612 for <ipsec@ietf.org>; Thu, 9 Jul 2009 23:09:36 -0700 (MST)
Received: from nsmurthy.freescale.com ([10.232.113.68]) by az33smr01.freescale.net (8.13.1/8.13.0) with ESMTP id n6A69UDE007597 for <ipsec@ietf.org>; Fri, 10 Jul 2009 01:09:33 -0500 (CDT)
Message-Id: <200907100609.n6A69UDE007597@az33smr01.freescale.net>
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Fri, 10 Jul 2009 11:48:36 +0530
To: "ipsec@ietf.org" <ipsec@ietf.org>
From: nsmurthy <ssmurthy.nittala@freescale.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="=====================_7800640==.ALT"
X-Brightmail-Tracker: AAAAAQAAAWE=
Subject: [IPsec] Submission of draft-ipsecme-aes-ctr-ikev2-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jul 2009 06:09:15 -0000

--=====================_7800640==.ALT
Content-Type: text/plain; charset="us-ascii"; format=flowed


Please use the link

http://mirror.switch.ch/ftp/mirror/internet-drafts/draft-ipsecme-aes-ctr-ikev2-00.txt

Hi ,

A new draft 
<http://mirror.switch.ch/cgi-bin/search//ftp/mirror/internet-drafts/draft-ipsecme-aes-ctr-ikev2-00.txt>draft-ipsecme-aes-ctr-ikev2-00.txt 
is submitted by NSS Murthy, S.Shen and Y.Mao.
Please send your comments.We wish to release the next version by 20th 
of this month.


Abstract
   This document describes the usage of Advanced Encryption Standard
   Counter Mode (AES-CTR), with an explicit initialization vector, by
   IKEv2 for encrypting IKE-SA and Child-SA negotiations.



Thank youns murthy
    
--=====================_7800640==.ALT
Content-Type: text/html; charset="us-ascii"

<html>
<body>
<br>
Please use the link <br><br>
<a href="http://mirror.switch.ch/ftp/mirror/internet-drafts/draft-ipsecme-aes-ctr-ikev2-00.txt" eudora="autourl">
http://mirror.switch.ch/ftp/mirror/internet-drafts/draft-ipsecme-aes-ctr-ikev2-00.txt<br>
<br>
</a>Hi ,<br><br>
A new draft
<a href="http://mirror.switch.ch/cgi-bin/search//ftp/mirror/internet-drafts/draft-ipsecme-aes-ctr-ikev2-00.txt">
draft-ipsecme-aes-ctr-ikev2-00.txt</a> is submitted by NSS Murthy, S.Shen
and Y.Mao.<br>
Please send your comments.We wish to release the next version by 20th of
this month.<br><br>
<br>
<pre>Abstract
&nbsp; This document describes the usage of Advanced Encryption Standard
&nbsp; Counter Mode (AES-CTR), with an explicit initialization vector,
by
&nbsp; IKEv2 for encrypting IKE-SA and Child-SA negotiations.



</pre>Thank youns murthy<br>
&nbsp; </body>
</html>

--=====================_7800640==.ALT--



From atsushi.fukumoto@toshiba.co.jp  Fri Jul 10 01:31:57 2009
Return-Path: <atsushi.fukumoto@toshiba.co.jp>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5B5E63A6FF1 for <ipsec@core3.amsl.com>; Fri, 10 Jul 2009 01:31:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.09
X-Spam-Level: 
X-Spam-Status: No, score=-4.09 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2qQTq6h+4UnC for <ipsec@core3.amsl.com>; Fri, 10 Jul 2009 01:31:56 -0700 (PDT)
Received: from imx2.toshiba.co.jp (inet-tsb5.toshiba.co.jp [202.33.96.24]) by core3.amsl.com (Postfix) with ESMTP id 722533A704C for <ipsec@ietf.org>; Fri, 10 Jul 2009 01:31:56 -0700 (PDT)
Received: from arc1.toshiba.co.jp ([133.199.194.235]) by imx2.toshiba.co.jp  with ESMTP id n6A8WNTj026174 for <ipsec@ietf.org>; Fri, 10 Jul 2009 17:32:23 +0900 (JST)
Received: (from root@localhost) by arc1.toshiba.co.jp  id n6A8WNX5007115 for ipsec@ietf.org; Fri, 10 Jul 2009 17:32:23 +0900 (JST)
Received: from unknown [133.199.192.144]  by arc1.toshiba.co.jp with ESMTP id TAA07114; Fri, 10 Jul 2009 17:32:23 +0900
Received: from mx11.toshiba.co.jp (localhost [127.0.0.1]) by ovp2.toshiba.co.jp  with ESMTP id n6A8WMF5020303 for <ipsec@ietf.org>; Fri, 10 Jul 2009 17:32:22 +0900 (JST)
Received: by toshiba.co.jp id n6A8WMDI025981; Fri, 10 Jul 2009 17:32:22 +0900 (JST)
To: ipsec@ietf.org
In-reply-to: <20090708220001.E3CBD3A6FB6@core3.amsl.com>
References: <20090708220001.E3CBD3A6FB6@core3.amsl.com>
Comments: In-reply-to Internet-Drafts@ietf.org message dated "Wed, 08 Jul 2009 15:00:01 -0700."
Date: Fri, 10 Jul 2009 17:32:22 +0900
Message-Id: <200907100832.n6A8WMDI025981@toshiba.co.jp>
From: atsushi.fukumoto@toshiba.co.jp
Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-ikev2bis-04.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jul 2009 08:31:57 -0000

ikev2bis draft-04 section 1.5 adds about INVALID_MAJOR_VERSION:

   There are two cases when such a one-way notification is sent:
   INVALID_IKE_SPI and INVALID_SPI.  These notifications are sent
   outside of an IKE SA.  Note that such notifications are explicitly
   not Informational exchanges; these are one-way messages that must not
   be responded to.  (INVALID_MAJOR_VERSION is also a one-way message
   which is sent outside of an IKE SA, although it is sent as a response
   to the incoming IKE SA creation.)

I feel it confusing.  Probably "such a one-way notification" should be
"a one-way notification".  I don't understand why
INVALID_MAJOR_VERSION case need to be separated from INVALID_IKE_SPI
and INVALID_SPI.

The word "notification message" seems somewhat ambiguous and
confusing.  In section 3.10, it refers to a Notification payload
rather than an entire message.  In some other places I suppose it
means an INFORMATIONAL exchange request message.

Come to think of it, I note there are two expressions in the draft:
"Notify payload" and "Notification payload".  Also in most places
"INFORMATIONAL exchange" whereas there are some "Informational
exchange" and "informational exchange".


					FUKUMOTO Atsushi
					atsushi.fukumoto@toshiba.co.jp

From yaronf@checkpoint.com  Fri Jul 10 09:12:01 2009
Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9765C3A6C82 for <ipsec@core3.amsl.com>; Fri, 10 Jul 2009 09:12:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.547
X-Spam-Level: 
X-Spam-Status: No, score=-2.547 tagged_above=-999 required=5 tests=[AWL=0.051,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pvTvxeGBLz9A for <ipsec@core3.amsl.com>; Fri, 10 Jul 2009 09:12:00 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id 6AC103A6E75 for <ipsec@ietf.org>; Fri, 10 Jul 2009 09:11:59 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 8A94829C002; Fri, 10 Jul 2009 19:12:40 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 3EE8D20037B for <ipsec@ietf.org>; Fri, 10 Jul 2009 19:12:40 +0300 (IDT)
X-CheckPoint: {4A5767F8-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n6AGCQ3d016649 for <ipsec@ietf.org>; Fri, 10 Jul 2009 19:12:26 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Fri, 10 Jul 2009 19:12:25 +0300
From: Yaron Sheffer <yaronf@checkpoint.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Date: Fri, 10 Jul 2009 19:12:24 +0300
Thread-Topic: re: draft-ipsecme-aes-ctr-ikev2-00
Thread-Index: AcoBeTXSF70VYmo1QkyeUo7DU+lwRg==
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59DC0@il-ex01.ad.checkpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0225_01CA0192.5B2BA380"
MIME-Version: 1.0
Subject: Re: [IPsec] draft-ipsecme-aes-ctr-ikev2-00
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jul 2009 16:12:01 -0000

------=_NextPart_000_0225_01CA0192.5B2BA380
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_0226_01CA0192.5B2BA380"


------=_NextPart_001_0226_01CA0192.5B2BA380
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi,

 

This draft was written at our request, but was published past the I-D
deadline for Stockholm, and with an incorrect name. 

 

I would like to request WG members to review it (now at the official
repository, http://tools.ietf.org/html/draft-ipsecme-aes-ctr-ikev2-00) as an
individual draft. If there is working group consensus behind it, we would
like to publish it as a WG draft shortly after Stockholm.

 

Thanks,

            Yaron


------=_NextPart_001_0226_01CA0192.5B2BA380
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"City"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:Arial;
	color:windowtext;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Hi,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>This draft was written at our request, but was =
published
past the I-D deadline for <st1:City w:st=3D"on"><st1:place =
w:st=3D"on">Stockholm</st1:place></st1:City>,
and with an incorrect name. <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>I would like to request WG members to review it (now =
at the
official repository, <a
href=3D"http://tools.ietf.org/html/draft-ipsecme-aes-ctr-ikev2-00">http:/=
/tools.ietf.org/html/draft-ipsecme-aes-ctr-ikev2-00</a>)
as an individual draft. If there is working group consensus behind it, =
we would
like to publish it as a WG draft shortly after <st1:City =
w:st=3D"on"><st1:place
 =
w:st=3D"on">Stockholm</st1:place></st1:City>.<o:p></o:p></span></font></p=
>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Thanks,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp; Yaron<o:p></o:p></span></font></p>

</div>

</body>

</html>

------=_NextPart_001_0226_01CA0192.5B2BA380--

------=_NextPart_000_0225_01CA0192.5B2BA380
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_0225_01CA0192.5B2BA380--

From latten@austin.ibm.com  Fri Jul 10 14:36:26 2009
Return-Path: <latten@austin.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C92A43A696D for <ipsec@core3.amsl.com>; Fri, 10 Jul 2009 14:36:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iSe6+hdDdJ5P for <ipsec@core3.amsl.com>; Fri, 10 Jul 2009 14:36:25 -0700 (PDT)
Received: from e35.co.us.ibm.com (e35.co.us.ibm.com [32.97.110.153]) by core3.amsl.com (Postfix) with ESMTP id B97903A688C for <ipsec@ietf.org>; Fri, 10 Jul 2009 14:36:25 -0700 (PDT)
Received: from d03relay04.boulder.ibm.com (d03relay04.boulder.ibm.com [9.17.195.106]) by e35.co.us.ibm.com (8.13.1/8.13.1) with ESMTP id n6ALSsWr017084 for <ipsec@ietf.org>; Fri, 10 Jul 2009 15:28:54 -0600
Received: from d03av03.boulder.ibm.com (d03av03.boulder.ibm.com [9.17.195.169]) by d03relay04.boulder.ibm.com (8.13.8/8.13.8/NCO v9.2) with ESMTP id n6ALajKE210400 for <ipsec@ietf.org>; Fri, 10 Jul 2009 15:36:45 -0600
Received: from d03av03.boulder.ibm.com (loopback [127.0.0.1]) by d03av03.boulder.ibm.com (8.12.11.20060308/8.13.3) with ESMTP id n6ALajbB032713 for <ipsec@ietf.org>; Fri, 10 Jul 2009 15:36:45 -0600
Received: from austin.ibm.com (netmail2.austin.ibm.com [9.41.248.176]) by d03av03.boulder.ibm.com (8.12.11.20060308/8.12.11) with ESMTP id n6ALaiK3032710; Fri, 10 Jul 2009 15:36:45 -0600
Received: from [9.41.41.43] (faith.austin.ibm.com [9.41.41.43]) by austin.ibm.com (8.13.8/8.12.10) with ESMTP id n6ALaiu9039958; Fri, 10 Jul 2009 16:36:44 -0500
From: Joy Latten <latten@austin.ibm.com>
To: ipsec@ietf.org
Content-Type: text/plain
Date: Fri, 10 Jul 2009 16:26:06 -0500
Message-Id: <1247261166.2783.39.camel@faith.austin.ibm.com>
Mime-Version: 1.0
X-Mailer: Evolution 2.24.5 (2.24.5-1.fc10) 
Content-Transfer-Encoding: 7bit
Cc: serue@us.ibm.com, gcwilson@us.ibm.com, tjaeger@cse.psu.edu
Subject: [IPsec] New version of labeled ipsec drafts
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: latten@austin.ibm.com
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jul 2009 21:36:26 -0000

Hi,

New versions of labeled ipsec drafts are available for review.
Please send any comments to latten@austin.ibm.com.

Thanks!

regards,
Joy Latten

A new version of I-D, draft-jml-ipsec-ikev2-security-context-01.txt has
been successfuly submitted by Joy Latten and posted to the IETF
repository.

Filename:        draft-jml-ipsec-ikev2-security-context
Revision:        01
Title:           Security Context Addendum to IPsec
Creation_date:   2009-07-10
WG ID:           Independent Submission
Number_of_pages: 10

Abstract:
This document describes the high-level requirements needed within
IPsec to support Mandatory Access Control (MAC) on network
communications. It describes the extensions to the Security
Architecture for the Internet Protocol [RFC4301] and the Internet
Key Exchange Protocol Version 2 [RFC4306]. It also describes the
negotiation of the security context for a particular Authentication
Header (AH) [RFC4302] and/or Encapsulating Security Payload (ESP)
[RFC4303] security association.
                                                                                  


The IETF Secretariat.


A new version of I-D, draft-jml-ipsec-ikev1-security-context-01.txt has
been successfuly submitted by Joy Latten and posted to the IETF
repository.

Filename:        draft-jml-ipsec-ikev1-security-context
Revision:        01
Title:           draft-jml-ipsec-ikev1-security-context-01
Creation_date:   2009-07-10
WG ID:           Independent Submission
Number_of_pages: 7

Abstract:
This document describes the need for and use of a security context
within IPsec. It describes the extension to the Internet IP Security
Domain of Interpretation (IPsec DOI) [RFC2407] for the Internet
Security Association and Key Management Protocol (ISAKMP) [RFC2408].
This extension supports the negotiation of the security context for a
particular IP Authentication Header (AH) [RFC4302] or IP
Encapsulating Security Payload (ESP) [RFC4303] security association.
                                                                                  


The IETF Secretariat.




From paul.hoffman@vpnc.org  Sun Jul 12 08:32:29 2009
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8ED7128C12E for <ipsec@core3.amsl.com>; Sun, 12 Jul 2009 08:32:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.419
X-Spam-Level: 
X-Spam-Status: No, score=-2.419 tagged_above=-999 required=5 tests=[AWL=0.180,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rxUOs6MJbDMr for <ipsec@core3.amsl.com>; Sun, 12 Jul 2009 08:32:28 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 65B4A28C128 for <ipsec@ietf.org>; Sun, 12 Jul 2009 08:32:28 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n6CFWrU0092970 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 12 Jul 2009 08:32:55 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06240836c67fae970680@[10.20.30.249]>
In-Reply-To: <19d0f0d561d7f5968851c362136ba194.squirrel@www.trepanning.net>
References: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com> <p062408b4c672f6178fca@[10.20.30.158]> <7D42CBF1-5BEB-4EE3-93E2-754A4BC2764A@stratussolutions.com> <p062408e0c67317806446@[10.20.30.158]> <OF3AB4DB32.79E9CCEB-ON852575E9.00403C25-852575E9.0040606B@us.ibm.com> <p06240816c6751e1439fb@[10.20.30.158]> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59519@il-ex01.ad.checkpoint.com> <20090706201610.049289A4772@odin.smetech.net> <19d0f0d561d7f5968851c362136ba194.squirrel@www.trepanning.net>
Date: Sun, 12 Jul 2009 08:32:52 -0700
To: "Dan Harkins" <dharkins@lounge.org>, "Russ Housley" <housley@vigilsec.com>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 Jul 2009 15:32:29 -0000

At 6:27 PM -0700 7/9/09, Dan Harkins wrote:
>  RFC 5114 claims it defines new ECP groups 19, 20, and 21 for IKE but
>so does RFC 4753.

To be fair, I don't see where RFC 5114 claims that they are new. In fact, it says "Three of these groups were previously specified for use with IKE [RFC4753]".

> Interestingly the curve definitions are different but
>the orders are the same (maybe it's just interesting because I don't
>understand why).

Where do you think they differ? The values look the same to me, but I could have missed something.

>  If there is no cryptographic difference between ECP curve 19 (20 and 21)
>as defined in RFC 5114 and RFC 4753 then can some mention be made in this
>draft to that effect?

RFC 4753 and RFC 5114 are uncorrelated Informational RFCs written by different groups of authors. Maybe it is better to keep them uncorrelated, and only link them if one of the other goes on Standards Track.

> And can it then obsolete RFC 5114 as well as RFC
>4753?

As you point out, 5114 does things that 4753 does not (new MODP groups, coverage of more protocols). I don't think we should ask the 4753bis authors to significantly expand their document in a way that they didn't intend in the original.

--Paul Hoffman, Director
--VPN Consortium

From dharkins@lounge.org  Sun Jul 12 09:59:15 2009
Return-Path: <dharkins@lounge.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 344453A6C0A for <ipsec@core3.amsl.com>; Sun, 12 Jul 2009 09:59:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.24
X-Spam-Level: 
X-Spam-Status: No, score=-6.24 tagged_above=-999 required=5 tests=[AWL=0.025,  BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 50mWXILT4ctE for <ipsec@core3.amsl.com>; Sun, 12 Jul 2009 09:59:14 -0700 (PDT)
Received: from colo.trepanning.net (colo.trepanning.net [69.55.226.174]) by core3.amsl.com (Postfix) with ESMTP id BCB2C28C11B for <ipsec@ietf.org>; Sun, 12 Jul 2009 09:59:11 -0700 (PDT)
Received: from www.trepanning.net (localhost [127.0.0.1]) by colo.trepanning.net (Postfix) with ESMTP id 5580F10224074; Sun, 12 Jul 2009 09:59:41 -0700 (PDT)
Received: from 69.12.173.8 (SquirrelMail authenticated user dharkins@lounge.org) by www.trepanning.net with HTTP; Sun, 12 Jul 2009 09:59:41 -0700 (PDT)
Message-ID: <3e17ef62ef65f207403ade498730d4ea.squirrel@www.trepanning.net>
In-Reply-To: <p06240836c67fae970680@[10.20.30.249]>
References: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com> <p062408b4c672f6178fca@[10.20.30.158]> <7D42CBF1-5BEB-4EE3-93E2-754A4BC2764A@stratussolutions.com> <p062408e0c67317806446@[10.20.30.158]> <OF3AB4DB32.79E9CCEB-ON852575E9.00403C25-852575E9.0040606B@us.ibm.com> <p06240816c6751e1439fb@[10.20.30.158]> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59519@il-ex01.ad.checkpoint.com> <20090706201610.049289A4772@odin.smetech.net> <19d0f0d561d7f5968851c362136ba194.squirrel@www.trepanning.net> <p06240836c67fae970680@[10.20.30.249]>
Date: Sun, 12 Jul 2009 09:59:41 -0700 (PDT)
From: "Dan Harkins" <dharkins@lounge.org>
To: "Paul Hoffman" <paul.hoffman@vpnc.org>
User-Agent: SquirrelMail/1.4.14 [SVN]
MIME-Version: 1.0
Content-Type: text/plain;charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Russ Housley <housley@vigilsec.com>, Dan Harkins <dharkins@lounge.org>, defu@orion.ncsc.mil
Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 Jul 2009 16:59:15 -0000

  Hi Paul,

  RFC5114 doesn't say they're new, it just gives a definition for them.
And the difference is in the curve equations. For group 19 RFC4753 says
that the equation for the curve is y^2 = x^3 - 3x + b and RFC5114 say the
equation for the curve is y^2 = x^3 + ax + b.

  The equation for the curve is what defines whether a particular (x,y)
combination is a valid point on the curve-- i.e. that it's in the group.
That's why I find it interesting that the order (the number of points
that satisfy the equation for the curve) is the same for both definitions.

  Of course, since p-3=a and the generator is the same it may not matter.
But it still seems wrong to have two different documents defining the same
curve differently, even if they are uncorrelated Informational RFCs.

  Can you elaborate on why you don't want to "ask the 4753bis authors to
significantly expand their document in a way that they didn't intend in
the original"? It seems like a perfectly reasonable request. And "no, we
don't want to do that" is an acceptable response provided it has a
reason.

  regards,

  Dan.

On Sun, July 12, 2009 8:32 am, Paul Hoffman wrote:
> At 6:27 PM -0700 7/9/09, Dan Harkins wrote:
>>  RFC 5114 claims it defines new ECP groups 19, 20, and 21 for IKE but
>>so does RFC 4753.
>
> To be fair, I don't see where RFC 5114 claims that they are new. In fact,
> it says "Three of these groups were previously specified for use with IKE
> [RFC4753]".
>
>> Interestingly the curve definitions are different but
>>the orders are the same (maybe it's just interesting because I don't
>>understand why).
>
> Where do you think they differ? The values look the same to me, but I
> could have missed something.
>
>>  If there is no cryptographic difference between ECP curve 19 (20 and
>> 21)
>>as defined in RFC 5114 and RFC 4753 then can some mention be made in this
>>draft to that effect?
>
> RFC 4753 and RFC 5114 are uncorrelated Informational RFCs written by
> different groups of authors. Maybe it is better to keep them uncorrelated,
> and only link them if one of the other goes on Standards Track.
>
>> And can it then obsolete RFC 5114 as well as RFC
>>4753?
>
> As you point out, 5114 does things that 4753 does not (new MODP groups,
> coverage of more protocols). I don't think we should ask the 4753bis
> authors to significantly expand their document in a way that they didn't
> intend in the original.
>
> --Paul Hoffman, Director
> --VPN Consortium
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>



From paul.hoffman@vpnc.org  Sun Jul 12 13:33:34 2009
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D90CF28C1C0 for <ipsec@core3.amsl.com>; Sun, 12 Jul 2009 13:33:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.423
X-Spam-Level: 
X-Spam-Status: No, score=-2.423 tagged_above=-999 required=5 tests=[AWL=0.176,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Iz4j97G8ep0d for <ipsec@core3.amsl.com>; Sun, 12 Jul 2009 13:33:33 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 834EC28C1BD for <ipsec@ietf.org>; Sun, 12 Jul 2009 13:33:33 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n6CKXxZE009955 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 12 Jul 2009 13:34:00 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p0624083dc67ff7d430d6@[10.20.30.158]>
In-Reply-To: <3e17ef62ef65f207403ade498730d4ea.squirrel@www.trepanning.net>
References: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com> <p062408b4c672f6178fca@[10.20.30.158]> <7D42CBF1-5BEB-4EE3-93E2-754A4BC2764A@stratussolutions.com> <p062408e0c67317806446@[10.20.30.158]> <OF3AB4DB32.79E9CCEB-ON852575E9.00403C25-852575E9.0040606B@us.ibm.com> <p06240816c6751e1439fb@[10.20.30.158]> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59519@il-ex01.ad.checkpoint.com> <20090706201610.049289A4772@odin.smetech.net> <19d0f0d561d7f5968851c362136ba194.squirrel@www.trepanning.net> <p06240836c67fae970680@[10.20.30.249]> <3e17ef62ef65f207403ade498730d4ea.squirrel@www.trepanning.net>
Date: Sun, 12 Jul 2009 13:33:28 -0700
To: "Dan Harkins" <dharkins@lounge.org>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Russ Housley <housley@vigilsec.com>, Dan Harkins <dharkins@lounge.org>, defu@orion.ncsc.mil
Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 Jul 2009 20:33:34 -0000

At 9:59 AM -0700 7/12/09, Dan Harkins wrote:
>  Of course, since p-3=a and the generator is the same it may not matter.

Exactly.

>But it still seems wrong to have two different documents defining the same
>curve differently, even if they are uncorrelated Informational RFCs.

Again: RFC 5114 does not "define" those three curves. The IANA registry, <http://www.iana.org/assignments/ikev2-parameters>, defines them, and has the definition pointing to RFC 4753.

>  Can you elaborate on why you don't want to "ask the 4753bis authors to
>significantly expand their document in a way that they didn't intend in
>the original"?

Yes. The current rfc4752bis, which is in IETF Last Call, has a very clear focus, namely to fix the error that started this thread. Asking them to also take on work that is unrelated to that focus is inappropriate. If they wanted to do that, they could have done so before IETF Last Call.

--Paul Hoffman, Director
--VPN Consortium

From paul.hoffman@vpnc.org  Sun Jul 12 13:54:38 2009
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0D9023A6C84 for <ipsec@core3.amsl.com>; Sun, 12 Jul 2009 13:54:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.992
X-Spam-Level: 
X-Spam-Status: No, score=-1.992 tagged_above=-999 required=5 tests=[AWL=-0.263, BAYES_00=-2.599, SARE_MLH_Stock1=0.87]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XDYffbCMBsK5 for <ipsec@core3.amsl.com>; Sun, 12 Jul 2009 13:54:37 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 59F363A6C7B for <ipsec@ietf.org>; Sun, 12 Jul 2009 13:53:56 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n6CKsN2i011060 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Sun, 12 Jul 2009 13:54:24 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p0624083fc67ffda78e65@[10.20.30.158]>
Date: Sun, 12 Jul 2009 13:54:22 -0700
To: IPsecme WG <ipsec@ietf.org>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Subject: [IPsec] Stockholm agenda
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 Jul 2009 20:54:38 -0000

Greetings again. Yaron and I have posted the agenda for the Stockholm meeting on the official IETF site; see <http://www.ietf.org/proceedings/09jul/agenda/ipsecme.txt>. We have only heard so far from two sets of document authors asking for presentation time for upcoming work, and that is reflected in the current agenda.

--Paul Hoffman, Director
--VPN Consortium

From hoskuld@hotmail.com  Sun Jul 12 15:52:52 2009
Return-Path: <hoskuld@hotmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4D77028C15E for <ipsec@core3.amsl.com>; Sun, 12 Jul 2009 15:52:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8HYPyABaT61Z for <ipsec@core3.amsl.com>; Sun, 12 Jul 2009 15:52:51 -0700 (PDT)
Received: from bay0-omc3-s9.bay0.hotmail.com (bay0-omc3-s9.bay0.hotmail.com [65.54.246.209]) by core3.amsl.com (Postfix) with ESMTP id 5796A3A68DF for <ipsec@ietf.org>; Sun, 12 Jul 2009 15:52:51 -0700 (PDT)
Received: from BAY114-W44 ([65.54.169.144]) by bay0-omc3-s9.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959);  Sun, 12 Jul 2009 15:53:21 -0700
Message-ID: <BAY114-W44AD4FD1DE94975DBF211FAD250@phx.gbl>
X-Originating-IP: [124.168.63.75]
From: Greg Daley <hoskuld@hotmail.com>
To: <latten@austin.ibm.com>, <ipsec@ietf.org>
Date: Mon, 13 Jul 2009 08:53:21 +1000
Importance: Normal
In-Reply-To: <1247261166.2783.39.camel@faith.austin.ibm.com>
References: <1247261166.2783.39.camel@faith.austin.ibm.com>
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginalArrivalTime: 12 Jul 2009 22:53:21.0624 (UTC) FILETIME=[8E293D80:01CA0343]
Subject: Re: [IPsec] New version of labeled ipsec drafts
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 Jul 2009 22:52:52 -0000

Hi Joy=2C

Couldn't the security context information be expressed in the IKEv2
version as a new Traffic Selector type?

It seems that the IKEv2 negotiation exchanges a parameter set=20
that describes the upper-layer data to pass over the ESP or AH=20
SA.

This is what the Traffic Selectors in IKEv2 do.

Greg Daley


----------------------------------------
> From: latten@austin.ibm.com
> To: ipsec@ietf.org
> Date: Fri=2C 10 Jul 2009 16:26:06 -0500
> CC: serue@us.ibm.com=3B gcwilson@us.ibm.com=3B tjaeger@cse.psu.edu
> Subject: [IPsec] New version of labeled ipsec drafts
>
> Hi=2C
>
> New versions of labeled ipsec drafts are available for review.
> Please send any comments to latten@austin.ibm.com.
>
> Thanks!
>
> regards=2C
> Joy Latten
>
> A new version of I-D=2C draft-jml-ipsec-ikev2-security-context-01.txt has
> been successfuly submitted by Joy Latten and posted to the IETF
> repository.
>
> Filename: draft-jml-ipsec-ikev2-security-context
> Revision: 01
> Title: Security Context Addendum to IPsec
> Creation_date: 2009-07-10
> WG ID: Independent Submission
> Number_of_pages: 10
>
> Abstract:
> This document describes the high-level requirements needed within
> IPsec to support Mandatory Access Control (MAC) on network
> communications. It describes the extensions to the Security
> Architecture for the Internet Protocol [RFC4301] and the Internet
> Key Exchange Protocol Version 2 [RFC4306]. It also describes the
> negotiation of the security context for a particular Authentication
> Header (AH) [RFC4302] and/or Encapsulating Security Payload (ESP)
> [RFC4303] security association.
>
>
>
> The IETF Secretariat.
>
>
> A new version of I-D=2C draft-jml-ipsec-ikev1-security-context-01.txt has
> been successfuly submitted by Joy Latten and posted to the IETF
> repository.
>
> Filename: draft-jml-ipsec-ikev1-security-context
> Revision: 01
> Title: draft-jml-ipsec-ikev1-security-context-01
> Creation_date: 2009-07-10
> WG ID: Independent Submission
> Number_of_pages: 7
>
> Abstract:
> This document describes the need for and use of a security context
> within IPsec. It describes the extension to the Internet IP Security
> Domain of Interpretation (IPsec DOI) [RFC2407] for the Internet
> Security Association and Key Management Protocol (ISAKMP) [RFC2408].
> This extension supports the negotiation of the security context for a
> particular IP Authentication Header (AH) [RFC4302] or IP
> Encapsulating Security Payload (ESP) [RFC4303] security association.
>
>
>
> The IETF Secretariat.
>
>
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

_________________________________________________________________
POP access for Hotmail is here! Click here to find out more
http://windowslive.ninemsn.com.au/article.aspx?id=3D802246=

From dharkins@lounge.org  Sun Jul 12 23:30:10 2009
Return-Path: <dharkins@lounge.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 82F1A28C20B for <ipsec@core3.amsl.com>; Sun, 12 Jul 2009 23:30:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.944
X-Spam-Level: 
X-Spam-Status: No, score=-4.944 tagged_above=-999 required=5 tests=[AWL=-1.279, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_MED=-4, SARE_BAYES_5x8=0.8, SARE_BAYES_6x8=0.8, SARE_BAYES_7x8=1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m5Pd41DTF+Ct for <ipsec@core3.amsl.com>; Sun, 12 Jul 2009 23:30:08 -0700 (PDT)
Received: from colo.trepanning.net (colo.trepanning.net [69.55.226.174]) by core3.amsl.com (Postfix) with ESMTP id 16EDD28C208 for <ipsec@ietf.org>; Sun, 12 Jul 2009 23:30:08 -0700 (PDT)
Received: from www.trepanning.net (localhost [127.0.0.1]) by colo.trepanning.net (Postfix) with ESMTP id 67F1510224074; Sun, 12 Jul 2009 23:30:38 -0700 (PDT)
Received: from 69.12.173.8 (SquirrelMail authenticated user dharkins@lounge.org) by www.trepanning.net with HTTP; Sun, 12 Jul 2009 23:30:38 -0700 (PDT)
Message-ID: <d40f609fa0c2863d237de7d86a8521f0.squirrel@www.trepanning.net>
In-Reply-To: <p0624083dc67ff7d430d6@[10.20.30.158]>
References: <B500CA54-010F-469F-AFA2-92AB44F71D54@stratussolutions.com> <p062408b4c672f6178fca@[10.20.30.158]> <7D42CBF1-5BEB-4EE3-93E2-754A4BC2764A@stratussolutions.com> <p062408e0c67317806446@[10.20.30.158]> <OF3AB4DB32.79E9CCEB-ON852575E9.00403C25-852575E9.0040606B@us.ibm.com> <p06240816c6751e1439fb@[10.20.30.158]> <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD59519@il-ex01.ad.checkpoint.com> <20090706201610.049289A4772@odin.smetech.net> <19d0f0d561d7f5968851c362136ba194.squirrel@www.trepanning.net> <p06240836c67fae970680@[10.20.30.249]> <3e17ef62ef65f207403ade498730d4ea.squirrel@www.trepanning.net> <p0624083dc67ff7d430d6@[10.20.30.158]>
Date: Sun, 12 Jul 2009 23:30:38 -0700 (PDT)
From: "Dan Harkins" <dharkins@lounge.org>
To: "Paul Hoffman" <paul.hoffman@vpnc.org>
User-Agent: SquirrelMail/1.4.14 [SVN]
MIME-Version: 1.0
Content-Type: text/plain;charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Dan Harkins <dharkins@lounge.org>, defu@orion.ncsc.mil
Subject: Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jul 2009 06:30:10 -0000

On Sun, July 12, 2009 1:33 pm, Paul Hoffman wrote:
>>But it still seems wrong to have two different documents defining the
>> same
>>curve differently, even if they are uncorrelated Informational RFCs.
>
> Again: RFC 5114 does not "define" those three curves. The IANA registry,
> <http://www.iana.org/assignments/ikev2-parameters>, defines them, and has
> the definition pointing to RFC 4753.

  No, the IANA registry defines a magic number one uses to refer to
the parameters of the curve which are actually defined in an RFC. And while
FFFFFFFF 00000001 00000000 00000000 00000000 FFFFFFFF FFFFFFFF FFFFFFFC
may equal -3 in this wonderful prime modulus group it causes a double- or
triple-take when implementing the group referred to by the IANA registry
that is defined in this RFC. There are 2 RFCs that define the same
parameters of group 19 differently even if mathematically they are not
different.

  And actually I think defining the curve ala RFC5114 is better since
a prime finite field is defined as [0, 1, ..., p-1] and "-3" is not in
that set.

>>  Can you elaborate on why you don't want to "ask the 4753bis authors to
>>significantly expand their document in a way that they didn't intend in
>>the original"?
>
> Yes. The current rfc4752bis, which is in IETF Last Call, has a very clear
> focus, namely to fix the error that started this thread. Asking them to
> also take on work that is unrelated to that focus is inappropriate. If
> they wanted to do that, they could have done so before IETF Last Call.

  When "Last Call" is announced it doesn't mean you can't order a drink
anymore, it means this is your last chance to order a drink before it's
too late. For I-Ds, comments post publication are "too late" and it hasn't
been published yet so it's not too late to ask the authors to change
their draft.

  Dan.



From dharkins@lounge.org  Mon Jul 13 00:19:45 2009
Return-Path: <dharkins@lounge.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6DC323A6CC3; Mon, 13 Jul 2009 00:19:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.784
X-Spam-Level: 
X-Spam-Status: No, score=-4.784 tagged_above=-999 required=5 tests=[AWL=-1.119, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_MED=-4, SARE_BAYES_5x8=0.8, SARE_BAYES_6x8=0.8, SARE_BAYES_7x8=1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Utv7QRrKx8c7; Mon, 13 Jul 2009 00:19:44 -0700 (PDT)
Received: from colo.trepanning.net (colo.trepanning.net [69.55.226.174]) by core3.amsl.com (Postfix) with ESMTP id C0E5C3A6C32; Mon, 13 Jul 2009 00:19:44 -0700 (PDT)
Received: from www.trepanning.net (localhost [127.0.0.1]) by colo.trepanning.net (Postfix) with ESMTP id 4A0ED10224078; Mon, 13 Jul 2009 00:20:13 -0700 (PDT)
Received: from 69.12.173.8 (SquirrelMail authenticated user dharkins@lounge.org) by www.trepanning.net with HTTP; Mon, 13 Jul 2009 00:20:13 -0700 (PDT)
Message-ID: <ffe94451fc3d4343e526bcd78f0a45e9.squirrel@www.trepanning.net>
Date: Mon, 13 Jul 2009 00:20:13 -0700 (PDT)
From: "Dan Harkins" <dharkins@lounge.org>
To: iesg@ietf.org
User-Agent: SquirrelMail/1.4.14 [SVN]
MIME-Version: 1.0
Content-Type: text/plain;charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
Cc: ipsec@ietf.org, tim.polk@nist.gov, defu@orion.ncsc.mil
Subject: [IPsec] review of  draft-solinas-rfc4753bis-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jul 2009 07:19:45 -0000

  Hi,

  I have reviewed this draft and would like these comments to be treated
just like any other last call comments.

  This draft will obsolete RFC 4753 (if approved) and before it does I
would like to see it slightly modified to address a discrepancy between
RFC 4753 and RFC 5114, both of which define the parameters for curves
19-21 (from the IANA registry) differently.

  Specifically, this draft, and RFC 4753, gives the equations of elliptic
curves defined over a prime field as y^2 = x^3 - 3x + b. Since a prime
field is defined as [0, 1, ..., p-1] I would like to see these curves
defined in the more general way as y^2 = x^3 + ax + b and then define the
value "a" such that a=p-3 for each curve depending on the prime, p:

3.1 256-bit Random ECP Group

   The equation for the elliptic curve is:

                  y^2 = x^3 + ax + b

   Group curve parameter a
             FFFFFFFF 00000001 00000000 00000000 00000000
             FFFFFFFF FFFFFFFF FFFFFFFC

3.2 384-bit Random ECP Group

   The equation for the elliptic curve is:

                  y^2 = x^3 + ax + b

   Group curve parameter a
             FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF
             FFFFFFFF FFFFFFFE FFFFFFFF 00000000 00000000 FFFFFFFC

3.3 521-bit Random ECP Group

   The equation for the elliptic curve is:

                  y^2 = x^3 + ax + b

   Group curve parameter a
             01FFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF
             FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF
             FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFC


Thank you, and regards,

  Dan.




From g_e_montenegro@yahoo.com  Mon Jul 13 09:04:57 2009
Return-Path: <g_e_montenegro@yahoo.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 264B628C177 for <ipsec@core3.amsl.com>; Mon, 13 Jul 2009 09:04:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AFtlJEkQFdeC for <ipsec@core3.amsl.com>; Mon, 13 Jul 2009 09:04:56 -0700 (PDT)
Received: from web82605.mail.mud.yahoo.com (web82605.mail.mud.yahoo.com [68.142.201.122]) by core3.amsl.com (Postfix) with SMTP id 4E1D33A690E for <ipsec@ietf.org>; Mon, 13 Jul 2009 09:04:55 -0700 (PDT)
Received: (qmail 54909 invoked by uid 60001); 13 Jul 2009 16:05:23 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1247501123; bh=4P4hMklHBjsbaWA72c+iWikRuOn57kCVYQGStOzpf8U=; h=Message-ID:X-YMail-OSG:Received:X-Mailer:References:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=CTqbsyaAZpqJVe78xSzttYTbBJuMZAI6lqR+s2Wb+PWTxMBMWG4oss2o/LRv3trDdm2HF4OlCBwLNYKSX7qxXRFzbHSqnyQbwbFjBwMVGlfkG4CU1oQTtVlzJ6t1zbknCNiHS+K0gNzOFdoBIekDvj7lwXtMNHZa9/7/GKWFOVE=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Message-ID:X-YMail-OSG:Received:X-Mailer:References:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=1ZBS2BO3AeP7GpjaBNXVIK2AN4DQZh0xWvNGoPqcSD2WxV3RBSvsubl9R26YY5oVasdDcy5uNYIgvov0b4a/dGdgqKdz1C0u/zp1zco0kHmmBHOM5wSeCaQUBwLgxnCNaHjv3rc1UHjhhf77hv7MlODOnAnVKb86Vzrf/nZEDow=;
Message-ID: <372852.53939.qm@web82605.mail.mud.yahoo.com>
X-YMail-OSG: RpRAclsVM1ldienM6n6L5N60MXn3iPGr7w_AdRMVX1.W5y26xKJudsKURSr_hWrUcIDtrH5YrO7_KvYob.Z2btmbR7GP_mUB4MoBJN5__CscjB.U2WxUTGORav66OsEsRquWsUVA0ZdQ0UfCvEDOJh8M8X5aG9JwobxLdyQ6oKxF7g94I7R7rs0Jc0DN7ZgQNYJqLyHuHQqpWknxb6DM9zRZVHIMuHRscSzeMhNsLrAzbvENyfqn0vIDdhOKpk2.t3QSBewR5G.UUwbHN6h7HgJC3BhDCst.vxhbq_ojGEIZGsN3Ydhgee8vd9nkOFBduOMVvMCKusJJlfrdj3y2DVGmhIpU
Received: from [12.197.88.10] by web82605.mail.mud.yahoo.com via HTTP; Mon, 13 Jul 2009 09:05:23 PDT
X-Mailer: YahooMailRC/1357.22 YahooMailWebService/0.7.289.10
References: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594E4@il-ex01.ad.checkpoint.com> <006FEB08D9C6444AB014105C9AEB133F433538CE3E@il-ex01.ad.checkpoint.com>
Date: Mon, 13 Jul 2009 09:05:23 -0700 (PDT)
From: gabriel montenegro <g_e_montenegro@yahoo.com>
To: Yoav Nir <ynir@checkpoint.com>, Yaron Sheffer <yaronf@checkpoint.com>, "ipsec@ietf.org" <ipsec@ietf.org>
In-Reply-To: <006FEB08D9C6444AB014105C9AEB133F433538CE3E@il-ex01.ad.checkpoint.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-758038563-1247501123=:53939"
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jul 2009 16:04:57 -0000

--0-758038563-1247501123=:53939
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Yoav,=0A=C2=A0=0AGood catch,=C2=A0 we say offset *to* what, but we don=
=E2=80=99t say *from* where.=0A=C2=A0=0AAmong the co-authors, we'd like to =
suggest this as a simple text change to address this:=0A=C2=A0=0AOLD:=0A=C2=
=A0=C2=A0 HdrLen, 8 bits: Offset to the beginning of the Payload Data in=0A=
=C2=A0=C2=A0 octets. =0A=C2=A0=0ANEW:=0A=C2=A0=C2=A0 HdrLen, 8 bits: Offset=
 from the beginning of the WESP header to =0A=C2=A0=C2=A0 the beginning of =
the Payload Data within the encapsulated ESP header, in=0A=C2=A0=C2=A0 octe=
ts. =0A=C2=A0=0A=C2=A0=0ADoes this sound ok?=0A=C2=A0=0ABTW, in the case of=
 TrailerLen we do say both *from* as well as *to*.=0A=0AGabriel=0A=0A>=0A>F=
rom: Yoav Nir <ynir@checkpoint.com>=0A>To: Yaron Sheffer <yaronf@checkpoint=
.com>; "ipsec@ietf.org" <ipsec@ietf.org>=0A>Sent: Tuesday, July 7, 2009 4:3=
5:19 AM=0A>Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-vi=
sibility-05=0A>=0A>=0A>I=E2=80=99ve read it again, and it seems fine. =C2=
=A0One minor issue, though.=0A>=C2=A0=0A>Section 2 describes the WESP heade=
r format. It has the following:=0A>=C2=A0=C2=A0 HdrLen, 8 bits: Offset to t=
he beginning of the Payload Data in=0A>=C2=A0=C2=A0 octets. The receiver MU=
ST ensure that this field matches with=0A>=C2=A0=C2=A0 the header offset co=
mputed from using the negotiated SA and MUST=0A>=C2=A0=C2=A0 drop the packe=
t in case it doesn't match.=0A>=C2=A0=0A>I think I know what they mean, but=
 it=E2=80=99s entirely not clear what this field is supposed to hold. =C2=
=A0Is it the size of the existing ESP header?=C2=A0 Is it that + 4?=C2=A0 H=
ow about =E2=80=9Cthe combined length of all the ESP fields that precede th=
e =E2=80=9CPayload Data=E2=80=9D field=E2=80=9D in ESP=E2=80=9D ? =C2=A0=0A=
>=C2=A0=0A>=C2=A0=0A>=C2=A0=0A>=0A________________________________=0A=0A>Fr=
om:ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Yaro=
n Sheffer=0A>Sent: Saturday, July 04, 2009 10:48 PM=0A>To: ipsec@ietf.org=
=0A>Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05=
=0A>=C2=A0=0A>This is the beginning of a two-week WG Last Call, which will =
end July 18. The target status for this document is Proposed Standard. The =
current document is at http://tools.ietf.org/html/draft-ietf-ipsecme-traffi=
c-visibility-05.=0A>=C2=A0=0A>If you have not read the document before now,=
 please do so. Having fresh eyes on the document often brings up important =
issues. If you HAVE read it before, please note that there have been severa=
l revisions since San Francisco , so you might want to read it again (plus =
it=E2=80=99s a short document). Send any comments to the list, even if they=
 are as simple as "I read it and it seems fine".=0A>=C2=A0=0A>Please clearl=
y indicate the position of any issue in the Internet Draft, and if possible=
 provide alternative text. Please also indicate the nature or severity of t=
he error or correction, e.g. major technical, minor technical, nit, so that=
 we can quickly judge the extent of problems with the document.=0A>=C2=A0=
=0A>Thanks,=0A>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0 Yaron=0A>=0A>Email secured by Check Point =0A>=0A>
--0-758038563-1247501123=:53939
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><style type=3D"text/css"><!-- DIV {margin:0px;} --></style></he=
ad><body><div style=3D"font-family:Courier New, courier, monaco, monospace,=
 sans-serif;font-size:10pt"><DIV>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=
=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma','sans-serif'; FONT-SIZE: =
10pt">Hi Yoav,</SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=3DMsoNor=
mal><SPAN style=3D"FONT-FAMILY: 'Tahoma','sans-serif'; FONT-SIZE: 10pt"></S=
PAN>&nbsp;</P>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=3DMsoNormal><SPAN s=
tyle=3D"FONT-FAMILY: 'Tahoma','sans-serif'; FONT-SIZE: 10pt">Good catch,&nb=
sp; we say offset *<B>to</B>* what, but we don=E2=80=99t say *<B>from</B>* =
where.<?xml:namespace prefix =3D o ns =3D "urn:schemas-microsoft-com:office=
:office" /><o:p></o:p></SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=
=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma','sans-serif'; FONT-SIZE: =
10pt"><o:p>&nbsp;</o:p></SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=
=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma','sans-serif'; FONT-SIZE: =
10pt">Among the co-authors, we'd like to suggest this as a simple text chan=
ge to address this:</SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=3DM=
soNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma','sans-serif'; FONT-SIZE: 10pt=
"><o:p>&nbsp;</o:p></SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=3DM=
soNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma','sans-serif'; FONT-SIZE: 10pt=
">OLD:<o:p></o:p></SPAN></P>=0A<P style=3D"PAGE-BREAK-BEFORE: always; MARGI=
N: 0in 0in 0pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Courier New'=
; mso-ansi-language: EN" lang=3DEN>&nbsp;&nbsp; HdrLen, 8 bits: Offset to t=
he beginning of the Payload Data in<o:p></o:p></SPAN></P>=0A<P style=3D"PAG=
E-BREAK-BEFORE: always; MARGIN: 0in 0in 0pt" class=3DMsoNormal><SPAN style=
=3D"FONT-FAMILY: 'Courier New'; mso-ansi-language: EN" lang=3DEN>&nbsp;&nbs=
p; octets. <o:p></o:p></SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=
=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma','sans-serif'; FONT-SIZE: =
10pt; mso-ansi-language: EN" lang=3DEN><o:p>&nbsp;</o:p></SPAN></P>=0A<P st=
yle=3D"MARGIN: 0in 0in 0pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: '=
Tahoma','sans-serif'; FONT-SIZE: 10pt">NEW:<o:p></o:p></SPAN></P>=0A<P styl=
e=3D"PAGE-BREAK-BEFORE: always; MARGIN: 0in 0in 0pt" class=3DMsoNormal><SPA=
N style=3D"FONT-FAMILY: 'Courier New'; mso-ansi-language: EN" lang=3DEN>&nb=
sp;&nbsp; HdrLen, 8 bits: Offset from the beginning of the WESP header to <=
o:p></o:p></SPAN></P>=0A<P style=3D"PAGE-BREAK-BEFORE: always; MARGIN: 0in =
0in 0pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Courier New'; mso-a=
nsi-language: EN" lang=3DEN>&nbsp;&nbsp; the beginning of the Payload Data =
within the encapsulated ESP header, in<o:p></o:p></SPAN></P>=0A<P style=3D"=
PAGE-BREAK-BEFORE: always; MARGIN: 0in 0in 0pt" class=3DMsoNormal><SPAN sty=
le=3D"FONT-FAMILY: 'Courier New'; mso-ansi-language: EN" lang=3DEN>&nbsp;&n=
bsp; octets. <o:p></o:p></SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" clas=
s=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma','sans-serif'; FONT-SIZE:=
 10pt; mso-ansi-language: EN" lang=3DEN><o:p>&nbsp;</o:p></SPAN></P>=0A<P s=
tyle=3D"MARGIN: 0in 0in 0pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: =
'Tahoma','sans-serif'; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p></SPAN></P>=0A<P s=
tyle=3D"MARGIN: 0in 0in 0pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: =
'Tahoma','sans-serif'; FONT-SIZE: 10pt">Does this sound ok?<o:p></o:p></SPA=
N></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=3DMsoNormal><SPAN style=3D"=
FONT-FAMILY: 'Tahoma','sans-serif'; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p></SPA=
N></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=3DMsoNormal><SPAN style=3D"=
FONT-FAMILY: 'Tahoma','sans-serif'; FONT-SIZE: 10pt">BTW, in the case of Tr=
ailerLen we do say both *<B>from</B>* as well as *<B>to</B>*.<o:p></o:p></S=
PAN></P></DIV>=0A<DIV><BR>Gabriel</DIV>=0A<BLOCKQUOTE style=3D"BORDER-LEFT:=
 rgb(16,16,255) 2px solid; PADDING-LEFT: 5px; MARGIN-LEFT: 5px">=0A<DIV sty=
le=3D"FONT-FAMILY: Courier New, courier, monaco, monospace, sans-serif; FON=
T-SIZE: 10pt"><BR>=0A<DIV style=3D"FONT-FAMILY: times new roman, new york, =
times, serif; FONT-SIZE: 12pt"><FONT size=3D2 face=3DTahoma><B><SPAN style=
=3D"FONT-WEIGHT: bold">From:</SPAN></B> Yoav Nir &lt;ynir@checkpoint.com&gt=
;<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> Yaron Sheffer &lt;=
yaronf@checkpoint.com&gt;; "ipsec@ietf.org" &lt;ipsec@ietf.org&gt;<BR><B><S=
PAN style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Tuesday, July 7, 2009 4:35=
:19 AM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [IPs=
ec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05<BR></FONT><BR>=
=0A<STYLE>=0A<!--=0A =0A _filtered {font-family:Tahoma;panose-1:2 11 6 4 3 =
5 4 4 2 4;}=0A =0Ap.MsoNormal, li.MsoNormal, div.MsoNormal=0A=09{margin:0cm=
;margin-bottom:.0001pt;font-size:12.0pt;font-family:"Times New Roman";}=0Aa=
:link, span.MsoHyperlink=0A=09{color:blue;text-decoration:underline;}=0Aa:v=
isited, span.MsoHyperlinkFollowed=0A=09{color:purple;text-decoration:underl=
ine;}=0Apre=0A=09{margin:0cm;margin-bottom:.0001pt;font-size:12.0pt;font-fa=
mily:"Courier New";}=0Aspan.EmailStyle17=0A=09{font-family:Arial;color:wind=
owtext;}=0Aspan.EmailStyle18=0A=09{font-family:Arial;color:navy;}=0A _filte=
red {margin:72.0pt 90.0pt 72.0pt 90.0pt;}=0Adiv.Section1=0A=09{}=0A-->=0A</=
STYLE>=0A=0A<DIV class=3DSection1>=0A<P class=3DMsoNormal><FONT color=3Dnav=
y size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; COLOR: navy; FON=
T-SIZE: 10pt">I=E2=80=99ve read it again, and it seems fine. &nbsp;One mino=
r issue, though.</SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT color=3Dnav=
y size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; COLOR: navy; FON=
T-SIZE: 10pt">&nbsp;</SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT color=
=3Dnavy size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; COLOR: nav=
y; FONT-SIZE: 10pt">Section 2 describes the WESP header format. It has the =
following:</SPAN></FONT></P><PRE><FONT size=3D3 face=3D"Courier New"><SPAN =
style=3D"FONT-SIZE: 12pt" lang=3DEN>&nbsp;&nbsp; HdrLen, 8 bits: Offset to =
the beginning of the Payload Data in</SPAN></FONT></PRE><PRE><FONT size=3D3=
 face=3D"Courier New"><SPAN style=3D"FONT-SIZE: 12pt" lang=3DEN>&nbsp;&nbsp=
; octets. The receiver MUST ensure that this field matches with</SPAN></FON=
T></PRE><PRE><FONT size=3D3 face=3D"Courier New"><SPAN style=3D"FONT-SIZE: =
12pt" lang=3DEN>&nbsp;&nbsp; the header offset computed from using the nego=
tiated SA and MUST</SPAN></FONT></PRE><PRE><FONT size=3D3 face=3D"Courier N=
ew"><SPAN style=3D"FONT-SIZE: 12pt" lang=3DEN>&nbsp;&nbsp; drop the packet =
in case it doesn't match.</SPAN></FONT></PRE>=0A<P class=3DMsoNormal><FONT =
color=3Dnavy size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; COLOR=
: navy; FONT-SIZE: 10pt" lang=3DEN>&nbsp;</SPAN></FONT></P>=0A<P class=3DMs=
oNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY=
: Arial; COLOR: navy; FONT-SIZE: 10pt">I think I know what they mean, but i=
t=E2=80=99s entirely not clear what this field is supposed to hold. &nbsp;I=
s it the size of the existing ESP header?&nbsp; Is it that + 4?&nbsp; How a=
bout =E2=80=9Cthe combined length of all the ESP fields that precede the =
=E2=80=9CPayload Data=E2=80=9D field=E2=80=9D in ESP=E2=80=9D ? &nbsp;</SPA=
N></FONT></P>=0A<P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DAri=
al><SPAN style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">&nbsp;<=
/SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=
=3DArial><SPAN style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt" l=
ang=3DEN>&nbsp;</SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT color=3Dnavy=
 size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT=
-SIZE: 10pt">&nbsp;</SPAN></FONT></P>=0A<DIV>=0A<DIV style=3D"TEXT-ALIGN: c=
enter" class=3DMsoNormal align=3Dcenter><FONT size=3D3 face=3D"Times New Ro=
man"><SPAN style=3D"FONT-SIZE: 12pt">=0A<HR tabIndex=3D-1 align=3Dcenter SI=
ZE=3D2 width=3D"100%">=0A</SPAN></FONT></DIV>=0A<P class=3DMsoNormal><B><FO=
NT size=3D2 face=3DTahoma><SPAN style=3D"FONT-FAMILY: Tahoma; FONT-SIZE: 10=
pt; FONT-WEIGHT: bold">From:</SPAN></FONT></B><FONT size=3D2 face=3DTahoma>=
<SPAN style=3D"FONT-FAMILY: Tahoma; FONT-SIZE: 10pt"> ipsec-bounces@ietf.or=
g [mailto:ipsec-bounces@ietf.org] <B><SPAN style=3D"FONT-WEIGHT: bold">On B=
ehalf Of </SPAN></B>Yaron Sheffer<BR><B><SPAN style=3D"FONT-WEIGHT: bold">S=
ent:</SPAN></B> Saturday, July 04, 2009 10:48 PM<BR><B><SPAN style=3D"FONT-=
WEIGHT: bold">To:</SPAN></B> ipsec@ietf.org<BR><B><SPAN style=3D"FONT-WEIGH=
T: bold">Subject:</SPAN></B> [IPsec] WG Last Call: draft-ietf-ipsecme-traff=
ic-visibility-05</SPAN></FONT></P></DIV>=0A<P class=3DMsoNormal><FONT size=
=3D3 face=3D"Times New Roman"><SPAN style=3D"FONT-SIZE: 12pt">&nbsp;</SPAN>=
</FONT></P>=0A<P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN style=
=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">This is the beginning of a two-wee=
k WG Last Call, which will end July 18. The target status for this document=
 is Proposed Standard. The current document is at http://tools.ietf.org/htm=
l/draft-ietf-ipsecme-traffic-visibility-05.</SPAN></FONT></P>=0A<P class=3D=
MsoNormal><FONT size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FO=
NT-SIZE: 10pt">&nbsp;</SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT size=
=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">If yo=
u have not read the document before now, please do so. Having fresh eyes on=
 the document often brings up important issues. If you HAVE read it before,=
 please note that there have been several revisions since San Francisco , s=
o you might want to read it again (plus it=E2=80=99s a short document). Sen=
d any comments to the list, even if they are as simple as "I read it and it=
 seems fine".</SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT size=3D2 face=
=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">&nbsp;</SPAN><=
/FONT></P>=0A<P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN style=
=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Please clearly indicate the positi=
on of any issue in the Internet Draft, and if possible provide alternative =
text. Please also indicate the nature or severity of the error or correctio=
n, e.g. major technical, minor technical, nit, so that we can quickly judge=
 the extent of problems with the document.</SPAN></FONT></P>=0A<P class=3DM=
soNormal><FONT size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FON=
T-SIZE: 10pt">&nbsp;</SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT size=3D=
2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Thanks,<=
/SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN =
style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Yaron</SPAN></FONT></P></DIV><BR><BR>=
Email secured by Check Point <BR><BR></DIV></DIV></BLOCKQUOTE></div></body>=
</html>
--0-758038563-1247501123=:53939--

From g_e_montenegro@yahoo.com  Mon Jul 13 11:22:06 2009
Return-Path: <g_e_montenegro@yahoo.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 82BDF28C352 for <ipsec@core3.amsl.com>; Mon, 13 Jul 2009 11:22:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.288
X-Spam-Level: 
X-Spam-Status: No, score=-2.288 tagged_above=-999 required=5 tests=[AWL=-0.309, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_SORBS_WEB=0.619]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9WgHQz50lfiL for <ipsec@core3.amsl.com>; Mon, 13 Jul 2009 11:22:05 -0700 (PDT)
Received: from web82608.mail.mud.yahoo.com (web82608.mail.mud.yahoo.com [68.142.201.125]) by core3.amsl.com (Postfix) with SMTP id 4839E28C663 for <ipsec@ietf.org>; Mon, 13 Jul 2009 11:21:00 -0700 (PDT)
Received: (qmail 42760 invoked by uid 60001); 13 Jul 2009 18:21:28 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1247509288; bh=6XpBBUYwngIZgkyOQcAq9LWFymXYAcQhXraxDmy7ZzQ=; h=Message-ID:X-YMail-OSG:Received:X-Mailer:References:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=jdtQgQ9aJbWcXmlM50z6NFKBSKKq/bqkyoh5qUKlrMALWODnWM9z1ddgqlH62dIaQbfUQXobs2F5r2UHJVPPpfYFM6kv0EJCkXUuKfJbJqc6hcPH6+tq8Yk5wlSES+82yILd6c6PjtJUARfipbtGxH5Cf5eqnvO8yWZqW8dIAf8=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Message-ID:X-YMail-OSG:Received:X-Mailer:References:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=gUZQoTYkOFClZyiPpOihK2SfDGhtQVsRDGsOAacgFtyiLw5Lv6Hpj1J5mbeMnch/sTO+ixl3da08DJFHmLNWAUXuqfG9nW5UL1TP+hRo2Z3sVEVZN7aniQUKoSAtSwAc5ZGz3VZF4QX/gNz9i6IbnE4PkyO2WGbIcHJo5e3L0gA=;
Message-ID: <380869.42304.qm@web82608.mail.mud.yahoo.com>
X-YMail-OSG: jh6XBLIVM1lhKdnStJDJ9HTg4XfF9HUvCw9b.BK2GG.w0erIJYbi4BxBN570l0vEaOIZyUUx9.Hn__UnL0Zxom95IXYKekSV5ESQOwb8ELZN2.8CU5IyDsagTYWc02yLXSIHOQOlnhLlynpspuP3H5qKTm00hQue5lyF1lMuYXRUQ1ysPEgzncIcVvXHDd7IO8tn0GWavOc7nRjYHMery2eVI.OLDahFV_9XGhvctsAGIjvcuxWf8Il6obBCIO_HM3jJaA8E7olfo1yYEQGh0Pg7sEAHwvUVfES4DEke.19_3VHx7Mn8rFI_ogH3g2Rh2QpMd.c4hU8pQQEkVYN8DH1qYWP2
Received: from [12.197.88.101] by web82608.mail.mud.yahoo.com via HTTP; Mon, 13 Jul 2009 11:21:28 PDT
X-Mailer: YahooMailRC/1357.22 YahooMailWebService/0.7.289.10
References: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594E4@il-ex01.ad.checkpoint.com> <006FEB08D9C6444AB014105C9AEB133F433538CE3E@il-ex01.ad.checkpoint.com> <372852.53939.qm@web82605.mail.mud.yahoo.com>
Date: Mon, 13 Jul 2009 11:21:28 -0700 (PDT)
From: gabriel montenegro <g_e_montenegro@yahoo.com>
To: Yoav Nir <ynir@checkpoint.com>, Yaron Sheffer <yaronf@checkpoint.com>, "ipsec@ietf.org" <ipsec@ietf.org>
In-Reply-To: <372852.53939.qm@web82605.mail.mud.yahoo.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-317283926-1247509288=:42304"
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jul 2009 18:22:06 -0000

--0-317283926-1247509288=:42304
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Brian Swander notes that we should be explicit about the IV=0Awhich may be =
present. It may be clear that this is the intention, but I agree that=0Ait =
is best to be explicit. =0A=0AThis is what we suggest in light of this:=0A=
=C2=A0=0ANEW:=0A=C2=A0=C2=A0 HdrLen, 8 bits: Offset from the beginning of t=
he WESP header to =0A=C2=A0=C2=A0 the beginning of the Rest of Payload Data=
 (i.e., past the IV, =0A=C2=A0=C2=A0 if present) within the encapsulated ES=
P header, inoctets. =0AGabriel=0A=0A>=0A>From: gabriel montenegro <g_e_mont=
enegro@yahoo.com>=0A>To: Yoav Nir <ynir@checkpoint.com>; Yaron Sheffer <yar=
onf@checkpoint.com>; "ipsec@ietf.org" <ipsec@ietf.org>=0A>Sent: Monday, Jul=
y 13, 2009 9:05:23 AM=0A>Subject: Re: [IPsec] WG Last Call: draft-ietf-ipse=
cme-traffic-visibility-05=0A>=0A>=0A>Hi Yoav,=0A>=C2=A0=0A>Good catch,=C2=
=A0 we say offset *to* what, but we don=E2=80=99t say *from* where.=0A>=C2=
=A0=0A>Among the co-authors, we'd like to suggest this as a simple text cha=
nge to address this:=0A>=C2=A0=0A>OLD:=0A>=C2=A0=C2=A0 HdrLen, 8 bits: Offs=
et to the beginning of the Payload Data in=0A>=C2=A0=C2=A0 octets. =0A>=C2=
=A0=0A>NEW:=0A>=C2=A0=C2=A0 HdrLen, 8 bits: Offset from the beginning of th=
e WESP header to =0A>=C2=A0=C2=A0 the beginning of the Payload Data within =
the encapsulated ESP header, in=0A>=C2=A0=C2=A0 octets. =0A>=C2=A0=0A>=C2=
=A0=0A>Does this sound ok?=0A>=C2=A0=0A>BTW, in the case of TrailerLen we d=
o say both *from* as well as *to*.=0A>=0A>Gabriel=0A>=0A>>=0A>>From: Yoav N=
ir <ynir@checkpoint.com>=0A>>To: Yaron Sheffer <yaronf@checkpoint.com>; "ip=
sec@ietf.org" <ipsec@ietf.org>=0A>>Sent: Tuesday, July 7, 2009 4:35:19 AM=
=0A>>Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibili=
ty-05=0A>>=0A>>=0A>>I=E2=80=99ve read it again, and it seems fine. =C2=A0On=
e minor issue, though.=0A>>=C2=A0=0A>>Section 2 describes the WESP header f=
ormat. It has the following:=0A>>=C2=A0=C2=A0 HdrLen, 8 bits: Offset to the=
 beginning of the Payload Data in=0A>>=C2=A0=C2=A0 octets. The receiver MUS=
T ensure that this field matches with=0A>>=C2=A0=C2=A0 the header offset co=
mputed from using the negotiated SA and MUST=0A>>=C2=A0=C2=A0 drop the pack=
et in case it doesn't match.=0A>>=C2=A0=0A>>I think I know what they mean, =
but it=E2=80=99s entirely not clear what this field is supposed to hold. =
=C2=A0Is it the size of the existing ESP header?=C2=A0 Is it that + 4?=C2=
=A0 How about =E2=80=9Cthe combined length of all the ESP fields that prece=
de the =E2=80=9CPayload Data=E2=80=9D field=E2=80=9D in ESP=E2=80=9D ? =C2=
=A0=0A>>=C2=A0=0A>>=C2=A0=0A>>=C2=A0=0A>>=0A_______________________________=
_=0A=0A>>From:ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Beh=
alf Of Yaron Sheffer=0A>>Sent: Saturday, July 04, 2009 10:48 PM=0A>>To: ips=
ec@ietf.org=0A>>Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-v=
isibility-05=0A>>=C2=A0=0A>>This is the beginning of a two-week WG Last Cal=
l, which will end July 18. The target status for this document is Proposed =
Standard. The current document is at http://tools.ietf.org/html/draft-ietf-=
ipsecme-traffic-visibility-05.=0A>>=C2=A0=0A>>If you have not read the docu=
ment before now, please do so. Having fresh eyes on the document often brin=
gs up important issues. If you HAVE read it before, please note that there =
have been several revisions since San Francisco , so you might want to read=
 it again (plus it=E2=80=99s a short document). Send any comments to the li=
st, even if they are as simple as "I read it and it seems fine".=0A>>=C2=A0=
=0A>>Please clearly indicate the position of any issue in the Internet Draf=
t, and if possible provide alternative text. Please also indicate the natur=
e or severity of the error or correction, e.g. major technical, minor techn=
ical, nit, so that we can quickly judge the extent of problems with the doc=
ument.=0A>>=C2=A0=0A>>Thanks,=0A>>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 Yaron=0A>>=0A>>Email secured by Check Point =0A=
>>=0A>>
--0-317283926-1247509288=:42304
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><style type=3D"text/css"><!-- DIV {margin:0px;} --></style></he=
ad><body><div style=3D"font-family:Courier New, courier, monaco, monospace,=
 sans-serif;font-size:10pt"><DIV>Brian Swander notes that we should be expl=
icit about the IV</DIV>=0A<DIV>which may be present. It may be clear that t=
his is the intention, but I agree that</DIV>=0A<DIV>it is best to be explic=
it. </DIV>=0A<DIV>&nbsp;</DIV>=0A<DIV>This is what we suggest in light of t=
his:</DIV>=0A<DIV><SPAN style=3D"FONT-FAMILY: 'Calibri','sans-serif'; COLOR=
: #1f497d"><?xml:namespace prefix =3D o ns =3D "urn:schemas-microsoft-com:o=
ffice:office" /><o:p>&nbsp;</o:p></SPAN></DIV>=0A<DIV>=0A<P style=3D"MARGIN=
: 0in 0in 0pt 2.3pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma'=
,'sans-serif'; COLOR: black; FONT-SIZE: 10pt">NEW:</SPAN><SPAN style=3D"COL=
OR: black"><o:p></o:p></SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt 2.3pt" =
class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Courier New'; COLOR: black; =
mso-ansi-language: EN" lang=3DEN>&nbsp;&nbsp; HdrLen, 8 bits: Offset from t=
he beginning of the WESP header to </SPAN><SPAN style=3D"COLOR: black"><o:p=
></o:p></SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt 2.3pt" class=3DMsoNorm=
al><SPAN style=3D"FONT-FAMILY: 'Courier New'; COLOR: black; mso-ansi-langua=
ge: EN" lang=3DEN>&nbsp;&nbsp; the beginning of the Rest of Payload Data (i=
.e., past the IV, <o:p></o:p></SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt =
2.3pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Courier New'; COLOR: =
black; mso-ansi-language: EN" lang=3DEN>&nbsp;&nbsp; if present) within the=
 encapsulated ESP header, in</SPAN><SPAN style=3D"COLOR: black; mso-ansi-la=
nguage: EN" lang=3DEN> </SPAN><SPAN style=3D"FONT-FAMILY: 'Courier New'; CO=
LOR: black; mso-ansi-language: EN" lang=3DEN>octets. <o:p></o:p></SPAN></P>=
<BR>Gabriel</DIV>=0A<BLOCKQUOTE style=3D"BORDER-LEFT: rgb(16,16,255) 2px so=
lid; PADDING-LEFT: 5px; MARGIN-LEFT: 5px">=0A<DIV style=3D"FONT-FAMILY: Cou=
rier New, courier, monaco, monospace, sans-serif; FONT-SIZE: 10pt"><BR>=0A<=
DIV style=3D"FONT-FAMILY: times new roman, new york, times, serif; FONT-SIZ=
E: 12pt"><FONT size=3D2 face=3DTahoma><B><SPAN style=3D"FONT-WEIGHT: bold">=
From:</SPAN></B> gabriel montenegro &lt;g_e_montenegro@yahoo.com&gt;<BR><B>=
<SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> Yoav Nir &lt;ynir@checkpoi=
nt.com&gt;; Yaron Sheffer &lt;yaronf@checkpoint.com&gt;; "ipsec@ietf.org" &=
lt;ipsec@ietf.org&gt;<BR><B><SPAN style=3D"FONT-WEIGHT: bold">Sent:</SPAN><=
/B> Monday, July 13, 2009 9:05:23 AM<BR><B><SPAN style=3D"FONT-WEIGHT: bold=
">Subject:</SPAN></B> Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-=
visibility-05<BR></FONT><BR>=0A<DIV style=3D"FONT-FAMILY: Courier New, cour=
ier, monaco, monospace, sans-serif; FONT-SIZE: 10pt">=0A<DIV>=0A<P style=3D=
"MARGIN: 0in 0in 0pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma=
', 'sans-serif'; FONT-SIZE: 10pt">Hi Yoav,</SPAN></P>=0A<P style=3D"MARGIN:=
 0in 0in 0pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma', 'sans=
-serif'; FONT-SIZE: 10pt"></SPAN>&nbsp;</P>=0A<P style=3D"MARGIN: 0in 0in 0=
pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma', 'sans-serif'; F=
ONT-SIZE: 10pt">Good catch,&nbsp; we say offset *<B>to</B>* what, but we do=
n=E2=80=99t say *<B>from</B>* where.</SPAN></P>=0A<P style=3D"MARGIN: 0in 0=
in 0pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma', 'sans-serif=
'; FONT-SIZE: 10pt">&nbsp;</SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" cl=
ass=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma', 'sans-serif'; FONT-SI=
ZE: 10pt">Among the co-authors, we'd like to suggest this as a simple text =
change to address this:</SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=
=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma', 'sans-serif'; FONT-SIZE:=
 10pt">&nbsp;</SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=3DMsoNorm=
al><SPAN style=3D"FONT-FAMILY: 'Tahoma', 'sans-serif'; FONT-SIZE: 10pt">OLD=
:</SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=3DMsoNormal><SPAN sty=
le=3D"FONT-FAMILY: 'Courier New'" lang=3DEN>&nbsp;&nbsp; HdrLen, 8 bits: Of=
fset to the beginning of the Payload Data in</SPAN></P>=0A<P style=3D"MARGI=
N: 0in 0in 0pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Courier New'=
" lang=3DEN>&nbsp;&nbsp; octets. </SPAN></P>=0A<P style=3D"MARGIN: 0in 0in =
0pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma', 'sans-serif'; =
FONT-SIZE: 10pt" lang=3DEN>&nbsp;</SPAN></P>=0A<P style=3D"MARGIN: 0in 0in =
0pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma', 'sans-serif'; =
FONT-SIZE: 10pt">NEW:</SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=
=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Courier New'" lang=3DEN>&nbsp;&nb=
sp; HdrLen, 8 bits: Offset from the beginning of the WESP header to </SPAN>=
</P>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=3DMsoNormal><SPAN style=3D"FO=
NT-FAMILY: 'Courier New'" lang=3DEN>&nbsp;&nbsp; the beginning of the Paylo=
ad Data within the encapsulated ESP header, in</SPAN></P>=0A<P style=3D"MAR=
GIN: 0in 0in 0pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Courier Ne=
w'" lang=3DEN>&nbsp;&nbsp; octets. </SPAN></P>=0A<P style=3D"MARGIN: 0in 0i=
n 0pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma', 'sans-serif'=
; FONT-SIZE: 10pt" lang=3DEN>&nbsp;</SPAN></P>=0A<P style=3D"MARGIN: 0in 0i=
n 0pt" class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma', 'sans-serif'=
; FONT-SIZE: 10pt">&nbsp;</SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" cla=
ss=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma', 'sans-serif'; FONT-SIZ=
E: 10pt">Does this sound ok?</SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" =
class=3DMsoNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma', 'sans-serif'; FONT-=
SIZE: 10pt">&nbsp;</SPAN></P>=0A<P style=3D"MARGIN: 0in 0in 0pt" class=3DMs=
oNormal><SPAN style=3D"FONT-FAMILY: 'Tahoma', 'sans-serif'; FONT-SIZE: 10pt=
">BTW, in the case of TrailerLen we do say both *<B>from</B>* as well as *<=
B>to</B>*.</SPAN></P></DIV>=0A<DIV><BR>Gabriel</DIV>=0A<BLOCKQUOTE style=3D=
"BORDER-LEFT: rgb(16,16,255) 2px solid; PADDING-LEFT: 5px; MARGIN-LEFT: 5px=
">=0A<DIV style=3D"FONT-FAMILY: Courier New, courier, monaco, monospace, sa=
ns-serif; FONT-SIZE: 10pt"><BR>=0A<DIV style=3D"FONT-FAMILY: times new roma=
n, new york, times, serif; FONT-SIZE: 12pt"><FONT size=3D2 face=3DTahoma><B=
><SPAN style=3D"FONT-WEIGHT: bold">From:</SPAN></B> Yoav Nir &lt;ynir@check=
point.com&gt;<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> Yaron =
Sheffer &lt;yaronf@checkpoint.com&gt;; "ipsec@ietf.org" &lt;ipsec@ietf.org&=
gt;<BR><B><SPAN style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Tuesday, July =
7, 2009 4:35:19 AM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">Subject:</SPAN><=
/B> Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05<BR><=
/FONT><BR>=0A<STYLE>=0A<!--=0A=0A_filtered {font-family:Tahoma;panose-1:2 1=
1 6 4 3 5 4 4 2 4;}=0A=0Ap.MsoNormal, li.MsoNormal, div.MsoNormal=0A=09{mar=
gin:0cm;margin-bottom:.0001pt;font-size:12.0pt;font-family:"Times New Roman=
";}=0Aa:link, span.MsoHyperlink=0A=09{color:blue;text-decoration:underline;=
}=0Aa:visited, span.MsoHyperlinkFollowed=0A=09{color:purple;text-decoration=
:underline;}=0Apre=0A=09{margin:0cm;margin-bottom:.0001pt;font-size:12.0pt;=
font-family:"Courier New";}=0Aspan.EmailStyle17=0A=09{font-family:Arial;col=
or:windowtext;}=0Aspan.EmailStyle18=0A=09{font-family:Arial;color:navy;}=0A=
_filtered {margin:72.0pt 90.0pt 72.0pt 90.0pt;}=0Adiv.Section1=0A=09{}=0A--=
>=0A</STYLE>=0A=0A<DIV class=3DSection1>=0A<P class=3DMsoNormal><FONT color=
=3Dnavy size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; COLOR: nav=
y; FONT-SIZE: 10pt">I=E2=80=99ve read it again, and it seems fine. &nbsp;On=
e minor issue, though.</SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT color=
=3Dnavy size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; COLOR: nav=
y; FONT-SIZE: 10pt">&nbsp;</SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT c=
olor=3Dnavy size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; COLOR:=
 navy; FONT-SIZE: 10pt">Section 2 describes the WESP header format. It has =
the following:</SPAN></FONT></P><PRE><FONT size=3D3 face=3D"Courier New"><S=
PAN style=3D"FONT-SIZE: 12pt" lang=3DEN>&nbsp;&nbsp; HdrLen, 8 bits: Offset=
 to the beginning of the Payload Data in</SPAN></FONT></PRE><PRE><FONT size=
=3D3 face=3D"Courier New"><SPAN style=3D"FONT-SIZE: 12pt" lang=3DEN>&nbsp;&=
nbsp; octets. The receiver MUST ensure that this field matches with</SPAN><=
/FONT></PRE><PRE><FONT size=3D3 face=3D"Courier New"><SPAN style=3D"FONT-SI=
ZE: 12pt" lang=3DEN>&nbsp;&nbsp; the header offset computed from using the =
negotiated SA and MUST</SPAN></FONT></PRE><PRE><FONT size=3D3 face=3D"Couri=
er New"><SPAN style=3D"FONT-SIZE: 12pt" lang=3DEN>&nbsp;&nbsp; drop the pac=
ket in case it doesn't match.</SPAN></FONT></PRE>=0A<P class=3DMsoNormal><F=
ONT color=3Dnavy size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; C=
OLOR: navy; FONT-SIZE: 10pt" lang=3DEN>&nbsp;</SPAN></FONT></P>=0A<P class=
=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN style=3D"FONT-F=
AMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">I think I know what they mean, =
but it=E2=80=99s entirely not clear what this field is supposed to hold. &n=
bsp;Is it the size of the existing ESP header?&nbsp; Is it that + 4?&nbsp; =
How about =E2=80=9Cthe combined length of all the ESP fields that precede t=
he =E2=80=9CPayload Data=E2=80=9D field=E2=80=9D in ESP=E2=80=9D ? &nbsp;</=
SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3D=
Arial><SPAN style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">&nbs=
p;</SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT color=3Dnavy size=3D2 fac=
e=3DArial><SPAN style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt" =
lang=3DEN>&nbsp;</SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT color=3Dnav=
y size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; COLOR: navy; FON=
T-SIZE: 10pt">&nbsp;</SPAN></FONT></P>=0A<DIV>=0A<DIV style=3D"TEXT-ALIGN: =
center" class=3DMsoNormal align=3Dcenter><FONT size=3D3 face=3D"Times New R=
oman"><SPAN style=3D"FONT-SIZE: 12pt">=0A<HR tabIndex=3D-1 align=3Dcenter S=
IZE=3D2 width=3D"100%">=0A</SPAN></FONT></DIV>=0A<P class=3DMsoNormal><B><F=
ONT size=3D2 face=3DTahoma><SPAN style=3D"FONT-FAMILY: Tahoma; FONT-SIZE: 1=
0pt; FONT-WEIGHT: bold">From:</SPAN></FONT></B><FONT size=3D2 face=3DTahoma=
><SPAN style=3D"FONT-FAMILY: Tahoma; FONT-SIZE: 10pt"> ipsec-bounces@ietf.o=
rg [mailto:ipsec-bounces@ietf.org] <B><SPAN style=3D"FONT-WEIGHT: bold">On =
Behalf Of </SPAN></B>Yaron Sheffer<BR><B><SPAN style=3D"FONT-WEIGHT: bold">=
Sent:</SPAN></B> Saturday, July 04, 2009 10:48 PM<BR><B><SPAN style=3D"FONT=
-WEIGHT: bold">To:</SPAN></B> ipsec@ietf.org<BR><B><SPAN style=3D"FONT-WEIG=
HT: bold">Subject:</SPAN></B> [IPsec] WG Last Call: draft-ietf-ipsecme-traf=
fic-visibility-05</SPAN></FONT></P></DIV>=0A<P class=3DMsoNormal><FONT size=
=3D3 face=3D"Times New Roman"><SPAN style=3D"FONT-SIZE: 12pt">&nbsp;</SPAN>=
</FONT></P>=0A<P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN style=
=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">This is the beginning of a two-wee=
k WG Last Call, which will end July 18. The target status for this document=
 is Proposed Standard. The current document is at http://tools.ietf.org/htm=
l/draft-ietf-ipsecme-traffic-visibility-05.</SPAN></FONT></P>=0A<P class=3D=
MsoNormal><FONT size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FO=
NT-SIZE: 10pt">&nbsp;</SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT size=
=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">If yo=
u have not read the document before now, please do so. Having fresh eyes on=
 the document often brings up important issues. If you HAVE read it before,=
 please note that there have been several revisions since San Francisco , s=
o you might want to read it again (plus it=E2=80=99s a short document). Sen=
d any comments to the list, even if they are as simple as "I read it and it=
 seems fine".</SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT size=3D2 face=
=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">&nbsp;</SPAN><=
/FONT></P>=0A<P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN style=
=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Please clearly indicate the positi=
on of any issue in the Internet Draft, and if possible provide alternative =
text. Please also indicate the nature or severity of the error or correctio=
n, e.g. major technical, minor technical, nit, so that we can quickly judge=
 the extent of problems with the document.</SPAN></FONT></P>=0A<P class=3DM=
soNormal><FONT size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FON=
T-SIZE: 10pt">&nbsp;</SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT size=3D=
2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Thanks,<=
/SPAN></FONT></P>=0A<P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN =
style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Yaron</SPAN></FONT></P></DIV><BR><BR>=
Email secured by Check Point <BR><BR></DIV></DIV></BLOCKQUOTE></DIV></DIV><=
/DIV></BLOCKQUOTE></div></body></html>
--0-317283926-1247509288=:42304--

From ynir@checkpoint.com  Mon Jul 13 23:48:36 2009
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5D0EF28C1AE for <ipsec@core3.amsl.com>; Mon, 13 Jul 2009 23:48:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.644
X-Spam-Level: 
X-Spam-Status: No, score=-2.644 tagged_above=-999 required=5 tests=[AWL=-0.046, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uDe0PNi7O673 for <ipsec@core3.amsl.com>; Mon, 13 Jul 2009 23:48:29 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id F0B2A3A6830 for <ipsec@ietf.org>; Mon, 13 Jul 2009 23:48:28 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id DEE2E29C004; Tue, 14 Jul 2009 09:46:49 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 8911829C002; Tue, 14 Jul 2009 09:46:49 +0300 (IDT)
X-CheckPoint: {4A5C292B-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n6E6kY3d027969; Tue, 14 Jul 2009 09:46:34 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Tue, 14 Jul 2009 09:46:34 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: "'gabriel montenegro'" <g_e_montenegro@yahoo.com>, Yaron Sheffer <yaronf@checkpoint.com>, "ipsec@ietf.org" <ipsec@ietf.org>
Date: Tue, 14 Jul 2009 09:46:33 +0300
Thread-Topic: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
Thread-Index: AcoD5sEEvR/lzu90TpGDL/NaGh/uSgAZ5ajg
Message-ID: <006FEB08D9C6444AB014105C9AEB133F608151F7AB@il-ex01.ad.checkpoint.com>
References: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594E4@il-ex01.ad.checkpoint.com> <006FEB08D9C6444AB014105C9AEB133F433538CE3E@il-ex01.ad.checkpoint.com> <372852.53939.qm@web82605.mail.mud.yahoo.com> <380869.42304.qm@web82608.mail.mud.yahoo.com>
In-Reply-To: <380869.42304.qm@web82608.mail.mud.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_006FEB08D9C6444AB014105C9AEB133F608151F7ABilex01adcheck_"
MIME-Version: 1.0
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Jul 2009 06:48:36 -0000

--_000_006FEB08D9C6444AB014105C9AEB133F608151F7ABilex01adcheck_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Works for me.

________________________________
From: gabriel montenegro [mailto:g_e_montenegro@yahoo.com]
Sent: Monday, July 13, 2009 9:21 PM
To: Yoav Nir; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Brian Swander notes that we should be explicit about the IV
which may be present. It may be clear that this is the intention, but I agr=
ee that
it is best to be explicit.

This is what we suggest in light of this:

NEW:
   HdrLen, 8 bits: Offset from the beginning of the WESP header to
   the beginning of the Rest of Payload Data (i.e., past the IV,
   if present) within the encapsulated ESP header, in octets.

Gabriel

From: gabriel montenegro <g_e_montenegro@yahoo.com>
To: Yoav Nir <ynir@checkpoint.com>; Yaron Sheffer <yaronf@checkpoint.com>; =
"ipsec@ietf.org" <ipsec@ietf.org>
Sent: Monday, July 13, 2009 9:05:23 AM
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
Hi Yoav,

Good catch,  we say offset *to* what, but we don't say *from* where.

Among the co-authors, we'd like to suggest this as a simple text change to =
address this:

OLD:
   HdrLen, 8 bits: Offset to the beginning of the Payload Data in
   octets.

NEW:
   HdrLen, 8 bits: Offset from the beginning of the WESP header to
   the beginning of the Payload Data within the encapsulated ESP header, in
   octets.


Does this sound ok?

BTW, in the case of TrailerLen we do say both *from* as well as *to*.

Gabriel

From: Yoav Nir <ynir@checkpoint.com>
To: Yaron Sheffer <yaronf@checkpoint.com>; "ipsec@ietf.org" <ipsec@ietf.org=
>
Sent: Tuesday, July 7, 2009 4:35:19 AM
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
I've read it again, and it seems fine.  One minor issue, though.

Section 2 describes the WESP header format. It has the following:

   HdrLen, 8 bits: Offset to the beginning of the Payload Data in

   octets. The receiver MUST ensure that this field matches with

   the header offset computed from using the negotiated SA and MUST

   drop the packet in case it doesn't match.

I think I know what they mean, but it's entirely not clear what this field =
is supposed to hold.  Is it the size of the existing ESP header?  Is it tha=
t + 4?  How about "the combined length of all the ESP fields that precede t=
he "Payload Data" field" in ESP" ?



________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Y=
aron Sheffer
Sent: Saturday, July 04, 2009 10:48 PM
To: ipsec@ietf.org
Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

This is the beginning of a two-week WG Last Call, which will end July 18. T=
he target status for this document is Proposed Standard. The current docume=
nt is at http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-0=
5.

If you have not read the document before now, please do so. Having fresh ey=
es on the document often brings up important issues. If you HAVE read it be=
fore, please note that there have been several revisions since San Francisc=
o , so you might want to read it again (plus it's a short document). Send a=
ny comments to the list, even if they are as simple as "I read it and it se=
ems fine".

Please clearly indicate the position of any issue in the Internet Draft, an=
d if possible provide alternative text. Please also indicate the nature or =
severity of the error or correction, e.g. major technical, minor technical,=
 nit, so that we can quickly judge the extent of problems with the document=
.

Thanks,
            Yaron


Email secured by Check Point

=0D=0A
Email secured by Check Point=0D=0A

--_000_006FEB08D9C6444AB014105C9AEB133F608151F7ABilex01adcheck_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" xmlns=3D"http://ww=
w.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" name=3D"City"/=
>
<o:SmartTagType namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place"/>
<o:SmartTagType namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PersonName"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
_filtered {font-family:Tahoma;panose-1:2 11 6 4 3 5 4 4 2 4;}
_filtered {margin:72.0pt 90.0pt 72.0pt 90.0pt;}

 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Calibri;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
pre
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Courier New";}
span.emailstyle17
	{font-family:Arial;
	color:windowtext;}
span.emailstyle18
	{font-family:Arial;
	color:navy;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Works for me.<o:p></o:p></span></font>=
</p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> gabriel
montenegro [mailto:g_e_montenegro@yahoo.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Monday, July 13, 2009 =
9:21
PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Yoav Nir; Yaron Sheffer;=
 <st1:PersonName
w:st=3D"on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] WG Last=
 Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span style=3D'fon=
t-size:10.0pt;
font-family:"Courier New"'>Brian Swander notes that we should be explicit a=
bout
the IV<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span style=3D'fon=
t-size:10.0pt;
font-family:"Courier New"'>which may be present. It may be clear that this =
is
the intention, but I agree that<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span style=3D'fon=
t-size:10.0pt;
font-family:"Courier New"'>it is best to be explicit. <o:p></o:p></span></f=
ont></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span style=3D'fon=
t-size:10.0pt;
font-family:"Courier New"'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span style=3D'fon=
t-size:10.0pt;
font-family:"Courier New"'>This is what we suggest in light of this:<o:p></=
o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 color=3D"#1f497d" face=3DCalibri><span
style=3D'font-size:10.0pt;font-family:Calibri;color:#1F497D'><o:p>&nbsp;</o=
:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal style=3D'margin-left:2.3pt'><font size=3D2 color=3Dbla=
ck
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma;color:blac=
k'>NEW:</span></font><font
color=3Dblack><span style=3D'color:black'><o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-left:2.3pt'><font size=3D3 color=3Dbla=
ck
face=3D"Courier New"><span lang=3DEN style=3D'font-size:12.0pt;font-family:=
"Courier New";
color:black'>&nbsp;&nbsp; HdrLen, 8 bits: Offset from the beginning of the =
WESP
header to </span></font><font color=3Dblack><span style=3D'color:black'><o:=
p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-left:2.3pt'><font size=3D3 color=3Dbla=
ck
face=3D"Courier New"><span lang=3DEN style=3D'font-size:12.0pt;font-family:=
"Courier New";
color:black'>&nbsp;&nbsp; the beginning of the Rest of Payload Data (i.e., =
past
the IV, <o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-left:2.3pt'><font size=3D3 color=3Dbla=
ck
face=3D"Courier New"><span lang=3DEN style=3D'font-size:12.0pt;font-family:=
"Courier New";
color:black'>&nbsp;&nbsp; if present) within the encapsulated ESP header, i=
n</span></font><font
color=3Dblack><span lang=3DEN style=3D'color:black'> </span></font><font co=
lor=3Dblack
face=3D"Courier New"><span lang=3DEN style=3D'font-family:"Courier New";col=
or:black'>octets.
<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span style=3D'fon=
t-size:10.0pt;
font-family:"Courier New"'><br>
Gabriel<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #1010FF 1.5pt;padding:0c=
m 0cm 0cm 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-bottom:5.0pt'>

<div>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span style=3D'fon=
t-size:10.0pt;
font-family:"Courier New"'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><b><font size=3D2 face=
=3DTahoma><span
style=3D'font-size:10.0pt;font-family:Tahoma;font-weight:bold'>From:</span>=
</font></b><font
size=3D2 face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>=
 gabriel
montenegro &lt;g_e_montenegro@yahoo.com&gt;<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Yoav Nir
&lt;ynir@checkpoint.com&gt;; Yaron Sheffer &lt;yaronf@checkpoint.com&gt;;
&quot;<st1:PersonName w:st=3D"on">ipsec@ietf.org</st1:PersonName>&quot; &lt=
;<st1:PersonName
w:st=3D"on">ipsec@ietf.org</st1:PersonName>&gt;<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Monday, July 13, 2009
9:05:23 AM<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] WG Last=
 Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

<div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DTahoma><span style=3D'font-size:=
10.0pt;
font-family:Tahoma'>Hi Yoav,</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DTahoma><span style=3D'font-size:=
10.0pt;
font-family:Tahoma'>Good catch,&nbsp; we say offset *<b><span style=3D'font=
-weight:
bold'>to</span></b>* what, but we don&#8217;t say *<b><span style=3D'font-w=
eight:bold'>from</span></b>*
where.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DTahoma><span style=3D'font-size:=
10.0pt;
font-family:Tahoma'>&nbsp;</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DTahoma><span style=3D'font-size:=
10.0pt;
font-family:Tahoma'>Among the co-authors, we'd like to suggest this as a si=
mple
text change to address this:</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DTahoma><span style=3D'font-size:=
10.0pt;
font-family:Tahoma'>&nbsp;</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DTahoma><span style=3D'font-size:=
10.0pt;
font-family:Tahoma'>OLD:</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Courier New"><span lang=3DEN
style=3D'font-size:12.0pt;font-family:"Courier New"'>&nbsp;&nbsp; HdrLen, 8=
 bits:
Offset to the beginning of the Payload Data in</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Courier New"><span lang=3DEN
style=3D'font-size:12.0pt;font-family:"Courier New"'>&nbsp;&nbsp; octets. <=
/span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DTahoma><span lang=3DEN style=3D'=
font-size:
10.0pt;font-family:Tahoma'>&nbsp;</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DTahoma><span style=3D'font-size:=
10.0pt;
font-family:Tahoma'>NEW:</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Courier New"><span lang=3DEN
style=3D'font-size:12.0pt;font-family:"Courier New"'>&nbsp;&nbsp; HdrLen, 8=
 bits:
Offset from the beginning of the WESP header to </span></font><o:p></o:p></=
p>

<p class=3DMsoNormal><font size=3D3 face=3D"Courier New"><span lang=3DEN
style=3D'font-size:12.0pt;font-family:"Courier New"'>&nbsp;&nbsp; the begin=
ning
of the Payload Data within the encapsulated ESP header, in</span></font><o:=
p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Courier New"><span lang=3DEN
style=3D'font-size:12.0pt;font-family:"Courier New"'>&nbsp;&nbsp; octets. <=
/span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DTahoma><span lang=3DEN style=3D'=
font-size:
10.0pt;font-family:Tahoma'>&nbsp;</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DTahoma><span style=3D'font-size:=
10.0pt;
font-family:Tahoma'>&nbsp;</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DTahoma><span style=3D'font-size:=
10.0pt;
font-family:Tahoma'>Does this sound ok?</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DTahoma><span style=3D'font-size:=
10.0pt;
font-family:Tahoma'>&nbsp;</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DTahoma><span style=3D'font-size:=
10.0pt;
font-family:Tahoma'>BTW, in the case of TrailerLen we do say both *<b><span
style=3D'font-weight:bold'>from</span></b>* as well as *<b><span
style=3D'font-weight:bold'>to</span></b>*.</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span style=3D'fon=
t-size:10.0pt;
font-family:"Courier New"'><br>
Gabriel<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid #1010FF 1.5pt;padding:0c=
m 0cm 0cm 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-bottom:5.0pt'>

<div>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span style=3D'fon=
t-size:10.0pt;
font-family:"Courier New"'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><b><font size=3D2 face=
=3DTahoma><span
style=3D'font-size:10.0pt;font-family:Tahoma;font-weight:bold'>From:</span>=
</font></b><font
size=3D2 face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>=
 Yoav Nir
&lt;ynir@checkpoint.com&gt;<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Yaron Sheffer &lt;yaronf=
@checkpoint.com&gt;;
&quot;<st1:PersonName w:st=3D"on">ipsec@ietf.org</st1:PersonName>&quot; &lt=
;<st1:PersonName
w:st=3D"on">ipsec@ietf.org</st1:PersonName>&gt;<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Tuesday, July 7, 2009
4:35:19 AM<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] WG Last=
 Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

<div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I&#8217;ve read it again, and it seems=
 fine.
&nbsp;One minor issue, though.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Section 2 describes the WESP header
format. It has the following:</span></font><o:p></o:p></p>

<pre><font size=3D3 face=3D"Courier New"><span lang=3DEN style=3D'font-size=
:12.0pt'>&nbsp;&nbsp; HdrLen, 8 bits: Offset to the beginning of the Payloa=
d Data in</span><o:p></o:p></font></pre><pre><font
size=3D3 face=3D"Courier New"><span lang=3DEN style=3D'font-size:12.0pt'>&n=
bsp;&nbsp; octets. The receiver MUST ensure that this field matches with</s=
pan><o:p></o:p></font></pre><pre><font
size=3D3 face=3D"Courier New"><span lang=3DEN style=3D'font-size:12.0pt'>&n=
bsp;&nbsp; the header offset computed from using the negotiated SA and MUST=
</span><o:p></o:p></font></pre><pre><font
size=3D3 face=3D"Courier New"><span lang=3DEN style=3D'font-size:12.0pt'>&n=
bsp;&nbsp; drop the packet in case it doesn't match.</span><o:p></o:p></fon=
t></pre>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span lang=3D=
EN
style=3D'font-size:10.0pt;font-family:Arial;color:navy'>&nbsp;</span></font=
><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I think I know what they mean, but it&=
#8217;s
entirely not clear what this field is supposed to hold. &nbsp;Is it the siz=
e of
the existing ESP header?&nbsp; Is it that + 4?&nbsp; How about &#8220;the c=
ombined
length of all the ESP fields that precede the &#8220;Payload Data&#8221; fi=
eld&#8221; in ESP&#8221; ?
&nbsp;</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span lang=3D=
EN
style=3D'font-size:10.0pt;font-family:Arial;color:navy'>&nbsp;</span></font=
><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabIndex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <b><span
style=3D'font-weight:bold'>On Behalf Of </span></b>Yaron Sheffer<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Saturday, July 04, 200=
9
10:48 PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName w:st=3D"=
on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> [IPsec] WG Last Cal=
l:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>This is the beginning of a two-week WG Last Call, which =
will
end July 18. The target status for this document is Proposed Standard. The
current document is at http://tools.ietf.org/html/draft-ietf-ipsecme-traffi=
c-visibility-05.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>&nbsp;</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>If you have not read the document before now, please do =
so.
Having fresh eyes on the document often brings up important issues. If you =
HAVE
read it before, please note that there have been several revisions since <s=
t1:City
w:st=3D"on"><st1:place w:st=3D"on">San Francisco</st1:place></st1:City> , s=
o you
might want to read it again (plus it&#8217;s a short document). Send any co=
mments to
the list, even if they are as simple as &quot;I read it and it seems
fine&quot;.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>&nbsp;</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Please clearly indicate the position of any issue in the
Internet Draft, and if possible provide alternative text. Please also indic=
ate
the nature or severity of the error or correction, e.g. major technical, mi=
nor
technical, nit, so that we can quickly judge the extent of problems with th=
e
document.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>&nbsp;</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Thanks,</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;
Yaron</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
Email secured by Check Point <o:p></o:p></span></font></p>

</div>

</div>

</blockquote>

</div>

</div>

</div>

</blockquote>

</div>

</div>


<br>=
=0D=0A
<br>Email secured by Check Point=0D=0A
<br>
<br>=
</body>

</html>

--_000_006FEB08D9C6444AB014105C9AEB133F608151F7ABilex01adcheck_--

From qiuying@i2r.a-star.edu.sg  Tue Jul 14 00:39:14 2009
Return-Path: <qiuying@i2r.a-star.edu.sg>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D0E1D3A6A33 for <ipsec@core3.amsl.com>; Tue, 14 Jul 2009 00:39:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.278
X-Spam-Level: 
X-Spam-Status: No, score=-1.278 tagged_above=-999 required=5 tests=[AWL=1.320,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5vH4mLsaIo5m for <ipsec@core3.amsl.com>; Tue, 14 Jul 2009 00:39:13 -0700 (PDT)
Received: from gw1.scei.a-star.edu.sg (gw1.scei.a-star.edu.sg [192.122.140.10]) by core3.amsl.com (Postfix) with ESMTP id B28B63A6E06 for <ipsec@ietf.org>; Tue, 14 Jul 2009 00:38:58 -0700 (PDT)
Received: from mailfe01.teak.local.net ([10.217.253.173]) by gw1.scei.a-star.edu.sg (8.14.1/8.14.1) with ESMTP id n6E7Wqf0005857;  Tue, 14 Jul 2009 15:32:53 +0800
Received: from t3400 ([10.217.141.123]) by mailfe01.teak.local.net with Microsoft SMTPSVC(6.0.3790.3959); Tue, 14 Jul 2009 15:34:28 +0800
Message-ID: <DF4B170548E644539355FC9A7B3D7143@t3400>
From: "QIU Ying" <qiuying@i2r.a-star.edu.sg>
To: "Yaron Sheffer" <yaronf@checkpoint.com>, <ipsec@ietf.org>
References: <7F9A6D26EB51614FBF9F81C0DA4CFEC8E8ABD594E4@il-ex01.ad.checkpoint.com>
Date: Tue, 14 Jul 2009 15:30:27 +0800
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_017B_01CA0498.03D12A20"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.5512
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579
X-OriginalArrivalTime: 14 Jul 2009 07:34:28.0179 (UTC) FILETIME=[84E4AA30:01CA0455]
X-Proofpoint-Virus-Version: vendor=fsecure engine=1.12.8161:2.4.5, 1.2.40, 4.0.166 definitions=2009-07-14_02:2009-07-03, 2009-07-14, 2009-07-13 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 ipscore=0 phishscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx engine=5.0.0-0811170000 definitions=main-0907140005
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Jul 2009 07:39:14 -0000

This is a multi-part message in MIME format.

------=_NextPart_000_017B_01CA0498.03D12A20
Content-Type: text/plain;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

Regarding the Next Header in section 2, what will be happened if the value =
of Next Header is zero (i.e. IPv6 Hop-by-Hop option) and the packet is not =
encrypted?

Regards
Qiu Ying

  ----- Original Message -----=20
  From: Yaron Sheffer=20
  To: ipsec@ietf.org=20
  Sent: Sunday, July 05, 2009 3:48 AM
  Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05


  This is the beginning of a two-week WG Last Call, which will end July 18.=
 The target status for this document is Proposed Standard. The current docu=
ment is at http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility=
-05.

=20=20=20

  If you have not read the document before now, please do so. Having fresh =
eyes on the document often brings up important issues. If you HAVE read it =
before, please note that there have been several revisions since San Franci=
sco, so you might want to read it again (plus it's a short document). Send =
any comments to the list, even if they are as simple as "I read it and it s=
eems fine".

=20=20=20

  Please clearly indicate the position of any issue in the Internet Draft, =
and if possible provide alternative text. Please also indicate the nature o=
r severity of the error or correction, e.g. major technical, minor technica=
l, nit, so that we can quickly judge the extent of problems with the docume=
nt.

=20=20=20

  Thanks,

              Yaron



---------------------------------------------------------------------------=
---


  _______________________________________________
  IPsec mailing list
  IPsec@ietf.org
  https://www.ietf.org/mailman/listinfo/ipsec

Institute for Infocomm Research disclaimer:  "This email is confidential an=
d may be privileged. If you are not the intended recipient, please delete i=
t and notify us immediately. Please do not copy or use it for any purpose, =
or disclose its contents to any other person. Thank you."

------=_NextPart_000_017B_01CA0498.03D12A20
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D=20
"urn:schemas-microsoft-com:vml" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word" xmlns:x =3D=20
"urn:schemas-microsoft-com:office:excel" xmlns:p =3D=20
"urn:schemas-microsoft-com:office:powerpoint" xmlns:a =3D=20
"urn:schemas-microsoft-com:office:access" xmlns:dt =3D=20
"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s =3D=20
"uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs =3D=20
"urn:schemas-microsoft-com:rowset" xmlns:z =3D "#RowsetSchema" xmlns:b =3D=
=20
"urn:schemas-microsoft-com:office:publisher" xmlns:ss =3D=20
"urn:schemas-microsoft-com:office:spreadsheet" xmlns:c =3D=20
"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns:odc =3D=20
"urn:schemas-microsoft-com:office:odc" xmlns:oa =3D=20
"urn:schemas-microsoft-com:office:activation" xmlns:html =3D=20
"http://www.w3.org/TR/REC-html40" xmlns:q =3D=20
"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc =3D=20
"http://microsoft.com/officenet/conferencing" XMLNS:D =3D "DAV:" XMLNS:Repl=
 =3D=20
"http://schemas.microsoft.com/repl/" xmlns:mt =3D=20
"http://schemas.microsoft.com/sharepoint/soap/meetings/" xmlns:x2 =3D=20
"http://schemas.microsoft.com/office/excel/2003/xml" xmlns:ppda =3D=20
"http://www.passport.com/NameSpace.xsd" xmlns:ois =3D=20
"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir =3D=20
"http://schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds =3D=20
"http://www.w3.org/2000/09/xmldsig#" xmlns:dsp =3D=20
"http://schemas.microsoft.com/sharepoint/dsp" xmlns:udc =3D=20
"http://schemas.microsoft.com/data/udc" xmlns:xsd =3D=20
"http://www.w3.org/2001/XMLSchema" xmlns:sub =3D=20
"http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/" xmlns:ec =3D=
=20
"http://www.w3.org/2001/04/xmlenc#" xmlns:sp =3D=20
"http://schemas.microsoft.com/sharepoint/" xmlns:sps =3D=20
"http://schemas.microsoft.com/sharepoint/soap/" xmlns:xsi =3D=20
"http://www.w3.org/2001/XMLSchema-instance" xmlns:udcs =3D=20
"http://schemas.microsoft.com/data/udc/soap" xmlns:udcxf =3D=20
"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udcp2p =3D=20
"http://schemas.microsoft.com/data/udc/parttopart" xmlns:st =3D "=01" xmlns=
:st1 =3D=20
"urn:schemas-microsoft-com:office:smarttags"><HEAD>
<META content=3D"text/html; charset=3Diso-8859-1" http-equiv=3DContent-Type>
<META name=3DGENERATOR content=3D"MSHTML 8.00.6001.18372"><o:SmartTagType=
=20
name=3D"City"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTagTyp=
e><o:SmartTagType=20
name=3D"place"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTagTyp=
e><!--[if !mso]>
<STYLE>st1\:* {
	BEHAVIOR: url(#default#ieooui)
}
</STYLE>
<![endif]-->
<STYLE>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Times;
	panose-1:2 2 6 3 5 4 5 2 3 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:Arial;
	color:windowtext;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</STYLE>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]--></HEAD>
<BODY lang=3DEN-US link=3Dblue bgColor=3D#ffffff vLink=3Dpurple>
<DIV><FONT size=3D2 face=3DArial>Regarding the Next Header in section 2, wh=
at will=20
be happened if the value of Next Header is zero (i.e. IPv6 Hop-by-Hop optio=
n)=20
and the packet is not encrypted?</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2 face=3DArial>Regards</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial>Qiu Ying</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
<BLOCKQUOTE=20
style=3D"BORDER-LEFT: #000000 2px solid; PADDING-LEFT: 5px; PADDING-RIGHT: =
0px; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px">
  <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV>
  <DIV=20
  style=3D"FONT: 10pt arial; BACKGROUND: #e4e4e4; font-color: black"><B>Fro=
m:</B>=20
  <A title=3Dyaronf@checkpoint.com href=3D"mailto:yaronf@checkpoint.com">Ya=
ron=20
  Sheffer</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A title=3Dipsec@ietf.org=20
  href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Sunday, July 05, 2009 3:48 A=
M</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> [IPsec] WG Last Call:=20
  draft-ietf-ipsecme-traffic-visibility-05</DIV>
  <DIV><BR></DIV>
  <DIV class=3DSection1>
  <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">This is the beginning of a=
=20
  two-week WG Last Call, which will end July 18. The target status for this=
=20
  document is Proposed Standard. The current document is at <A=20
  href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-=
05">http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05</A>=
.<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p></SPAN></F=
ONT></P>
  <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">If you have not read the do=
cument=20
  before now, please do so. Having fresh eyes on the document often brings =
up=20
  important issues. If you HAVE read it before, please note that there have=
 been=20
  several revisions since <st1:City w:st=3D"on"><st1:place w:st=3D"on">San=
=20
  Francisco</st1:place></st1:City>, so you might want to read it again (plu=
s=20
  it=92s a short document). Send any comments to the list, even if they are=
 as=20
  simple as "I read it and it seems fine".<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p></SPAN></F=
ONT></P>
  <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Please clearly indicate the=
=20
  position of any issue in the Internet Draft, and if possible provide=20
  alternative text. Please also indicate the nature or severity of the erro=
r or=20
  correction, e.g. major technical, minor technical, nit, so that we can qu=
ickly=20
  judge the extent of problems with the document.<o:p></o:p></SPAN></FONT><=
/P>
  <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p></SPAN></F=
ONT></P>
  <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Thanks,<o:p></o:p></SPAN></=
FONT></P>
  <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
  Yaron</SPAN></FONT><FONT size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p></o:p></SPAN></FONT></=
P></DIV>
  <P>
  <HR>

  <P></P>_______________________________________________<BR>IPsec mailing=
=20
  list<BR>IPsec@ietf.org<BR>https://www.ietf.org/mailman/listinfo/ipsec<BR>=
</BLOCKQUOTE>
<DIV>
Institute for Infocomm Research disclaimer:  &quot;This email is confidenti=
al and may be privileged. If you are not the intended recipient, please del=
ete it and notify us immediately. Please do not copy or use it for any purp=
ose, or disclose its contents to any other person. Thank you.&quot;<BR>
</DIV></BODY></HTML>

------=_NextPart_000_017B_01CA0498.03D12A20--


From qiuying@i2r.a-star.edu.sg  Tue Jul 14 01:50:21 2009
Return-Path: <qiuying@i2r.a-star.edu.sg>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 770183A63EB for <ipsec@core3.amsl.com>; Tue, 14 Jul 2009 01:50:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.492
X-Spam-Level: 
X-Spam-Status: No, score=-0.492 tagged_above=-999 required=5 tests=[AWL=0.094,  BAYES_00=-2.599, FAKE_REPLY_C=2.012, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0EGfR64Q9DjR for <ipsec@core3.amsl.com>; Tue, 14 Jul 2009 01:50:20 -0700 (PDT)
Received: from gw2.scei.a-star.edu.sg (gw2.scei.a-star.edu.sg [192.122.140.11]) by core3.amsl.com (Postfix) with ESMTP id 58CC53A6E64 for <ipsec@ietf.org>; Tue, 14 Jul 2009 01:50:18 -0700 (PDT)
Received: from mailfe01.teak.local.net ([10.217.253.173]) by gw2.scei.a-star.edu.sg (8.14.1/8.14.1) with ESMTP id n6E7dYAO017729;  Tue, 14 Jul 2009 00:39:34 -0700
Received: from t3400 ([10.217.141.123]) by mailfe01.teak.local.net with Microsoft SMTPSVC(6.0.3790.3959); Tue, 14 Jul 2009 15:41:09 +0800
Message-ID: <2E5D69B62A99425C894AA9B258004990@t3400>
From: "QIU Ying" <qiuying@i2r.a-star.edu.sg>
To: "QIU Ying" <qiuying@i2r.a-star.edu.sg>, "Yaron Sheffer" <yaronf@checkpoint.com>, <ipsec@ietf.org>
Date: Tue, 14 Jul 2009 15:37:09 +0800
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_018F_01CA0498.F31EC2E0"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.5512
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579
X-OriginalArrivalTime: 14 Jul 2009 07:41:09.0572 (UTC) FILETIME=[74246040:01CA0456]
X-Proofpoint-Virus-Version: vendor=fsecure engine=1.12.8161:2.4.5, 1.2.40, 4.0.166 definitions=2009-07-14_02:2009-07-03, 2009-07-14, 2009-07-13 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 ipscore=0 phishscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx engine=5.0.0-0811170000 definitions=main-0907140007
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Jul 2009 08:50:21 -0000

This is a multi-part message in MIME format.

------=_NextPart_000_018F_01CA0498.F31EC2E0
Content-Type: text/plain;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

Since the zero of next header value is used for HOPOPT already, maybe apply=
ing a new value for this intention is better to avoid the confliction.

Regards
Qiu Ying

  ----- Original Message -----=20
  From: QIU Ying=20
  To: Yaron Sheffer ; ipsec@ietf.org=20
  Sent: Tuesday, July 14, 2009 3:30 PM
  Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-=
05


  Regarding the Next Header in section 2, what will be happened if the valu=
e of Next Header is zero (i.e. IPv6 Hop-by-Hop option) and the packet is no=
t encrypted?

  Regards
  Qiu Ying

    ----- Original Message -----=20
    From: Yaron Sheffer=20
    To: ipsec@ietf.org=20
    Sent: Sunday, July 05, 2009 3:48 AM
    Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05


    This is the beginning of a two-week WG Last Call, which will end July 1=
8. The target status for this document is Proposed Standard. The current do=
cument is at http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibili=
ty-05.

=20=20=20=20=20

    If you have not read the document before now, please do so. Having fres=
h eyes on the document often brings up important issues. If you HAVE read i=
t before, please note that there have been several revisions since San Fran=
cisco, so you might want to read it again (plus it's a short document). Sen=
d any comments to the list, even if they are as simple as "I read it and it=
 seems fine".

=20=20=20=20=20

    Please clearly indicate the position of any issue in the Internet Draft=
, and if possible provide alternative text. Please also indicate the nature=
 or severity of the error or correction, e.g. major technical, minor techni=
cal, nit, so that we can quickly judge the extent of problems with the docu=
ment.

=20=20=20=20=20

    Thanks,

                Yaron



----------------------------------------------------------------------------


    _______________________________________________
    IPsec mailing list
    IPsec@ietf.org
    https://www.ietf.org/mailman/listinfo/ipsec

Institute for Infocomm Research disclaimer:  "This email is confidential an=
d may be privileged. If you are not the intended recipient, please delete i=
t and notify us immediately. Please do not copy or use it for any purpose, =
or disclose its contents to any other person. Thank you."

------=_NextPart_000_018F_01CA0498.F31EC2E0
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D=20
"urn:schemas-microsoft-com:vml" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word" xmlns:x =3D=20
"urn:schemas-microsoft-com:office:excel" xmlns:p =3D=20
"urn:schemas-microsoft-com:office:powerpoint" xmlns:a =3D=20
"urn:schemas-microsoft-com:office:access" xmlns:dt =3D=20
"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s =3D=20
"uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs =3D=20
"urn:schemas-microsoft-com:rowset" xmlns:z =3D "#RowsetSchema" xmlns:b =3D=
=20
"urn:schemas-microsoft-com:office:publisher" xmlns:ss =3D=20
"urn:schemas-microsoft-com:office:spreadsheet" xmlns:c =3D=20
"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns:odc =3D=20
"urn:schemas-microsoft-com:office:odc" xmlns:oa =3D=20
"urn:schemas-microsoft-com:office:activation" xmlns:html =3D=20
"http://www.w3.org/TR/REC-html40" xmlns:q =3D=20
"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc =3D=20
"http://microsoft.com/officenet/conferencing" XMLNS:D =3D "DAV:" XMLNS:Repl=
 =3D=20
"http://schemas.microsoft.com/repl/" xmlns:mt =3D=20
"http://schemas.microsoft.com/sharepoint/soap/meetings/" xmlns:x2 =3D=20
"http://schemas.microsoft.com/office/excel/2003/xml" xmlns:ppda =3D=20
"http://www.passport.com/NameSpace.xsd" xmlns:ois =3D=20
"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir =3D=20
"http://schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds =3D=20
"http://www.w3.org/2000/09/xmldsig#" xmlns:dsp =3D=20
"http://schemas.microsoft.com/sharepoint/dsp" xmlns:udc =3D=20
"http://schemas.microsoft.com/data/udc" xmlns:xsd =3D=20
"http://www.w3.org/2001/XMLSchema" xmlns:sub =3D=20
"http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/" xmlns:ec =3D=
=20
"http://www.w3.org/2001/04/xmlenc#" xmlns:sp =3D=20
"http://schemas.microsoft.com/sharepoint/" xmlns:sps =3D=20
"http://schemas.microsoft.com/sharepoint/soap/" xmlns:xsi =3D=20
"http://www.w3.org/2001/XMLSchema-instance" xmlns:udcs =3D=20
"http://schemas.microsoft.com/data/udc/soap" xmlns:udcxf =3D=20
"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udcp2p =3D=20
"http://schemas.microsoft.com/data/udc/parttopart" xmlns:st =3D "=01" xmlns=
:st1 =3D=20
"urn:schemas-microsoft-com:office:smarttags"><HEAD>
<META content=3D"text/html; charset=3Diso-8859-1" http-equiv=3DContent-Type>
<META name=3DGENERATOR content=3D"MSHTML 8.00.6001.18372"><o:SmartTagType=
=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"=20
name=3D"City"></o:SmartTagType><o:SmartTagType=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"=20
name=3D"place"></o:SmartTagType><!--[if !mso]>
<STYLE>st1\:* {
	BEHAVIOR: url(#default#ieooui)
}
</STYLE>
<![endif]-->
<STYLE>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Times;
	panose-1:2 2 6 3 5 4 5 2 3 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:Arial;
	color:windowtext;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</STYLE>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]--></HEAD>
<BODY lang=3DEN-US link=3Dblue bgColor=3D#ffffff vLink=3Dpurple>
<DIV><FONT size=3D2 face=3DArial>Since the zero of&nbsp;next header&nbsp;va=
lue is=20
used for HOPOPT already, maybe applying a new value for this intention is b=
etter=20
to avoid the confliction.</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2 face=3DArial>Regards</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial>Qiu Ying</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
<BLOCKQUOTE=20
style=3D"BORDER-LEFT: #000000 2px solid; PADDING-LEFT: 5px; PADDING-RIGHT: =
0px; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px"=20
dir=3Dltr>
  <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV>
  <DIV=20
  style=3D"FONT: 10pt arial; BACKGROUND: #e4e4e4; font-color: black"><B>Fro=
m:</B>=20
  <A title=3Dqiuying@i2r.a-star.edu.sg href=3D"mailto:qiuying@i2r.a-star.ed=
u.sg">QIU=20
  Ying</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A title=3Dyaronf@checkpoint.c=
om=20
  href=3D"mailto:yaronf@checkpoint.com">Yaron Sheffer</A> ; <A=20
  title=3Dipsec@ietf.org href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A> =
</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Tuesday, July 14, 2009 3:30=
=20
PM</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> Re: [IPsec] WG Last Call:=
=20
  draft-ietf-ipsecme-traffic-visibility-05</DIV>
  <DIV><BR></DIV>
  <DIV><FONT size=3D2 face=3DArial>Regarding the Next Header in section 2, =
what will=20
  be happened if the value of Next Header is zero (i.e. IPv6 Hop-by-Hop opt=
ion)=20
  and the packet is not encrypted?</FONT></DIV>
  <DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
  <DIV><FONT size=3D2 face=3DArial>Regards</FONT></DIV>
  <DIV><FONT size=3D2 face=3DArial>Qiu Ying</FONT></DIV>
  <DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
  <BLOCKQUOTE=20
  style=3D"BORDER-LEFT: #000000 2px solid; PADDING-LEFT: 5px; PADDING-RIGHT=
: 0px; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px">
    <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV>
    <DIV=20
    style=3D"FONT: 10pt arial; BACKGROUND: #e4e4e4; font-color: black"><B>F=
rom:</B>=20
    <A title=3Dyaronf@checkpoint.com href=3D"mailto:yaronf@checkpoint.com">=
Yaron=20
    Sheffer</A> </DIV>
    <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A title=3Dipsec@ietf.org=20
    href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A> </DIV>
    <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Sunday, July 05, 2009 3:48=
=20
    AM</DIV>
    <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> [IPsec] WG Last Call:=
=20
    draft-ietf-ipsecme-traffic-visibility-05</DIV>
    <DIV><BR></DIV>
    <DIV class=3DSection1>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">This is the beginning of =
a=20
    two-week WG Last Call, which will end July 18. The target status for th=
is=20
    document is Proposed Standard. The current document is at <A=20
    href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibilit=
y-05">http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05</=
A>.<o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p></SPAN><=
/FONT></P>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">If you have not read the=
=20
    document before now, please do so. Having fresh eyes on the document of=
ten=20
    brings up important issues. If you HAVE read it before, please note tha=
t=20
    there have been several revisions since <st1:City w:st=3D"on"><st1:plac=
e=20
    w:st=3D"on">San Francisco</st1:place></st1:City>, so you might want to =
read it=20
    again (plus it=92s a short document). Send any comments to the list, ev=
en if=20
    they are as simple as "I read it and it seems=20
    fine".<o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p></SPAN><=
/FONT></P>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Please clearly indicate t=
he=20
    position of any issue in the Internet Draft, and if possible provide=20
    alternative text. Please also indicate the nature or severity of the er=
ror=20
    or correction, e.g. major technical, minor technical, nit, so that we c=
an=20
    quickly judge the extent of problems with the=20
    document.<o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p></SPAN><=
/FONT></P>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Thanks,<o:p></o:p></SPAN>=
</FONT></P>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
    Yaron</SPAN></FONT><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p></o:p></SPAN></FONT>=
</P></DIV>
    <P>
    <HR>

    <P></P>_______________________________________________<BR>IPsec mailing=
=20
    list<BR>IPsec@ietf.org<BR>https://www.ietf.org/mailman/listinfo/ipsec<B=
R></BLOCKQUOTE></BLOCKQUOTE>
<DIV>
Institute for Infocomm Research disclaimer:  &quot;This email is confidenti=
al and may be privileged. If you are not the intended recipient, please del=
ete it and notify us immediately. Please do not copy or use it for any purp=
ose, or disclose its contents to any other person. Thank you.&quot;<BR>
</DIV></BODY></HTML>

------=_NextPart_000_018F_01CA0498.F31EC2E0--


From ken.grewal@intel.com  Tue Jul 14 10:34:24 2009
Return-Path: <ken.grewal@intel.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 694473A6A07 for <ipsec@core3.amsl.com>; Tue, 14 Jul 2009 10:34:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A5wX9BIg9iEG for <ipsec@core3.amsl.com>; Tue, 14 Jul 2009 10:34:18 -0700 (PDT)
Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by core3.amsl.com (Postfix) with ESMTP id 36E0328C389 for <ipsec@ietf.org>; Tue, 14 Jul 2009 10:34:06 -0700 (PDT)
Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga101.fm.intel.com with ESMTP; 14 Jul 2009 10:16:42 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="4.42,398,1243839600";  d="scan'208,217";a="474737844"
Received: from rrsmsx602.amr.corp.intel.com ([10.31.0.33]) by fmsmga002.fm.intel.com with ESMTP; 14 Jul 2009 10:25:09 -0700
Received: from rrsmsx505.amr.corp.intel.com ([10.31.0.36]) by rrsmsx602.amr.corp.intel.com ([10.31.0.33]) with mapi; Tue, 14 Jul 2009 11:31:46 -0600
From: "Grewal, Ken" <ken.grewal@intel.com>
To: QIU Ying <qiuying@i2r.a-star.edu.sg>, Yaron Sheffer <yaronf@checkpoint.com>, "ipsec@ietf.org" <ipsec@ietf.org>
Date: Tue, 14 Jul 2009 11:31:19 -0600
Thread-Topic: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
Thread-Index: AcoEYD47d9p+Sj4+QKuf3PsAhh4QwQARxHtw
Message-ID: <C49B4B6450D9AA48AB99694D2EB0A4832C2438DC@rrsmsx505.amr.corp.intel.com>
References: <2E5D69B62A99425C894AA9B258004990@t3400>
In-Reply-To: <2E5D69B62A99425C894AA9B258004990@t3400>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C49B4B6450D9AA48AB99694D2EB0A4832C2438DCrrsmsx505amrcor_"
MIME-Version: 1.0
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Jul 2009 17:34:24 -0000

--_000_C49B4B6450D9AA48AB99694D2EB0A4832C2438DCrrsmsx505amrcor_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Thanks Qiu Ying - great observation.

We had originally proposed using a bit from the WESP flags (integrity only)=
 for differentiating between ESP-encrypted and ESP-NULL traffic, but change=
d this to using a value of zero in the next header for efficient encoding, =
although this is overloading the meaning of next header.
With your observation, the current definition is not practical so we have t=
he following options:


 1.  Revert back to using a bit in the flags to differentiate between encry=
pted / NULL traffic.
 2.  Allocate a new protocol value for the next header field to indicate en=
crypted data, which seems like an overkill.

As we are already asking for a new protocol value for WESP, option 1 seems =
to be the better choice.

Other opinions?

Thanks,
- Ken

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Q=
IU Ying
Sent: Tuesday, July 14, 2009 12:37 AM
To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Since the zero of next header value is used for HOPOPT already, maybe apply=
ing a new value for this intention is better to avoid the confliction.

Regards
Qiu Ying

----- Original Message -----
From: QIU Ying<mailto:qiuying@i2r.a-star.edu.sg>
To: Yaron Sheffer<mailto:yaronf@checkpoint.com> ; ipsec@ietf.org<mailto:ips=
ec@ietf.org>
Sent: Tuesday, July 14, 2009 3:30 PM
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Regarding the Next Header in section 2, what will be happened if the value =
of Next Header is zero (i.e. IPv6 Hop-by-Hop option) and the packet is not =
encrypted?

Regards
Qiu Ying

----- Original Message -----
From: Yaron Sheffer<mailto:yaronf@checkpoint.com>
To: ipsec@ietf.org<mailto:ipsec@ietf.org>
Sent: Sunday, July 05, 2009 3:48 AM
Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

This is the beginning of a two-week WG Last Call, which will end July 18. T=
he target status for this document is Proposed Standard. The current docume=
nt is at http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-0=
5.

If you have not read the document before now, please do so. Having fresh ey=
es on the document often brings up important issues. If you HAVE read it be=
fore, please note that there have been several revisions since San Francisc=
o, so you might want to read it again (plus it's a short document). Send an=
y comments to the list, even if they are as simple as "I read it and it see=
ms fine".

Please clearly indicate the position of any issue in the Internet Draft, an=
d if possible provide alternative text. Please also indicate the nature or =
severity of the error or correction, e.g. major technical, minor technical,=
 nit, so that we can quickly judge the extent of problems with the document=
.

Thanks,
            Yaron
________________________________
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
Institute for Infocomm Research disclaimer: "This email is confidential and=
 may be privileged. If you are not the intended recipient, please delete it=
 and notify us immediately. Please do not copy or use it for any purpose, o=
r disclose its contents to any other person. Thank you."

--_000_C49B4B6450D9AA48AB99694D2EB0A4832C2438DCrrsmsx505amrcor_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:p=3D"urn:schemas-m=
icrosoft-com:office:powerpoint" xmlns:a=3D"urn:schemas-microsoft-com:office=
:access" xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s=3D"=
uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs=3D"urn:schemas-microsof=
t-com:rowset" xmlns:z=3D"#RowsetSchema" xmlns:b=3D"urn:schemas-microsoft-co=
m:office:publisher" xmlns:ss=3D"urn:schemas-microsoft-com:office:spreadshee=
t" xmlns:c=3D"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns=
:odc=3D"urn:schemas-microsoft-com:office:odc" xmlns:oa=3D"urn:schemas-micro=
soft-com:office:activation" xmlns:html=3D"http://www.w3.org/TR/REC-html40" =
xmlns:q=3D"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc=3D"http://m=
icrosoft.com/officenet/conferencing" xmlns:D=3D"DAV:" xmlns:Repl=3D"http://=
schemas.microsoft.com/repl/" xmlns:mt=3D"http://schemas.microsoft.com/share=
point/soap/meetings/" xmlns:x2=3D"http://schemas.microsoft.com/office/excel=
/2003/xml" xmlns:ppda=3D"http://www.passport.com/NameSpace.xsd" xmlns:ois=
=3D"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir=3D"http://=
schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds=3D"http://www.w3=
.org/2000/09/xmldsig#" xmlns:dsp=3D"http://schemas.microsoft.com/sharepoint=
/dsp" xmlns:udc=3D"http://schemas.microsoft.com/data/udc" xmlns:xsd=3D"http=
://www.w3.org/2001/XMLSchema" xmlns:sub=3D"http://schemas.microsoft.com/sha=
repoint/soap/2002/1/alerts/" xmlns:ec=3D"http://www.w3.org/2001/04/xmlenc#"=
 xmlns:sp=3D"http://schemas.microsoft.com/sharepoint/" xmlns:sps=3D"http://=
schemas.microsoft.com/sharepoint/soap/" xmlns:xsi=3D"http://www.w3.org/2001=
/XMLSchema-instance" xmlns:udcs=3D"http://schemas.microsoft.com/data/udc/so=
ap" xmlns:udcxf=3D"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udc=
p2p=3D"http://schemas.microsoft.com/data/udc/parttopart" xmlns:st=3D"&#1;" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" xmlns=3D"http://ww=
w.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" name=3D"City"/=
>
<o:SmartTagType namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place"/>
<o:SmartTagType namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PersonName"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:Arial;
	color:windowtext;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
 /* List Definitions */
 @list l0
	{mso-list-id:547450348;
	mso-list-type:hybrid;
	mso-list-template-ids:-2036706544 67698703 67698713 67698715 67698703 6769=
8713 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body bgcolor=3Dwhite lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Thanks Qiu Ying - great observation. <=
o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>We had originally proposed using a bit
from the WESP flags (integrity only) for differentiating between ESP-encryp=
ted
and ESP-NULL traffic, but changed this to using a value of zero in the next
header for efficient encoding, although this is overloading the meaning of =
next
header. <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>With your observation, the current
definition is not practical so we have the following options:<o:p></o:p></s=
pan></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<ol style=3D'margin-top:0in' start=3D1 type=3D1>
 <li class=3DMsoNormal style=3D'color:navy;mso-list:l0 level1 lfo1'><font s=
ize=3D2
     color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt;font-family:=
Arial'>Revert
     back to using a bit in the flags to differentiate between encrypted / =
NULL
     traffic.<o:p></o:p></span></font></li>
 <li class=3DMsoNormal style=3D'color:navy;mso-list:l0 level1 lfo1'><font s=
ize=3D2
     color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt;font-family:=
Arial'>Allocate
     a new protocol value for the next header field to indicate encrypted d=
ata,
     which seems like an overkill.<o:p></o:p></span></font></li>
</ol>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>As we are already asking for a new
protocol value for WESP, option 1 seems to be the better choice.<o:p></o:p>=
</span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Other opinions?<o:p></o:p></span></fon=
t></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt;color:navy'>Thanks, <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt;color:navy'>- Ken<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> <st1:Per=
sonName
w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonName> [mailto:<st1:PersonName
w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonName>] <b><span style=3D'font=
-weight:
bold'>On Behalf Of </span></b>QIU Ying<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Tuesday, July 14, 2009=
 12:37
AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> QIU Ying; Yaron Sheffer;=
 <st1:PersonName
w:st=3D"on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] WG Last=
 Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Since the zero of&nbsp;next header&nbsp;value is used fo=
r
HOPOPT already, maybe applying a new value for this intention is better to
avoid the confliction.</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Regards</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Qiu Ying</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid black 1.5pt;padding:0in =
0in 0in 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>----- Original Message ----- <o:p></o:p></span></font></=
p>

</div>

<div style=3D'font-color:black'>

<p class=3DMsoNormal style=3D'background:#E4E4E4'><b><font size=3D2 face=3D=
Arial><span
style=3D'font-size:10.0pt;font-family:Arial;font-weight:bold'>From:</span><=
/font></b><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <=
a
href=3D"mailto:qiuying@i2r.a-star.edu.sg" title=3D"qiuying@i2r.a-star.edu.s=
g">QIU
Ying</a> <o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>To:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:yaronf@checkpoint.com" title=3D"yaronf@checkpoint.com">Yaron=
 Sheffer</a>
; <a href=3D"mailto:ipsec@ietf.org" title=3D"ipsec@ietf.org">ipsec@ietf.org=
</a> <o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Sent:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> Tuesday, J=
uly 14,
2009 3:30 PM<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Subject:</span></font></b><font size=3D=
2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> Re: [IPsec=
] WG
Last Call: draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></span></font=
></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Regarding the Next Header in section 2, what will be
happened if the value of Next Header is zero (i.e. IPv6 Hop-by-Hop option) =
and
the packet is not encrypted?</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Regards</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Qiu Ying</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid black 1.5pt;padding:0in =
0in 0in 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>----- Original Message ----- <o:p></o:p></span></font></=
p>

</div>

<div style=3D'font-color:black'>

<p class=3DMsoNormal style=3D'background:#E4E4E4'><b><font size=3D2 face=3D=
Arial><span
style=3D'font-size:10.0pt;font-family:Arial;font-weight:bold'>From:</span><=
/font></b><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <=
a
href=3D"mailto:yaronf@checkpoint.com" title=3D"yaronf@checkpoint.com">Yaron=
 Sheffer</a>
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>To:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:ipsec@ietf.org" title=3D"ipsec@ietf.org">ipsec@ietf.org</a> =
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Sent:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> Sunday, Ju=
ly 05,
2009 3:48 AM<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Subject:</span></font></b><font size=3D=
2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> [IPsec] WG=
 Last
Call: draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>This is the beginning of a two-week WG Last Call, which =
will
end July 18. The target status for this document is Proposed Standard. The
current document is at <a
href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05=
">http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05</a>.<=
o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>If you have not read the document before now, please do =
so.
Having fresh eyes on the document often brings up important issues. If you =
HAVE
read it before, please note that there have been several revisions since <s=
t1:place
w:st=3D"on"><st1:City w:st=3D"on">San Francisco</st1:City></st1:place>, so =
you
might want to read it again (plus it&#8217;s a short document). Send any co=
mments to
the list, even if they are as simple as &quot;I read it and it seems
fine&quot;.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Please clearly indicate the position of any issue in the
Internet Draft, and if possible provide alternative text. Please also indic=
ate
the nature or severity of the error or correction, e.g. major technical, mi=
nor
technical, nit, so that we can quickly judge the extent of problems with th=
e
document.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Thanks,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;
Yaron<o:p></o:p></span></font></p>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>_______________________________________________<br>
IPsec mailing list<br>
IPsec@ietf.org<br>
https://www.ietf.org/mailman/listinfo/ipsec<o:p></o:p></span></font></p>

</blockquote>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Institute for Infocomm Research disclaimer: &quot;This email is
confidential and may be privileged. If you are not the intended recipient,
please delete it and notify us immediately. Please do not copy or use it fo=
r
any purpose, or disclose its contents to any other person. Thank you.&quot;=
<o:p></o:p></span></font></p>

</div>

</div>

</div>

</body>

</html>

--_000_C49B4B6450D9AA48AB99694D2EB0A4832C2438DCrrsmsx505amrcor_--

From root@core3.amsl.com  Tue Jul 14 15:45:01 2009
Return-Path: <root@core3.amsl.com>
X-Original-To: ipsec@ietf.org
Delivered-To: ipsec@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 0) id 957103A689F; Tue, 14 Jul 2009 15:45:01 -0700 (PDT)
From: Internet-Drafts@ietf.org
To: i-d-announce@ietf.org
Content-Type: Multipart/Mixed; Boundary="NextPart"
Mime-Version: 1.0
Message-Id: <20090714224501.957103A689F@core3.amsl.com>
Date: Tue, 14 Jul 2009 15:45:01 -0700 (PDT)
Cc: ipsec@ietf.org
Subject: [IPsec] I-D ACTION:draft-ietf-ipsecme-roadmap-03.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Jul 2009 22:45:01 -0000

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts 
directories.
This draft is a work item of the IP Security Maintenance and Extensions Working Group of the IETF.

	Title		: IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap
	Author(s)	: S. Frankel, S. Krishnan
	Filename	: draft-ietf-ipsecme-roadmap-03.txt
	Pages		: 62
	Date		: 2009-7-14
	
Over the past few years, the number of RFCs that define and use IPsec
   and IKE has greatly proliferated.  This is complicated by the fact
   that these RFCs originate from numerous IETF working groups: the
   original IPsec WG, its various spin-offs, and other WGs that use
   IPsec and/or IKE to protect their protocols' traffic.

   This document is a snapshot of IPsec- and IKE-related RFCs.  It
   includes a brief description of each RFC, along with background
   information explaining the motivation and context of IPsec's
   outgrowths and extensions.  It obsoletes the previous IPsec Document
   Roadmap [RFC2411].

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-roadmap-03.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Message/External-body;
	name="draft-ietf-ipsecme-roadmap-03.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2009-7-14153219.I-D@ietf.org>


--NextPart--


From qiuying@i2r.a-star.edu.sg  Tue Jul 14 19:56:59 2009
Return-Path: <qiuying@i2r.a-star.edu.sg>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3C78B3A691B for <ipsec@core3.amsl.com>; Tue, 14 Jul 2009 19:56:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.511
X-Spam-Level: 
X-Spam-Status: No, score=-1.511 tagged_above=-999 required=5 tests=[AWL=1.087,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HF2LGVnhvQxt for <ipsec@core3.amsl.com>; Tue, 14 Jul 2009 19:56:57 -0700 (PDT)
Received: from gw2.scei.a-star.edu.sg (gw2.scei.a-star.edu.sg [192.122.140.11]) by core3.amsl.com (Postfix) with ESMTP id C3FFC3A68B9 for <ipsec@ietf.org>; Tue, 14 Jul 2009 19:56:56 -0700 (PDT)
Received: from mailfe01.teak.local.net ([10.217.253.173]) by gw2.scei.a-star.edu.sg (8.14.1/8.14.1) with ESMTP id n6F2iRns008609;  Tue, 14 Jul 2009 19:44:27 -0700
Received: from t3400 ([10.217.141.123]) by mailfe01.teak.local.net with Microsoft SMTPSVC(6.0.3790.3959); Wed, 15 Jul 2009 10:46:03 +0800
Message-ID: <E12B577D22E64DE1806D838CDC751259@t3400>
From: "QIU Ying" <qiuying@i2r.a-star.edu.sg>
To: "Grewal, Ken" <ken.grewal@intel.com>, "Yaron Sheffer" <yaronf@checkpoint.com>, <ipsec@ietf.org>
References: <2E5D69B62A99425C894AA9B258004990@t3400> <C49B4B6450D9AA48AB99694D2EB0A4832C2438DC@rrsmsx505.amr.corp.intel.com>
Date: Wed, 15 Jul 2009 10:42:03 +0800
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_021E_01CA0538.E3C6E250"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.5512
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579
X-OriginalArrivalTime: 15 Jul 2009 02:46:03.0872 (UTC) FILETIME=[6522B600:01CA04F6]
X-Proofpoint-Virus-Version: vendor=fsecure engine=1.12.8161:2.4.5, 1.2.40, 4.0.166 definitions=2009-07-15_03:2009-07-03, 2009-07-14, 2009-07-14 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 ipscore=0 phishscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx engine=5.0.0-0811170000 definitions=main-0907140202
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jul 2009 02:56:59 -0000

This is a multi-part message in MIME format.

------=_NextPart_000_021E_01CA0538.E3C6E250
Content-Type: text/plain;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi, Ken

Agree that Option 1 is better as it applies lesser new IANA numbers. But in=
 this case, it seems redundancy to copy the value of Next Header field in t=
he ESP trailer to here. How about simply setting the value as ESP here? I t=
hink it more meet the original concept of Next Header.

Maybe I am missing something

Regards
Qiu Ying

  ----- Original Message -----=20
  From: Grewal, Ken=20
  To: QIU Ying ; Yaron Sheffer ; ipsec@ietf.org=20
  Sent: Wednesday, July 15, 2009 1:31 AM
  Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-=
05


  Thanks Qiu Ying - great observation.=20

=20=20=20

  We had originally proposed using a bit from the WESP flags (integrity onl=
y) for differentiating between ESP-encrypted and ESP-NULL traffic, but chan=
ged this to using a value of zero in the next header for efficient encoding=
, although this is overloading the meaning of next header.=20

  With your observation, the current definition is not practical so we have=
 the following options:

=20=20=20

    1.. Revert back to using a bit in the flags to differentiate between en=
crypted / NULL traffic.=20
    2.. Allocate a new protocol value for the next header field to indicate=
 encrypted data, which seems like an overkill.=20
=20=20=20

  As we are already asking for a new protocol value for WESP, option 1 seem=
s to be the better choice.

=20=20=20

  Other opinions?

=20=20=20

  Thanks,=20

  - Ken

=20=20=20


---------------------------------------------------------------------------=
---

  From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of=
 QIU Ying
  Sent: Tuesday, July 14, 2009 12:37 AM
  To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
  Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-=
05

=20=20=20

  Since the zero of next header value is used for HOPOPT already, maybe app=
lying a new value for this intention is better to avoid the confliction.

=20=20=20

  Regards

  Qiu Ying

=20=20=20

    ----- Original Message -----=20

    From: QIU Ying=20

    To: Yaron Sheffer ; ipsec@ietf.org=20

    Sent: Tuesday, July 14, 2009 3:30 PM

    Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibilit=
y-05

=20=20=20=20=20

    Regarding the Next Header in section 2, what will be happened if the va=
lue of Next Header is zero (i.e. IPv6 Hop-by-Hop option) and the packet is =
not encrypted?

=20=20=20=20=20

    Regards

    Qiu Ying

=20=20=20=20=20

      ----- Original Message -----=20

      From: Yaron Sheffer=20

      To: ipsec@ietf.org=20

      Sent: Sunday, July 05, 2009 3:48 AM

      Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-=
05

=20=20=20=20=20=20=20

      This is the beginning of a two-week WG Last Call, which will end July=
 18. The target status for this document is Proposed Standard. The current =
document is at http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibi=
lity-05.

=20=20=20=20=20=20=20

      If you have not read the document before now, please do so. Having fr=
esh eyes on the document often brings up important issues. If you HAVE read=
 it before, please note that there have been several revisions since San Fr=
ancisco, so you might want to read it again (plus it's a short document). S=
end any comments to the list, even if they are as simple as "I read it and =
it seems fine".

=20=20=20=20=20=20=20

      Please clearly indicate the position of any issue in the Internet Dra=
ft, and if possible provide alternative text. Please also indicate the natu=
re or severity of the error or correction, e.g. major technical, minor tech=
nical, nit, so that we can quickly judge the extent of problems with the do=
cument.

=20=20=20=20=20=20=20

      Thanks,

                  Yaron


--------------------------------------------------------------------------

      _______________________________________________
      IPsec mailing list
      IPsec@ietf.org
      https://www.ietf.org/mailman/listinfo/ipsec

  Institute for Infocomm Research disclaimer: "This email is confidential a=
nd may be privileged. If you are not the intended recipient, please delete =
it and notify us immediately. Please do not copy or use it for any purpose,=
 or disclose its contents to any other person. Thank you."

Institute for Infocomm Research disclaimer:  "This email is confidential an=
d may be privileged. If you are not the intended recipient, please delete i=
t and notify us immediately. Please do not copy or use it for any purpose, =
or disclose its contents to any other person. Thank you."

------=_NextPart_000_021E_01CA0538.E3C6E250
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D=20
"urn:schemas-microsoft-com:vml" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word" xmlns:x =3D=20
"urn:schemas-microsoft-com:office:excel" xmlns:p =3D=20
"urn:schemas-microsoft-com:office:powerpoint" xmlns:a =3D=20
"urn:schemas-microsoft-com:office:access" xmlns:dt =3D=20
"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s =3D=20
"uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs =3D=20
"urn:schemas-microsoft-com:rowset" xmlns:z =3D "#RowsetSchema" xmlns:b =3D=
=20
"urn:schemas-microsoft-com:office:publisher" xmlns:ss =3D=20
"urn:schemas-microsoft-com:office:spreadsheet" xmlns:c =3D=20
"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns:odc =3D=20
"urn:schemas-microsoft-com:office:odc" xmlns:oa =3D=20
"urn:schemas-microsoft-com:office:activation" xmlns:html =3D=20
"http://www.w3.org/TR/REC-html40" xmlns:q =3D=20
"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc =3D=20
"http://microsoft.com/officenet/conferencing" XMLNS:D =3D "DAV:" XMLNS:Repl=
 =3D=20
"http://schemas.microsoft.com/repl/" xmlns:mt =3D=20
"http://schemas.microsoft.com/sharepoint/soap/meetings/" xmlns:x2 =3D=20
"http://schemas.microsoft.com/office/excel/2003/xml" xmlns:ppda =3D=20
"http://www.passport.com/NameSpace.xsd" xmlns:ois =3D=20
"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir =3D=20
"http://schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds =3D=20
"http://www.w3.org/2000/09/xmldsig#" xmlns:dsp =3D=20
"http://schemas.microsoft.com/sharepoint/dsp" xmlns:udc =3D=20
"http://schemas.microsoft.com/data/udc" xmlns:xsd =3D=20
"http://www.w3.org/2001/XMLSchema" xmlns:sub =3D=20
"http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/" xmlns:ec =3D=
=20
"http://www.w3.org/2001/04/xmlenc#" xmlns:sp =3D=20
"http://schemas.microsoft.com/sharepoint/" xmlns:sps =3D=20
"http://schemas.microsoft.com/sharepoint/soap/" xmlns:xsi =3D=20
"http://www.w3.org/2001/XMLSchema-instance" xmlns:udcs =3D=20
"http://schemas.microsoft.com/data/udc/soap" xmlns:udcxf =3D=20
"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udcp2p =3D=20
"http://schemas.microsoft.com/data/udc/parttopart" xmlns:st =3D "=01" xmlns=
:st1 =3D=20
"urn:schemas-microsoft-com:office:smarttags"><HEAD>
<META content=3D"text/html; charset=3Diso-8859-1" http-equiv=3DContent-Type>
<META name=3DGENERATOR content=3D"MSHTML 8.00.6001.18372"><!--[if !mso]>
<STYLE>v\:* {
	BEHAVIOR: url(#default#VML)
}
o\:* {
	BEHAVIOR: url(#default#VML)
}
w\:* {
	BEHAVIOR: url(#default#VML)
}
.shape {
	BEHAVIOR: url(#default#VML)
}
</STYLE>
<![endif]--><o:SmartTagType name=3D"City"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTagTyp=
e><o:SmartTagType=20
name=3D"place"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTagTyp=
e><o:SmartTagType=20
name=3D"PersonName"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTagTyp=
e><!--[if !mso]>
<STYLE>
st1\:*{behavior:url(#default#ieooui) }
</STYLE>
<![endif]-->
<STYLE>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:Arial;
	color:windowtext;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
 /* List Definitions */
 @list l0
	{mso-list-id:547450348;
	mso-list-type:hybrid;
	mso-list-template-ids:-2036706544 67698703 67698713 67698715 67698703 6769=
8713 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
-->
</STYLE>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]--></HEAD>
<BODY lang=3DEN-US link=3Dblue bgColor=3Dwhite vLink=3Dpurple>
<DIV><FONT size=3D2 face=3DArial>Hi, Ken</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2 face=3DArial>Agree that&nbsp;Option 1 is better as it a=
pplies=20
lesser new IANA numbers. But in this case, it seems&nbsp;redundancy to copy=
 the=20
value of Next Header field in the ESP trailer to here. How about=20
simply&nbsp;setting the value as ESP here? I think it more meet the origina=
l=20
concept of Next Header.</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2 face=3DArial>Maybe I am missing something</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2 face=3DArial>Regards</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial>Qiu Ying</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
<BLOCKQUOTE=20
style=3D"BORDER-LEFT: #000000 2px solid; PADDING-LEFT: 5px; PADDING-RIGHT: =
0px; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px"=20
dir=3Dltr>
  <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV>
  <DIV=20
  style=3D"FONT: 10pt arial; BACKGROUND: #e4e4e4; font-color: black"><B>Fro=
m:</B>=20
  <A title=3Dken.grewal@intel.com href=3D"mailto:ken.grewal@intel.com">Grew=
al,=20
  Ken</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A title=3Dqiuying@i2r.a-star.=
edu.sg=20
  href=3D"mailto:qiuying@i2r.a-star.edu.sg">QIU Ying</A> ; <A=20
  title=3Dyaronf@checkpoint.com href=3D"mailto:yaronf@checkpoint.com">Yaron=
=20
  Sheffer</A> ; <A title=3Dipsec@ietf.org=20
  href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Wednesday, July 15, 2009 1:3=
1=20
  AM</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> RE: [IPsec] WG Last Call:=
=20
  draft-ietf-ipsecme-traffic-visibility-05</DIV>
  <DIV><FONT size=3D2 face=3DArial></FONT><FONT size=3D2 face=3DArial></FON=
T><BR></DIV>
  <DIV class=3DSection1>
  <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">Thanks Qiu Yin=
g -=20
  great observation. <o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp;</o=
:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">We had origina=
lly=20
  proposed using a bit from the WESP flags (integrity only) for differentia=
ting=20
  between ESP-encrypted and ESP-NULL traffic, but changed this to using a v=
alue=20
  of zero in the next header for efficient encoding, although this is=20
  overloading the meaning of next header. <o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">With your=20
  observation, the current definition is not practical so we have the follo=
wing=20
  options:<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp;</o=
:p></SPAN></FONT></P>
  <OL style=3D"MARGIN-TOP: 0in" type=3D1>
    <LI style=3D"COLOR: navy; mso-list: l0 level1 lfo1" class=3DMsoNormal><=
FONT=20
    color=3Dnavy size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Revert back to using a bi=
t in=20
    the flags to differentiate between encrypted / NULL=20
    traffic.<o:p></o:p></SPAN></FONT>=20
    <LI style=3D"COLOR: navy; mso-list: l0 level1 lfo1" class=3DMsoNormal><=
FONT=20
    color=3Dnavy size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Allocate a new protocol v=
alue=20
    for the next header field to indicate encrypted data, which seems like =
an=20
    overkill.<o:p></o:p></SPAN></FONT> </LI></OL>
  <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp;</o=
:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">As we are alre=
ady=20
  asking for a new protocol value for WESP, option 1 seems to be the better=
=20
  choice.<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp;</o=
:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">Other=20
  opinions?<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp;</o=
:p></SPAN></FONT></P>
  <DIV>
  <P class=3DMsoNormal><FONT color=3Dnavy size=3D3 face=3D"Times New Roman"=
><SPAN=20
  style=3D"COLOR: navy; FONT-SIZE: 12pt">Thanks, <o:p></o:p></SPAN></FONT><=
/P>
  <P class=3DMsoNormal><FONT color=3Dnavy size=3D3 face=3D"Times New Roman"=
><SPAN=20
  style=3D"COLOR: navy; FONT-SIZE: 12pt">- Ken<o:p></o:p></SPAN></FONT></P>=
</DIV>
  <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp;</o=
:p></SPAN></FONT></P>
  <DIV=20
  style=3D"BORDER-BOTTOM: medium none; BORDER-LEFT: blue 1.5pt solid; PADDI=
NG-BOTTOM: 0in; PADDING-LEFT: 4pt; PADDING-RIGHT: 0in; BORDER-TOP: medium n=
one; BORDER-RIGHT: medium none; PADDING-TOP: 0in">
  <DIV>
  <DIV style=3D"TEXT-ALIGN: center" class=3DMsoNormal align=3Dcenter><FONT =
size=3D3=20
  face=3D"Times New Roman"><SPAN style=3D"FONT-SIZE: 12pt">
  <HR tabIndex=3D-1 align=3Dcenter SIZE=3D2 width=3D"100%">
  </SPAN></FONT></DIV>
  <P class=3DMsoNormal><B><FONT size=3D2 face=3DTahoma><SPAN=20
  style=3D"FONT-FAMILY: Tahoma; FONT-SIZE: 10pt; FONT-WEIGHT: bold">From:</=
SPAN></FONT></B><FONT=20
  size=3D2 face=3DTahoma><SPAN style=3D"FONT-FAMILY: Tahoma; FONT-SIZE: 10p=
t">=20
  <st1:PersonName w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonName>=20
  [mailto:<st1:PersonName w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonNam=
e>]=20
  <B><SPAN style=3D"FONT-WEIGHT: bold">On Behalf Of </SPAN></B>QIU=20
  Ying<BR><B><SPAN style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Tuesday, Ju=
ly 14,=20
  2009 12:37 AM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> QIU =
Ying;=20
  Yaron Sheffer; <st1:PersonName=20
  w:st=3D"on">ipsec@ietf.org</st1:PersonName><BR><B><SPAN=20
  style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [IPsec] WG Last Call:=
=20
  draft-ietf-ipsecme-traffic-visibility-05</SPAN></FONT><o:p></o:p></P></DI=
V>
  <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
  style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <DIV>
  <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Since the zero of&nbsp;next=
=20
  header&nbsp;value is used for HOPOPT already, maybe applying a new value =
for=20
  this intention is better to avoid the=20
  confliction.</SPAN></FONT><o:p></o:p></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
  style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Regards</SPAN></FONT><o:p><=
/o:p></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
  style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Qiu=20
  Ying</SPAN></FONT><o:p></o:p></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
  style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
  <BLOCKQUOTE=20
  style=3D"BORDER-BOTTOM: medium none; BORDER-LEFT: black 1.5pt solid; PADD=
ING-BOTTOM: 0in; MARGIN: 5pt 0in 5pt 3.75pt; PADDING-LEFT: 4pt; PADDING-RIG=
HT: 0in; BORDER-TOP: medium none; BORDER-RIGHT: medium none; PADDING-TOP: 0=
in">
    <DIV>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">----- Original Message --=
---=20
    <o:p></o:p></SPAN></FONT></P></DIV>
    <DIV style=3D"font-color: black">
    <P style=3D"BACKGROUND: #e4e4e4" class=3DMsoNormal><B><FONT size=3D2=20
    face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">From:<=
/SPAN></FONT></B><FONT=20
    size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10p=
t"> <A=20
    title=3Dqiuying@i2r.a-star.edu.sg href=3D"mailto:qiuying@i2r.a-star.edu=
.sg">QIU=20
    Ying</A> <o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">To:</S=
PAN></FONT></B><FONT=20
    size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10p=
t"> <A=20
    title=3Dyaronf@checkpoint.com href=3D"mailto:yaronf@checkpoint.com">Yar=
on=20
    Sheffer</A> ; <A title=3Dipsec@ietf.org=20
    href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A>=20
    <o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">Sent:<=
/SPAN></FONT></B><FONT=20
    size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10p=
t">=20
    Tuesday, July 14, 2009 3:30 PM<o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">Subjec=
t:</SPAN></FONT></B><FONT=20
    size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10p=
t"> Re:=20
    [IPsec] WG Last Call:=20
    draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FONT></P></=
DIV>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
    style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Regarding the Next Header=
 in=20
    section 2, what will be happened if the value of Next Header is zero (i=
.e.=20
    IPv6 Hop-by-Hop option) and the packet is not=20
    encrypted?</SPAN></FONT><o:p></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
    style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Regards</SPAN></FONT><o:p=
></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Qiu=20
    Ying</SPAN></FONT><o:p></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
    style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
    <BLOCKQUOTE=20
    style=3D"BORDER-BOTTOM: medium none; BORDER-LEFT: black 1.5pt solid; PA=
DDING-BOTTOM: 0in; MARGIN: 5pt 0in 5pt 3.75pt; PADDING-LEFT: 4pt; PADDING-R=
IGHT: 0in; BORDER-TOP: medium none; BORDER-RIGHT: medium none; PADDING-TOP:=
 0in">
      <DIV>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">----- Original Message =
-----=20
      <o:p></o:p></SPAN></FONT></P></DIV>
      <DIV style=3D"font-color: black">
      <P style=3D"BACKGROUND: #e4e4e4" class=3DMsoNormal><B><FONT size=3D2=
=20
      face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">From=
:</SPAN></FONT></B><FONT=20
      size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 1=
0pt"> <A=20
      title=3Dyaronf@checkpoint.com href=3D"mailto:yaronf@checkpoint.com">Y=
aron=20
      Sheffer</A> <o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">To:<=
/SPAN></FONT></B><FONT=20
      size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 1=
0pt"> <A=20
      title=3Dipsec@ietf.org href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org<=
/A>=20
      <o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">Sent=
:</SPAN></FONT></B><FONT=20
      size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 1=
0pt">=20
      Sunday, July 05, 2009 3:48 AM<o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">Subj=
ect:</SPAN></FONT></B><FONT=20
      size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 1=
0pt">=20
      [IPsec] WG Last Call:=20
      draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FONT></P>=
</DIV>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
      style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DIV>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">This is the beginning o=
f a=20
      two-week WG Last Call, which will end July 18. The target status for =
this=20
      document is Proposed Standard. The current document is at <A=20
      href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibil=
ity-05">http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05=
</A>.<o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p></SPAN=
></FONT></P>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">If you have not read th=
e=20
      document before now, please do so. Having fresh eyes on the document =
often=20
      brings up important issues. If you HAVE read it before, please note t=
hat=20
      there have been several revisions since <st1:place w:st=3D"on"><st1:C=
ity=20
      w:st=3D"on">San Francisco</st1:City></st1:place>, so you might want t=
o read=20
      it again (plus it=92s a short document). Send any comments to the lis=
t, even=20
      if they are as simple as "I read it and it seems=20
      fine".<o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p></SPAN=
></FONT></P>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Please clearly indicate=
 the=20
      position of any issue in the Internet Draft, and if possible provide=
=20
      alternative text. Please also indicate the nature or severity of the =
error=20
      or correction, e.g. major technical, minor technical, nit, so that we=
 can=20
      quickly judge the extent of problems with the=20
      document.<o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p></SPAN=
></FONT></P>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Thanks,<o:p></o:p></SPA=
N></FONT></P>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
      Yaron<o:p></o:p></SPAN></FONT></P>
      <DIV style=3D"TEXT-ALIGN: center" class=3DMsoNormal align=3Dcenter><F=
ONT size=3D3=20
      face=3D"Times New Roman"><SPAN style=3D"FONT-SIZE: 12pt">
      <HR align=3Dcenter SIZE=3D2 width=3D"100%">
      </SPAN></FONT></DIV>
      <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
      style=3D"FONT-SIZE: 12pt">___________________________________________=
____<BR>IPsec=20
      mailing=20
      list<BR>IPsec@ietf.org<BR>https://www.ietf.org/mailman/listinfo/ipsec=
<o:p></o:p></SPAN></FONT></P></BLOCKQUOTE></BLOCKQUOTE>
  <DIV>
  <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
  style=3D"FONT-SIZE: 12pt">Institute for Infocomm Research disclaimer: "Th=
is=20
  email is confidential and may be privileged. If you are not the intended=
=20
  recipient, please delete it and notify us immediately. Please do not copy=
 or=20
  use it for any purpose, or disclose its contents to any other person. Tha=
nk=20
  you."<o:p></o:p></SPAN></FONT></P></DIV></DIV></DIV></BLOCKQUOTE>
<DIV>
Institute for Infocomm Research disclaimer:  &quot;This email is confidenti=
al and may be privileged. If you are not the intended recipient, please del=
ete it and notify us immediately. Please do not copy or use it for any purp=
ose, or disclose its contents to any other person. Thank you.&quot;<BR>
</DIV></BODY></HTML>

------=_NextPart_000_021E_01CA0538.E3C6E250--


From ken.grewal@intel.com  Wed Jul 15 08:28:01 2009
Return-Path: <ken.grewal@intel.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E1E903A6993 for <ipsec@core3.amsl.com>; Wed, 15 Jul 2009 08:28:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MI8K7jECTV99 for <ipsec@core3.amsl.com>; Wed, 15 Jul 2009 08:27:53 -0700 (PDT)
Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by core3.amsl.com (Postfix) with ESMTP id 70CFB3A6CED for <ipsec@ietf.org>; Wed, 15 Jul 2009 08:27:53 -0700 (PDT)
Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga102.fm.intel.com with ESMTP; 15 Jul 2009 08:18:38 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="4.42,405,1243839600";  d="scan'208,217";a="708067145"
Received: from rrsmsx602.amr.corp.intel.com ([10.31.0.33]) by fmsmga001.fm.intel.com with ESMTP; 15 Jul 2009 08:30:37 -0700
Received: from rrsmsx505.amr.corp.intel.com ([10.31.0.36]) by rrsmsx602.amr.corp.intel.com ([10.31.0.33]) with mapi; Wed, 15 Jul 2009 09:27:20 -0600
From: "Grewal, Ken" <ken.grewal@intel.com>
To: QIU Ying <qiuying@i2r.a-star.edu.sg>, Yaron Sheffer <yaronf@checkpoint.com>, "ipsec@ietf.org" <ipsec@ietf.org>
Date: Wed, 15 Jul 2009 09:27:01 -0600
Thread-Topic: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
Thread-Index: AcoE9mMzRspYXvBER22PFG5Az3HTWQAaYrjw
Message-ID: <C49B4B6450D9AA48AB99694D2EB0A4832C24406A@rrsmsx505.amr.corp.intel.com>
References: <2E5D69B62A99425C894AA9B258004990@t3400> <C49B4B6450D9AA48AB99694D2EB0A4832C2438DC@rrsmsx505.amr.corp.intel.com> <E12B577D22E64DE1806D838CDC751259@t3400>
In-Reply-To: <E12B577D22E64DE1806D838CDC751259@t3400>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C49B4B6450D9AA48AB99694D2EB0A4832C24406Arrsmsx505amrcor_"
MIME-Version: 1.0
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jul 2009 15:28:02 -0000

--_000_C49B4B6450D9AA48AB99694D2EB0A4832C24406Arrsmsx505amrcor_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Qiu Ying,
Copying the value of the ESP next header to the WESP next header is useful =
for efficient HW parsing when using ESP-NULL.
You are correct that in the case of encrypted traffic, we can set this valu=
e to 'ESP', which could denote that the payload is encrypted.
Having said that, some people in the past have mentioned that it may be cle=
aner to have a dedicated bit to denote whether the payload is encrypted or =
using ESP-NULL.

Either way works, as long as there is a discrete, unambiguous way to denote=
 this.

Thanks,
- Ken

________________________________
From: QIU Ying [mailto:qiuying@i2r.a-star.edu.sg]
Sent: Tuesday, July 14, 2009 7:42 PM
To: Grewal, Ken; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Hi, Ken

Agree that Option 1 is better as it applies lesser new IANA numbers. But in=
 this case, it seems redundancy to copy the value of Next Header field in t=
he ESP trailer to here. How about simply setting the value as ESP here? I t=
hink it more meet the original concept of Next Header.

Maybe I am missing something

Regards
Qiu Ying

----- Original Message -----
From: Grewal, Ken<mailto:ken.grewal@intel.com>
To: QIU Ying<mailto:qiuying@i2r.a-star.edu.sg> ; Yaron Sheffer<mailto:yaron=
f@checkpoint.com> ; ipsec@ietf.org<mailto:ipsec@ietf.org>
Sent: Wednesday, July 15, 2009 1:31 AM
Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Thanks Qiu Ying - great observation.

We had originally proposed using a bit from the WESP flags (integrity only)=
 for differentiating between ESP-encrypted and ESP-NULL traffic, but change=
d this to using a value of zero in the next header for efficient encoding, =
although this is overloading the meaning of next header.
With your observation, the current definition is not practical so we have t=
he following options:


 1.  Revert back to using a bit in the flags to differentiate between encry=
pted / NULL traffic.
 2.  Allocate a new protocol value for the next header field to indicate en=
crypted data, which seems like an overkill.

As we are already asking for a new protocol value for WESP, option 1 seems =
to be the better choice.

Other opinions?

Thanks,
- Ken

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Q=
IU Ying
Sent: Tuesday, July 14, 2009 12:37 AM
To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Since the zero of next header value is used for HOPOPT already, maybe apply=
ing a new value for this intention is better to avoid the confliction.

Regards
Qiu Ying

----- Original Message -----
From: QIU Ying<mailto:qiuying@i2r.a-star.edu.sg>
To: Yaron Sheffer<mailto:yaronf@checkpoint.com> ; ipsec@ietf.org<mailto:ips=
ec@ietf.org>
Sent: Tuesday, July 14, 2009 3:30 PM
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Regarding the Next Header in section 2, what will be happened if the value =
of Next Header is zero (i.e. IPv6 Hop-by-Hop option) and the packet is not =
encrypted?

Regards
Qiu Ying

----- Original Message -----
From: Yaron Sheffer<mailto:yaronf@checkpoint.com>
To: ipsec@ietf.org<mailto:ipsec@ietf.org>
Sent: Sunday, July 05, 2009 3:48 AM
Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

This is the beginning of a two-week WG Last Call, which will end July 18. T=
he target status for this document is Proposed Standard. The current docume=
nt is at http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-0=
5.

If you have not read the document before now, please do so. Having fresh ey=
es on the document often brings up important issues. If you HAVE read it be=
fore, please note that there have been several revisions since San Francisc=
o, so you might want to read it again (plus it's a short document). Send an=
y comments to the list, even if they are as simple as "I read it and it see=
ms fine".

Please clearly indicate the position of any issue in the Internet Draft, an=
d if possible provide alternative text. Please also indicate the nature or =
severity of the error or correction, e.g. major technical, minor technical,=
 nit, so that we can quickly judge the extent of problems with the document=
.

Thanks,
            Yaron
________________________________
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
Institute for Infocomm Research disclaimer: "This email is confidential and=
 may be privileged. If you are not the intended recipient, please delete it=
 and notify us immediately. Please do not copy or use it for any purpose, o=
r disclose its contents to any other person. Thank you."
Institute for Infocomm Research disclaimer: "This email is confidential and=
 may be privileged. If you are not the intended recipient, please delete it=
 and notify us immediately. Please do not copy or use it for any purpose, o=
r disclose its contents to any other person. Thank you."

--_000_C49B4B6450D9AA48AB99694D2EB0A4832C24406Arrsmsx505amrcor_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:p=3D"urn:schemas-m=
icrosoft-com:office:powerpoint" xmlns:a=3D"urn:schemas-microsoft-com:office=
:access" xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s=3D"=
uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs=3D"urn:schemas-microsof=
t-com:rowset" xmlns:z=3D"#RowsetSchema" xmlns:b=3D"urn:schemas-microsoft-co=
m:office:publisher" xmlns:ss=3D"urn:schemas-microsoft-com:office:spreadshee=
t" xmlns:c=3D"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns=
:odc=3D"urn:schemas-microsoft-com:office:odc" xmlns:oa=3D"urn:schemas-micro=
soft-com:office:activation" xmlns:html=3D"http://www.w3.org/TR/REC-html40" =
xmlns:q=3D"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc=3D"http://m=
icrosoft.com/officenet/conferencing" xmlns:D=3D"DAV:" xmlns:Repl=3D"http://=
schemas.microsoft.com/repl/" xmlns:mt=3D"http://schemas.microsoft.com/share=
point/soap/meetings/" xmlns:x2=3D"http://schemas.microsoft.com/office/excel=
/2003/xml" xmlns:ppda=3D"http://www.passport.com/NameSpace.xsd" xmlns:ois=
=3D"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir=3D"http://=
schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds=3D"http://www.w3=
.org/2000/09/xmldsig#" xmlns:dsp=3D"http://schemas.microsoft.com/sharepoint=
/dsp" xmlns:udc=3D"http://schemas.microsoft.com/data/udc" xmlns:xsd=3D"http=
://www.w3.org/2001/XMLSchema" xmlns:sub=3D"http://schemas.microsoft.com/sha=
repoint/soap/2002/1/alerts/" xmlns:ec=3D"http://www.w3.org/2001/04/xmlenc#"=
 xmlns:sp=3D"http://schemas.microsoft.com/sharepoint/" xmlns:sps=3D"http://=
schemas.microsoft.com/sharepoint/soap/" xmlns:xsi=3D"http://www.w3.org/2001=
/XMLSchema-instance" xmlns:udcs=3D"http://schemas.microsoft.com/data/udc/so=
ap" xmlns:udcxf=3D"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udc=
p2p=3D"http://schemas.microsoft.com/data/udc/parttopart" xmlns:st=3D"&#1;" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" xmlns=3D"http://ww=
w.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" name=3D"City"/=
>
<o:SmartTagType namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place"/>
<o:SmartTagType namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PersonName"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman";}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:Arial;
	color:windowtext;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:Arial;
	color:navy;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
 /* List Definitions */
 @list l0
	{mso-list-id:520707701;
	mso-list-template-ids:-1415693858;}
@list l1
	{mso-list-id:547450348;
	mso-list-type:hybrid;
	mso-list-template-ids:-2036706544 67698703 67698713 67698715 67698703 6769=
8713 67698715 67698703 67698713 67698715;}
@list l1:level1
	{mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level2
	{mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level3
	{mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level4
	{mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level5
	{mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level6
	{mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level7
	{mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level8
	{mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level9
	{mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body bgcolor=3Dwhite lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Qiu Ying, <o:p></o:p></span></font></p=
>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Copying the value of the ESP next head=
er
to the WESP next header is useful for efficient HW parsing when using ESP-N=
ULL.
<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>You are correct that in the case of
encrypted traffic, we can set this value to &#8216;ESP&#8217;, which could
denote that the payload is encrypted. <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Having said that, some people in the p=
ast
have mentioned that it may be cleaner to have a dedicated bit to denote whe=
ther
the payload is encrypted or using ESP-NULL.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Either way works, as long as there is =
a
discrete, unambiguous way to denote this. &nbsp;<o:p></o:p></span></font></=
p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt;color:navy'>Thanks, <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt;color:navy'>- Ken<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> QIU Ying
[mailto:qiuying@i2r.a-star.edu.sg] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Tuesday, July 14, 2009=
 7:42
PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Grewal, Ken; Yaron Sheff=
er; <st1:PersonName
w:st=3D"on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] WG Last=
 Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Hi, Ken</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Agree that&nbsp;Option 1 is better as it applies lesser =
new
IANA numbers. But in this case, it seems&nbsp;redundancy to copy the value =
of
Next Header field in the ESP trailer to here. How about simply&nbsp;setting=
 the
value as ESP here? I think it more meet the original concept of Next Header=
.</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Maybe I am missing something</span></font><o:p></o:p></p=
>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Regards</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Qiu Ying</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid black 1.5pt;padding:0in =
0in 0in 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>----- Original Message ----- <o:p></o:p></span></font></=
p>

</div>

<div style=3D'font-color:black'>

<p class=3DMsoNormal style=3D'background:#E4E4E4'><b><font size=3D2 face=3D=
Arial><span
style=3D'font-size:10.0pt;font-family:Arial;font-weight:bold'>From:</span><=
/font></b><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <=
a
href=3D"mailto:ken.grewal@intel.com" title=3D"ken.grewal@intel.com">Grewal,=
 Ken</a>
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>To:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:qiuying@i2r.a-star.edu.sg" title=3D"qiuying@i2r.a-star.edu.s=
g">QIU
Ying</a> ; <a href=3D"mailto:yaronf@checkpoint.com" title=3D"yaronf@checkpo=
int.com">Yaron
Sheffer</a> ; <a href=3D"mailto:ipsec@ietf.org" title=3D"ipsec@ietf.org">ip=
sec@ietf.org</a>
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Sent:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> Wednesday,=
 July
15, 2009 1:31 AM<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Subject:</span></font></b><font size=3D=
2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> RE: [IPsec=
] WG
Last Call: draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></span></font=
></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Thanks Qiu Ying - great observation. <=
o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>We had originally proposed using a bit
from the WESP flags (integrity only) for differentiating between ESP-encryp=
ted
and ESP-NULL traffic, but changed this to using a value of zero in the next
header for efficient encoding, although this is overloading the meaning of =
next
header. <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>With your observation, the current
definition is not practical so we have the following options:<o:p></o:p></s=
pan></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<ol style=3D'margin-top:0in' start=3D1 type=3D1>
 <li class=3DMsoNormal style=3D'color:navy;mso-list:l1 level1 lfo3'><font s=
ize=3D2
     color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt;font-family:=
Arial'>Revert
     back to using a bit in the flags to differentiate between encrypted / =
NULL
     traffic.</span></font> <font size=3D2 face=3DArial><span style=3D'font=
-size:
     10.0pt;font-family:Arial'><o:p></o:p></span></font></li>
 <li class=3DMsoNormal style=3D'color:navy;mso-list:l1 level1 lfo3'><font s=
ize=3D2
     color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt;font-family:=
Arial'>Allocate
     a new protocol value for the next header field to indicate encrypted d=
ata,
     which seems like an overkill.</span></font> <font size=3D2 face=3DAria=
l><span
     style=3D'font-size:10.0pt;font-family:Arial'><o:p></o:p></span></font>=
</li>
</ol>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>As we are already asking for a new
protocol value for WESP, option 1 seems to be the better choice.<o:p></o:p>=
</span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Other opinions?<o:p></o:p></span></fon=
t></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt;color:navy'>Thanks, <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt;color:navy'>- Ken<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> <st1:Per=
sonName
w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonName> [mailto:<st1:PersonName
w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonName>] <b><span style=3D'font=
-weight:
bold'>On Behalf Of </span></b>QIU Ying<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Tuesday, July 14, 2009=
 12:37
AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> QIU Ying; Yaron Sheffer;=
 <st1:PersonName
w:st=3D"on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] WG Last=
 Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Since the zero of&nbsp;next header&nbsp;value is used fo=
r
HOPOPT already, maybe applying a new value for this intention is better to
avoid the confliction.</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Regards</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Qiu Ying</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid black 1.5pt;padding:0in =
0in 0in 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>----- Original Message ----- <o:p></o:p></span></font></=
p>

</div>

<div style=3D'font-color:black'>

<p class=3DMsoNormal style=3D'background:#E4E4E4'><b><font size=3D2 face=3D=
Arial><span
style=3D'font-size:10.0pt;font-family:Arial;font-weight:bold'>From:</span><=
/font></b><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <=
a
href=3D"mailto:qiuying@i2r.a-star.edu.sg" title=3D"qiuying@i2r.a-star.edu.s=
g">QIU
Ying</a> <o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>To:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:yaronf@checkpoint.com" title=3D"yaronf@checkpoint.com">Yaron=
 Sheffer</a>
; <a href=3D"mailto:ipsec@ietf.org" title=3D"ipsec@ietf.org">ipsec@ietf.org=
</a> <o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Sent:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> Tuesday, J=
uly 14,
2009 3:30 PM<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Subject:</span></font></b><font size=3D=
2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> Re: [IPsec=
] WG
Last Call: draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></span></font=
></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Regarding the Next Header in section 2, what will be
happened if the value of Next Header is zero (i.e. IPv6 Hop-by-Hop option) =
and
the packet is not encrypted?</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Regards</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Qiu Ying</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid black 1.5pt;padding:0in =
0in 0in 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>----- Original Message ----- <o:p></o:p></span></font></=
p>

</div>

<div style=3D'font-color:black'>

<p class=3DMsoNormal style=3D'background:#E4E4E4'><b><font size=3D2 face=3D=
Arial><span
style=3D'font-size:10.0pt;font-family:Arial;font-weight:bold'>From:</span><=
/font></b><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <=
a
href=3D"mailto:yaronf@checkpoint.com" title=3D"yaronf@checkpoint.com">Yaron=
 Sheffer</a>
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>To:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:ipsec@ietf.org" title=3D"ipsec@ietf.org">ipsec@ietf.org</a> =
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Sent:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> Sunday, Ju=
ly 05,
2009 3:48 AM<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Subject:</span></font></b><font size=3D=
2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> [IPsec] WG=
 Last
Call: draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>This is the beginning of a two-week WG Last Call, which =
will
end July 18. The target status for this document is Proposed Standard. The
current document is at <a
href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05=
">http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05</a>.<=
o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>If you have not read the document before now, please do =
so.
Having fresh eyes on the document often brings up important issues. If you =
HAVE
read it before, please note that there have been several revisions since <s=
t1:place
w:st=3D"on"><st1:City w:st=3D"on">San Francisco</st1:City></st1:place>, so =
you
might want to read it again (plus it&#8217;s a short document). Send any
comments to the list, even if they are as simple as &quot;I read it and it
seems fine&quot;.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Please clearly indicate the position of any issue in the
Internet Draft, and if possible provide alternative text. Please also indic=
ate
the nature or severity of the error or correction, e.g. major technical, mi=
nor
technical, nit, so that we can quickly judge the extent of problems with th=
e
document.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Thanks,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;
Yaron<o:p></o:p></span></font></p>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>_______________________________________________<br>
IPsec mailing list<br>
IPsec@ietf.org<br>
https://www.ietf.org/mailman/listinfo/ipsec<o:p></o:p></span></font></p>

</blockquote>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Institute for Infocomm Research disclaimer: &quot;This email is
confidential and may be privileged. If you are not the intended recipient,
please delete it and notify us immediately. Please do not copy or use it fo=
r
any purpose, or disclose its contents to any other person. Thank you.&quot;=
<o:p></o:p></span></font></p>

</div>

</div>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Institute for Infocomm Research disclaimer: &quot;This email is
confidential and may be privileged. If you are not the intended recipient,
please delete it and notify us immediately. Please do not copy or use it fo=
r
any purpose, or disclose its contents to any other person. Thank you.&quot;=
<o:p></o:p></span></font></p>

</div>

</div>

</div>

</body>

</html>

--_000_C49B4B6450D9AA48AB99694D2EB0A4832C24406Arrsmsx505amrcor_--

From manav@alcatel-lucent.com  Wed Jul 15 23:29:52 2009
Return-Path: <manav@alcatel-lucent.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CBD0F3A6827 for <ipsec@core3.amsl.com>; Wed, 15 Jul 2009 23:29:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZOYK8F0HYovP for <ipsec@core3.amsl.com>; Wed, 15 Jul 2009 23:29:43 -0700 (PDT)
Received: from hoemail1.alcatel.com (hoemail1.alcatel.com [192.160.6.148]) by core3.amsl.com (Postfix) with ESMTP id 108703A6922 for <ipsec@ietf.org>; Wed, 15 Jul 2009 23:29:10 -0700 (PDT)
Received: from horh1.usa.alcatel.com (h172-22-218-55.lucent.com [172.22.218.55]) by hoemail1.alcatel.com (8.13.8/IER-o) with ESMTP id n6G6RqcW016157; Thu, 16 Jul 2009 01:27:52 -0500 (CDT)
Received: from mail.apac.alcatel-lucent.com (h202-65-2-130.alcatel.com [202.65.2.130]) by horh1.usa.alcatel.com (8.13.8/emsr) with ESMTP id n6G6RdSH016677; Thu, 16 Jul 2009 01:27:40 -0500 (CDT)
Received: from INBANSXCHHUB02.in.alcatel-lucent.com (inbansxchhub02.in.alcatel-lucent.com [135.250.12.35]) by mail.apac.alcatel-lucent.com (8.13.7/8.13.7/Alcanet1.0) with ESMTP id n6G6JNWS018615; Thu, 16 Jul 2009 14:22:48 +0800
Received: from INBANSXCHMBSA1.in.alcatel-lucent.com ([135.250.12.50]) by INBANSXCHHUB02.in.alcatel-lucent.com ([135.250.12.35]) with mapi; Thu, 16 Jul 2009 11:57:17 +0530
From: "Bhatia, Manav (Manav)" <manav@alcatel-lucent.com>
To: "Grewal, Ken" <ken.grewal@intel.com>, QIU Ying <qiuying@i2r.a-star.edu.sg>, Yaron Sheffer <yaronf@checkpoint.com>, "ipsec@ietf.org" <ipsec@ietf.org>
Date: Thu, 16 Jul 2009 11:57:13 +0530
Thread-Topic: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
Thread-Index: AcoE9mMzRspYXvBER22PFG5Az3HTWQAaYrjwAB+bSHA=
Message-ID: <7C362EEF9C7896468B36C9B79200D8350A1C4BC25F@INBANSXCHMBSA1.in.alcatel-lucent.com>
References: <2E5D69B62A99425C894AA9B258004990@t3400> <C49B4B6450D9AA48AB99694D2EB0A4832C2438DC@rrsmsx505.amr.corp.intel.com> <E12B577D22E64DE1806D838CDC751259@t3400> <C49B4B6450D9AA48AB99694D2EB0A4832C24406A@rrsmsx505.amr.corp.intel.com>
In-Reply-To: <C49B4B6450D9AA48AB99694D2EB0A4832C24406A@rrsmsx505.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_7C362EEF9C7896468B36C9B79200D8350A1C4BC25FINBANSXCHMBSA_"
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 172.22.12.27
X-Scanned-By: MIMEDefang 2.64 on 202.65.2.130
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jul 2009 06:29:52 -0000

--_000_7C362EEF9C7896468B36C9B79200D8350A1C4BC25FINBANSXCHMBSA_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

We can use ESP as the next header to denote encryption being used as long a=
s we are sure that we will never have an ESP packet inside the WESP encapsu=
lation. In my view there is nothing that precludes that from happening, whi=
ch means that we may have some corner cases where WESP may actually be carr=
ying an ESP packet inside it. Given this, i would rather that we don't use =
the ESP value to denote encryption being used.

I am also not a big fan of the encryption bit as that takes away one bit fr=
om the already limited number of bits that we have at our disposal in the f=
lags field.

Given that a packet will never carry a protocol ID of 0xFF i propose to use=
 this value in the next-header to denote encryption being used. Would this =
work?

Cheers, Manav

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of G=
rewal, Ken
Sent: Wednesday, July 15, 2009 8.57 PM
To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Qiu Ying,
Copying the value of the ESP next header to the WESP next header is useful =
for efficient HW parsing when using ESP-NULL.
You are correct that in the case of encrypted traffic, we can set this valu=
e to 'ESP', which could denote that the payload is encrypted.
Having said that, some people in the past have mentioned that it may be cle=
aner to have a dedicated bit to denote whether the payload is encrypted or =
using ESP-NULL.

Either way works, as long as there is a discrete, unambiguous way to denote=
 this.

Thanks,
- Ken

________________________________
From: QIU Ying [mailto:qiuying@i2r.a-star.edu.sg]
Sent: Tuesday, July 14, 2009 7:42 PM
To: Grewal, Ken; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Hi, Ken

Agree that Option 1 is better as it applies lesser new IANA numbers. But in=
 this case, it seems redundancy to copy the value of Next Header field in t=
he ESP trailer to here. How about simply setting the value as ESP here? I t=
hink it more meet the original concept of Next Header.

Maybe I am missing something

Regards
Qiu Ying

----- Original Message -----
From: Grewal, Ken<mailto:ken.grewal@intel.com>
To: QIU Ying<mailto:qiuying@i2r.a-star.edu.sg> ; Yaron Sheffer<mailto:yaron=
f@checkpoint.com> ; ipsec@ietf.org<mailto:ipsec@ietf.org>
Sent: Wednesday, July 15, 2009 1:31 AM
Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Thanks Qiu Ying - great observation.

We had originally proposed using a bit from the WESP flags (integrity only)=
 for differentiating between ESP-encrypted and ESP-NULL traffic, but change=
d this to using a value of zero in the next header for efficient encoding, =
although this is overloading the meaning of next header.
With your observation, the current definition is not practical so we have t=
he following options:


 1.  Revert back to using a bit in the flags to differentiate between encry=
pted / NULL traffic.
 2.  Allocate a new protocol value for the next header field to indicate en=
crypted data, which seems like an overkill.

As we are already asking for a new protocol value for WESP, option 1 seems =
to be the better choice.

Other opinions?

Thanks,
- Ken

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Q=
IU Ying
Sent: Tuesday, July 14, 2009 12:37 AM
To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Since the zero of next header value is used for HOPOPT already, maybe apply=
ing a new value for this intention is better to avoid the confliction.

Regards
Qiu Ying

----- Original Message -----
From: QIU Ying<mailto:qiuying@i2r.a-star.edu.sg>
To: Yaron Sheffer<mailto:yaronf@checkpoint.com> ; ipsec@ietf.org<mailto:ips=
ec@ietf.org>
Sent: Tuesday, July 14, 2009 3:30 PM
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Regarding the Next Header in section 2, what will be happened if the value =
of Next Header is zero (i.e. IPv6 Hop-by-Hop option) and the packet is not =
encrypted?

Regards
Qiu Ying

----- Original Message -----
From: Yaron Sheffer<mailto:yaronf@checkpoint.com>
To: ipsec@ietf.org<mailto:ipsec@ietf.org>
Sent: Sunday, July 05, 2009 3:48 AM
Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

This is the beginning of a two-week WG Last Call, which will end July 18. T=
he target status for this document is Proposed Standard. The current docume=
nt is at http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-0=
5.

If you have not read the document before now, please do so. Having fresh ey=
es on the document often brings up important issues. If you HAVE read it be=
fore, please note that there have been several revisions since San Francisc=
o, so you might want to read it again (plus it's a short document). Send an=
y comments to the list, even if they are as simple as "I read it and it see=
ms fine".

Please clearly indicate the position of any issue in the Internet Draft, an=
d if possible provide alternative text. Please also indicate the nature or =
severity of the error or correction, e.g. major technical, minor technical,=
 nit, so that we can quickly judge the extent of problems with the document=
.

Thanks,
            Yaron
________________________________
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
Institute for Infocomm Research disclaimer: "This email is confidential and=
 may be privileged. If you are not the intended recipient, please delete it=
 and notify us immediately. Please do not copy or use it for any purpose, o=
r disclose its contents to any other person. Thank you."
Institute for Infocomm Research disclaimer: "This email is confidential and=
 may be privileged. If you are not the intended recipient, please delete it=
 and notify us immediately. Please do not copy or use it for any purpose, o=
r disclose its contents to any other person. Thank you."

--_000_7C362EEF9C7896468B36C9B79200D8350A1C4BC25FINBANSXCHMBSA_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D=20
"urn:schemas-microsoft-com:vml" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word" xmlns:x =3D=20
"urn:schemas-microsoft-com:office:excel" xmlns:p =3D=20
"urn:schemas-microsoft-com:office:powerpoint" xmlns:a =3D=20
"urn:schemas-microsoft-com:office:access" xmlns:dt =3D=20
"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s =3D=20
"uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs =3D=20
"urn:schemas-microsoft-com:rowset" xmlns:z =3D "#RowsetSchema" xmlns:b =3D=
=20
"urn:schemas-microsoft-com:office:publisher" xmlns:ss =3D=20
"urn:schemas-microsoft-com:office:spreadsheet" xmlns:c =3D=20
"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns:odc =3D=20
"urn:schemas-microsoft-com:office:odc" xmlns:oa =3D=20
"urn:schemas-microsoft-com:office:activation" xmlns:html =3D=20
"http://www.w3.org/TR/REC-html40" xmlns:q =3D=20
"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc =3D=20
"http://microsoft.com/officenet/conferencing" XMLNS:D =3D "DAV:" XMLNS:Repl=
 =3D=20
"http://schemas.microsoft.com/repl/" xmlns:mt =3D=20
"http://schemas.microsoft.com/sharepoint/soap/meetings/" xmlns:x2 =3D=20
"http://schemas.microsoft.com/office/excel/2003/xml" xmlns:ppda =3D=20
"http://www.passport.com/NameSpace.xsd" xmlns:ois =3D=20
"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir =3D=20
"http://schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds =3D=20
"http://www.w3.org/2000/09/xmldsig#" xmlns:dsp =3D=20
"http://schemas.microsoft.com/sharepoint/dsp" xmlns:udc =3D=20
"http://schemas.microsoft.com/data/udc" xmlns:xsd =3D=20
"http://www.w3.org/2001/XMLSchema" xmlns:sub =3D=20
"http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/" xmlns:ec =3D=
=20
"http://www.w3.org/2001/04/xmlenc#" xmlns:sp =3D=20
"http://schemas.microsoft.com/sharepoint/" xmlns:sps =3D=20
"http://schemas.microsoft.com/sharepoint/soap/" xmlns:xsi =3D=20
"http://www.w3.org/2001/XMLSchema-instance" xmlns:udcs =3D=20
"http://schemas.microsoft.com/data/udc/soap" xmlns:udcxf =3D=20
"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udcp2p =3D=20
"http://schemas.microsoft.com/data/udc/parttopart" xmlns:st =3D "=01" xmlns=
:st1 =3D=20
"urn:schemas-microsoft-com:office:smarttags"><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.2900.3492" name=3DGENERATOR><!--[if !mso]>
<STYLE>v\:* {
	BEHAVIOR: url(#default#VML)
}
o\:* {
	BEHAVIOR: url(#default#VML)
}
w\:* {
	BEHAVIOR: url(#default#VML)
}
.shape {
	BEHAVIOR: url(#default#VML)
}
</STYLE>
<![endif]--><o:SmartTagType name=3D"City"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTagTyp=
e><o:SmartTagType=20
name=3D"place"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTagTyp=
e><o:SmartTagType=20
name=3D"PersonName"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTagTyp=
e><!--[if !mso]>
<STYLE>st1\:* {
	BEHAVIOR: url(#default#ieooui)
}
</STYLE>
<![endif]-->
<STYLE>@font-face {
	font-family: Tahoma;
}
@page Section1 {size: 8.5in 11.0in; margin: 1.0in 1.25in 1.0in 1.25in; }
P.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
LI.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
DIV.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
A:link {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlink {
	COLOR: blue; TEXT-DECORATION: underline
}
A:visited {
	COLOR: purple; TEXT-DECORATION: underline
}
SPAN.MsoHyperlinkFollowed {
	COLOR: purple; TEXT-DECORATION: underline
}
P {
	FONT-SIZE: 12pt; MARGIN-LEFT: 0in; MARGIN-RIGHT: 0in; FONT-FAMILY: "Times =
New Roman"; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto
}
SPAN.EmailStyle18 {
	COLOR: windowtext; FONT-FAMILY: Arial; mso-style-type: personal
}
SPAN.EmailStyle19 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal
}
SPAN.EmailStyle20 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal-reply
}
DIV.Section1 {
	page: Section1
}
OL {
	MARGIN-BOTTOM: 0in
}
UL {
	MARGIN-BOTTOM: 0in
}
</STYLE>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]--></HEAD>
<BODY lang=3DEN-US vLink=3Dpurple link=3Dblue bgColor=3Dwhite>
<DIV dir=3Dltr align=3Dleft>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D457021906-16072009><FONT face=3DA=
rial=20
color=3D#0000ff size=3D2>We can use ESP as the next header to denote encryp=
tion=20
being used as long as we are sure that we will never have an ESP packet ins=
ide=20
the WESP encapsulation. In my view there is nothing that precludes that fro=
m=20
happening, which means that we may have some corner cases where WESP may=20
actually be carrying an ESP packet inside it. Given this, i would rather th=
at we=20
don't use the ESP value to denote encryption being used.</FONT></SPAN></DIV=
>
<DIV><SPAN class=3D457021906-16072009><FONT face=3DArial color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D457021906-16072009><FONT face=3DArial color=3D#0000ff si=
ze=3D2>I am=20
also not a big fan of the encryption bit as that takes away one bit from th=
e=20
already limited number of bits that we have at our disposal in&nbsp;the fla=
gs=20
field.</FONT></SPAN></DIV>
<DIV><SPAN class=3D457021906-16072009><FONT face=3DArial color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D457021906-16072009><FONT face=3DArial color=3D#0000ff si=
ze=3D2>Given=20
that a packet will never carry a protocol ID of 0xFF i propose=20
to&nbsp;use&nbsp;this value in the next-header to denote encryption being u=
sed.=20
Would this work?</FONT></SPAN></DIV>
<DIV><SPAN class=3D457021906-16072009><FONT face=3DArial color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D457021906-16072009><FONT face=3DArial color=3D#0000ff=20
size=3D2>Cheers, Manav</FONT></SPAN></DIV></DIV><BR>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px soli=
d; MARGIN-RIGHT: 0px">
  <DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr align=3Dleft>
  <HR tabIndex=3D-1>
  <FONT face=3DTahoma size=3D2><B>From:</B> ipsec-bounces@ietf.org=20
  [mailto:ipsec-bounces@ietf.org] <B>On Behalf Of </B>Grewal,=20
  Ken<BR><B>Sent:</B> Wednesday, July 15, 2009 8.57 PM<BR><B>To:</B> QIU Yi=
ng;=20
  Yaron Sheffer; ipsec@ietf.org<BR><B>Subject:</B> Re: [IPsec] WG Last Call=
:=20
  draft-ietf-ipsecme-traffic-visibility-05<BR></FONT><BR></DIV>
  <DIV></DIV>
  <DIV class=3DSection1>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Qiu Ying,=20
  <o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Copying the va=
lue of=20
  the ESP next header to the WESP next header is useful for efficient HW pa=
rsing=20
  when using ESP-NULL. <o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">You are correc=
t that=20
  in the case of encrypted traffic, we can set this value to &#8216;ESP&#82=
17;, which could=20
  denote that the payload is encrypted. <o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Having said th=
at,=20
  some people in the past have mentioned that it may be cleaner to have a=20
  dedicated bit to denote whether the payload is encrypted or using=20
  ESP-NULL.<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp;</o=
:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Either way wor=
ks, as=20
  long as there is a discrete, unambiguous way to denote this.=20
  &nbsp;<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp;</o=
:p></SPAN></FONT></P>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy size=3D3=
><SPAN=20
  style=3D"FONT-SIZE: 12pt; COLOR: navy">Thanks, <o:p></o:p></SPAN></FONT><=
/P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy size=3D3=
><SPAN=20
  style=3D"FONT-SIZE: 12pt; COLOR: navy">- Ken<o:p></o:p></SPAN></FONT></P>=
</DIV>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp;</o=
:p></SPAN></FONT></P>
  <DIV=20
  style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: mediu=
m none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0in; BORDER-LEFT: blue 1.5pt sol=
id; PADDING-TOP: 0in; BORDER-BOTTOM: medium none">
  <DIV>
  <DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" align=3Dcenter><FONT=
=20
  face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt">
  <HR tabIndex=3D-1 align=3Dcenter width=3D"100%" SIZE=3D2>
  </SPAN></FONT></DIV>
  <P class=3DMsoNormal><B><FONT face=3DTahoma size=3D2><SPAN=20
  style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Tahoma">From:</=
SPAN></FONT></B><FONT=20
  face=3DTahoma size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Tahom=
a"> QIU=20
  Ying [mailto:qiuying@i2r.a-star.edu.sg] <BR><B><SPAN=20
  style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Tuesday, July 14, 2009 7:42=
=20
  PM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> Grewal, Ken; Ya=
ron=20
  Sheffer; <st1:PersonName w:st=3D"on">ipsec@ietf.org</st1:PersonName><BR><=
B><SPAN=20
  style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [IPsec] WG Last Call:=
=20
  draft-ietf-ipsecme-traffic-visibility-05</SPAN></FONT><o:p></o:p></P></DI=
V>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <DIV>
  <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Hi,=20
  Ken</SPAN></FONT><o:p></o:p></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Agree that&nbsp;Option 1 is=
 better=20
  as it applies lesser new IANA numbers. But in this case, it=20
  seems&nbsp;redundancy to copy the value of Next Header field in the ESP=20
  trailer to here. How about simply&nbsp;setting the value as ESP here? I t=
hink=20
  it more meet the original concept of Next=20
  Header.</SPAN></FONT><o:p></o:p></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Maybe I am missing=20
  something</SPAN></FONT><o:p></o:p></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Regards</SPAN></FONT><o:p><=
/o:p></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Qiu=20
  Ying</SPAN></FONT><o:p></o:p></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
  <BLOCKQUOTE=20
  style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: mediu=
m none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0in; MARGIN: 5pt 0in 5pt 3.75pt;=
 BORDER-LEFT: black 1.5pt solid; PADDING-TOP: 0in; BORDER-BOTTOM: medium no=
ne">
    <DIV>
    <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">----- Original Message --=
---=20
    <o:p></o:p></SPAN></FONT></P></DIV>
    <DIV style=3D"font-color: black">
    <P class=3DMsoNormal style=3D"BACKGROUND: #e4e4e4"><B><FONT face=3DAria=
l=20
    size=3D2><SPAN=20
    style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">From:<=
/SPAN></FONT></B><FONT=20
    face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Aria=
l"> <A=20
    title=3Dken.grewal@intel.com href=3D"mailto:ken.grewal@intel.com">Grewa=
l,=20
    Ken</A> <o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">To:</S=
PAN></FONT></B><FONT=20
    face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Aria=
l"> <A=20
    title=3Dqiuying@i2r.a-star.edu.sg href=3D"mailto:qiuying@i2r.a-star.edu=
.sg">QIU=20
    Ying</A> ; <A title=3Dyaronf@checkpoint.com=20
    href=3D"mailto:yaronf@checkpoint.com">Yaron Sheffer</A> ; <A=20
    title=3Dipsec@ietf.org href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A=
>=20
    <o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">Sent:<=
/SPAN></FONT></B><FONT=20
    face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Aria=
l">=20
    Wednesday, July 15, 2009 1:31 AM<o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">Subjec=
t:</SPAN></FONT></B><FONT=20
    face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Aria=
l"> RE:=20
    [IPsec] WG Last Call:=20
    draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FONT></P></=
DIV>
    <DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DIV>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Thanks Qiu Y=
ing -=20
    great observation. <o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp;<=
/o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">We had origi=
nally=20
    proposed using a bit from the WESP flags (integrity only) for=20
    differentiating between ESP-encrypted and ESP-NULL traffic, but changed=
 this=20
    to using a value of zero in the next header for efficient encoding, alt=
hough=20
    this is overloading the meaning of next header.=20
<o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">With your=20
    observation, the current definition is not practical so we have the=20
    following options:<o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp;<=
/o:p></SPAN></FONT></P>
    <OL style=3D"MARGIN-TOP: 0in" type=3D1>
      <LI class=3DMsoNormal style=3D"COLOR: navy; mso-list: l1 level1 lfo3"=
><FONT=20
      face=3DArial color=3Dnavy size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Revert back to using a =
bit in=20
      the flags to differentiate between encrypted / NULL traffic.</SPAN></=
FONT>=20
      <FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><o:p></o:p></SPAN></FON=
T>
      <LI class=3DMsoNormal style=3D"COLOR: navy; mso-list: l1 level1 lfo3"=
><FONT=20
      face=3DArial color=3Dnavy size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Allocate a new protocol=
 value=20
      for the next header field to indicate encrypted data, which seems lik=
e an=20
      overkill.</SPAN></FONT> <FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><o:p></o:p></SPAN></FON=
T></LI></OL>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp;<=
/o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">As we are al=
ready=20
    asking for a new protocol value for WESP, option 1 seems to be the bett=
er=20
    choice.<o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp;<=
/o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Other=20
    opinions?<o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp;<=
/o:p></SPAN></FONT></P>
    <DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy size=
=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt; COLOR: navy">Thanks, <o:p></o:p></SPAN></FONT=
></P>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy size=
=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt; COLOR: navy">-=20
Ken<o:p></o:p></SPAN></FONT></P></DIV>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp;<=
/o:p></SPAN></FONT></P>
    <DIV=20
    style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: med=
ium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0in; BORDER-LEFT: blue 1.5pt s=
olid; PADDING-TOP: 0in; BORDER-BOTTOM: medium none">
    <DIV>
    <DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" align=3Dcenter><FON=
T=20
    face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt">
    <HR tabIndex=3D-1 align=3Dcenter width=3D"100%" SIZE=3D2>
    </SPAN></FONT></DIV>
    <P class=3DMsoNormal><B><FONT face=3DTahoma size=3D2><SPAN=20
    style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Tahoma">From:=
</SPAN></FONT></B><FONT=20
    face=3DTahoma size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Tah=
oma">=20
    <st1:PersonName w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonName>=20
    [mailto:<st1:PersonName w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonN=
ame>]=20
    <B><SPAN style=3D"FONT-WEIGHT: bold">On Behalf Of </SPAN></B>QIU=20
    Ying<BR><B><SPAN style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Tuesday, =
July=20
    14, 2009 12:37 AM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B=
> QIU=20
    Ying; Yaron Sheffer; <st1:PersonName=20
    w:st=3D"on">ipsec@ietf.org</st1:PersonName><BR><B><SPAN=20
    style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [IPsec] WG Last Cal=
l:=20
    draft-ietf-ipsecme-traffic-visibility-05</SPAN></FONT><o:p></o:p></P></=
DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
    <DIV>
    <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Since the zero of&nbsp;ne=
xt=20
    header&nbsp;value is used for HOPOPT already, maybe applying a new valu=
e for=20
    this intention is better to avoid the=20
    confliction.</SPAN></FONT><o:p></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Regards</SPAN></FONT><o:p=
></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Qiu=20
    Ying</SPAN></FONT><o:p></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
    <BLOCKQUOTE=20
    style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: med=
ium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0in; MARGIN: 5pt 0in 5pt 3.75p=
t; BORDER-LEFT: black 1.5pt solid; PADDING-TOP: 0in; BORDER-BOTTOM: medium =
none">
      <DIV>
      <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">----- Original Message =
-----=20
      <o:p></o:p></SPAN></FONT></P></DIV>
      <DIV style=3D"font-color: black">
      <P class=3DMsoNormal style=3D"BACKGROUND: #e4e4e4"><B><FONT face=3DAr=
ial=20
      size=3D2><SPAN=20
      style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">From=
:</SPAN></FONT></B><FONT=20
      face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Ar=
ial"> <A=20
      title=3Dqiuying@i2r.a-star.edu.sg=20
      href=3D"mailto:qiuying@i2r.a-star.edu.sg">QIU Ying</A>=20
      <o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">To:<=
/SPAN></FONT></B><FONT=20
      face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Ar=
ial"> <A=20
      title=3Dyaronf@checkpoint.com href=3D"mailto:yaronf@checkpoint.com">Y=
aron=20
      Sheffer</A> ; <A title=3Dipsec@ietf.org=20
      href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A>=20
      <o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">Sent=
:</SPAN></FONT></B><FONT=20
      face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Ar=
ial">=20
      Tuesday, July 14, 2009 3:30 PM<o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">Subj=
ect:</SPAN></FONT></B><FONT=20
      face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Ar=
ial"> Re:=20
      [IPsec] WG Last Call:=20
      draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FONT></P>=
</DIV>
      <DIV>
      <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
      style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Regarding the Next Head=
er in=20
      section 2, what will be happened if the value of Next Header is zero =
(i.e.=20
      IPv6 Hop-by-Hop option) and the packet is not=20
      encrypted?</SPAN></FONT><o:p></o:p></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
      style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Regards</SPAN></FONT><o=
:p></o:p></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Qiu=20
      Ying</SPAN></FONT><o:p></o:p></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
      style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
      <BLOCKQUOTE=20
      style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: m=
edium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0in; MARGIN: 5pt 0in 5pt 3.7=
5pt; BORDER-LEFT: black 1.5pt solid; PADDING-TOP: 0in; BORDER-BOTTOM: mediu=
m none">
        <DIV>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">----- Original Messag=
e -----=20
        <o:p></o:p></SPAN></FONT></P></DIV>
        <DIV style=3D"font-color: black">
        <P class=3DMsoNormal style=3D"BACKGROUND: #e4e4e4"><B><FONT face=3D=
Arial=20
        size=3D2><SPAN=20
        style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">Fr=
om:</SPAN></FONT></B><FONT=20
        face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial"> <A=20
        title=3Dyaronf@checkpoint.com href=3D"mailto:yaronf@checkpoint.com"=
>Yaron=20
        Sheffer</A> <o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">To=
:</SPAN></FONT></B><FONT=20
        face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial"> <A=20
        title=3Dipsec@ietf.org href=3D"mailto:ipsec@ietf.org">ipsec@ietf.or=
g</A>=20
        <o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">Se=
nt:</SPAN></FONT></B><FONT=20
        face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial">=20
        Sunday, July 05, 2009 3:48 AM<o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">Su=
bject:</SPAN></FONT></B><FONT=20
        face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial">=20
        [IPsec] WG Last Call:=20
        draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FONT></=
P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=
=20
        style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DIV>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">This is the beginning=
 of a=20
        two-week WG Last Call, which will end July 18. The target status fo=
r=20
        this document is Proposed Standard. The current document is at <A=20
        href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visib=
ility-05">http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-=
05</A>.<o:p></o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><o:p>&nbsp;</o:p></SP=
AN></FONT></P>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">If you have not read =
the=20
        document before now, please do so. Having fresh eyes on the documen=
t=20
        often brings up important issues. If you HAVE read it before, pleas=
e=20
        note that there have been several revisions since <st1:place=20
        w:st=3D"on"><st1:City w:st=3D"on">San Francisco</st1:City></st1:pla=
ce>, so=20
        you might want to read it again (plus it&#8217;s a short document).=
 Send any=20
        comments to the list, even if they are as simple as "I read it and =
it=20
        seems fine".<o:p></o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><o:p>&nbsp;</o:p></SP=
AN></FONT></P>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Please clearly indica=
te the=20
        position of any issue in the Internet Draft, and if possible provid=
e=20
        alternative text. Please also indicate the nature or severity of th=
e=20
        error or correction, e.g. major technical, minor technical, nit, so=
 that=20
        we can quickly judge the extent of problems with the=20
        document.<o:p></o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><o:p>&nbsp;</o:p></SP=
AN></FONT></P>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Thanks,<o:p></o:p></S=
PAN></FONT></P>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
        Yaron<o:p></o:p></SPAN></FONT></P>
        <DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" align=3Dcenter>=
<FONT=20
        face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt">
        <HR align=3Dcenter width=3D"100%" SIZE=3D2>
        </SPAN></FONT></DIV>
        <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=
=20
        style=3D"FONT-SIZE: 12pt">_________________________________________=
______<BR>IPsec=20
        mailing=20
        list<BR>IPsec@ietf.org<BR>https://www.ietf.org/mailman/listinfo/ips=
ec<o:p></o:p></SPAN></FONT></P></BLOCKQUOTE></BLOCKQUOTE>
    <DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt">Institute for Infocomm Research disclaimer: "=
This=20
    email is confidential and may be privileged. If you are not the intende=
d=20
    recipient, please delete it and notify us immediately. Please do not co=
py or=20
    use it for any purpose, or disclose its contents to any other person. T=
hank=20
    you."<o:p></o:p></SPAN></FONT></P></DIV></DIV></BLOCKQUOTE>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">Institute for Infocomm Research disclaimer: "Th=
is=20
  email is confidential and may be privileged. If you are not the intended=
=20
  recipient, please delete it and notify us immediately. Please do not copy=
 or=20
  use it for any purpose, or disclose its contents to any other person. Tha=
nk=20
  you."<o:p></o:p></SPAN></FONT></P></DIV></DIV></DIV></BLOCKQUOTE></BODY><=
/HTML>

--_000_7C362EEF9C7896468B36C9B79200D8350A1C4BC25FINBANSXCHMBSA_--

From qiuying@i2r.a-star.edu.sg  Thu Jul 16 00:21:12 2009
Return-Path: <qiuying@i2r.a-star.edu.sg>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 61A3C3A6811 for <ipsec@core3.amsl.com>; Thu, 16 Jul 2009 00:21:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.647
X-Spam-Level: 
X-Spam-Status: No, score=-1.647 tagged_above=-999 required=5 tests=[AWL=0.951,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aC6PSKGOC2t3 for <ipsec@core3.amsl.com>; Thu, 16 Jul 2009 00:20:55 -0700 (PDT)
Received: from gw1.scei.a-star.edu.sg (gw1.scei.a-star.edu.sg [192.122.140.10]) by core3.amsl.com (Postfix) with ESMTP id 6BA533A6827 for <ipsec@ietf.org>; Thu, 16 Jul 2009 00:20:52 -0700 (PDT)
Received: from mailfe01.teak.local.net ([10.217.253.173]) by gw1.scei.a-star.edu.sg (8.14.1/8.14.1) with ESMTP id n6G7EAfx017241;  Thu, 16 Jul 2009 15:14:10 +0800
Received: from t3400 ([10.217.141.123]) by mailfe01.teak.local.net with Microsoft SMTPSVC(6.0.3790.3959); Thu, 16 Jul 2009 15:15:46 +0800
Message-ID: <4EB8BD054AA343E79C6233E451202CBB@t3400>
From: "QIU Ying" <qiuying@i2r.a-star.edu.sg>
To: "Bhatia, Manav \(Manav\)" <manav@alcatel-lucent.com>, "Grewal, Ken" <ken.grewal@intel.com>, "Yaron Sheffer" <yaronf@checkpoint.com>, <ipsec@ietf.org>
References: <2E5D69B62A99425C894AA9B258004990@t3400><C49B4B6450D9AA48AB99694D2EB0A4832C2438DC@rrsmsx505.amr.corp.intel.com><E12B577D22E64DE1806D838CDC751259@t3400> <C49B4B6450D9AA48AB99694D2EB0A4832C24406A@rrsmsx505.amr.corp.intel.com> <7C362EEF9C7896468B36C9B79200D8350A1C4BC25F@INBANSXCHMBSA1.in.alcatel-lucent.com>
Date: Thu, 16 Jul 2009 15:11:35 +0800
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0056_01CA0627.B5A60CD0"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.5512
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579
X-OriginalArrivalTime: 16 Jul 2009 07:15:46.0587 (UTC) FILETIME=[3D32CEB0:01CA05E5]
X-Proofpoint-Virus-Version: vendor=fsecure engine=1.12.8161:2.4.5, 1.2.40, 4.0.166 definitions=2009-07-16_03:2009-07-03, 2009-07-16, 2009-07-15 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 ipscore=0 phishscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx engine=5.0.0-0811170000 definitions=main-0907160001
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jul 2009 07:21:12 -0000

This is a multi-part message in MIME format.

------=_NextPart_000_0056_01CA0627.B5A60CD0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi, Manav

0xFF (255) is reserved by IANA. Maybe you are correct that IANA  would neve=
r release the special number to a document. But it is risk for a long term =
RFC.

If I am not wrong, Ken's meaning is to set the next header as ESP if carryi=
ng an ESP packet inside it. Otherwise, still use the same value of the next=
 header in ESP trailer. So it seems acceptable.

Regards
Qiu Ying


  ----- Original Message -----=20
  From: Bhatia, Manav (Manav)=20
  To: Grewal, Ken ; QIU Ying ; Yaron Sheffer ; ipsec@ietf.org=20
  Sent: Thursday, July 16, 2009 2:27 PM
  Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-=
05


  We can use ESP as the next header to denote encryption being used as long=
 as we are sure that we will never have an ESP packet inside the WESP encap=
sulation. In my view there is nothing that precludes that from happening, w=
hich means that we may have some corner cases where WESP may actually be ca=
rrying an ESP packet inside it. Given this, i would rather that we don't us=
e the ESP value to denote encryption being used.

  I am also not a big fan of the encryption bit as that takes away one bit =
from the already limited number of bits that we have at our disposal in the=
 flags field.

  Given that a packet will never carry a protocol ID of 0xFF i propose to u=
se this value in the next-header to denote encryption being used. Would thi=
s work?

  Cheers, Manav



----------------------------------------------------------------------------
    From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf =
Of Grewal, Ken
    Sent: Wednesday, July 15, 2009 8.57 PM
    To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
    Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibilit=
y-05


    Qiu Ying,=20

    Copying the value of the ESP next header to the WESP next header is use=
ful for efficient HW parsing when using ESP-NULL.=20

    You are correct that in the case of encrypted traffic, we can set this =
value to 'ESP', which could denote that the payload is encrypted.=20

    Having said that, some people in the past have mentioned that it may be=
 cleaner to have a dedicated bit to denote whether the payload is encrypted=
 or using ESP-NULL.

=20=20=20=20=20

    Either way works, as long as there is a discrete, unambiguous way to de=
note this.=20=20

=20=20=20=20=20

    Thanks,=20

    - Ken

=20=20=20=20=20


----------------------------------------------------------------------------

    From: QIU Ying [mailto:qiuying@i2r.a-star.edu.sg]=20
    Sent: Tuesday, July 14, 2009 7:42 PM
    To: Grewal, Ken; Yaron Sheffer; ipsec@ietf.org
    Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibilit=
y-05

=20=20=20=20=20

    Hi, Ken

=20=20=20=20=20

    Agree that Option 1 is better as it applies lesser new IANA numbers. Bu=
t in this case, it seems redundancy to copy the value of Next Header field =
in the ESP trailer to here. How about simply setting the value as ESP here?=
 I think it more meet the original concept of Next Header.

=20=20=20=20=20

    Maybe I am missing something

=20=20=20=20=20

    Regards

    Qiu Ying

=20=20=20=20=20

      ----- Original Message -----=20

      From: Grewal, Ken=20

      To: QIU Ying ; Yaron Sheffer ; ipsec@ietf.org=20

      Sent: Wednesday, July 15, 2009 1:31 AM

      Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibil=
ity-05

=20=20=20=20=20=20=20

      Thanks Qiu Ying - great observation.=20

=20=20=20=20=20=20=20

      We had originally proposed using a bit from the WESP flags (integrity=
 only) for differentiating between ESP-encrypted and ESP-NULL traffic, but =
changed this to using a value of zero in the next header for efficient enco=
ding, although this is overloading the meaning of next header.=20

      With your observation, the current definition is not practical so we =
have the following options:

=20=20=20=20=20=20=20

        1.. Revert back to using a bit in the flags to differentiate betwee=
n encrypted / NULL traffic.=20
        2.. Allocate a new protocol value for the next header field to indi=
cate encrypted data, which seems like an overkill.=20
=20=20=20=20=20=20=20

      As we are already asking for a new protocol value for WESP, option 1 =
seems to be the better choice.

=20=20=20=20=20=20=20

      Other opinions?

=20=20=20=20=20=20=20

      Thanks,=20

      - Ken

=20=20=20=20=20=20=20


--------------------------------------------------------------------------

      From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behal=
f Of QIU Ying
      Sent: Tuesday, July 14, 2009 12:37 AM
      To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
      Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibil=
ity-05

=20=20=20=20=20=20=20

      Since the zero of next header value is used for HOPOPT already, maybe=
 applying a new value for this intention is better to avoid the confliction.

=20=20=20=20=20=20=20

      Regards

      Qiu Ying

=20=20=20=20=20=20=20

        ----- Original Message -----=20

        From: QIU Ying=20

        To: Yaron Sheffer ; ipsec@ietf.org=20

        Sent: Tuesday, July 14, 2009 3:30 PM

        Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visib=
ility-05

=20=20=20=20=20=20=20=20=20

        Regarding the Next Header in section 2, what will be happened if th=
e value of Next Header is zero (i.e. IPv6 Hop-by-Hop option) and the packet=
 is not encrypted?

=20=20=20=20=20=20=20=20=20

        Regards

        Qiu Ying

=20=20=20=20=20=20=20=20=20

          ----- Original Message -----=20

          From: Yaron Sheffer=20

          To: ipsec@ietf.org=20

          Sent: Sunday, July 05, 2009 3:48 AM

          Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibil=
ity-05

=20=20=20=20=20=20=20=20=20=20=20

          This is the beginning of a two-week WG Last Call, which will end =
July 18. The target status for this document is Proposed Standard. The curr=
ent document is at http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-vi=
sibility-05.

=20=20=20=20=20=20=20=20=20=20=20

          If you have not read the document before now, please do so. Havin=
g fresh eyes on the document often brings up important issues. If you HAVE =
read it before, please note that there have been several revisions since Sa=
n Francisco, so you might want to read it again (plus it's a short document=
). Send any comments to the list, even if they are as simple as "I read it =
and it seems fine".

=20=20=20=20=20=20=20=20=20=20=20

          Please clearly indicate the position of any issue in the Internet=
 Draft, and if possible provide alternative text. Please also indicate the =
nature or severity of the error or correction, e.g. major technical, minor =
technical, nit, so that we can quickly judge the extent of problems with th=
e document.

=20=20=20=20=20=20=20=20=20=20=20

          Thanks,

                      Yaron


----------------------------------------------------------------------

          _______________________________________________
          IPsec mailing list
          IPsec@ietf.org
          https://www.ietf.org/mailman/listinfo/ipsec

      Institute for Infocomm Research disclaimer: "This email is confidenti=
al and may be privileged. If you are not the intended recipient, please del=
ete it and notify us immediately. Please do not copy or use it for any purp=
ose, or disclose its contents to any other person. Thank you."

    Institute for Infocomm Research disclaimer: "This email is confidential=
 and may be privileged. If you are not the intended recipient, please delet=
e it and notify us immediately. Please do not copy or use it for any purpos=
e, or disclose its contents to any other person. Thank you."

Institute for Infocomm Research disclaimer:  "This email is confidential an=
d may be privileged. If you are not the intended recipient, please delete i=
t and notify us immediately. Please do not copy or use it for any purpose, =
or disclose its contents to any other person. Thank you."

------=_NextPart_000_0056_01CA0627.B5A60CD0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D=20
"urn:schemas-microsoft-com:vml" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word" xmlns:x =3D=20
"urn:schemas-microsoft-com:office:excel" xmlns:p =3D=20
"urn:schemas-microsoft-com:office:powerpoint" xmlns:a =3D=20
"urn:schemas-microsoft-com:office:access" xmlns:dt =3D=20
"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s =3D=20
"uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs =3D=20
"urn:schemas-microsoft-com:rowset" xmlns:z =3D "#RowsetSchema" xmlns:b =3D=
=20
"urn:schemas-microsoft-com:office:publisher" xmlns:ss =3D=20
"urn:schemas-microsoft-com:office:spreadsheet" xmlns:c =3D=20
"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns:odc =3D=20
"urn:schemas-microsoft-com:office:odc" xmlns:oa =3D=20
"urn:schemas-microsoft-com:office:activation" xmlns:html =3D=20
"http://www.w3.org/TR/REC-html40" xmlns:q =3D=20
"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc =3D=20
"http://microsoft.com/officenet/conferencing" XMLNS:D =3D "DAV:" XMLNS:Repl=
 =3D=20
"http://schemas.microsoft.com/repl/" xmlns:mt =3D=20
"http://schemas.microsoft.com/sharepoint/soap/meetings/" xmlns:x2 =3D=20
"http://schemas.microsoft.com/office/excel/2003/xml" xmlns:ppda =3D=20
"http://www.passport.com/NameSpace.xsd" xmlns:ois =3D=20
"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir =3D=20
"http://schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds =3D=20
"http://www.w3.org/2000/09/xmldsig#" xmlns:dsp =3D=20
"http://schemas.microsoft.com/sharepoint/dsp" xmlns:udc =3D=20
"http://schemas.microsoft.com/data/udc" xmlns:xsd =3D=20
"http://www.w3.org/2001/XMLSchema" xmlns:sub =3D=20
"http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/" xmlns:ec =3D=
=20
"http://www.w3.org/2001/04/xmlenc#" xmlns:sp =3D=20
"http://schemas.microsoft.com/sharepoint/" xmlns:sps =3D=20
"http://schemas.microsoft.com/sharepoint/soap/" xmlns:xsi =3D=20
"http://www.w3.org/2001/XMLSchema-instance" xmlns:udcs =3D=20
"http://schemas.microsoft.com/data/udc/soap" xmlns:udcxf =3D=20
"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udcp2p =3D=20
"http://schemas.microsoft.com/data/udc/parttopart" xmlns:st =3D "=01" xmlns=
:st1 =3D=20
"urn:schemas-microsoft-com:office:smarttags"><HEAD>
<META content=3D"text/html; charset=3Diso-8859-1" http-equiv=3DContent-Type>
<META name=3DGENERATOR content=3D"MSHTML 8.00.6001.18372"><!--[if !mso]>
<STYLE>v\:* {
	BEHAVIOR: url(#default#VML)
}
o\:* {
	BEHAVIOR: url(#default#VML)
}
w\:* {
	BEHAVIOR: url(#default#VML)
}
.shape {
	BEHAVIOR: url(#default#VML)
}
</STYLE>
<![endif]--><o:SmartTagType=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"=20
name=3D"City"></o:SmartTagType><o:SmartTagType=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"=20
name=3D"place"></o:SmartTagType><o:SmartTagType=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"=20
name=3D"PersonName"></o:SmartTagType><!--[if !mso]>
<STYLE>st1\:* {
	BEHAVIOR: url(#default#ieooui)
}
</STYLE>
<![endif]-->
<STYLE>@font-face {
	font-family: Tahoma;
}
@page Section1 {size: 8.5in 11.0in; margin: 1.0in 1.25in 1.0in 1.25in; }
P.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
LI.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
DIV.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
A:link {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlink {
	COLOR: blue; TEXT-DECORATION: underline
}
A:visited {
	COLOR: purple; TEXT-DECORATION: underline
}
SPAN.MsoHyperlinkFollowed {
	COLOR: purple; TEXT-DECORATION: underline
}
P {
	FONT-SIZE: 12pt; MARGIN-LEFT: 0in; MARGIN-RIGHT: 0in; FONT-FAMILY: "Times =
New Roman"; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto
}
SPAN.EmailStyle18 {
	COLOR: windowtext; FONT-FAMILY: Arial; mso-style-type: personal
}
SPAN.EmailStyle19 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal
}
SPAN.EmailStyle20 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal-reply
}
DIV.Section1 {
	page: Section1
}
OL {
	MARGIN-BOTTOM: 0in
}
UL {
	MARGIN-BOTTOM: 0in
}
</STYLE>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]--></HEAD>
<BODY lang=3DEN-US link=3Dblue bgColor=3Dwhite vLink=3Dpurple>
<DIV><FONT size=3D2 face=3DArial>Hi, Manav</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2 face=3DArial>0xFF (255) is reserved by IANA. Maybe you =
are=20
correct that&nbsp;IANA &nbsp;would&nbsp;never release the special number to=
 a=20
document. But it is risk for a long term RFC.</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2 face=3DArial>If I am not wrong, Ken's meaning is to set=
 the next=20
header as ESP if carrying an ESP packet inside it. Otherwise, still use the=
 same=20
value of the next header in ESP trailer. So it seems acceptable.</FONT></DI=
V>
<DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2 face=3DArial>Regards</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial>Qiu Ying</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
<BLOCKQUOTE=20
style=3D"BORDER-LEFT: #000000 2px solid; PADDING-LEFT: 5px; PADDING-RIGHT: =
0px; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px"=20
dir=3Dltr>
  <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV>
  <DIV=20
  style=3D"FONT: 10pt arial; BACKGROUND: #e4e4e4; font-color: black"><B>Fro=
m:</B>=20
  <A title=3Dmanav@alcatel-lucent.com=20
  href=3D"mailto:manav@alcatel-lucent.com">Bhatia, Manav (Manav)</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A title=3Dken.grewal@intel.co=
m=20
  href=3D"mailto:ken.grewal@intel.com">Grewal, Ken</A> ; <A=20
  title=3Dqiuying@i2r.a-star.edu.sg href=3D"mailto:qiuying@i2r.a-star.edu.s=
g">QIU=20
  Ying</A> ; <A title=3Dyaronf@checkpoint.com=20
  href=3D"mailto:yaronf@checkpoint.com">Yaron Sheffer</A> ; <A=20
  title=3Dipsec@ietf.org href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A> =
</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Thursday, July 16, 2009 2:27=
=20
  PM</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> RE: [IPsec] WG Last Call:=
=20
  draft-ietf-ipsecme-traffic-visibility-05</DIV>
  <DIV><BR></DIV>
  <DIV dir=3Dltr align=3Dleft>
  <DIV dir=3Dltr align=3Dleft><SPAN class=3D457021906-16072009><FONT color=
=3D#0000ff=20
  size=3D2 face=3DArial>We can use ESP as the next header to denote encrypt=
ion being=20
  used as long as we are sure that we will never have an ESP packet inside =
the=20
  WESP encapsulation. In my view there is nothing that precludes that from=
=20
  happening, which means that we may have some corner cases where WESP may=
=20
  actually be carrying an ESP packet inside it. Given this, i would rather =
that=20
  we don't use the ESP value to denote encryption being=20
used.</FONT></SPAN></DIV>
  <DIV><SPAN class=3D457021906-16072009><FONT color=3D#0000ff size=3D2=20
  face=3DArial></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=3D457021906-16072009><FONT color=3D#0000ff size=3D2 face=
=3DArial>I am=20
  also not a big fan of the encryption bit as that takes away one bit from =
the=20
  already limited number of bits that we have at our disposal in&nbsp;the f=
lags=20
  field.</FONT></SPAN></DIV>
  <DIV><SPAN class=3D457021906-16072009><FONT color=3D#0000ff size=3D2=20
  face=3DArial></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=3D457021906-16072009><FONT color=3D#0000ff size=3D2=20
  face=3DArial>Given that a packet will never carry a protocol ID of 0xFF i=
=20
  propose to&nbsp;use&nbsp;this value in the next-header to denote encrypti=
on=20
  being used. Would this work?</FONT></SPAN></DIV>
  <DIV><SPAN class=3D457021906-16072009><FONT color=3D#0000ff size=3D2=20
  face=3DArial></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=3D457021906-16072009><FONT color=3D#0000ff size=3D2=20
  face=3DArial>Cheers, Manav</FONT></SPAN></DIV></DIV><BR>
  <BLOCKQUOTE=20
  style=3D"BORDER-LEFT: #0000ff 2px solid; PADDING-LEFT: 5px; MARGIN-LEFT: =
5px; MARGIN-RIGHT: 0px"=20
  dir=3Dltr>
    <DIV dir=3Dltr lang=3Den-us class=3DOutlookMessageHeader align=3Dleft>
    <HR tabIndex=3D-1>
    <FONT size=3D2 face=3DTahoma><B>From:</B> ipsec-bounces@ietf.org=20
    [mailto:ipsec-bounces@ietf.org] <B>On Behalf Of </B>Grewal,=20
    Ken<BR><B>Sent:</B> Wednesday, July 15, 2009 8.57 PM<BR><B>To:</B> QIU =
Ying;=20
    Yaron Sheffer; ipsec@ietf.org<BR><B>Subject:</B> Re: [IPsec] WG Last Ca=
ll:=20
    draft-ietf-ipsecme-traffic-visibility-05<BR></FONT><BR></DIV>
    <DIV></DIV>
    <DIV class=3DSection1>
    <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">Qiu Ying,=20
    <o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">Copying the =
value=20
    of the ESP next header to the WESP next header is useful for efficient =
HW=20
    parsing when using ESP-NULL. <o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">You are corr=
ect=20
    that in the case of encrypted traffic, we can set this value to =91ESP=
=92, which=20
    could denote that the payload is encrypted. <o:p></o:p></SPAN></FONT></=
P>
    <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">Having said =
that,=20
    some people in the past have mentioned that it may be cleaner to have a=
=20
    dedicated bit to denote whether the payload is encrypted or using=20
    ESP-NULL.<o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp;<=
/o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">Either way w=
orks,=20
    as long as there is a discrete, unambiguous way to denote this.=20
    &nbsp;<o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp;<=
/o:p></SPAN></FONT></P>
    <DIV>
    <P class=3DMsoNormal><FONT color=3Dnavy size=3D3 face=3D"Times New Roma=
n"><SPAN=20
    style=3D"COLOR: navy; FONT-SIZE: 12pt">Thanks, <o:p></o:p></SPAN></FONT=
></P>
    <P class=3DMsoNormal><FONT color=3Dnavy size=3D3 face=3D"Times New Roma=
n"><SPAN=20
    style=3D"COLOR: navy; FONT-SIZE: 12pt">-=20
Ken<o:p></o:p></SPAN></FONT></P></DIV>
    <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp;<=
/o:p></SPAN></FONT></P>
    <DIV=20
    style=3D"BORDER-BOTTOM: medium none; BORDER-LEFT: blue 1.5pt solid; PAD=
DING-BOTTOM: 0in; PADDING-LEFT: 4pt; PADDING-RIGHT: 0in; BORDER-TOP: medium=
 none; BORDER-RIGHT: medium none; PADDING-TOP: 0in">
    <DIV>
    <DIV style=3D"TEXT-ALIGN: center" class=3DMsoNormal align=3Dcenter><FON=
T size=3D3=20
    face=3D"Times New Roman"><SPAN style=3D"FONT-SIZE: 12pt">
    <HR tabIndex=3D-1 align=3Dcenter SIZE=3D2 width=3D"100%">
    </SPAN></FONT></DIV>
    <P class=3DMsoNormal><B><FONT size=3D2 face=3DTahoma><SPAN=20
    style=3D"FONT-FAMILY: Tahoma; FONT-SIZE: 10pt; FONT-WEIGHT: bold">From:=
</SPAN></FONT></B><FONT=20
    size=3D2 face=3DTahoma><SPAN style=3D"FONT-FAMILY: Tahoma; FONT-SIZE: 1=
0pt"> QIU=20
    Ying [mailto:qiuying@i2r.a-star.edu.sg] <BR><B><SPAN=20
    style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Tuesday, July 14, 2009 7:4=
2=20
    PM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> Grewal, Ken; =
Yaron=20
    Sheffer; <st1:PersonName=20
    w:st=3D"on">ipsec@ietf.org</st1:PersonName><BR><B><SPAN=20
    style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [IPsec] WG Last Cal=
l:=20
    draft-ietf-ipsecme-traffic-visibility-05</SPAN></FONT><o:p></o:p></P></=
DIV>
    <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
    style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Hi,=20
    Ken</SPAN></FONT><o:p></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
    style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Agree that&nbsp;Option 1 =
is=20
    better as it applies lesser new IANA numbers. But in this case, it=20
    seems&nbsp;redundancy to copy the value of Next Header field in the ESP=
=20
    trailer to here. How about simply&nbsp;setting the value as ESP here? I=
=20
    think it more meet the original concept of Next=20
    Header.</SPAN></FONT><o:p></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
    style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Maybe I am missing=20
    something</SPAN></FONT><o:p></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
    style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Regards</SPAN></FONT><o:p=
></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
    style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Qiu=20
    Ying</SPAN></FONT><o:p></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
    style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
    <BLOCKQUOTE=20
    style=3D"BORDER-BOTTOM: medium none; BORDER-LEFT: black 1.5pt solid; PA=
DDING-BOTTOM: 0in; MARGIN: 5pt 0in 5pt 3.75pt; PADDING-LEFT: 4pt; PADDING-R=
IGHT: 0in; BORDER-TOP: medium none; BORDER-RIGHT: medium none; PADDING-TOP:=
 0in">
      <DIV>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">----- Original Message =
-----=20
      <o:p></o:p></SPAN></FONT></P></DIV>
      <DIV style=3D"font-color: black">
      <P style=3D"BACKGROUND: #e4e4e4" class=3DMsoNormal><B><FONT size=3D2=
=20
      face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">From=
:</SPAN></FONT></B><FONT=20
      size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 1=
0pt"> <A=20
      title=3Dken.grewal@intel.com href=3D"mailto:ken.grewal@intel.com">Gre=
wal,=20
      Ken</A> <o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">To:<=
/SPAN></FONT></B><FONT=20
      size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 1=
0pt"> <A=20
      title=3Dqiuying@i2r.a-star.edu.sg=20
      href=3D"mailto:qiuying@i2r.a-star.edu.sg">QIU Ying</A> ; <A=20
      title=3Dyaronf@checkpoint.com href=3D"mailto:yaronf@checkpoint.com">Y=
aron=20
      Sheffer</A> ; <A title=3Dipsec@ietf.org=20
      href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A>=20
      <o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">Sent=
:</SPAN></FONT></B><FONT=20
      size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 1=
0pt">=20
      Wednesday, July 15, 2009 1:31 AM<o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">Subj=
ect:</SPAN></FONT></B><FONT=20
      size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE: 1=
0pt"> RE:=20
      [IPsec] WG Last Call:=20
      draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FONT></P>=
</DIV>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
      style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DIV>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">Thanks Qiu=
 Ying -=20
      great observation. <o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp=
;</o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">We had ori=
ginally=20
      proposed using a bit from the WESP flags (integrity only) for=20
      differentiating between ESP-encrypted and ESP-NULL traffic, but chang=
ed=20
      this to using a value of zero in the next header for efficient encodi=
ng,=20
      although this is overloading the meaning of next header.=20
      <o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">With your=
=20
      observation, the current definition is not practical so we have the=
=20
      following options:<o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp=
;</o:p></SPAN></FONT></P>
      <OL style=3D"MARGIN-TOP: 0in" type=3D1>
        <LI style=3D"COLOR: navy; mso-list: l1 level1 lfo3" class=3DMsoNorm=
al><FONT=20
        color=3Dnavy size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Revert back to using =
a bit=20
        in the flags to differentiate between encrypted / NULL=20
        traffic.</SPAN></FONT> <FONT size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p></o:p></SPAN></F=
ONT>
        <LI style=3D"COLOR: navy; mso-list: l1 level1 lfo3" class=3DMsoNorm=
al><FONT=20
        color=3Dnavy size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Allocate a new protoc=
ol=20
        value for the next header field to indicate encrypted data, which s=
eems=20
        like an overkill.</SPAN></FONT> <FONT size=3D2 face=3DArial><SPAN=
=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p></o:p></SPAN></F=
ONT></LI></OL>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp=
;</o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">As we are =
already=20
      asking for a new protocol value for WESP, option 1 seems to be the be=
tter=20
      choice.<o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp=
;</o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">Other=20
      opinions?<o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp=
;</o:p></SPAN></FONT></P>
      <DIV>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D3 face=3D"Times New Ro=
man"><SPAN=20
      style=3D"COLOR: navy; FONT-SIZE: 12pt">Thanks, <o:p></o:p></SPAN></FO=
NT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D3 face=3D"Times New Ro=
man"><SPAN=20
      style=3D"COLOR: navy; FONT-SIZE: 12pt">-=20
      Ken<o:p></o:p></SPAN></FONT></P></DIV>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp=
;</o:p></SPAN></FONT></P>
      <DIV=20
      style=3D"BORDER-BOTTOM: medium none; BORDER-LEFT: blue 1.5pt solid; P=
ADDING-BOTTOM: 0in; PADDING-LEFT: 4pt; PADDING-RIGHT: 0in; BORDER-TOP: medi=
um none; BORDER-RIGHT: medium none; PADDING-TOP: 0in">
      <DIV>
      <DIV style=3D"TEXT-ALIGN: center" class=3DMsoNormal align=3Dcenter><F=
ONT size=3D3=20
      face=3D"Times New Roman"><SPAN style=3D"FONT-SIZE: 12pt">
      <HR tabIndex=3D-1 align=3Dcenter SIZE=3D2 width=3D"100%">
      </SPAN></FONT></DIV>
      <P class=3DMsoNormal><B><FONT size=3D2 face=3DTahoma><SPAN=20
      style=3D"FONT-FAMILY: Tahoma; FONT-SIZE: 10pt; FONT-WEIGHT: bold">Fro=
m:</SPAN></FONT></B><FONT=20
      size=3D2 face=3DTahoma><SPAN style=3D"FONT-FAMILY: Tahoma; FONT-SIZE:=
 10pt">=20
      <st1:PersonName w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonName>=
=20
      [mailto:<st1:PersonName w:st=3D"on">ipsec-bounces@ietf.org</st1:Perso=
nName>]=20
      <B><SPAN style=3D"FONT-WEIGHT: bold">On Behalf Of </SPAN></B>QIU=20
      Ying<BR><B><SPAN style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Tuesday=
, July=20
      14, 2009 12:37 AM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN><=
/B> QIU=20
      Ying; Yaron Sheffer; <st1:PersonName=20
      w:st=3D"on">ipsec@ietf.org</st1:PersonName><BR><B><SPAN=20
      style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [IPsec] WG Last C=
all:=20
      draft-ietf-ipsecme-traffic-visibility-05</SPAN></FONT><o:p></o:p></P>=
</DIV>
      <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
      style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Since the zero of&nbsp;=
next=20
      header&nbsp;value is used for HOPOPT already, maybe applying a new va=
lue=20
      for this intention is better to avoid the=20
      confliction.</SPAN></FONT><o:p></o:p></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
      style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Regards</SPAN></FONT><o=
:p></o:p></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Qiu=20
      Ying</SPAN></FONT><o:p></o:p></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
      style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
      <BLOCKQUOTE=20
      style=3D"BORDER-BOTTOM: medium none; BORDER-LEFT: black 1.5pt solid; =
PADDING-BOTTOM: 0in; MARGIN: 5pt 0in 5pt 3.75pt; PADDING-LEFT: 4pt; PADDING=
-RIGHT: 0in; BORDER-TOP: medium none; BORDER-RIGHT: medium none; PADDING-TO=
P: 0in">
        <DIV>
        <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">----- Original Messag=
e -----=20
        <o:p></o:p></SPAN></FONT></P></DIV>
        <DIV style=3D"font-color: black">
        <P style=3D"BACKGROUND: #e4e4e4" class=3DMsoNormal><B><FONT size=3D=
2=20
        face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">Fr=
om:</SPAN></FONT></B><FONT=20
        size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE:=
 10pt"> <A=20
        title=3Dqiuying@i2r.a-star.edu.sg=20
        href=3D"mailto:qiuying@i2r.a-star.edu.sg">QIU Ying</A>=20
        <o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">To=
:</SPAN></FONT></B><FONT=20
        size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE:=
 10pt"> <A=20
        title=3Dyaronf@checkpoint.com href=3D"mailto:yaronf@checkpoint.com"=
>Yaron=20
        Sheffer</A> ; <A title=3Dipsec@ietf.org=20
        href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A>=20
        <o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">Se=
nt:</SPAN></FONT></B><FONT=20
        size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE:=
 10pt">=20
        Tuesday, July 14, 2009 3:30 PM<o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">Su=
bject:</SPAN></FONT></B><FONT=20
        size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE:=
 10pt"> Re:=20
        [IPsec] WG Last Call:=20
        draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FONT></=
P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=
=20
        style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Regarding the Next He=
ader in=20
        section 2, what will be happened if the value of Next Header is zer=
o=20
        (i.e. IPv6 Hop-by-Hop option) and the packet is not=20
        encrypted?</SPAN></FONT><o:p></o:p></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=
=20
        style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Regards</SPAN></FONT>=
<o:p></o:p></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Qiu=20
        Ying</SPAN></FONT><o:p></o:p></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=
=20
        style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
        <BLOCKQUOTE=20
        style=3D"BORDER-BOTTOM: medium none; BORDER-LEFT: black 1.5pt solid=
; PADDING-BOTTOM: 0in; MARGIN: 5pt 0in 5pt 3.75pt; PADDING-LEFT: 4pt; PADDI=
NG-RIGHT: 0in; BORDER-TOP: medium none; BORDER-RIGHT: medium none; PADDING-=
TOP: 0in">
          <DIV>
          <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">----- Original Mess=
age=20
          ----- <o:p></o:p></SPAN></FONT></P></DIV>
          <DIV style=3D"font-color: black">
          <P style=3D"BACKGROUND: #e4e4e4" class=3DMsoNormal><B><FONT size=
=3D2=20
          face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">=
From:</SPAN></FONT></B><FONT=20
          size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZ=
E: 10pt">=20
          <A title=3Dyaronf@checkpoint.com=20
          href=3D"mailto:yaronf@checkpoint.com">Yaron Sheffer</A>=20
          <o:p></o:p></SPAN></FONT></P></DIV>
          <DIV>
          <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">=
To:</SPAN></FONT></B><FONT=20
          size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZ=
E: 10pt">=20
          <A title=3Dipsec@ietf.org=20
          href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A>=20
          <o:p></o:p></SPAN></FONT></P></DIV>
          <DIV>
          <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">=
Sent:</SPAN></FONT></B><FONT=20
          size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZ=
E: 10pt">=20
          Sunday, July 05, 2009 3:48 AM<o:p></o:p></SPAN></FONT></P></DIV>
          <DIV>
          <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">=
Subject:</SPAN></FONT></B><FONT=20
          size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZ=
E: 10pt">=20
          [IPsec] WG Last Call:=20
          draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FONT>=
</P></DIV>
          <DIV>
          <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPA=
N=20
          style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DI=
V>
          <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">This is the beginni=
ng of a=20
          two-week WG Last Call, which will end July 18. The target status =
for=20
          this document is Proposed Standard. The current document is at <A=
=20
          href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-vis=
ibility-05">http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibilit=
y-05</A>.<o:p></o:p></SPAN></FONT></P>
          <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p></=
SPAN></FONT></P>
          <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">If you have not rea=
d the=20
          document before now, please do so. Having fresh eyes on the docum=
ent=20
          often brings up important issues. If you HAVE read it before, ple=
ase=20
          note that there have been several revisions since <st1:place=20
          w:st=3D"on"><st1:City w:st=3D"on">San Francisco</st1:City></st1:p=
lace>, so=20
          you might want to read it again (plus it=92s a short document). S=
end any=20
          comments to the list, even if they are as simple as "I read it an=
d it=20
          seems fine".<o:p></o:p></SPAN></FONT></P>
          <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p></=
SPAN></FONT></P>
          <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Please clearly indi=
cate=20
          the position of any issue in the Internet Draft, and if possible=
=20
          provide alternative text. Please also indicate the nature or seve=
rity=20
          of the error or correction, e.g. major technical, minor technical=
,=20
          nit, so that we can quickly judge the extent of problems with the=
=20
          document.<o:p></o:p></SPAN></FONT></P>
          <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p></=
SPAN></FONT></P>
          <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Thanks,<o:p></o:p><=
/SPAN></FONT></P>
          <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
          Yaron<o:p></o:p></SPAN></FONT></P>
          <DIV style=3D"TEXT-ALIGN: center" class=3DMsoNormal align=3Dcente=
r><FONT=20
          size=3D3 face=3D"Times New Roman"><SPAN style=3D"FONT-SIZE: 12pt">
          <HR align=3Dcenter SIZE=3D2 width=3D"100%">
          </SPAN></FONT></DIV>
          <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPA=
N=20
          style=3D"FONT-SIZE: 12pt">_______________________________________=
________<BR>IPsec=20
          mailing=20
          list<BR>IPsec@ietf.org<BR>https://www.ietf.org/mailman/listinfo/i=
psec<o:p></o:p></SPAN></FONT></P></BLOCKQUOTE></BLOCKQUOTE>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
      style=3D"FONT-SIZE: 12pt">Institute for Infocomm Research disclaimer:=
 "This=20
      email is confidential and may be privileged. If you are not the inten=
ded=20
      recipient, please delete it and notify us immediately. Please do not =
copy=20
      or use it for any purpose, or disclose its contents to any other pers=
on.=20
      Thank you."<o:p></o:p></SPAN></FONT></P></DIV></DIV></BLOCKQUOTE>
    <DIV>
    <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
    style=3D"FONT-SIZE: 12pt">Institute for Infocomm Research disclaimer: "=
This=20
    email is confidential and may be privileged. If you are not the intende=
d=20
    recipient, please delete it and notify us immediately. Please do not co=
py or=20
    use it for any purpose, or disclose its contents to any other person. T=
hank=20
    you."<o:p></o:p></SPAN></FONT></P></DIV></DIV></DIV></BLOCKQUOTE></BLOC=
KQUOTE>
<DIV>
Institute for Infocomm Research disclaimer:  &quot;This email is confidenti=
al and may be privileged. If you are not the intended recipient, please del=
ete it and notify us immediately. Please do not copy or use it for any purp=
ose, or disclose its contents to any other person. Thank you.&quot;<BR>
</DIV></BODY></HTML>

------=_NextPart_000_0056_01CA0627.B5A60CD0--


From qiuying@i2r.a-star.edu.sg  Thu Jul 16 00:54:33 2009
Return-Path: <qiuying@i2r.a-star.edu.sg>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 68B143A69BD for <ipsec@core3.amsl.com>; Thu, 16 Jul 2009 00:54:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.753
X-Spam-Level: 
X-Spam-Status: No, score=-1.753 tagged_above=-999 required=5 tests=[AWL=0.845,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n0290VCozQqe for <ipsec@core3.amsl.com>; Thu, 16 Jul 2009 00:54:31 -0700 (PDT)
Received: from gw1.scei.a-star.edu.sg (gw1.scei.a-star.edu.sg [192.122.140.10]) by core3.amsl.com (Postfix) with ESMTP id 3E2B23A6998 for <ipsec@ietf.org>; Thu, 16 Jul 2009 00:54:28 -0700 (PDT)
Received: from mailfe01.teak.local.net ([10.217.253.173]) by gw1.scei.a-star.edu.sg (8.14.1/8.14.1) with ESMTP id n6G7Y2Te004134;  Thu, 16 Jul 2009 15:34:02 +0800
Received: from t3400 ([10.217.141.123]) by mailfe01.teak.local.net with Microsoft SMTPSVC(6.0.3790.3959); Thu, 16 Jul 2009 15:35:38 +0800
Message-ID: <449470331FD44A268216A4EDA48EDC52@t3400>
From: "QIU Ying" <qiuying@i2r.a-star.edu.sg>
To: "QIU Ying" <qiuying@i2r.a-star.edu.sg>, "Bhatia, Manav \(Manav\)" <manav@alcatel-lucent.com>, "Grewal, Ken" <ken.grewal@intel.com>, "Yaron Sheffer" <yaronf@checkpoint.com>, <ipsec@ietf.org>
References: <2E5D69B62A99425C894AA9B258004990@t3400><C49B4B6450D9AA48AB99694D2EB0A4832C2438DC@rrsmsx505.amr.corp.intel.com><E12B577D22E64DE1806D838CDC751259@t3400><C49B4B6450D9AA48AB99694D2EB0A4832C24406A@rrsmsx505.amr.corp.intel.com><7C362EEF9C7896468B36C9B79200D8350A1C4BC25F@INBANSXCHMBSA1.in.alcatel-lucent.com> <4EB8BD054AA343E79C6233E451202CBB@t3400>
Date: Thu, 16 Jul 2009 15:31:27 +0800
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0073_01CA062A.7C0ADC00"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.5512
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579
X-OriginalArrivalTime: 16 Jul 2009 07:35:38.0002 (UTC) FILETIME=[03564F20:01CA05E8]
X-Proofpoint-Virus-Version: vendor=fsecure engine=1.12.8161:2.4.5, 1.2.40, 4.0.166 definitions=2009-07-16_03:2009-07-03, 2009-07-16, 2009-07-15 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 ipscore=0 phishscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx engine=5.0.0-0811170000 definitions=main-0907160002
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jul 2009 07:54:33 -0000

This is a multi-part message in MIME format.

------=_NextPart_000_0073_01CA062A.7C0ADC00
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Oh, maybe I misunderstood Manav's thought.

Perhaps Manav's meaning is that WESP carries an ESP-null packet which trail=
er next header is happened ESP. It will cause the conflict. But I do not th=
ink this assumption were practical.

Regards
Qiu Ying



  ----- Original Message -----=20
  From: QIU Ying=20
  To: Bhatia, Manav (Manav) ; Grewal, Ken ; Yaron Sheffer ; ipsec@ietf.org=
=20
  Sent: Thursday, July 16, 2009 3:11 PM
  Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-=
05


  Hi, Manav

  0xFF (255) is reserved by IANA. Maybe you are correct that IANA  would ne=
ver release the special number to a document. But it is risk for a long ter=
m RFC.

  If I am not wrong, Ken's meaning is to set the next header as ESP if carr=
ying an ESP packet inside it. Otherwise, still use the same value of the ne=
xt header in ESP trailer. So it seems acceptable.

  Regards
  Qiu Ying


    ----- Original Message -----=20
    From: Bhatia, Manav (Manav)=20
    To: Grewal, Ken ; QIU Ying ; Yaron Sheffer ; ipsec@ietf.org=20
    Sent: Thursday, July 16, 2009 2:27 PM
    Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibilit=
y-05


    We can use ESP as the next header to denote encryption being used as lo=
ng as we are sure that we will never have an ESP packet inside the WESP enc=
apsulation. In my view there is nothing that precludes that from happening,=
 which means that we may have some corner cases where WESP may actually be =
carrying an ESP packet inside it. Given this, i would rather that we don't =
use the ESP value to denote encryption being used.

    I am also not a big fan of the encryption bit as that takes away one bi=
t from the already limited number of bits that we have at our disposal in t=
he flags field.

    Given that a packet will never carry a protocol ID of 0xFF i propose to=
 use this value in the next-header to denote encryption being used. Would t=
his work?

    Cheers, Manav



--------------------------------------------------------------------------
      From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behal=
f Of Grewal, Ken
      Sent: Wednesday, July 15, 2009 8.57 PM
      To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
      Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibil=
ity-05


      Qiu Ying,=20

      Copying the value of the ESP next header to the WESP next header is u=
seful for efficient HW parsing when using ESP-NULL.=20

      You are correct that in the case of encrypted traffic, we can set thi=
s value to 'ESP', which could denote that the payload is encrypted.=20

      Having said that, some people in the past have mentioned that it may =
be cleaner to have a dedicated bit to denote whether the payload is encrypt=
ed or using ESP-NULL.

=20=20=20=20=20=20=20

      Either way works, as long as there is a discrete, unambiguous way to =
denote this.=20=20

=20=20=20=20=20=20=20

      Thanks,=20

      - Ken

=20=20=20=20=20=20=20


--------------------------------------------------------------------------

      From: QIU Ying [mailto:qiuying@i2r.a-star.edu.sg]=20
      Sent: Tuesday, July 14, 2009 7:42 PM
      To: Grewal, Ken; Yaron Sheffer; ipsec@ietf.org
      Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibil=
ity-05

=20=20=20=20=20=20=20

      Hi, Ken

=20=20=20=20=20=20=20

      Agree that Option 1 is better as it applies lesser new IANA numbers. =
But in this case, it seems redundancy to copy the value of Next Header fiel=
d in the ESP trailer to here. How about simply setting the value as ESP her=
e? I think it more meet the original concept of Next Header.

=20=20=20=20=20=20=20

      Maybe I am missing something

=20=20=20=20=20=20=20

      Regards

      Qiu Ying

=20=20=20=20=20=20=20

        ----- Original Message -----=20

        From: Grewal, Ken=20

        To: QIU Ying ; Yaron Sheffer ; ipsec@ietf.org=20

        Sent: Wednesday, July 15, 2009 1:31 AM

        Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visib=
ility-05

=20=20=20=20=20=20=20=20=20

        Thanks Qiu Ying - great observation.=20

=20=20=20=20=20=20=20=20=20

        We had originally proposed using a bit from the WESP flags (integri=
ty only) for differentiating between ESP-encrypted and ESP-NULL traffic, bu=
t changed this to using a value of zero in the next header for efficient en=
coding, although this is overloading the meaning of next header.=20

        With your observation, the current definition is not practical so w=
e have the following options:

=20=20=20=20=20=20=20=20=20

          1.. Revert back to using a bit in the flags to differentiate betw=
een encrypted / NULL traffic.=20
          2.. Allocate a new protocol value for the next header field to in=
dicate encrypted data, which seems like an overkill.=20
=20=20=20=20=20=20=20=20=20

        As we are already asking for a new protocol value for WESP, option =
1 seems to be the better choice.

=20=20=20=20=20=20=20=20=20

        Other opinions?

=20=20=20=20=20=20=20=20=20

        Thanks,=20

        - Ken

=20=20=20=20=20=20=20=20=20


------------------------------------------------------------------------

        From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Beh=
alf Of QIU Ying
        Sent: Tuesday, July 14, 2009 12:37 AM
        To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
        Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visib=
ility-05

=20=20=20=20=20=20=20=20=20

        Since the zero of next header value is used for HOPOPT already, may=
be applying a new value for this intention is better to avoid the conflicti=
on.

=20=20=20=20=20=20=20=20=20

        Regards

        Qiu Ying

=20=20=20=20=20=20=20=20=20

          ----- Original Message -----=20

          From: QIU Ying=20

          To: Yaron Sheffer ; ipsec@ietf.org=20

          Sent: Tuesday, July 14, 2009 3:30 PM

          Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-vis=
ibility-05

=20=20=20=20=20=20=20=20=20=20=20

          Regarding the Next Header in section 2, what will be happened if =
the value of Next Header is zero (i.e. IPv6 Hop-by-Hop option) and the pack=
et is not encrypted?

=20=20=20=20=20=20=20=20=20=20=20

          Regards

          Qiu Ying

=20=20=20=20=20=20=20=20=20=20=20

            ----- Original Message -----=20

            From: Yaron Sheffer=20

            To: ipsec@ietf.org=20

            Sent: Sunday, July 05, 2009 3:48 AM

            Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visib=
ility-05

=20=20=20=20=20=20=20=20=20=20=20=20=20

            This is the beginning of a two-week WG Last Call, which will en=
d July 18. The target status for this document is Proposed Standard. The cu=
rrent document is at http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-=
visibility-05.

=20=20=20=20=20=20=20=20=20=20=20=20=20

            If you have not read the document before now, please do so. Hav=
ing fresh eyes on the document often brings up important issues. If you HAV=
E read it before, please note that there have been several revisions since =
San Francisco, so you might want to read it again (plus it's a short docume=
nt). Send any comments to the list, even if they are as simple as "I read i=
t and it seems fine".

=20=20=20=20=20=20=20=20=20=20=20=20=20

            Please clearly indicate the position of any issue in the Intern=
et Draft, and if possible provide alternative text. Please also indicate th=
e nature or severity of the error or correction, e.g. major technical, mino=
r technical, nit, so that we can quickly judge the extent of problems with =
the document.

=20=20=20=20=20=20=20=20=20=20=20=20=20

            Thanks,

                        Yaron


--------------------------------------------------------------------

            _______________________________________________
            IPsec mailing list
            IPsec@ietf.org
            https://www.ietf.org/mailman/listinfo/ipsec

        Institute for Infocomm Research disclaimer: "This email is confiden=
tial and may be privileged. If you are not the intended recipient, please d=
elete it and notify us immediately. Please do not copy or use it for any pu=
rpose, or disclose its contents to any other person. Thank you."

      Institute for Infocomm Research disclaimer: "This email is confidenti=
al and may be privileged. If you are not the intended recipient, please del=
ete it and notify us immediately. Please do not copy or use it for any purp=
ose, or disclose its contents to any other person. Thank you."

  Institute for Infocomm Research disclaimer: "This email is confidential a=
nd may be privileged. If you are not the intended recipient, please delete =
it and notify us immediately. Please do not copy or use it for any purpose,=
 or disclose its contents to any other person. Thank you."



---------------------------------------------------------------------------=
---


  _______________________________________________
  IPsec mailing list
  IPsec@ietf.org
  https://www.ietf.org/mailman/listinfo/ipsec

Institute for Infocomm Research disclaimer:  "This email is confidential an=
d may be privileged. If you are not the intended recipient, please delete i=
t and notify us immediately. Please do not copy or use it for any purpose, =
or disclose its contents to any other person. Thank you."

------=_NextPart_000_0073_01CA062A.7C0ADC00
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D=20
"urn:schemas-microsoft-com:vml" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word" xmlns:x =3D=20
"urn:schemas-microsoft-com:office:excel" xmlns:p =3D=20
"urn:schemas-microsoft-com:office:powerpoint" xmlns:a =3D=20
"urn:schemas-microsoft-com:office:access" xmlns:dt =3D=20
"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s =3D=20
"uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs =3D=20
"urn:schemas-microsoft-com:rowset" xmlns:z =3D "#RowsetSchema" xmlns:b =3D=
=20
"urn:schemas-microsoft-com:office:publisher" xmlns:ss =3D=20
"urn:schemas-microsoft-com:office:spreadsheet" xmlns:c =3D=20
"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns:odc =3D=20
"urn:schemas-microsoft-com:office:odc" xmlns:oa =3D=20
"urn:schemas-microsoft-com:office:activation" xmlns:html =3D=20
"http://www.w3.org/TR/REC-html40" xmlns:q =3D=20
"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc =3D=20
"http://microsoft.com/officenet/conferencing" XMLNS:D =3D "DAV:" XMLNS:Repl=
 =3D=20
"http://schemas.microsoft.com/repl/" xmlns:mt =3D=20
"http://schemas.microsoft.com/sharepoint/soap/meetings/" xmlns:x2 =3D=20
"http://schemas.microsoft.com/office/excel/2003/xml" xmlns:ppda =3D=20
"http://www.passport.com/NameSpace.xsd" xmlns:ois =3D=20
"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir =3D=20
"http://schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds =3D=20
"http://www.w3.org/2000/09/xmldsig#" xmlns:dsp =3D=20
"http://schemas.microsoft.com/sharepoint/dsp" xmlns:udc =3D=20
"http://schemas.microsoft.com/data/udc" xmlns:xsd =3D=20
"http://www.w3.org/2001/XMLSchema" xmlns:sub =3D=20
"http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/" xmlns:ec =3D=
=20
"http://www.w3.org/2001/04/xmlenc#" xmlns:sp =3D=20
"http://schemas.microsoft.com/sharepoint/" xmlns:sps =3D=20
"http://schemas.microsoft.com/sharepoint/soap/" xmlns:xsi =3D=20
"http://www.w3.org/2001/XMLSchema-instance" xmlns:udcs =3D=20
"http://schemas.microsoft.com/data/udc/soap" xmlns:udcxf =3D=20
"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udcp2p =3D=20
"http://schemas.microsoft.com/data/udc/parttopart" xmlns:st =3D "=01" xmlns=
:st1 =3D=20
"urn:schemas-microsoft-com:office:smarttags"><HEAD>
<META content=3D"text/html; charset=3Diso-8859-1" http-equiv=3DContent-Type>
<META name=3DGENERATOR content=3D"MSHTML 8.00.6001.18372"><!--[if !mso]>
<STYLE>v\:* {
	BEHAVIOR: url(#default#VML)
}
o\:* {
	BEHAVIOR: url(#default#VML)
}
w\:* {
	BEHAVIOR: url(#default#VML)
}
.shape {
	BEHAVIOR: url(#default#VML)
}
</STYLE>
<![endif]--><o:SmartTagType name=3D"City"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTagTyp=
e><o:SmartTagType=20
name=3D"place"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTagTyp=
e><o:SmartTagType=20
name=3D"PersonName"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTagTyp=
e><!--[if !mso]>
<STYLE>st1\:* {
	BEHAVIOR: url(#default#ieooui)
}
</STYLE>
<![endif]-->
<STYLE>@font-face {
	font-family: Tahoma;
}
@page Section1 {size: 8.5in 11.0in; margin: 1.0in 1.25in 1.0in 1.25in; }
P.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
LI.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
DIV.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
A:link {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlink {
	COLOR: blue; TEXT-DECORATION: underline
}
A:visited {
	COLOR: purple; TEXT-DECORATION: underline
}
SPAN.MsoHyperlinkFollowed {
	COLOR: purple; TEXT-DECORATION: underline
}
P {
	FONT-SIZE: 12pt; MARGIN-LEFT: 0in; MARGIN-RIGHT: 0in; FONT-FAMILY: "Times =
New Roman"; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto
}
SPAN.EmailStyle18 {
	COLOR: windowtext; FONT-FAMILY: Arial; mso-style-type: personal
}
SPAN.EmailStyle19 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal
}
SPAN.EmailStyle20 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal-reply
}
DIV.Section1 {
	page: Section1
}
OL {
	MARGIN-BOTTOM: 0in
}
UL {
	MARGIN-BOTTOM: 0in
}
</STYLE>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]--></HEAD>
<BODY lang=3DEN-US link=3Dblue bgColor=3Dwhite vLink=3Dpurple>
<DIV><FONT size=3D2 face=3DArial>
<DIV><FONT size=3D2 face=3DArial>Oh, maybe I misunderstood Manav's=20
thought.</FONT></DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2 face=3DArial>Perhaps Manav's meaning is&nbsp;that WESP =
carries=20
an ESP-null packet which trailer&nbsp;next header is happened ESP. It will =
cause=20
the conflict. But I do not think this assumption were practical.</FONT></DI=
V>
<DIV>&nbsp;</DIV>
<DIV>Regards</DIV>
<DIV>Qiu Ying</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;</DIV></FONT></DIV>
<BLOCKQUOTE=20
style=3D"BORDER-LEFT: #000000 2px solid; PADDING-LEFT: 5px; PADDING-RIGHT: =
0px; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px">
  <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV>
  <DIV=20
  style=3D"FONT: 10pt arial; BACKGROUND: #e4e4e4; font-color: black"><B>Fro=
m:</B>=20
  <A title=3Dqiuying@i2r.a-star.edu.sg href=3D"mailto:qiuying@i2r.a-star.ed=
u.sg">QIU=20
  Ying</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A title=3Dmanav@alcatel-lucen=
t.com=20
  href=3D"mailto:manav@alcatel-lucent.com">Bhatia, Manav (Manav)</A> ; <A=
=20
  title=3Dken.grewal@intel.com href=3D"mailto:ken.grewal@intel.com">Grewal,=
 Ken</A>=20
  ; <A title=3Dyaronf@checkpoint.com href=3D"mailto:yaronf@checkpoint.com">=
Yaron=20
  Sheffer</A> ; <A title=3Dipsec@ietf.org=20
  href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Thursday, July 16, 2009 3:11=
=20
  PM</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> Re: [IPsec] WG Last Call:=
=20
  draft-ietf-ipsecme-traffic-visibility-05</DIV>
  <DIV><BR></DIV>
  <DIV><FONT size=3D2 face=3DArial>Hi, Manav</FONT></DIV>
  <DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
  <DIV><FONT size=3D2 face=3DArial>0xFF (255) is reserved by IANA. Maybe yo=
u are=20
  correct that&nbsp;IANA &nbsp;would&nbsp;never release the special number =
to a=20
  document. But it is risk for a long term RFC.</FONT></DIV>
  <DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
  <DIV><FONT size=3D2 face=3DArial>If I am not wrong, Ken's meaning is to s=
et the=20
  next header as ESP if carrying an ESP packet inside it. Otherwise, still =
use=20
  the same value of the next header in ESP trailer. So it seems=20
  acceptable.</FONT></DIV>
  <DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
  <DIV><FONT size=3D2 face=3DArial>Regards</FONT></DIV>
  <DIV><FONT size=3D2 face=3DArial>Qiu Ying</FONT></DIV>
  <DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
  <DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
  <BLOCKQUOTE=20
  style=3D"BORDER-LEFT: #000000 2px solid; PADDING-LEFT: 5px; PADDING-RIGHT=
: 0px; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px"=20
  dir=3Dltr>
    <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV>
    <DIV=20
    style=3D"FONT: 10pt arial; BACKGROUND: #e4e4e4; font-color: black"><B>F=
rom:</B>=20
    <A title=3Dmanav@alcatel-lucent.com=20
    href=3D"mailto:manav@alcatel-lucent.com">Bhatia, Manav (Manav)</A> </DI=
V>
    <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A title=3Dken.grewal@intel.=
com=20
    href=3D"mailto:ken.grewal@intel.com">Grewal, Ken</A> ; <A=20
    title=3Dqiuying@i2r.a-star.edu.sg href=3D"mailto:qiuying@i2r.a-star.edu=
.sg">QIU=20
    Ying</A> ; <A title=3Dyaronf@checkpoint.com=20
    href=3D"mailto:yaronf@checkpoint.com">Yaron Sheffer</A> ; <A=20
    title=3Dipsec@ietf.org href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A=
> </DIV>
    <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Thursday, July 16, 2009 2:=
27=20
    PM</DIV>
    <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> RE: [IPsec] WG Last Cal=
l:=20
    draft-ietf-ipsecme-traffic-visibility-05</DIV>
    <DIV><BR></DIV>
    <DIV dir=3Dltr align=3Dleft>
    <DIV dir=3Dltr align=3Dleft><SPAN class=3D457021906-16072009><FONT colo=
r=3D#0000ff=20
    size=3D2 face=3DArial>We can use ESP as the next header to denote encry=
ption=20
    being used as long as we are sure that we will never have an ESP packet=
=20
    inside the WESP encapsulation. In my view there is nothing that preclud=
es=20
    that from happening, which means that we may have some corner cases whe=
re=20
    WESP may actually be carrying an ESP packet inside it. Given this, i wo=
uld=20
    rather that we don't use the ESP value to denote encryption being=20
    used.</FONT></SPAN></DIV>
    <DIV><SPAN class=3D457021906-16072009><FONT color=3D#0000ff size=3D2=20
    face=3DArial></FONT></SPAN>&nbsp;</DIV>
    <DIV><SPAN class=3D457021906-16072009><FONT color=3D#0000ff size=3D2 fa=
ce=3DArial>I=20
    am also not a big fan of the encryption bit as that takes away one bit =
from=20
    the already limited number of bits that we have at our disposal in&nbsp=
;the=20
    flags field.</FONT></SPAN></DIV>
    <DIV><SPAN class=3D457021906-16072009><FONT color=3D#0000ff size=3D2=20
    face=3DArial></FONT></SPAN>&nbsp;</DIV>
    <DIV><SPAN class=3D457021906-16072009><FONT color=3D#0000ff size=3D2=20
    face=3DArial>Given that a packet will never carry a protocol ID of 0xFF=
 i=20
    propose to&nbsp;use&nbsp;this value in the next-header to denote encryp=
tion=20
    being used. Would this work?</FONT></SPAN></DIV>
    <DIV><SPAN class=3D457021906-16072009><FONT color=3D#0000ff size=3D2=20
    face=3DArial></FONT></SPAN>&nbsp;</DIV>
    <DIV><SPAN class=3D457021906-16072009><FONT color=3D#0000ff size=3D2=20
    face=3DArial>Cheers, Manav</FONT></SPAN></DIV></DIV><BR>
    <BLOCKQUOTE=20
    style=3D"BORDER-LEFT: #0000ff 2px solid; PADDING-LEFT: 5px; MARGIN-LEFT=
: 5px; MARGIN-RIGHT: 0px"=20
    dir=3Dltr>
      <DIV dir=3Dltr lang=3Den-us class=3DOutlookMessageHeader align=3Dleft>
      <HR tabIndex=3D-1>
      <FONT size=3D2 face=3DTahoma><B>From:</B> ipsec-bounces@ietf.org=20
      [mailto:ipsec-bounces@ietf.org] <B>On Behalf Of </B>Grewal,=20
      Ken<BR><B>Sent:</B> Wednesday, July 15, 2009 8.57 PM<BR><B>To:</B> QI=
U=20
      Ying; Yaron Sheffer; ipsec@ietf.org<BR><B>Subject:</B> Re: [IPsec] WG=
 Last=20
      Call: draft-ietf-ipsecme-traffic-visibility-05<BR></FONT><BR></DIV>
      <DIV></DIV>
      <DIV class=3DSection1>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">Qiu Ying,=
=20
      <o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">Copying th=
e value=20
      of the ESP next header to the WESP next header is useful for efficien=
t HW=20
      parsing when using ESP-NULL. <o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">You are co=
rrect=20
      that in the case of encrypted traffic, we can set this value to =91ES=
P=92,=20
      which could denote that the payload is encrypted.=20
      <o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">Having sai=
d that,=20
      some people in the past have mentioned that it may be cleaner to have=
 a=20
      dedicated bit to denote whether the payload is encrypted or using=20
      ESP-NULL.<o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp=
;</o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">Either way=
 works,=20
      as long as there is a discrete, unambiguous way to denote this.=20
      &nbsp;<o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp=
;</o:p></SPAN></FONT></P>
      <DIV>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D3 face=3D"Times New Ro=
man"><SPAN=20
      style=3D"COLOR: navy; FONT-SIZE: 12pt">Thanks, <o:p></o:p></SPAN></FO=
NT></P>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D3 face=3D"Times New Ro=
man"><SPAN=20
      style=3D"COLOR: navy; FONT-SIZE: 12pt">-=20
      Ken<o:p></o:p></SPAN></FONT></P></DIV>
      <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
      style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nbsp=
;</o:p></SPAN></FONT></P>
      <DIV=20
      style=3D"BORDER-BOTTOM: medium none; BORDER-LEFT: blue 1.5pt solid; P=
ADDING-BOTTOM: 0in; PADDING-LEFT: 4pt; PADDING-RIGHT: 0in; BORDER-TOP: medi=
um none; BORDER-RIGHT: medium none; PADDING-TOP: 0in">
      <DIV>
      <DIV style=3D"TEXT-ALIGN: center" class=3DMsoNormal align=3Dcenter><F=
ONT size=3D3=20
      face=3D"Times New Roman"><SPAN style=3D"FONT-SIZE: 12pt">
      <HR tabIndex=3D-1 align=3Dcenter SIZE=3D2 width=3D"100%">
      </SPAN></FONT></DIV>
      <P class=3DMsoNormal><B><FONT size=3D2 face=3DTahoma><SPAN=20
      style=3D"FONT-FAMILY: Tahoma; FONT-SIZE: 10pt; FONT-WEIGHT: bold">Fro=
m:</SPAN></FONT></B><FONT=20
      size=3D2 face=3DTahoma><SPAN style=3D"FONT-FAMILY: Tahoma; FONT-SIZE:=
 10pt"> QIU=20
      Ying [mailto:qiuying@i2r.a-star.edu.sg] <BR><B><SPAN=20
      style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Tuesday, July 14, 2009 7=
:42=20
      PM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> Grewal, Ken=
; Yaron=20
      Sheffer; <st1:PersonName=20
      w:st=3D"on">ipsec@ietf.org</st1:PersonName><BR><B><SPAN=20
      style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [IPsec] WG Last C=
all:=20
      draft-ietf-ipsecme-traffic-visibility-05</SPAN></FONT><o:p></o:p></P>=
</DIV>
      <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
      style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Hi,=20
      Ken</SPAN></FONT><o:p></o:p></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
      style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Agree that&nbsp;Option =
1 is=20
      better as it applies lesser new IANA numbers. But in this case, it=20
      seems&nbsp;redundancy to copy the value of Next Header field in the E=
SP=20
      trailer to here. How about simply&nbsp;setting the value as ESP here?=
 I=20
      think it more meet the original concept of Next=20
      Header.</SPAN></FONT><o:p></o:p></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
      style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Maybe I am missing=20
      something</SPAN></FONT><o:p></o:p></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
      style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Regards</SPAN></FONT><o=
:p></o:p></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
      style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Qiu=20
      Ying</SPAN></FONT><o:p></o:p></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
      style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
      <BLOCKQUOTE=20
      style=3D"BORDER-BOTTOM: medium none; BORDER-LEFT: black 1.5pt solid; =
PADDING-BOTTOM: 0in; MARGIN: 5pt 0in 5pt 3.75pt; PADDING-LEFT: 4pt; PADDING=
-RIGHT: 0in; BORDER-TOP: medium none; BORDER-RIGHT: medium none; PADDING-TO=
P: 0in">
        <DIV>
        <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">----- Original Messag=
e -----=20
        <o:p></o:p></SPAN></FONT></P></DIV>
        <DIV style=3D"font-color: black">
        <P style=3D"BACKGROUND: #e4e4e4" class=3DMsoNormal><B><FONT size=3D=
2=20
        face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">Fr=
om:</SPAN></FONT></B><FONT=20
        size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE:=
 10pt"> <A=20
        title=3Dken.grewal@intel.com href=3D"mailto:ken.grewal@intel.com">G=
rewal,=20
        Ken</A> <o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">To=
:</SPAN></FONT></B><FONT=20
        size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE:=
 10pt"> <A=20
        title=3Dqiuying@i2r.a-star.edu.sg=20
        href=3D"mailto:qiuying@i2r.a-star.edu.sg">QIU Ying</A> ; <A=20
        title=3Dyaronf@checkpoint.com href=3D"mailto:yaronf@checkpoint.com"=
>Yaron=20
        Sheffer</A> ; <A title=3Dipsec@ietf.org=20
        href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A>=20
        <o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">Se=
nt:</SPAN></FONT></B><FONT=20
        size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE:=
 10pt">=20
        Wednesday, July 15, 2009 1:31 AM<o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">Su=
bject:</SPAN></FONT></B><FONT=20
        size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZE:=
 10pt"> RE:=20
        [IPsec] WG Last Call:=20
        draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FONT></=
P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=
=20
        style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DIV>
        <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
        style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">Thanks Q=
iu Ying=20
        - great observation. <o:p></o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
        style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nb=
sp;</o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
        style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">We had=
=20
        originally proposed using a bit from the WESP flags (integrity only=
) for=20
        differentiating between ESP-encrypted and ESP-NULL traffic, but cha=
nged=20
        this to using a value of zero in the next header for efficient enco=
ding,=20
        although this is overloading the meaning of next header.=20
        <o:p></o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
        style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">With you=
r=20
        observation, the current definition is not practical so we have the=
=20
        following options:<o:p></o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
        style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nb=
sp;</o:p></SPAN></FONT></P>
        <OL style=3D"MARGIN-TOP: 0in" type=3D1>
          <LI style=3D"COLOR: navy; mso-list: l1 level1 lfo3"=20
          class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Revert back to usin=
g a bit=20
          in the flags to differentiate between encrypted / NULL=20
          traffic.</SPAN></FONT> <FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p></o:p></SPAN><=
/FONT>
          <LI style=3D"COLOR: navy; mso-list: l1 level1 lfo3"=20
          class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Allocate a new prot=
ocol=20
          value for the next header field to indicate encrypted data, which=
=20
          seems like an overkill.</SPAN></FONT> <FONT size=3D2 face=3DArial=
><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p></o:p></SPAN><=
/FONT></LI></OL>
        <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
        style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nb=
sp;</o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
        style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">As we ar=
e=20
        already asking for a new protocol value for WESP, option 1 seems to=
 be=20
        the better choice.<o:p></o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
        style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nb=
sp;</o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
        style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt">Other=20
        opinions?<o:p></o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
        style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nb=
sp;</o:p></SPAN></FONT></P>
        <DIV>
        <P class=3DMsoNormal><FONT color=3Dnavy size=3D3 face=3D"Times New =
Roman"><SPAN=20
        style=3D"COLOR: navy; FONT-SIZE: 12pt">Thanks,=20
        <o:p></o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT color=3Dnavy size=3D3 face=3D"Times New =
Roman"><SPAN=20
        style=3D"COLOR: navy; FONT-SIZE: 12pt">-=20
        Ken<o:p></o:p></SPAN></FONT></P></DIV>
        <P class=3DMsoNormal><FONT color=3Dnavy size=3D2 face=3DArial><SPAN=
=20
        style=3D"FONT-FAMILY: Arial; COLOR: navy; FONT-SIZE: 10pt"><o:p>&nb=
sp;</o:p></SPAN></FONT></P>
        <DIV=20
        style=3D"BORDER-BOTTOM: medium none; BORDER-LEFT: blue 1.5pt solid;=
 PADDING-BOTTOM: 0in; PADDING-LEFT: 4pt; PADDING-RIGHT: 0in; BORDER-TOP: me=
dium none; BORDER-RIGHT: medium none; PADDING-TOP: 0in">
        <DIV>
        <DIV style=3D"TEXT-ALIGN: center" class=3DMsoNormal align=3Dcenter>=
<FONT=20
        size=3D3 face=3D"Times New Roman"><SPAN style=3D"FONT-SIZE: 12pt">
        <HR tabIndex=3D-1 align=3Dcenter SIZE=3D2 width=3D"100%">
        </SPAN></FONT></DIV>
        <P class=3DMsoNormal><B><FONT size=3D2 face=3DTahoma><SPAN=20
        style=3D"FONT-FAMILY: Tahoma; FONT-SIZE: 10pt; FONT-WEIGHT: bold">F=
rom:</SPAN></FONT></B><FONT=20
        size=3D2 face=3DTahoma><SPAN style=3D"FONT-FAMILY: Tahoma; FONT-SIZ=
E: 10pt">=20
        <st1:PersonName w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonName>=
=20
        [mailto:<st1:PersonName=20
        w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonName>] <B><SPAN=20
        style=3D"FONT-WEIGHT: bold">On Behalf Of </SPAN></B>QIU Ying<BR><B>=
<SPAN=20
        style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Tuesday, July 14, 2009=
 12:37=20
        AM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> QIU Ying;=
 Yaron=20
        Sheffer; <st1:PersonName=20
        w:st=3D"on">ipsec@ietf.org</st1:PersonName><BR><B><SPAN=20
        style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [IPsec] WG Last=
 Call:=20
        draft-ietf-ipsecme-traffic-visibility-05</SPAN></FONT><o:p></o:p></=
P></DIV>
        <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=
=20
        style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
        <DIV>
        <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Since the zero of&nbs=
p;next=20
        header&nbsp;value is used for HOPOPT already, maybe applying a new =
value=20
        for this intention is better to avoid the=20
        confliction.</SPAN></FONT><o:p></o:p></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=
=20
        style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Regards</SPAN></FONT>=
<o:p></o:p></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
        style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Qiu=20
        Ying</SPAN></FONT><o:p></o:p></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=
=20
        style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
        <BLOCKQUOTE=20
        style=3D"BORDER-BOTTOM: medium none; BORDER-LEFT: black 1.5pt solid=
; PADDING-BOTTOM: 0in; MARGIN: 5pt 0in 5pt 3.75pt; PADDING-LEFT: 4pt; PADDI=
NG-RIGHT: 0in; BORDER-TOP: medium none; BORDER-RIGHT: medium none; PADDING-=
TOP: 0in">
          <DIV>
          <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">----- Original Mess=
age=20
          ----- <o:p></o:p></SPAN></FONT></P></DIV>
          <DIV style=3D"font-color: black">
          <P style=3D"BACKGROUND: #e4e4e4" class=3DMsoNormal><B><FONT size=
=3D2=20
          face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">=
From:</SPAN></FONT></B><FONT=20
          size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZ=
E: 10pt">=20
          <A title=3Dqiuying@i2r.a-star.edu.sg=20
          href=3D"mailto:qiuying@i2r.a-star.edu.sg">QIU Ying</A>=20
          <o:p></o:p></SPAN></FONT></P></DIV>
          <DIV>
          <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">=
To:</SPAN></FONT></B><FONT=20
          size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZ=
E: 10pt">=20
          <A title=3Dyaronf@checkpoint.com=20
          href=3D"mailto:yaronf@checkpoint.com">Yaron Sheffer</A> ; <A=20
          title=3Dipsec@ietf.org href=3D"mailto:ipsec@ietf.org">ipsec@ietf.=
org</A>=20
          <o:p></o:p></SPAN></FONT></P></DIV>
          <DIV>
          <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">=
Sent:</SPAN></FONT></B><FONT=20
          size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZ=
E: 10pt">=20
          Tuesday, July 14, 2009 3:30 PM<o:p></o:p></SPAN></FONT></P></DIV>
          <DIV>
          <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold">=
Subject:</SPAN></FONT></B><FONT=20
          size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-SIZ=
E: 10pt">=20
          Re: [IPsec] WG Last Call:=20
          draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FONT>=
</P></DIV>
          <DIV>
          <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPA=
N=20
          style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DI=
V>
          <DIV>
          <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Regarding the Next =
Header=20
          in section 2, what will be happened if the value of Next Header i=
s=20
          zero (i.e. IPv6 Hop-by-Hop option) and the packet is not=20
          encrypted?</SPAN></FONT><o:p></o:p></P></DIV>
          <DIV>
          <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPA=
N=20
          style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DI=
V>
          <DIV>
          <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Regards</SPAN></FON=
T><o:p></o:p></P></DIV>
          <DIV>
          <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
          style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Qiu=20
          Ying</SPAN></FONT><o:p></o:p></P></DIV>
          <DIV>
          <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPA=
N=20
          style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DI=
V>
          <BLOCKQUOTE=20
          style=3D"BORDER-BOTTOM: medium none; BORDER-LEFT: black 1.5pt sol=
id; PADDING-BOTTOM: 0in; MARGIN: 5pt 0in 5pt 3.75pt; PADDING-LEFT: 4pt; PAD=
DING-RIGHT: 0in; BORDER-TOP: medium none; BORDER-RIGHT: medium none; PADDIN=
G-TOP: 0in">
            <DIV>
            <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
            style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">----- Original Me=
ssage=20
            ----- <o:p></o:p></SPAN></FONT></P></DIV>
            <DIV style=3D"font-color: black">
            <P style=3D"BACKGROUND: #e4e4e4" class=3DMsoNormal><B><FONT siz=
e=3D2=20
            face=3DArial><SPAN=20
            style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold=
">From:</SPAN></FONT></B><FONT=20
            size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-S=
IZE: 10pt">=20
            <A title=3Dyaronf@checkpoint.com=20
            href=3D"mailto:yaronf@checkpoint.com">Yaron Sheffer</A>=20
            <o:p></o:p></SPAN></FONT></P></DIV>
            <DIV>
            <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
            style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold=
">To:</SPAN></FONT></B><FONT=20
            size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-S=
IZE: 10pt">=20
            <A title=3Dipsec@ietf.org=20
            href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A>=20
            <o:p></o:p></SPAN></FONT></P></DIV>
            <DIV>
            <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
            style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold=
">Sent:</SPAN></FONT></B><FONT=20
            size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-S=
IZE: 10pt">=20
            Sunday, July 05, 2009 3:48 AM<o:p></o:p></SPAN></FONT></P></DIV>
            <DIV>
            <P class=3DMsoNormal><B><FONT size=3D2 face=3DArial><SPAN=20
            style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt; FONT-WEIGHT: bold=
">Subject:</SPAN></FONT></B><FONT=20
            size=3D2 face=3DArial><SPAN style=3D"FONT-FAMILY: Arial; FONT-S=
IZE: 10pt">=20
            [IPsec] WG Last Call:=20
            draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FON=
T></P></DIV>
            <DIV>
            <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><S=
PAN=20
            style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></=
DIV>
            <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
            style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">This is the begin=
ning of=20
            a two-week WG Last Call, which will end July 18. The target sta=
tus=20
            for this document is Proposed Standard. The current document is=
 at=20
            <A=20
            href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-v=
isibility-05">http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibil=
ity-05</A>.<o:p></o:p></SPAN></FONT></P>
            <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
            style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p>=
</SPAN></FONT></P>
            <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
            style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">If you have not r=
ead the=20
            document before now, please do so. Having fresh eyes on the doc=
ument=20
            often brings up important issues. If you HAVE read it before, p=
lease=20
            note that there have been several revisions since <st1:place=20
            w:st=3D"on"><st1:City w:st=3D"on">San Francisco</st1:City></st1=
:place>,=20
            so you might want to read it again (plus it=92s a short documen=
t).=20
            Send any comments to the list, even if they are as simple as "I=
 read=20
            it and it seems fine".<o:p></o:p></SPAN></FONT></P>
            <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
            style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p>=
</SPAN></FONT></P>
            <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
            style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Please clearly in=
dicate=20
            the position of any issue in the Internet Draft, and if possibl=
e=20
            provide alternative text. Please also indicate the nature or=20
            severity of the error or correction, e.g. major technical, mino=
r=20
            technical, nit, so that we can quickly judge the extent of prob=
lems=20
            with the document.<o:p></o:p></SPAN></FONT></P>
            <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
            style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt"><o:p>&nbsp;</o:p>=
</SPAN></FONT></P>
            <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
            style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">Thanks,<o:p></o:p=
></SPAN></FONT></P>
            <P class=3DMsoNormal><FONT size=3D2 face=3DArial><SPAN=20
            style=3D"FONT-FAMILY: Arial; FONT-SIZE: 10pt">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
            Yaron<o:p></o:p></SPAN></FONT></P>
            <DIV style=3D"TEXT-ALIGN: center" class=3DMsoNormal align=3Dcen=
ter><FONT=20
            size=3D3 face=3D"Times New Roman"><SPAN style=3D"FONT-SIZE: 12p=
t">
            <HR align=3Dcenter SIZE=3D2 width=3D"100%">
            </SPAN></FONT></DIV>
            <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><S=
PAN=20
            style=3D"FONT-SIZE: 12pt">_____________________________________=
__________<BR>IPsec=20
            mailing=20
            list<BR>IPsec@ietf.org<BR>https://www.ietf.org/mailman/listinfo=
/ipsec<o:p></o:p></SPAN></FONT></P></BLOCKQUOTE></BLOCKQUOTE>
        <DIV>
        <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=
=20
        style=3D"FONT-SIZE: 12pt">Institute for Infocomm Research disclaime=
r:=20
        "This email is confidential and may be privileged. If you are not t=
he=20
        intended recipient, please delete it and notify us immediately. Ple=
ase=20
        do not copy or use it for any purpose, or disclose its contents to =
any=20
        other person. Thank=20
      you."<o:p></o:p></SPAN></FONT></P></DIV></DIV></BLOCKQUOTE>
      <DIV>
      <P class=3DMsoNormal><FONT size=3D3 face=3D"Times New Roman"><SPAN=20
      style=3D"FONT-SIZE: 12pt">Institute for Infocomm Research disclaimer:=
 "This=20
      email is confidential and may be privileged. If you are not the inten=
ded=20
      recipient, please delete it and notify us immediately. Please do not =
copy=20
      or use it for any purpose, or disclose its contents to any other pers=
on.=20
      Thank=20
  you."<o:p></o:p></SPAN></FONT></P></DIV></DIV></DIV></BLOCKQUOTE></BLOCKQ=
UOTE>
  <DIV>Institute for Infocomm Research disclaimer: "This email is confident=
ial=20
  and may be privileged. If you are not the intended recipient, please dele=
te it=20
  and notify us immediately. Please do not copy or use it for any purpose, =
or=20
  disclose its contents to any other person. Thank you."<BR></DIV>
  <P>
  <HR>

  <P></P>_______________________________________________<BR>IPsec mailing=
=20
  list<BR>IPsec@ietf.org<BR>https://www.ietf.org/mailman/listinfo/ipsec<BR>=
</BLOCKQUOTE>
<DIV>
Institute for Infocomm Research disclaimer:  &quot;This email is confidenti=
al and may be privileged. If you are not the intended recipient, please del=
ete it and notify us immediately. Please do not copy or use it for any purp=
ose, or disclose its contents to any other person. Thank you.&quot;<BR>
</DIV></BODY></HTML>

------=_NextPart_000_0073_01CA062A.7C0ADC00--


From manav@alcatel-lucent.com  Thu Jul 16 01:00:16 2009
Return-Path: <manav@alcatel-lucent.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E02813A67EA for <ipsec@core3.amsl.com>; Thu, 16 Jul 2009 01:00:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zm79rJ2Ih4zx for <ipsec@core3.amsl.com>; Thu, 16 Jul 2009 01:00:05 -0700 (PDT)
Received: from hoemail1.alcatel.com (hoemail1.alcatel.com [192.160.6.148]) by core3.amsl.com (Postfix) with ESMTP id 848E23A6998 for <ipsec@ietf.org>; Thu, 16 Jul 2009 01:00:02 -0700 (PDT)
Received: from horh1.usa.alcatel.com (h172-22-218-55.lucent.com [172.22.218.55]) by hoemail1.alcatel.com (8.13.8/IER-o) with ESMTP id n6G7xTrS012797; Thu, 16 Jul 2009 02:59:29 -0500 (CDT)
Received: from mail.apac.alcatel-lucent.com (aprelay03.apac.alcatel-lucent.com [202.65.2.133]) by horh1.usa.alcatel.com (8.13.8/emsr) with ESMTP id n6G7xOrt028886; Thu, 16 Jul 2009 02:59:25 -0500 (CDT)
Received: from INBANSXCHHUB02.in.alcatel-lucent.com (inbansxchhub02.in.alcatel-lucent.com [135.250.12.35]) by mail.apac.alcatel-lucent.com (8.13.7/8.13.7/Alcanet1.0) with ESMTP id n6G88a9G023311; Thu, 16 Jul 2009 16:08:43 +0800
Received: from INBANSXCHMBSA1.in.alcatel-lucent.com ([135.250.12.50]) by INBANSXCHHUB02.in.alcatel-lucent.com ([135.250.12.35]) with mapi; Thu, 16 Jul 2009 13:29:14 +0530
From: "Bhatia, Manav (Manav)" <manav@alcatel-lucent.com>
To: QIU Ying <qiuying@i2r.a-star.edu.sg>, "Grewal, Ken" <ken.grewal@intel.com>, Yaron Sheffer <yaronf@checkpoint.com>, "ipsec@ietf.org" <ipsec@ietf.org>
Date: Thu, 16 Jul 2009 13:29:14 +0530
Thread-Topic: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
Thread-Index: AcoF59ajfgpSdLYJRd+9eTCK3sZZewAA0W5A
Message-ID: <7C362EEF9C7896468B36C9B79200D8350A1C4BC30E@INBANSXCHMBSA1.in.alcatel-lucent.com>
References: <2E5D69B62A99425C894AA9B258004990@t3400><C49B4B6450D9AA48AB99694D2EB0A4832C2438DC@rrsmsx505.amr.corp.intel.com><E12B577D22E64DE1806D838CDC751259@t3400><C49B4B6450D9AA48AB99694D2EB0A4832C24406A@rrsmsx505.amr.corp.intel.com><7C362EEF9C7896468B36C9B79200D8350A1C4BC25F@INBANSXCHMBSA1.in.alcatel-lucent.com> <4EB8BD054AA343E79C6233E451202CBB@t3400> <449470331FD44A268216A4EDA48EDC52@t3400>
In-Reply-To: <449470331FD44A268216A4EDA48EDC52@t3400>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_7C362EEF9C7896468B36C9B79200D8350A1C4BC30EINBANSXCHMBSA_"
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 172.22.12.27
X-Scanned-By: MIMEDefang 2.64 on 202.65.2.133
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jul 2009 08:00:17 -0000

--_000_7C362EEF9C7896468B36C9B79200D8350A1C4BC30EINBANSXCHMBSA_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Yes, this is what i had meant. I agree that i don't see a use case for this=
, but there is really nothing that precludes the possibility of having ESP-=
NULL in WESP.

Cheers, Manav

________________________________
From: QIU Ying [mailto:qiuying@i2r.a-star.edu.sg]
Sent: Thursday, July 16, 2009 1.01 PM
To: QIU Ying; Bhatia, Manav (Manav); Grewal, Ken; Yaron Sheffer; ipsec@ietf=
.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Oh, maybe I misunderstood Manav's thought.

Perhaps Manav's meaning is that WESP carries an ESP-null packet which trail=
er next header is happened ESP. It will cause the conflict. But I do not th=
ink this assumption were practical.

Regards
Qiu Ying



----- Original Message -----
From: QIU Ying<mailto:qiuying@i2r.a-star.edu.sg>
To: Bhatia, Manav (Manav)<mailto:manav@alcatel-lucent.com> ; Grewal, Ken<ma=
ilto:ken.grewal@intel.com> ; Yaron Sheffer<mailto:yaronf@checkpoint.com> ; =
ipsec@ietf.org<mailto:ipsec@ietf.org>
Sent: Thursday, July 16, 2009 3:11 PM
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Hi, Manav

0xFF (255) is reserved by IANA. Maybe you are correct that IANA  would neve=
r release the special number to a document. But it is risk for a long term =
RFC.

If I am not wrong, Ken's meaning is to set the next header as ESP if carryi=
ng an ESP packet inside it. Otherwise, still use the same value of the next=
 header in ESP trailer. So it seems acceptable.

Regards
Qiu Ying


----- Original Message -----
From: Bhatia, Manav (Manav)<mailto:manav@alcatel-lucent.com>
To: Grewal, Ken<mailto:ken.grewal@intel.com> ; QIU Ying<mailto:qiuying@i2r.=
a-star.edu.sg> ; Yaron Sheffer<mailto:yaronf@checkpoint.com> ; ipsec@ietf.o=
rg<mailto:ipsec@ietf.org>
Sent: Thursday, July 16, 2009 2:27 PM
Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

We can use ESP as the next header to denote encryption being used as long a=
s we are sure that we will never have an ESP packet inside the WESP encapsu=
lation. In my view there is nothing that precludes that from happening, whi=
ch means that we may have some corner cases where WESP may actually be carr=
ying an ESP packet inside it. Given this, i would rather that we don't use =
the ESP value to denote encryption being used.

I am also not a big fan of the encryption bit as that takes away one bit fr=
om the already limited number of bits that we have at our disposal in the f=
lags field.

Given that a packet will never carry a protocol ID of 0xFF i propose to use=
 this value in the next-header to denote encryption being used. Would this =
work?

Cheers, Manav

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of G=
rewal, Ken
Sent: Wednesday, July 15, 2009 8.57 PM
To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Qiu Ying,
Copying the value of the ESP next header to the WESP next header is useful =
for efficient HW parsing when using ESP-NULL.
You are correct that in the case of encrypted traffic, we can set this valu=
e to 'ESP', which could denote that the payload is encrypted.
Having said that, some people in the past have mentioned that it may be cle=
aner to have a dedicated bit to denote whether the payload is encrypted or =
using ESP-NULL.

Either way works, as long as there is a discrete, unambiguous way to denote=
 this.

Thanks,
- Ken

________________________________
From: QIU Ying [mailto:qiuying@i2r.a-star.edu.sg]
Sent: Tuesday, July 14, 2009 7:42 PM
To: Grewal, Ken; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Hi, Ken

Agree that Option 1 is better as it applies lesser new IANA numbers. But in=
 this case, it seems redundancy to copy the value of Next Header field in t=
he ESP trailer to here. How about simply setting the value as ESP here? I t=
hink it more meet the original concept of Next Header.

Maybe I am missing something

Regards
Qiu Ying

----- Original Message -----
From: Grewal, Ken<mailto:ken.grewal@intel.com>
To: QIU Ying<mailto:qiuying@i2r.a-star.edu.sg> ; Yaron Sheffer<mailto:yaron=
f@checkpoint.com> ; ipsec@ietf.org<mailto:ipsec@ietf.org>
Sent: Wednesday, July 15, 2009 1:31 AM
Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Thanks Qiu Ying - great observation.

We had originally proposed using a bit from the WESP flags (integrity only)=
 for differentiating between ESP-encrypted and ESP-NULL traffic, but change=
d this to using a value of zero in the next header for efficient encoding, =
although this is overloading the meaning of next header.
With your observation, the current definition is not practical so we have t=
he following options:


 1.  Revert back to using a bit in the flags to differentiate between encry=
pted / NULL traffic.
 2.  Allocate a new protocol value for the next header field to indicate en=
crypted data, which seems like an overkill.

As we are already asking for a new protocol value for WESP, option 1 seems =
to be the better choice.

Other opinions?

Thanks,
- Ken

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Q=
IU Ying
Sent: Tuesday, July 14, 2009 12:37 AM
To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Since the zero of next header value is used for HOPOPT already, maybe apply=
ing a new value for this intention is better to avoid the confliction.

Regards
Qiu Ying

----- Original Message -----
From: QIU Ying<mailto:qiuying@i2r.a-star.edu.sg>
To: Yaron Sheffer<mailto:yaronf@checkpoint.com> ; ipsec@ietf.org<mailto:ips=
ec@ietf.org>
Sent: Tuesday, July 14, 2009 3:30 PM
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Regarding the Next Header in section 2, what will be happened if the value =
of Next Header is zero (i.e. IPv6 Hop-by-Hop option) and the packet is not =
encrypted?

Regards
Qiu Ying

----- Original Message -----
From: Yaron Sheffer<mailto:yaronf@checkpoint.com>
To: ipsec@ietf.org<mailto:ipsec@ietf.org>
Sent: Sunday, July 05, 2009 3:48 AM
Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

This is the beginning of a two-week WG Last Call, which will end July 18. T=
he target status for this document is Proposed Standard. The current docume=
nt is at http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-0=
5.

If you have not read the document before now, please do so. Having fresh ey=
es on the document often brings up important issues. If you HAVE read it be=
fore, please note that there have been several revisions since San Francisc=
o, so you might want to read it again (plus it's a short document). Send an=
y comments to the list, even if they are as simple as "I read it and it see=
ms fine".

Please clearly indicate the position of any issue in the Internet Draft, an=
d if possible provide alternative text. Please also indicate the nature or =
severity of the error or correction, e.g. major technical, minor technical,=
 nit, so that we can quickly judge the extent of problems with the document=
.

Thanks,
            Yaron
________________________________
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
Institute for Infocomm Research disclaimer: "This email is confidential and=
 may be privileged. If you are not the intended recipient, please delete it=
 and notify us immediately. Please do not copy or use it for any purpose, o=
r disclose its contents to any other person. Thank you."
Institute for Infocomm Research disclaimer: "This email is confidential and=
 may be privileged. If you are not the intended recipient, please delete it=
 and notify us immediately. Please do not copy or use it for any purpose, o=
r disclose its contents to any other person. Thank you."
Institute for Infocomm Research disclaimer: "This email is confidential and=
 may be privileged. If you are not the intended recipient, please delete it=
 and notify us immediately. Please do not copy or use it for any purpose, o=
r disclose its contents to any other person. Thank you."

________________________________

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
Institute for Infocomm Research disclaimer: "This email is confidential and=
 may be privileged. If you are not the intended recipient, please delete it=
 and notify us immediately. Please do not copy or use it for any purpose, o=
r disclose its contents to any other person. Thank you."

--_000_7C362EEF9C7896468B36C9B79200D8350A1C4BC30EINBANSXCHMBSA_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D=20
"urn:schemas-microsoft-com:vml" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word" xmlns:x =3D=20
"urn:schemas-microsoft-com:office:excel" xmlns:p =3D=20
"urn:schemas-microsoft-com:office:powerpoint" xmlns:a =3D=20
"urn:schemas-microsoft-com:office:access" xmlns:dt =3D=20
"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s =3D=20
"uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs =3D=20
"urn:schemas-microsoft-com:rowset" xmlns:z =3D "#RowsetSchema" xmlns:b =3D=
=20
"urn:schemas-microsoft-com:office:publisher" xmlns:ss =3D=20
"urn:schemas-microsoft-com:office:spreadsheet" xmlns:c =3D=20
"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns:odc =3D=20
"urn:schemas-microsoft-com:office:odc" xmlns:oa =3D=20
"urn:schemas-microsoft-com:office:activation" xmlns:html =3D=20
"http://www.w3.org/TR/REC-html40" xmlns:q =3D=20
"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc =3D=20
"http://microsoft.com/officenet/conferencing" XMLNS:D =3D "DAV:" XMLNS:Repl=
 =3D=20
"http://schemas.microsoft.com/repl/" xmlns:mt =3D=20
"http://schemas.microsoft.com/sharepoint/soap/meetings/" xmlns:x2 =3D=20
"http://schemas.microsoft.com/office/excel/2003/xml" xmlns:ppda =3D=20
"http://www.passport.com/NameSpace.xsd" xmlns:ois =3D=20
"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir =3D=20
"http://schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds =3D=20
"http://www.w3.org/2000/09/xmldsig#" xmlns:dsp =3D=20
"http://schemas.microsoft.com/sharepoint/dsp" xmlns:udc =3D=20
"http://schemas.microsoft.com/data/udc" xmlns:xsd =3D=20
"http://www.w3.org/2001/XMLSchema" xmlns:sub =3D=20
"http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/" xmlns:ec =3D=
=20
"http://www.w3.org/2001/04/xmlenc#" xmlns:sp =3D=20
"http://schemas.microsoft.com/sharepoint/" xmlns:sps =3D=20
"http://schemas.microsoft.com/sharepoint/soap/" xmlns:xsi =3D=20
"http://www.w3.org/2001/XMLSchema-instance" xmlns:udcs =3D=20
"http://schemas.microsoft.com/data/udc/soap" xmlns:udcxf =3D=20
"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udcp2p =3D=20
"http://schemas.microsoft.com/data/udc/parttopart" xmlns:st =3D "=01" xmlns=
:st1 =3D=20
"urn:schemas-microsoft-com:office:smarttags"><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.2900.3492" name=3DGENERATOR><!--[if !mso]>
<STYLE>v\:* {
	BEHAVIOR: url(#default#VML)
}
o\:* {
	BEHAVIOR: url(#default#VML)
}
w\:* {
	BEHAVIOR: url(#default#VML)
}
.shape {
	BEHAVIOR: url(#default#VML)
}
</STYLE>
<![endif]--><o:SmartTagType=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"=20
name=3D"City"></o:SmartTagType><o:SmartTagType=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"=20
name=3D"place"></o:SmartTagType><o:SmartTagType=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"=20
name=3D"PersonName"></o:SmartTagType><!--[if !mso]>
<STYLE>st1\:* {
	BEHAVIOR: url(#default#ieooui)
}
</STYLE>
<![endif]-->
<STYLE>@font-face {
	font-family: Tahoma;
}
@page Section1 {size: 8.5in 11.0in; margin: 1.0in 1.25in 1.0in 1.25in; }
P.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
LI.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
DIV.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
A:link {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlink {
	COLOR: blue; TEXT-DECORATION: underline
}
A:visited {
	COLOR: purple; TEXT-DECORATION: underline
}
SPAN.MsoHyperlinkFollowed {
	COLOR: purple; TEXT-DECORATION: underline
}
P {
	FONT-SIZE: 12pt; MARGIN-LEFT: 0in; MARGIN-RIGHT: 0in; FONT-FAMILY: "Times =
New Roman"; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto
}
SPAN.EmailStyle18 {
	COLOR: windowtext; FONT-FAMILY: Arial; mso-style-type: personal
}
SPAN.EmailStyle19 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal
}
SPAN.EmailStyle20 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal-reply
}
DIV.Section1 {
	page: Section1
}
OL {
	MARGIN-BOTTOM: 0in
}
UL {
	MARGIN-BOTTOM: 0in
}
</STYLE>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]--></HEAD>
<BODY lang=3DEN-US vLink=3Dpurple link=3Dblue bgColor=3Dwhite>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D503485707-16072009><FONT face=3DA=
rial=20
color=3D#0000ff size=3D2>Yes, this is what i had meant. I agree that i don'=
t see a=20
use case for this, but there is really nothing that precludes the possibili=
ty of=20
having&nbsp;ESP-NULL in WESP.</FONT></SPAN></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D503485707-16072009><FONT face=3DA=
rial=20
color=3D#0000ff size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D503485707-16072009><FONT face=3DA=
rial=20
color=3D#0000ff size=3D2>Cheers, Manav</FONT></SPAN></DIV><BR>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px soli=
d; MARGIN-RIGHT: 0px">
  <DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr align=3Dleft>
  <HR tabIndex=3D-1>
  <FONT face=3DTahoma size=3D2><B>From:</B> QIU Ying=20
  [mailto:qiuying@i2r.a-star.edu.sg] <BR><B>Sent:</B> Thursday, July 16, 20=
09=20
  1.01 PM<BR><B>To:</B> QIU Ying; Bhatia, Manav (Manav); Grewal, Ken; Yaron=
=20
  Sheffer; ipsec@ietf.org<BR><B>Subject:</B> Re: [IPsec] WG Last Call:=20
  draft-ietf-ipsecme-traffic-visibility-05<BR></FONT><BR></DIV>
  <DIV></DIV>
  <DIV><FONT face=3DArial size=3D2>
  <DIV><FONT face=3DArial size=3D2>Oh, maybe I misunderstood Manav's=20
  thought.</FONT></DIV>
  <DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
  <DIV><FONT face=3DArial size=3D2>Perhaps Manav's meaning is&nbsp;that WES=
P carries=20
  an ESP-null packet which trailer&nbsp;next header is happened ESP. It wil=
l=20
  cause the conflict. But I do not think this assumption were=20
  practical.</FONT></DIV>
  <DIV>&nbsp;</DIV>
  <DIV>Regards</DIV>
  <DIV>Qiu Ying</DIV>
  <DIV>&nbsp;</DIV>
  <DIV>&nbsp;</DIV>
  <DIV>&nbsp;</DIV></FONT></DIV>
  <BLOCKQUOTE=20
  style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-=
LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
    <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV>
    <DIV=20
    style=3D"BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>F=
rom:</B>=20
    <A title=3Dqiuying@i2r.a-star.edu.sg=20
    href=3D"mailto:qiuying@i2r.a-star.edu.sg">QIU Ying</A> </DIV>
    <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A title=3Dmanav@alcatel-luc=
ent.com=20
    href=3D"mailto:manav@alcatel-lucent.com">Bhatia, Manav (Manav)</A> ; <A=
=20
    title=3Dken.grewal@intel.com href=3D"mailto:ken.grewal@intel.com">Grewa=
l,=20
    Ken</A> ; <A title=3Dyaronf@checkpoint.com=20
    href=3D"mailto:yaronf@checkpoint.com">Yaron Sheffer</A> ; <A=20
    title=3Dipsec@ietf.org href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A=
> </DIV>
    <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Thursday, July 16, 2009 3:=
11=20
    PM</DIV>
    <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> Re: [IPsec] WG Last Cal=
l:=20
    draft-ietf-ipsecme-traffic-visibility-05</DIV>
    <DIV><BR></DIV>
    <DIV><FONT face=3DArial size=3D2>Hi, Manav</FONT></DIV>
    <DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
    <DIV><FONT face=3DArial size=3D2>0xFF (255) is reserved by IANA. Maybe =
you are=20
    correct that&nbsp;IANA &nbsp;would&nbsp;never release the special numbe=
r to=20
    a document. But it is risk for a long term RFC.</FONT></DIV>
    <DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
    <DIV><FONT face=3DArial size=3D2>If I am not wrong, Ken's meaning is to=
 set the=20
    next header as ESP if carrying an ESP packet inside it. Otherwise, stil=
l use=20
    the same value of the next header in ESP trailer. So it seems=20
    acceptable.</FONT></DIV>
    <DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
    <DIV><FONT face=3DArial size=3D2>Regards</FONT></DIV>
    <DIV><FONT face=3DArial size=3D2>Qiu Ying</FONT></DIV>
    <DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
    <DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
    <BLOCKQUOTE dir=3Dltr=20
    style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDE=
R-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
      <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV>
      <DIV=20
      style=3D"BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B=
>From:</B>=20
      <A title=3Dmanav@alcatel-lucent.com=20
      href=3D"mailto:manav@alcatel-lucent.com">Bhatia, Manav (Manav)</A> </=
DIV>
      <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A title=3Dken.grewal@inte=
l.com=20
      href=3D"mailto:ken.grewal@intel.com">Grewal, Ken</A> ; <A=20
      title=3Dqiuying@i2r.a-star.edu.sg=20
      href=3D"mailto:qiuying@i2r.a-star.edu.sg">QIU Ying</A> ; <A=20
      title=3Dyaronf@checkpoint.com href=3D"mailto:yaronf@checkpoint.com">Y=
aron=20
      Sheffer</A> ; <A title=3Dipsec@ietf.org=20
      href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A> </DIV>
      <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Thursday, July 16, 2009 =
2:27=20
      PM</DIV>
      <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> RE: [IPsec] WG Last C=
all:=20
      draft-ietf-ipsecme-traffic-visibility-05</DIV>
      <DIV><BR></DIV>
      <DIV dir=3Dltr align=3Dleft>
      <DIV dir=3Dltr align=3Dleft><SPAN class=3D457021906-16072009><FONT fa=
ce=3DArial=20
      color=3D#0000ff size=3D2>We can use ESP as the next header to denote=
=20
      encryption being used as long as we are sure that we will never have =
an=20
      ESP packet inside the WESP encapsulation. In my view there is nothing=
 that=20
      precludes that from happening, which means that we may have some corn=
er=20
      cases where WESP may actually be carrying an ESP packet inside it. Gi=
ven=20
      this, i would rather that we don't use the ESP value to denote encryp=
tion=20
      being used.</FONT></SPAN></DIV>
      <DIV><SPAN class=3D457021906-16072009><FONT face=3DArial color=3D#000=
0ff=20
      size=3D2></FONT></SPAN>&nbsp;</DIV>
      <DIV><SPAN class=3D457021906-16072009><FONT face=3DArial color=3D#000=
0ff=20
      size=3D2>I am also not a big fan of the encryption bit as that takes =
away=20
      one bit from the already limited number of bits that we have at our=20
      disposal in&nbsp;the flags field.</FONT></SPAN></DIV>
      <DIV><SPAN class=3D457021906-16072009><FONT face=3DArial color=3D#000=
0ff=20
      size=3D2></FONT></SPAN>&nbsp;</DIV>
      <DIV><SPAN class=3D457021906-16072009><FONT face=3DArial color=3D#000=
0ff=20
      size=3D2>Given that a packet will never carry a protocol ID of 0xFF i=
=20
      propose to&nbsp;use&nbsp;this value in the next-header to denote=20
      encryption being used. Would this work?</FONT></SPAN></DIV>
      <DIV><SPAN class=3D457021906-16072009><FONT face=3DArial color=3D#000=
0ff=20
      size=3D2></FONT></SPAN>&nbsp;</DIV>
      <DIV><SPAN class=3D457021906-16072009><FONT face=3DArial color=3D#000=
0ff=20
      size=3D2>Cheers, Manav</FONT></SPAN></DIV></DIV><BR>
      <BLOCKQUOTE dir=3Dltr=20
      style=3D"PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2p=
x solid; MARGIN-RIGHT: 0px">
        <DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr align=3Dle=
ft>
        <HR tabIndex=3D-1>
        <FONT face=3DTahoma size=3D2><B>From:</B> ipsec-bounces@ietf.org=20
        [mailto:ipsec-bounces@ietf.org] <B>On Behalf Of </B>Grewal,=20
        Ken<BR><B>Sent:</B> Wednesday, July 15, 2009 8.57 PM<BR><B>To:</B> =
QIU=20
        Ying; Yaron Sheffer; ipsec@ietf.org<BR><B>Subject:</B> Re: [IPsec] =
WG=20
        Last Call: draft-ietf-ipsecme-traffic-visibility-05<BR></FONT><BR><=
/DIV>
        <DIV></DIV>
        <DIV class=3DSection1>
        <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=
=20
        style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Qiu Ying=
,=20
        <o:p></o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=
=20
        style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Copying =
the=20
        value of the ESP next header to the WESP next header is useful for=
=20
        efficient HW parsing when using ESP-NULL. <o:p></o:p></SPAN></FONT>=
</P>
        <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=
=20
        style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">You are =
correct=20
        that in the case of encrypted traffic, we can set this value to &#8=
216;ESP&#8217;,=20
        which could denote that the payload is encrypted.=20
        <o:p></o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=
=20
        style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Having s=
aid=20
        that, some people in the past have mentioned that it may be cleaner=
 to=20
        have a dedicated bit to denote whether the payload is encrypted or =
using=20
        ESP-NULL.<o:p></o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=
=20
        style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nb=
sp;</o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=
=20
        style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Either w=
ay=20
        works, as long as there is a discrete, unambiguous way to denote th=
is.=20
        &nbsp;<o:p></o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=
=20
        style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nb=
sp;</o:p></SPAN></FONT></P>
        <DIV>
        <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy si=
ze=3D3><SPAN=20
        style=3D"FONT-SIZE: 12pt; COLOR: navy">Thanks,=20
        <o:p></o:p></SPAN></FONT></P>
        <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy si=
ze=3D3><SPAN=20
        style=3D"FONT-SIZE: 12pt; COLOR: navy">-=20
        Ken<o:p></o:p></SPAN></FONT></P></DIV>
        <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=
=20
        style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nb=
sp;</o:p></SPAN></FONT></P>
        <DIV=20
        style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP:=
 medium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0in; BORDER-LEFT: blue 1.5=
pt solid; PADDING-TOP: 0in; BORDER-BOTTOM: medium none">
        <DIV>
        <DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" align=3Dcenter>=
<FONT=20
        face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt">
        <HR tabIndex=3D-1 align=3Dcenter width=3D"100%" SIZE=3D2>
        </SPAN></FONT></DIV>
        <P class=3DMsoNormal><B><FONT face=3DTahoma size=3D2><SPAN=20
        style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Tahoma">F=
rom:</SPAN></FONT></B><FONT=20
        face=3DTahoma size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY:=
 Tahoma">=20
        QIU Ying [mailto:qiuying@i2r.a-star.edu.sg] <BR><B><SPAN=20
        style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Tuesday, July 14, 2009=
 7:42=20
        PM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> Grewal, K=
en;=20
        Yaron Sheffer; <st1:PersonName=20
        w:st=3D"on">ipsec@ietf.org</st1:PersonName><BR><B><SPAN=20
        style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [IPsec] WG Last=
 Call:=20
        draft-ietf-ipsecme-traffic-visibility-05</SPAN></FONT><o:p></o:p></=
P></DIV>
        <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=
=20
        style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
        <DIV>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Hi,=20
        Ken</SPAN></FONT><o:p></o:p></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=
=20
        style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Agree that&nbsp;Optio=
n 1 is=20
        better as it applies lesser new IANA numbers. But in this case, it=
=20
        seems&nbsp;redundancy to copy the value of Next Header field in the=
 ESP=20
        trailer to here. How about simply&nbsp;setting the value as ESP her=
e? I=20
        think it more meet the original concept of Next=20
        Header.</SPAN></FONT><o:p></o:p></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=
=20
        style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Maybe I am missing=20
        something</SPAN></FONT><o:p></o:p></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=
=20
        style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Regards</SPAN></FONT>=
<o:p></o:p></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Qiu=20
        Ying</SPAN></FONT><o:p></o:p></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=
=20
        style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
        <BLOCKQUOTE=20
        style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP:=
 medium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0in; MARGIN: 5pt 0in 5pt 3=
.75pt; BORDER-LEFT: black 1.5pt solid; PADDING-TOP: 0in; BORDER-BOTTOM: med=
ium none">
          <DIV>
          <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">----- Original Mess=
age=20
          ----- <o:p></o:p></SPAN></FONT></P></DIV>
          <DIV style=3D"font-color: black">
          <P class=3DMsoNormal style=3D"BACKGROUND: #e4e4e4"><B><FONT face=
=3DArial=20
          size=3D2><SPAN=20
          style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">=
From:</SPAN></FONT></B><FONT=20
          face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY=
: Arial">=20
          <A title=3Dken.grewal@intel.com=20
          href=3D"mailto:ken.grewal@intel.com">Grewal, Ken</A>=20
          <o:p></o:p></SPAN></FONT></P></DIV>
          <DIV>
          <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">=
To:</SPAN></FONT></B><FONT=20
          face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY=
: Arial">=20
          <A title=3Dqiuying@i2r.a-star.edu.sg=20
          href=3D"mailto:qiuying@i2r.a-star.edu.sg">QIU Ying</A> ; <A=20
          title=3Dyaronf@checkpoint.com href=3D"mailto:yaronf@checkpoint.co=
m">Yaron=20
          Sheffer</A> ; <A title=3Dipsec@ietf.org=20
          href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A>=20
          <o:p></o:p></SPAN></FONT></P></DIV>
          <DIV>
          <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">=
Sent:</SPAN></FONT></B><FONT=20
          face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY=
: Arial">=20
          Wednesday, July 15, 2009 1:31 AM<o:p></o:p></SPAN></FONT></P></DI=
V>
          <DIV>
          <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">=
Subject:</SPAN></FONT></B><FONT=20
          face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY=
: Arial">=20
          RE: [IPsec] WG Last Call:=20
          draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FONT>=
</P></DIV>
          <DIV>
          <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPA=
N=20
          style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DI=
V>
          <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SP=
AN=20
          style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Thanks=
 Qiu=20
          Ying - great observation. <o:p></o:p></SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SP=
AN=20
          style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&=
nbsp;</o:p></SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SP=
AN=20
          style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">We had=
=20
          originally proposed using a bit from the WESP flags (integrity on=
ly)=20
          for differentiating between ESP-encrypted and ESP-NULL traffic, b=
ut=20
          changed this to using a value of zero in the next header for effi=
cient=20
          encoding, although this is overloading the meaning of next header=
.=20
          <o:p></o:p></SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SP=
AN=20
          style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">With y=
our=20
          observation, the current definition is not practical so we have t=
he=20
          following options:<o:p></o:p></SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SP=
AN=20
          style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&=
nbsp;</o:p></SPAN></FONT></P>
          <OL style=3D"MARGIN-TOP: 0in" type=3D1>
            <LI class=3DMsoNormal=20
            style=3D"COLOR: navy; mso-list: l1 level1 lfo3"><FONT face=3DAr=
ial=20
            color=3Dnavy size=3D2><SPAN=20
            style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Revert back to us=
ing a=20
            bit in the flags to differentiate between encrypted / NULL=20
            traffic.</SPAN></FONT> <FONT face=3DArial size=3D2><SPAN=20
            style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><o:p></o:p></SPAN=
></FONT>
            <LI class=3DMsoNormal=20
            style=3D"COLOR: navy; mso-list: l1 level1 lfo3"><FONT face=3DAr=
ial=20
            color=3Dnavy size=3D2><SPAN=20
            style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Allocate a new pr=
otocol=20
            value for the next header field to indicate encrypted data, whi=
ch=20
            seems like an overkill.</SPAN></FONT> <FONT face=3DArial size=
=3D2><SPAN=20
            style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><o:p></o:p></SPAN=
></FONT></LI></OL>
          <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SP=
AN=20
          style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&=
nbsp;</o:p></SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SP=
AN=20
          style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">As we =
are=20
          already asking for a new protocol value for WESP, option 1 seems =
to be=20
          the better choice.<o:p></o:p></SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SP=
AN=20
          style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&=
nbsp;</o:p></SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SP=
AN=20
          style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Other=
=20
          opinions?<o:p></o:p></SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SP=
AN=20
          style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&=
nbsp;</o:p></SPAN></FONT></P>
          <DIV>
          <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy=
=20
          size=3D3><SPAN style=3D"FONT-SIZE: 12pt; COLOR: navy">Thanks,=20
          <o:p></o:p></SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy=
=20
          size=3D3><SPAN style=3D"FONT-SIZE: 12pt; COLOR: navy">-=20
          Ken<o:p></o:p></SPAN></FONT></P></DIV>
          <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SP=
AN=20
          style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&=
nbsp;</o:p></SPAN></FONT></P>
          <DIV=20
          style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TO=
P: medium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0in; BORDER-LEFT: blue 1=
.5pt solid; PADDING-TOP: 0in; BORDER-BOTTOM: medium none">
          <DIV>
          <DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" align=3Dcente=
r><FONT=20
          face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt"=
>
          <HR tabIndex=3D-1 align=3Dcenter width=3D"100%" SIZE=3D2>
          </SPAN></FONT></DIV>
          <P class=3DMsoNormal><B><FONT face=3DTahoma size=3D2><SPAN=20
          style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Tahoma"=
>From:</SPAN></FONT></B><FONT=20
          face=3DTahoma size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMIL=
Y: Tahoma">=20
          <st1:PersonName w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonNam=
e>=20
          [mailto:<st1:PersonName=20
          w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonName>] <B><SPAN=20
          style=3D"FONT-WEIGHT: bold">On Behalf Of </SPAN></B>QIU Ying<BR><=
B><SPAN=20
          style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Tuesday, July 14, 20=
09=20
          12:37 AM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> Q=
IU=20
          Ying; Yaron Sheffer; <st1:PersonName=20
          w:st=3D"on">ipsec@ietf.org</st1:PersonName><BR><B><SPAN=20
          style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [IPsec] WG La=
st=20
          Call:=20
          draft-ietf-ipsecme-traffic-visibility-05</SPAN></FONT><o:p></o:p>=
</P></DIV>
          <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPA=
N=20
          style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
          <DIV>
          <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Since the zero=20
          of&nbsp;next header&nbsp;value is used for HOPOPT already, maybe=
=20
          applying a new value for this intention is better to avoid the=20
          confliction.</SPAN></FONT><o:p></o:p></P></DIV>
          <DIV>
          <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPA=
N=20
          style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DI=
V>
          <DIV>
          <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Regards</SPAN></FON=
T><o:p></o:p></P></DIV>
          <DIV>
          <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Qiu=20
          Ying</SPAN></FONT><o:p></o:p></P></DIV>
          <DIV>
          <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPA=
N=20
          style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DI=
V>
          <BLOCKQUOTE=20
          style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TO=
P: medium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0in; MARGIN: 5pt 0in 5pt=
 3.75pt; BORDER-LEFT: black 1.5pt solid; PADDING-TOP: 0in; BORDER-BOTTOM: m=
edium none">
            <DIV>
            <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
            style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">----- Original Me=
ssage=20
            ----- <o:p></o:p></SPAN></FONT></P></DIV>
            <DIV style=3D"font-color: black">
            <P class=3DMsoNormal style=3D"BACKGROUND: #e4e4e4"><B><FONT fac=
e=3DArial=20
            size=3D2><SPAN=20
            style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial=
">From:</SPAN></FONT></B><FONT=20
            face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMI=
LY: Arial">=20
            <A title=3Dqiuying@i2r.a-star.edu.sg=20
            href=3D"mailto:qiuying@i2r.a-star.edu.sg">QIU Ying</A>=20
            <o:p></o:p></SPAN></FONT></P></DIV>
            <DIV>
            <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
            style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial=
">To:</SPAN></FONT></B><FONT=20
            face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMI=
LY: Arial">=20
            <A title=3Dyaronf@checkpoint.com=20
            href=3D"mailto:yaronf@checkpoint.com">Yaron Sheffer</A> ; <A=20
            title=3Dipsec@ietf.org href=3D"mailto:ipsec@ietf.org">ipsec@iet=
f.org</A>=20
            <o:p></o:p></SPAN></FONT></P></DIV>
            <DIV>
            <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
            style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial=
">Sent:</SPAN></FONT></B><FONT=20
            face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMI=
LY: Arial">=20
            Tuesday, July 14, 2009 3:30 PM<o:p></o:p></SPAN></FONT></P></DI=
V>
            <DIV>
            <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
            style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial=
">Subject:</SPAN></FONT></B><FONT=20
            face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMI=
LY: Arial">=20
            Re: [IPsec] WG Last Call:=20
            draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FON=
T></P></DIV>
            <DIV>
            <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><S=
PAN=20
            style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></=
DIV>
            <DIV>
            <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
            style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Regarding the Nex=
t=20
            Header in section 2, what will be happened if the value of Next=
=20
            Header is zero (i.e. IPv6 Hop-by-Hop option) and the packet is =
not=20
            encrypted?</SPAN></FONT><o:p></o:p></P></DIV>
            <DIV>
            <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><S=
PAN=20
            style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></=
DIV>
            <DIV>
            <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
            style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Regards</SPAN></F=
ONT><o:p></o:p></P></DIV>
            <DIV>
            <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
            style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Qiu=20
            Ying</SPAN></FONT><o:p></o:p></P></DIV>
            <DIV>
            <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><S=
PAN=20
            style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></=
DIV>
            <BLOCKQUOTE=20
            style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-=
TOP: medium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0in; MARGIN: 5pt 0in 5=
pt 3.75pt; BORDER-LEFT: black 1.5pt solid; PADDING-TOP: 0in; BORDER-BOTTOM:=
 medium none">
              <DIV>
              <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
              style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">----- Original =
Message=20
              ----- <o:p></o:p></SPAN></FONT></P></DIV>
              <DIV style=3D"font-color: black">
              <P class=3DMsoNormal style=3D"BACKGROUND: #e4e4e4"><B><FONT f=
ace=3DArial=20
              size=3D2><SPAN=20
              style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Ari=
al">From:</SPAN></FONT></B><FONT=20
              face=3DArial size=3D2><SPAN=20
              style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"> <A=20
              title=3Dyaronf@checkpoint.com=20
              href=3D"mailto:yaronf@checkpoint.com">Yaron Sheffer</A>=20
              <o:p></o:p></SPAN></FONT></P></DIV>
              <DIV>
              <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
              style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Ari=
al">To:</SPAN></FONT></B><FONT=20
              face=3DArial size=3D2><SPAN=20
              style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"> <A=20
              title=3Dipsec@ietf.org=20
              href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A>=20
              <o:p></o:p></SPAN></FONT></P></DIV>
              <DIV>
              <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
              style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Ari=
al">Sent:</SPAN></FONT></B><FONT=20
              face=3DArial size=3D2><SPAN=20
              style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"> Sunday, July 0=
5, 2009=20
              3:48 AM<o:p></o:p></SPAN></FONT></P></DIV>
              <DIV>
              <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
              style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Ari=
al">Subject:</SPAN></FONT></B><FONT=20
              face=3DArial size=3D2><SPAN=20
              style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"> [IPsec] WG Las=
t Call:=20
              draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></F=
ONT></P></DIV>
              <DIV>
              <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3>=
<SPAN=20
              style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>=
</DIV>
              <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
              style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">This is the beg=
inning=20
              of a two-week WG Last Call, which will end July 18. The targe=
t=20
              status for this document is Proposed Standard. The current=20
              document is at <A=20
              href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme-traffic=
-visibility-05">http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visib=
ility-05</A>.<o:p></o:p></SPAN></FONT></P>
              <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
              style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><o:p>&nbsp;</o:=
p></SPAN></FONT></P>
              <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
              style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">If you have not=
 read=20
              the document before now, please do so. Having fresh eyes on t=
he=20
              document often brings up important issues. If you HAVE read i=
t=20
              before, please note that there have been several revisions si=
nce=20
              <st1:place w:st=3D"on"><st1:City w:st=3D"on">San=20
              Francisco</st1:City></st1:place>, so you might want to read i=
t=20
              again (plus it&#8217;s a short document). Send any comments t=
o the list,=20
              even if they are as simple as "I read it and it seems=20
              fine".<o:p></o:p></SPAN></FONT></P>
              <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
              style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><o:p>&nbsp;</o:=
p></SPAN></FONT></P>
              <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
              style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Please clearly=
=20
              indicate the position of any issue in the Internet Draft, and=
 if=20
              possible provide alternative text. Please also indicate the n=
ature=20
              or severity of the error or correction, e.g. major technical,=
=20
              minor technical, nit, so that we can quickly judge the extent=
 of=20
              problems with the document.<o:p></o:p></SPAN></FONT></P>
              <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
              style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><o:p>&nbsp;</o:=
p></SPAN></FONT></P>
              <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
              style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Thanks,<o:p></o=
:p></SPAN></FONT></P>
              <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
              style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
              Yaron<o:p></o:p></SPAN></FONT></P>
              <DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" align=3Dc=
enter><FONT=20
              face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 1=
2pt">
              <HR align=3Dcenter width=3D"100%" SIZE=3D2>
              </SPAN></FONT></DIV>
              <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3>=
<SPAN=20
              style=3D"FONT-SIZE: 12pt">___________________________________=
____________<BR>IPsec=20
              mailing=20
              list<BR>IPsec@ietf.org<BR>https://www.ietf.org/mailman/listin=
fo/ipsec<o:p></o:p></SPAN></FONT></P></BLOCKQUOTE></BLOCKQUOTE>
          <DIV>
          <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPA=
N=20
          style=3D"FONT-SIZE: 12pt">Institute for Infocomm Research disclai=
mer:=20
          "This email is confidential and may be privileged. If you are not=
 the=20
          intended recipient, please delete it and notify us immediately. P=
lease=20
          do not copy or use it for any purpose, or disclose its contents t=
o any=20
          other person. Thank=20
        you."<o:p></o:p></SPAN></FONT></P></DIV></DIV></BLOCKQUOTE>
        <DIV>
        <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=
=20
        style=3D"FONT-SIZE: 12pt">Institute for Infocomm Research disclaime=
r:=20
        "This email is confidential and may be privileged. If you are not t=
he=20
        intended recipient, please delete it and notify us immediately. Ple=
ase=20
        do not copy or use it for any purpose, or disclose its contents to =
any=20
        other person. Thank=20
      you."<o:p></o:p></SPAN></FONT></P></DIV></DIV></DIV></BLOCKQUOTE></BL=
OCKQUOTE>
    <DIV>Institute for Infocomm Research disclaimer: "This email is confide=
ntial=20
    and may be privileged. If you are not the intended recipient, please de=
lete=20
    it and notify us immediately. Please do not copy or use it for any purp=
ose,=20
    or disclose its contents to any other person. Thank you."<BR></DIV>
    <P>
    <HR>

    <P></P>_______________________________________________<BR>IPsec mailing=
=20
    list<BR>IPsec@ietf.org<BR>https://www.ietf.org/mailman/listinfo/ipsec<B=
R></BLOCKQUOTE>
  <DIV>Institute for Infocomm Research disclaimer: "This email is confident=
ial=20
  and may be privileged. If you are not the intended recipient, please dele=
te it=20
  and notify us immediately. Please do not copy or use it for any purpose, =
or=20
  disclose its contents to any other person. Thank=20
you."<BR></DIV></BLOCKQUOTE></BODY></HTML>

--_000_7C362EEF9C7896468B36C9B79200D8350A1C4BC30EINBANSXCHMBSA_--

From yaronf@checkpoint.com  Thu Jul 16 01:51:03 2009
Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 997A33A6C99 for <ipsec@core3.amsl.com>; Thu, 16 Jul 2009 01:51:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.55
X-Spam-Level: 
X-Spam-Status: No, score=-2.55 tagged_above=-999 required=5 tests=[AWL=0.048,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id alPmNOiZ2Yag for <ipsec@core3.amsl.com>; Thu, 16 Jul 2009 01:50:54 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id 2039F28C199 for <ipsec@ietf.org>; Thu, 16 Jul 2009 01:50:53 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 0455929C005; Thu, 16 Jul 2009 11:51:38 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id A2D7F29C002; Thu, 16 Jul 2009 11:51:38 +0300 (IDT)
X-CheckPoint: {4A5EE951-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n6G8pN3d027078; Thu, 16 Jul 2009 11:51:23 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Thu, 16 Jul 2009 11:51:22 +0300
From: Yaron Sheffer <yaronf@checkpoint.com>
To: "Bhatia, Manav (Manav)" <manav@alcatel-lucent.com>, "Grewal, Ken" <ken.grewal@intel.com>, QIU Ying <qiuying@i2r.a-star.edu.sg>, "ipsec@ietf.org" <ipsec@ietf.org>
Date: Thu, 16 Jul 2009 11:51:18 +0300
Thread-Topic: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
Thread-Index: AcoE9mMzRspYXvBER22PFG5Az3HTWQAaYrjwAB+bSHAABQv/oA==
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC801295365570A@il-ex01.ad.checkpoint.com>
References: <2E5D69B62A99425C894AA9B258004990@t3400> <C49B4B6450D9AA48AB99694D2EB0A4832C2438DC@rrsmsx505.amr.corp.intel.com> <E12B577D22E64DE1806D838CDC751259@t3400> <C49B4B6450D9AA48AB99694D2EB0A4832C24406A@rrsmsx505.amr.corp.intel.com> <7C362EEF9C7896468B36C9B79200D8350A1C4BC25F@INBANSXCHMBSA1.in.alcatel-lucent.com>
In-Reply-To: <7C362EEF9C7896468B36C9B79200D8350A1C4BC25F@INBANSXCHMBSA1.in.alcatel-lucent.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0025_01CA05FA.F75F9600"
MIME-Version: 1.0
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jul 2009 08:51:03 -0000

------=_NextPart_000_0025_01CA05FA.F75F9600
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_0026_01CA05FA.F75F9600"


------=_NextPart_001_0026_01CA05FA.F75F9600
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

I'll vote for the Encryption Bit.

 

  _____  

From: Bhatia, Manav (Manav) [mailto:manav@alcatel-lucent.com] 
Sent: Thursday, July 16, 2009 7:27
To: Grewal, Ken; QIU Ying; Yaron Sheffer; ipsec@ietf.org
Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

 

We can use ESP as the next header to denote encryption being used as long as
we are sure that we will never have an ESP packet inside the WESP
encapsulation. In my view there is nothing that precludes that from
happening, which means that we may have some corner cases where WESP may
actually be carrying an ESP packet inside it. Given this, i would rather
that we don't use the ESP value to denote encryption being used.

 

I am also not a big fan of the encryption bit as that takes away one bit
from the already limited number of bits that we have at our disposal in the
flags field.

 

Given that a packet will never carry a protocol ID of 0xFF i propose to use
this value in the next-header to denote encryption being used. Would this
work?

 

Cheers, Manav

 


  _____  


From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of
Grewal, Ken
Sent: Wednesday, July 15, 2009 8.57 PM
To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Qiu Ying, 

Copying the value of the ESP next header to the WESP next header is useful
for efficient HW parsing when using ESP-NULL. 

You are correct that in the case of encrypted traffic, we can set this value
to 'ESP', which could denote that the payload is encrypted. 

Having said that, some people in the past have mentioned that it may be
cleaner to have a dedicated bit to denote whether the payload is encrypted
or using ESP-NULL.

 

Either way works, as long as there is a discrete, unambiguous way to denote
this.  

 

Thanks, 

- Ken

 


  _____  


From: QIU Ying [mailto:qiuying@i2r.a-star.edu.sg] 
Sent: Tuesday, July 14, 2009 7:42 PM
To: Grewal, Ken; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

 

Hi, Ken

 

Agree that Option 1 is better as it applies lesser new IANA numbers. But in
this case, it seems redundancy to copy the value of Next Header field in the
ESP trailer to here. How about simply setting the value as ESP here? I think
it more meet the original concept of Next Header.

 

Maybe I am missing something

 

Regards

Qiu Ying

 

----- Original Message ----- 

From: Grewal, Ken <mailto:ken.grewal@intel.com>  

To: QIU <mailto:qiuying@i2r.a-star.edu.sg>  Ying ; Yaron
<mailto:yaronf@checkpoint.com>  Sheffer ; ipsec@ietf.org 

Sent: Wednesday, July 15, 2009 1:31 AM

Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

 

Thanks Qiu Ying - great observation. 

 

We had originally proposed using a bit from the WESP flags (integrity only)
for differentiating between ESP-encrypted and ESP-NULL traffic, but changed
this to using a value of zero in the next header for efficient encoding,
although this is overloading the meaning of next header. 

With your observation, the current definition is not practical so we have
the following options:

 

1.	Revert back to using a bit in the flags to differentiate between
encrypted / NULL traffic. 
2.	Allocate a new protocol value for the next header field to indicate
encrypted data, which seems like an overkill. 

 

As we are already asking for a new protocol value for WESP, option 1 seems
to be the better choice.

 

Other opinions?

 

Thanks, 

- Ken

 


  _____  


From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of
QIU Ying
Sent: Tuesday, July 14, 2009 12:37 AM
To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

 

Since the zero of next header value is used for HOPOPT already, maybe
applying a new value for this intention is better to avoid the confliction.

 

Regards

Qiu Ying

 

----- Original Message ----- 

From: QIU <mailto:qiuying@i2r.a-star.edu.sg>  Ying 

To: Yaron Sheffer <mailto:yaronf@checkpoint.com>  ; ipsec@ietf.org 

Sent: Tuesday, July 14, 2009 3:30 PM

Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

 

Regarding the Next Header in section 2, what will be happened if the value
of Next Header is zero (i.e. IPv6 Hop-by-Hop option) and the packet is not
encrypted?

 

Regards

Qiu Ying

 

----- Original Message ----- 

From: Yaron Sheffer <mailto:yaronf@checkpoint.com>  

To: ipsec@ietf.org 

Sent: Sunday, July 05, 2009 3:48 AM

Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

 

This is the beginning of a two-week WG Last Call, which will end July 18.
The target status for this document is Proposed Standard. The current
document is at
http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05.

 

If you have not read the document before now, please do so. Having fresh
eyes on the document often brings up important issues. If you HAVE read it
before, please note that there have been several revisions since San
Francisco, so you might want to read it again (plus it's a short document).
Send any comments to the list, even if they are as simple as "I read it and
it seems fine".

 

Please clearly indicate the position of any issue in the Internet Draft, and
if possible provide alternative text. Please also indicate the nature or
severity of the error or correction, e.g. major technical, minor technical,
nit, so that we can quickly judge the extent of problems with the document.

 

Thanks,

            Yaron


  _____  


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Institute for Infocomm Research disclaimer: "This email is confidential and
may be privileged. If you are not the intended recipient, please delete it
and notify us immediately. Please do not copy or use it for any purpose, or
disclose its contents to any other person. Thank you."

Institute for Infocomm Research disclaimer: "This email is confidential and
may be privileged. If you are not the intended recipient, please delete it
and notify us immediately. Please do not copy or use it for any purpose, or
disclose its contents to any other person. Thank you."



Scanned by Check Point Total Security Gateway. 


------=_NextPart_001_0026_01CA05FA.F75F9600
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" =
xmlns:p=3D"urn:schemas-microsoft-com:office:powerpoint" =
xmlns:a=3D"urn:schemas-microsoft-com:office:access" =
xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" =
xmlns:s=3D"uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" =
xmlns:rs=3D"urn:schemas-microsoft-com:rowset" xmlns:z=3D"#RowsetSchema" =
xmlns:b=3D"urn:schemas-microsoft-com:office:publisher" =
xmlns:ss=3D"urn:schemas-microsoft-com:office:spreadsheet" =
xmlns:c=3D"urn:schemas-microsoft-com:office:component:spreadsheet" =
xmlns:odc=3D"urn:schemas-microsoft-com:office:odc" =
xmlns:oa=3D"urn:schemas-microsoft-com:office:activation" =
xmlns:html=3D"http://www.w3.org/TR/REC-html40" =
xmlns:q=3D"http://schemas.xmlsoap.org/soap/envelope/" =
xmlns:rtc=3D"http://microsoft.com/officenet/conferencing" =
xmlns:D=3D"DAV:" xmlns:Repl=3D"http://schemas.microsoft.com/repl/" =
xmlns:mt=3D"http://schemas.microsoft.com/sharepoint/soap/meetings/" =
xmlns:x2=3D"http://schemas.microsoft.com/office/excel/2003/xml" =
xmlns:ppda=3D"http://www.passport.com/NameSpace.xsd" =
xmlns:ois=3D"http://schemas.microsoft.com/sharepoint/soap/ois/" =
xmlns:dir=3D"http://schemas.microsoft.com/sharepoint/soap/directory/" =
xmlns:ds=3D"http://www.w3.org/2000/09/xmldsig#" =
xmlns:dsp=3D"http://schemas.microsoft.com/sharepoint/dsp" =
xmlns:udc=3D"http://schemas.microsoft.com/data/udc" =
xmlns:xsd=3D"http://www.w3.org/2001/XMLSchema" =
xmlns:sub=3D"http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/"=
 xmlns:ec=3D"http://www.w3.org/2001/04/xmlenc#" =
xmlns:sp=3D"http://schemas.microsoft.com/sharepoint/" =
xmlns:sps=3D"http://schemas.microsoft.com/sharepoint/soap/" =
xmlns:xsi=3D"http://www.w3.org/2001/XMLSchema-instance" =
xmlns:udcs=3D"http://schemas.microsoft.com/data/udc/soap" =
xmlns:udcxf=3D"http://schemas.microsoft.com/data/udc/xmlfile" =
xmlns:udcp2p=3D"http://schemas.microsoft.com/data/udc/parttopart" =
xmlns:st=3D"&#1;" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" =
name=3D"City"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PersonName"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:12.0pt;
	font-family:"Times New Roman";}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:Arial;
	color:windowtext;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:Arial;
	color:navy;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:Arial;
	color:navy;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
 /* List Definitions */
 @list l0
	{mso-list-id:1292781829;
	mso-list-template-ids:620419168;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body bgcolor=3Dwhite lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I&#8217;ll vote for the Encryption =
Bit&#8230;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0cm 0cm =
0cm 4.0pt'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> =
<st1:PersonName
w:st=3D"on">Bhatia, Manav</st1:PersonName> (Manav)
[mailto:manav@alcatel-lucent.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Thursday, July 16, =
2009 7:27<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName =
w:st=3D"on">Grewal,
 Ken</st1:PersonName>; QIU Ying; <st1:PersonName w:st=3D"on">Yaron =
Sheffer</st1:PersonName>;
<st1:PersonName w:st=3D"on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> RE: [IPsec] WG =
Last Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:blue'>We can use ESP as the next header =
to
denote encryption being used as long as we are sure that we will never =
have an
ESP packet inside the WESP encapsulation. In my view there is nothing =
that
precludes that from happening, which means that we may have some corner =
cases
where WESP may actually be carrying an ESP packet inside it. Given this, =
i
would rather that we don't use the ESP value to denote encryption being =
used.</span></font><o:p></o:p></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:blue'>I am also not a big fan of the =
encryption
bit as that takes away one bit from the already limited number of bits =
that we
have at our disposal in&nbsp;the flags =
field.</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Given that a packet will never =
carry a
protocol ID of 0xFF i propose to&nbsp;use&nbsp;this value in the =
next-header to
denote encryption being used. Would this =
work?</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Cheers, =
Manav</span></font><o:p></o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid blue =
1.5pt;padding:0cm 0cm 0cm 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt'=
>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><b><font size=3D2 =
face=3DTahoma><span
style=3D'font-size:10.0pt;font-family:Tahoma;font-weight:bold'>From:</spa=
n></font></b><font
size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;font-family:Tahoma'>
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <b><span
style=3D'font-weight:bold'>On Behalf Of </span></b><st1:PersonName =
w:st=3D"on">Grewal,
 Ken</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Wednesday, July 15, =
2009
8.57 PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> QIU Ying; =
<st1:PersonName
w:st=3D"on">Yaron Sheffer</st1:PersonName>; <st1:PersonName =
w:st=3D"on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] WG =
Last Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Qiu Ying, =
<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Copying the value of the ESP next =
header
to the WESP next header is useful for efficient HW parsing when using =
ESP-NULL.
<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>You are correct that in the case of
encrypted traffic, we can set this value to &#8216;ESP&#8217;, which =
could denote that the
payload is encrypted. <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Having said that, some people in =
the past
have mentioned that it may be cleaner to have a dedicated bit to denote =
whether
the payload is encrypted or using ESP-NULL.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Either way works, as long as there =
is a
discrete, unambiguous way to denote this. =
&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt;color:navy'>Thanks, =
<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt;color:navy'>- Ken<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0cm 0cm =
0cm 4.0pt'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> QIU =
Ying
[mailto:qiuying@i2r.a-star.edu.sg] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Tuesday, July 14, =
2009 7:42
PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName =
w:st=3D"on">Grewal,
 Ken</st1:PersonName>; <st1:PersonName w:st=3D"on">Yaron =
Sheffer</st1:PersonName>;
<st1:PersonName w:st=3D"on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] WG =
Last Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Hi, Ken</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Agree that&nbsp;Option 1 is better as it applies =
lesser new
IANA numbers. But in this case, it seems&nbsp;redundancy to copy the =
value of
Next Header field in the ESP trailer to here. How about =
simply&nbsp;setting the
value as ESP here? I think it more meet the original concept of Next =
Header.</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Maybe I am missing =
something</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Regards</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Qiu Ying</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid black =
1.5pt;padding:0cm 0cm 0cm 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt'=
>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>----- Original Message ----- =
<o:p></o:p></span></font></p>

</div>

<div style=3D'font-color:black'>

<p class=3DMsoNormal style=3D'background:#E4E4E4'><b><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial;font-weight:bold'>From:</span=
></font></b><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:ken.grewal@intel.com" =
title=3D"ken.grewal@intel.com">Grewal, Ken</a>
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>To:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:qiuying@i2r.a-star.edu.sg" =
title=3D"qiuying@i2r.a-star.edu.sg">QIU
Ying</a> ; <a href=3D"mailto:yaronf@checkpoint.com" =
title=3D"yaronf@checkpoint.com">Yaron
Sheffer</a> ; <a href=3D"mailto:ipsec@ietf.org" =
title=3D"ipsec@ietf.org">ipsec@ietf.org</a>
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>Sent:</span></font></b><font =
size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> =
Wednesday, July
15, 2009 1:31 AM<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>Subject:</span></font></b><font =
size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> RE: =
[IPsec] WG
Last Call: =
draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Thanks Qiu Ying - great =
observation. <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>We had originally proposed using a =
bit
from the WESP flags (integrity only) for differentiating between =
ESP-encrypted
and ESP-NULL traffic, but changed this to using a value of zero in the =
next
header for efficient encoding, although this is overloading the meaning =
of next
header. <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>With your observation, the current
definition is not practical so we have the following =
options:<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<ol style=3D'margin-top:0cm' start=3D1 type=3D1>
 <li class=3DMsoNormal style=3D'color:navy;mso-list:l0 level1 =
lfo1'><font size=3D2
     color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Revert
     back to using a bit in the flags to differentiate between encrypted =
/ NULL
     traffic.</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:
     10.0pt;font-family:Arial'><o:p></o:p></span></font></li>
 <li class=3DMsoNormal style=3D'color:navy;mso-list:l0 level1 =
lfo1'><font size=3D2
     color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Allocate
     a new protocol value for the next header field to indicate =
encrypted data,
     which seems like an overkill.</span></font> <font size=3D2 =
face=3DArial><span
     =
style=3D'font-size:10.0pt;font-family:Arial'><o:p></o:p></span></font></l=
i>
</ol>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>As we are already asking for a new
protocol value for WESP, option 1 seems to be the better =
choice.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Other =
opinions?<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt;color:navy'>Thanks, =
<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt;color:navy'>- Ken<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0cm 0cm =
0cm 4.0pt'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> =
<st1:PersonName
w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonName> =
[mailto:<st1:PersonName
w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonName>] <b><span =
style=3D'font-weight:
bold'>On Behalf Of </span></b>QIU Ying<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Tuesday, July 14, =
2009 12:37
AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> QIU Ying; =
<st1:PersonName
w:st=3D"on">Yaron Sheffer</st1:PersonName>; <st1:PersonName =
w:st=3D"on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] WG =
Last Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Since the zero of&nbsp;next header&nbsp;value is used =
for
HOPOPT already, maybe applying a new value for this intention is better =
to
avoid the confliction.</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Regards</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Qiu Ying</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid black =
1.5pt;padding:0cm 0cm 0cm 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt'=
>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>----- Original Message ----- =
<o:p></o:p></span></font></p>

</div>

<div style=3D'font-color:black'>

<p class=3DMsoNormal style=3D'background:#E4E4E4'><b><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial;font-weight:bold'>From:</span=
></font></b><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:qiuying@i2r.a-star.edu.sg" =
title=3D"qiuying@i2r.a-star.edu.sg">QIU
Ying</a> <o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>To:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:yaronf@checkpoint.com" =
title=3D"yaronf@checkpoint.com">Yaron Sheffer</a>
; <a href=3D"mailto:ipsec@ietf.org" =
title=3D"ipsec@ietf.org">ipsec@ietf.org</a> =
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>Sent:</span></font></b><font =
size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> =
Tuesday, July 14,
2009 3:30 PM<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>Subject:</span></font></b><font =
size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> Re: =
[IPsec] WG
Last Call: =
draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Regarding the Next Header in section 2, what will be
happened if the value of Next Header is zero (i.e. IPv6 Hop-by-Hop =
option) and
the packet is not encrypted?</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Regards</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Qiu Ying</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid black =
1.5pt;padding:0cm 0cm 0cm 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt'=
>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>----- Original Message ----- =
<o:p></o:p></span></font></p>

</div>

<div style=3D'font-color:black'>

<p class=3DMsoNormal style=3D'background:#E4E4E4'><b><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial;font-weight:bold'>From:</span=
></font></b><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:yaronf@checkpoint.com" =
title=3D"yaronf@checkpoint.com">Yaron Sheffer</a>
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>To:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:ipsec@ietf.org" =
title=3D"ipsec@ietf.org">ipsec@ietf.org</a> =
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>Sent:</span></font></b><font =
size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> Sunday, =
July 05,
2009 3:48 AM<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>Subject:</span></font></b><font =
size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> [IPsec] =
WG Last
Call: =
draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>This is the beginning of a two-week WG Last Call, =
which will
end July 18. The target status for this document is Proposed Standard. =
The
current document is at <a
href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-=
05">http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05</=
a>.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>If you have not read the document before now, please =
do so.
Having fresh eyes on the document often brings up important issues. If =
you HAVE
read it before, please note that there have been several revisions since =
<st1:place
w:st=3D"on"><st1:City w:st=3D"on">San Francisco</st1:City></st1:place>, =
so you
might want to read it again (plus it&#8217;s a short document). Send any =
comments to
the list, even if they are as simple as &quot;I read it and it seems
fine&quot;.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Please clearly indicate the position of any issue in =
the
Internet Draft, and if possible provide alternative text. Please also =
indicate
the nature or severity of the error or correction, e.g. major technical, =
minor
technical, nit, so that we can quickly judge the extent of problems with =
the
document.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Thanks,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;
Yaron<o:p></o:p></span></font></p>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>_______________________________________________<br>
IPsec mailing list<br>
IPsec@ietf.org<br>
https://www.ietf.org/mailman/listinfo/ipsec<o:p></o:p></span></font></p>

</blockquote>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>Institute for Infocomm Research disclaimer: &quot;This email is
confidential and may be privileged. If you are not the intended =
recipient,
please delete it and notify us immediately. Please do not copy or use it =
for
any purpose, or disclose its contents to any other person. Thank =
you.&quot;<o:p></o:p></span></font></p>

</div>

</div>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>Institute for Infocomm Research disclaimer: &quot;This email is
confidential and may be privileged. If you are not the intended =
recipient,
please delete it and notify us immediately. Please do not copy or use it =
for
any purpose, or disclose its contents to any other person. Thank =
you.&quot;<o:p></o:p></span></font></p>

</div>

</div>

</blockquote>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
Scanned by Check Point Total Security Gateway. =
<o:p></o:p></span></font></p>

</div>

</div>

</body>

</html>

------=_NextPart_001_0026_01CA05FA.F75F9600--

------=_NextPart_000_0025_01CA05FA.F75F9600
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_0025_01CA05FA.F75F9600--

From manav@alcatel-lucent.com  Thu Jul 16 02:24:53 2009
Return-Path: <manav@alcatel-lucent.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D22443A685E for <ipsec@core3.amsl.com>; Thu, 16 Jul 2009 02:24:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4sbx7QfwXY4Y for <ipsec@core3.amsl.com>; Thu, 16 Jul 2009 02:24:43 -0700 (PDT)
Received: from hoemail1.alcatel.com (hoemail1.alcatel.com [192.160.6.148]) by core3.amsl.com (Postfix) with ESMTP id C110628C158 for <ipsec@ietf.org>; Thu, 16 Jul 2009 02:24:40 -0700 (PDT)
Received: from horh1.usa.alcatel.com (h172-22-218-55.lucent.com [172.22.218.55]) by hoemail1.alcatel.com (8.13.8/IER-o) with ESMTP id n6G9M49w008006; Thu, 16 Jul 2009 04:22:04 -0500 (CDT)
Received: from mail.apac.alcatel-lucent.com (aprelay03.apac.alcatel-lucent.com [202.65.2.133]) by horh1.usa.alcatel.com (8.13.8/emsr) with ESMTP id n6G9M0Uk004301; Thu, 16 Jul 2009 04:22:01 -0500 (CDT)
Received: from INBANSXCHHUB02.in.alcatel-lucent.com (inbansxchhub02.in.alcatel-lucent.com [135.250.12.35]) by mail.apac.alcatel-lucent.com (8.13.7/8.13.7/Alcanet1.0) with ESMTP id n6G9UZS5005947; Thu, 16 Jul 2009 17:31:20 +0800
Received: from INBANSXCHMBSA1.in.alcatel-lucent.com ([135.250.12.50]) by INBANSXCHHUB02.in.alcatel-lucent.com ([135.250.12.35]) with mapi; Thu, 16 Jul 2009 14:51:43 +0530
From: "Bhatia, Manav (Manav)" <manav@alcatel-lucent.com>
To: Yaron Sheffer <yaronf@checkpoint.com>, "Grewal, Ken" <ken.grewal@intel.com>, QIU Ying <qiuying@i2r.a-star.edu.sg>, "ipsec@ietf.org" <ipsec@ietf.org>
Date: Thu, 16 Jul 2009 14:51:42 +0530
Thread-Topic: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
Thread-Index: AcoE9mMzRspYXvBER22PFG5Az3HTWQAaYrjwAB+bSHAABQv/oAAA9vOA
Message-ID: <7C362EEF9C7896468B36C9B79200D8350A1C4BC38D@INBANSXCHMBSA1.in.alcatel-lucent.com>
References: <2E5D69B62A99425C894AA9B258004990@t3400> <C49B4B6450D9AA48AB99694D2EB0A4832C2438DC@rrsmsx505.amr.corp.intel.com> <E12B577D22E64DE1806D838CDC751259@t3400> <C49B4B6450D9AA48AB99694D2EB0A4832C24406A@rrsmsx505.amr.corp.intel.com> <7C362EEF9C7896468B36C9B79200D8350A1C4BC25F@INBANSXCHMBSA1.in.alcatel-lucent.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC801295365570A@il-ex01.ad.checkpoint.com>
In-Reply-To: <7F9A6D26EB51614FBF9F81C0DA4CFEC801295365570A@il-ex01.ad.checkpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_7C362EEF9C7896468B36C9B79200D8350A1C4BC38DINBANSXCHMBSA_"
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 172.22.12.27
X-Scanned-By: MIMEDefang 2.64 on 202.65.2.133
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jul 2009 09:24:53 -0000

--_000_7C362EEF9C7896468B36C9B79200D8350A1C4BC38DINBANSXCHMBSA_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

If we're to go with the encryption bit then we need more verbiage on what t=
he Next Header should carry (and would mean) when that bit is set and when =
it is not set. Also, what happens when there is a disconnect between the tw=
o, etc. This is certainly doable, but involves more moving parts then simpl=
y deriving the state from the Next Header field.

Cheers, Manav

________________________________
From: Yaron Sheffer [mailto:yaronf@checkpoint.com]
Sent: Thursday, July 16, 2009 2.21 PM
To: Bhatia, Manav (Manav); Grewal, Ken; QIU Ying; ipsec@ietf.org
Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

I'll vote for the Encryption Bit...

________________________________
From: Bhatia, Manav (Manav) [mailto:manav@alcatel-lucent.com]
Sent: Thursday, July 16, 2009 7:27
To: Grewal, Ken; QIU Ying; Yaron Sheffer; ipsec@ietf.org
Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

We can use ESP as the next header to denote encryption being used as long a=
s we are sure that we will never have an ESP packet inside the WESP encapsu=
lation. In my view there is nothing that precludes that from happening, whi=
ch means that we may have some corner cases where WESP may actually be carr=
ying an ESP packet inside it. Given this, i would rather that we don't use =
the ESP value to denote encryption being used.

I am also not a big fan of the encryption bit as that takes away one bit fr=
om the already limited number of bits that we have at our disposal in the f=
lags field.

Given that a packet will never carry a protocol ID of 0xFF i propose to use=
 this value in the next-header to denote encryption being used. Would this =
work?

Cheers, Manav

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of G=
rewal, Ken
Sent: Wednesday, July 15, 2009 8.57 PM
To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
Qiu Ying,
Copying the value of the ESP next header to the WESP next header is useful =
for efficient HW parsing when using ESP-NULL.
You are correct that in the case of encrypted traffic, we can set this valu=
e to 'ESP', which could denote that the payload is encrypted.
Having said that, some people in the past have mentioned that it may be cle=
aner to have a dedicated bit to denote whether the payload is encrypted or =
using ESP-NULL.

Either way works, as long as there is a discrete, unambiguous way to denote=
 this.

Thanks,
- Ken

________________________________
From: QIU Ying [mailto:qiuying@i2r.a-star.edu.sg]
Sent: Tuesday, July 14, 2009 7:42 PM
To: Grewal, Ken; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Hi, Ken

Agree that Option 1 is better as it applies lesser new IANA numbers. But in=
 this case, it seems redundancy to copy the value of Next Header field in t=
he ESP trailer to here. How about simply setting the value as ESP here? I t=
hink it more meet the original concept of Next Header.

Maybe I am missing something

Regards
Qiu Ying

----- Original Message -----
From: Grewal, Ken<mailto:ken.grewal@intel.com>
To: QIU Ying<mailto:qiuying@i2r.a-star.edu.sg> ; Yaron Sheffer<mailto:yaron=
f@checkpoint.com> ; ipsec@ietf.org<mailto:ipsec@ietf.org>
Sent: Wednesday, July 15, 2009 1:31 AM
Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Thanks Qiu Ying - great observation.

We had originally proposed using a bit from the WESP flags (integrity only)=
 for differentiating between ESP-encrypted and ESP-NULL traffic, but change=
d this to using a value of zero in the next header for efficient encoding, =
although this is overloading the meaning of next header.
With your observation, the current definition is not practical so we have t=
he following options:


 1.  Revert back to using a bit in the flags to differentiate between encry=
pted / NULL traffic.
 2.  Allocate a new protocol value for the next header field to indicate en=
crypted data, which seems like an overkill.

As we are already asking for a new protocol value for WESP, option 1 seems =
to be the better choice.

Other opinions?

Thanks,
- Ken

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Q=
IU Ying
Sent: Tuesday, July 14, 2009 12:37 AM
To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Since the zero of next header value is used for HOPOPT already, maybe apply=
ing a new value for this intention is better to avoid the confliction.

Regards
Qiu Ying

----- Original Message -----
From: QIU Ying<mailto:qiuying@i2r.a-star.edu.sg>
To: Yaron Sheffer<mailto:yaronf@checkpoint.com> ; ipsec@ietf.org<mailto:ips=
ec@ietf.org>
Sent: Tuesday, July 14, 2009 3:30 PM
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Regarding the Next Header in section 2, what will be happened if the value =
of Next Header is zero (i.e. IPv6 Hop-by-Hop option) and the packet is not =
encrypted?

Regards
Qiu Ying

----- Original Message -----
From: Yaron Sheffer<mailto:yaronf@checkpoint.com>
To: ipsec@ietf.org<mailto:ipsec@ietf.org>
Sent: Sunday, July 05, 2009 3:48 AM
Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

This is the beginning of a two-week WG Last Call, which will end July 18. T=
he target status for this document is Proposed Standard. The current docume=
nt is at http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-0=
5.

If you have not read the document before now, please do so. Having fresh ey=
es on the document often brings up important issues. If you HAVE read it be=
fore, please note that there have been several revisions since San Francisc=
o, so you might want to read it again (plus it's a short document). Send an=
y comments to the list, even if they are as simple as "I read it and it see=
ms fine".

Please clearly indicate the position of any issue in the Internet Draft, an=
d if possible provide alternative text. Please also indicate the nature or =
severity of the error or correction, e.g. major technical, minor technical,=
 nit, so that we can quickly judge the extent of problems with the document=
.

Thanks,
            Yaron
________________________________
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
Institute for Infocomm Research disclaimer: "This email is confidential and=
 may be privileged. If you are not the intended recipient, please delete it=
 and notify us immediately. Please do not copy or use it for any purpose, o=
r disclose its contents to any other person. Thank you."
Institute for Infocomm Research disclaimer: "This email is confidential and=
 may be privileged. If you are not the intended recipient, please delete it=
 and notify us immediately. Please do not copy or use it for any purpose, o=
r disclose its contents to any other person. Thank you."


Scanned by Check Point Total Security Gateway.

--_000_7C362EEF9C7896468B36C9B79200D8350A1C4BC38DINBANSXCHMBSA_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D=20
"urn:schemas-microsoft-com:vml" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word" xmlns:x =3D=20
"urn:schemas-microsoft-com:office:excel" xmlns:p =3D=20
"urn:schemas-microsoft-com:office:powerpoint" xmlns:a =3D=20
"urn:schemas-microsoft-com:office:access" xmlns:dt =3D=20
"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s =3D=20
"uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs =3D=20
"urn:schemas-microsoft-com:rowset" xmlns:z =3D "#RowsetSchema" xmlns:b =3D=
=20
"urn:schemas-microsoft-com:office:publisher" xmlns:ss =3D=20
"urn:schemas-microsoft-com:office:spreadsheet" xmlns:c =3D=20
"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns:odc =3D=20
"urn:schemas-microsoft-com:office:odc" xmlns:oa =3D=20
"urn:schemas-microsoft-com:office:activation" xmlns:html =3D=20
"http://www.w3.org/TR/REC-html40" xmlns:q =3D=20
"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc =3D=20
"http://microsoft.com/officenet/conferencing" XMLNS:D =3D "DAV:" XMLNS:Repl=
 =3D=20
"http://schemas.microsoft.com/repl/" xmlns:mt =3D=20
"http://schemas.microsoft.com/sharepoint/soap/meetings/" xmlns:x2 =3D=20
"http://schemas.microsoft.com/office/excel/2003/xml" xmlns:ppda =3D=20
"http://www.passport.com/NameSpace.xsd" xmlns:ois =3D=20
"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir =3D=20
"http://schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds =3D=20
"http://www.w3.org/2000/09/xmldsig#" xmlns:dsp =3D=20
"http://schemas.microsoft.com/sharepoint/dsp" xmlns:udc =3D=20
"http://schemas.microsoft.com/data/udc" xmlns:xsd =3D=20
"http://www.w3.org/2001/XMLSchema" xmlns:sub =3D=20
"http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/" xmlns:ec =3D=
=20
"http://www.w3.org/2001/04/xmlenc#" xmlns:sp =3D=20
"http://schemas.microsoft.com/sharepoint/" xmlns:sps =3D=20
"http://schemas.microsoft.com/sharepoint/soap/" xmlns:xsi =3D=20
"http://www.w3.org/2001/XMLSchema-instance" xmlns:udcs =3D=20
"http://schemas.microsoft.com/data/udc/soap" xmlns:udcxf =3D=20
"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udcp2p =3D=20
"http://schemas.microsoft.com/data/udc/parttopart" xmlns:st =3D "=01" xmlns=
:st1 =3D=20
"urn:schemas-microsoft-com:office:smarttags"><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.2900.3492" name=3DGENERATOR><!--[if !mso]>
<STYLE>v\:* {
	BEHAVIOR: url(#default#VML)
}
o\:* {
	BEHAVIOR: url(#default#VML)
}
w\:* {
	BEHAVIOR: url(#default#VML)
}
.shape {
	BEHAVIOR: url(#default#VML)
}
</STYLE>
<![endif]--><o:SmartTagType name=3D"City"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTagTyp=
e><o:SmartTagType=20
name=3D"place"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTagTyp=
e><o:SmartTagType=20
name=3D"PersonName"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTagTyp=
e><!--[if !mso]>
<STYLE>st1\:* {
	BEHAVIOR: url(#default#ieooui)
}
</STYLE>
<![endif]-->
<STYLE>@font-face {
	font-family: Tahoma;
}
@page Section1 {size: 612.0pt 792.0pt; margin: 72.0pt 90.0pt 72.0pt 90.0pt;=
 }
P.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0cm 0cm 0pt; FONT-FAMILY: "Times New Roman"
}
LI.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0cm 0cm 0pt; FONT-FAMILY: "Times New Roman"
}
DIV.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0cm 0cm 0pt; FONT-FAMILY: "Times New Roman"
}
A:link {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlink {
	COLOR: blue; TEXT-DECORATION: underline
}
A:visited {
	COLOR: purple; TEXT-DECORATION: underline
}
SPAN.MsoHyperlinkFollowed {
	COLOR: purple; TEXT-DECORATION: underline
}
P {
	FONT-SIZE: 12pt; MARGIN-LEFT: 0cm; MARGIN-RIGHT: 0cm; FONT-FAMILY: "Times =
New Roman"; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto
}
SPAN.EmailStyle18 {
	COLOR: windowtext; FONT-FAMILY: Arial; mso-style-type: personal
}
SPAN.EmailStyle19 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal
}
SPAN.EmailStyle20 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal
}
SPAN.EmailStyle21 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal-reply
}
DIV.Section1 {
	page: Section1
}
OL {
	MARGIN-BOTTOM: 0cm
}
UL {
	MARGIN-BOTTOM: 0cm
}
</STYLE>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]--></HEAD>
<BODY lang=3DEN-US vLink=3Dpurple link=3Dblue bgColor=3Dwhite>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D165381809-16072009><FONT face=3DA=
rial=20
color=3D#0000ff size=3D2>If we're to go with the encryption bit then we nee=
d more=20
verbiage on what the Next Header should carry (and would mean) when that bi=
t is=20
set and when it is not set. Also, what happens when there is a disconnect=20
between the two, etc. This is certainly doable, but involves more moving pa=
rts=20
then simply deriving the state from the Next Header field.</FONT></SPAN></D=
IV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D165381809-16072009><FONT face=3DA=
rial=20
color=3D#0000ff size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D165381809-16072009><FONT face=3DA=
rial=20
color=3D#0000ff size=3D2>Cheers, Manav</FONT></SPAN></DIV><BR>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px soli=
d; MARGIN-RIGHT: 0px">
  <DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr align=3Dleft>
  <HR tabIndex=3D-1>
  <FONT face=3DTahoma size=3D2><B>From:</B> Yaron Sheffer=20
  [mailto:yaronf@checkpoint.com] <BR><B>Sent:</B> Thursday, July 16, 2009 2=
.21=20
  PM<BR><B>To:</B> Bhatia, Manav (Manav); Grewal, Ken; QIU Ying;=20
  ipsec@ietf.org<BR><B>Subject:</B> RE: [IPsec] WG Last Call:=20
  draft-ietf-ipsecme-traffic-visibility-05<BR></FONT><BR></DIV>
  <DIV></DIV>
  <DIV class=3DSection1>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">I&#8217;ll vot=
e for the=20
  Encryption Bit&#8230;<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp;</o=
:p></SPAN></FONT></P>
  <DIV=20
  style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0cm; BORDER-TOP: mediu=
m none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0cm; BORDER-LEFT: blue 1.5pt sol=
id; PADDING-TOP: 0cm; BORDER-BOTTOM: medium none">
  <DIV>
  <DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" align=3Dcenter><FONT=
=20
  face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt">
  <HR tabIndex=3D-1 align=3Dcenter width=3D"100%" SIZE=3D2>
  </SPAN></FONT></DIV>
  <P class=3DMsoNormal><B><FONT face=3DTahoma size=3D2><SPAN=20
  style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Tahoma">From:</=
SPAN></FONT></B><FONT=20
  face=3DTahoma size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Tahom=
a">=20
  <st1:PersonName w:st=3D"on">Bhatia, Manav</st1:PersonName> (Manav)=20
  [mailto:manav@alcatel-lucent.com] <BR><B><SPAN=20
  style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Thursday, July 16, 2009=20
  7:27<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> <st1:PersonNa=
me=20
  w:st=3D"on">Grewal, Ken</st1:PersonName>; QIU Ying; <st1:PersonName=20
  w:st=3D"on">Yaron Sheffer</st1:PersonName>; <st1:PersonName=20
  w:st=3D"on">ipsec@ietf.org</st1:PersonName><BR><B><SPAN=20
  style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> RE: [IPsec] WG Last Call:=
=20
  draft-ietf-ipsecme-traffic-visibility-05</SPAN></FONT><o:p></o:p></P></DI=
V>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dblue size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: blue; FONT-FAMILY: Arial">We can use ESP=
 as the=20
  next header to denote encryption being used as long as we are sure that w=
e=20
  will never have an ESP packet inside the WESP encapsulation. In my view t=
here=20
  is nothing that precludes that from happening, which means that we may ha=
ve=20
  some corner cases where WESP may actually be carrying an ESP packet insid=
e it.=20
  Given this, i would rather that we don't use the ESP value to denote=20
  encryption being used.</SPAN></FONT><o:p></o:p></P>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dblue size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: blue; FONT-FAMILY: Arial">I am also not =
a big=20
  fan of the encryption bit as that takes away one bit from the already lim=
ited=20
  number of bits that we have at our disposal in&nbsp;the flags=20
  field.</SPAN></FONT><o:p></o:p></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dblue size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: blue; FONT-FAMILY: Arial">Given that a p=
acket=20
  will never carry a protocol ID of 0xFF i propose to&nbsp;use&nbsp;this va=
lue=20
  in the next-header to denote encryption being used. Would this=20
  work?</SPAN></FONT><o:p></o:p></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dblue size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: blue; FONT-FAMILY: Arial">Cheers,=20
  Manav</SPAN></FONT><o:p></o:p></P></DIV>
  <BLOCKQUOTE=20
  style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0cm; BORDER-TOP: mediu=
m none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0cm; MARGIN: 5pt 0cm 5pt 3.75pt;=
 BORDER-LEFT: blue 1.5pt solid; PADDING-TOP: 0cm; BORDER-BOTTOM: medium non=
e">
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
    <DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" align=3Dcenter><FON=
T=20
    face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt">
    <HR tabIndex=3D-1 align=3Dcenter width=3D"100%" SIZE=3D2>
    </SPAN></FONT></DIV>
    <P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><B><FONT face=3DTaho=
ma=20
    size=3D2><SPAN=20
    style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Tahoma">From:=
</SPAN></FONT></B><FONT=20
    face=3DTahoma size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Tah=
oma">=20
    ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <B><SPAN=20
    style=3D"FONT-WEIGHT: bold">On Behalf Of </SPAN></B><st1:PersonName=20
    w:st=3D"on">Grewal, Ken</st1:PersonName><BR><B><SPAN=20
    style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Wednesday, July 15, 2009 8=
.57=20
    PM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> QIU Ying;=20
    <st1:PersonName w:st=3D"on">Yaron Sheffer</st1:PersonName>; <st1:Person=
Name=20
    w:st=3D"on">ipsec@ietf.org</st1:PersonName><BR><B><SPAN=20
    style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [IPsec] WG Last Cal=
l:=20
    draft-ietf-ipsecme-traffic-visibility-05</SPAN></FONT><o:p></o:p></P>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Qiu Ying,=20
    <o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Copying the =
value=20
    of the ESP next header to the WESP next header is useful for efficient =
HW=20
    parsing when using ESP-NULL. <o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">You are corr=
ect=20
    that in the case of encrypted traffic, we can set this value to &#8216;=
ESP&#8217;, which=20
    could denote that the payload is encrypted. <o:p></o:p></SPAN></FONT></=
P>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Having said =
that,=20
    some people in the past have mentioned that it may be cleaner to have a=
=20
    dedicated bit to denote whether the payload is encrypted or using=20
    ESP-NULL.<o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp;<=
/o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Either way w=
orks,=20
    as long as there is a discrete, unambiguous way to denote this.=20
    &nbsp;<o:p></o:p></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp;<=
/o:p></SPAN></FONT></P>
    <DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy size=
=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt; COLOR: navy">Thanks, <o:p></o:p></SPAN></FONT=
></P>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy size=
=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt; COLOR: navy">-=20
Ken<o:p></o:p></SPAN></FONT></P></DIV>
    <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp;<=
/o:p></SPAN></FONT></P>
    <DIV=20
    style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0cm; BORDER-TOP: med=
ium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0cm; BORDER-LEFT: blue 1.5pt s=
olid; PADDING-TOP: 0cm; BORDER-BOTTOM: medium none">
    <DIV>
    <DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" align=3Dcenter><FON=
T=20
    face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt">
    <HR tabIndex=3D-1 align=3Dcenter width=3D"100%" SIZE=3D2>
    </SPAN></FONT></DIV>
    <P class=3DMsoNormal><B><FONT face=3DTahoma size=3D2><SPAN=20
    style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Tahoma">From:=
</SPAN></FONT></B><FONT=20
    face=3DTahoma size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Tah=
oma"> QIU=20
    Ying [mailto:qiuying@i2r.a-star.edu.sg] <BR><B><SPAN=20
    style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Tuesday, July 14, 2009 7:4=
2=20
    PM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> <st1:PersonNa=
me=20
    w:st=3D"on">Grewal, Ken</st1:PersonName>; <st1:PersonName w:st=3D"on">Y=
aron=20
    Sheffer</st1:PersonName>; <st1:PersonName=20
    w:st=3D"on">ipsec@ietf.org</st1:PersonName><BR><B><SPAN=20
    style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [IPsec] WG Last Cal=
l:=20
    draft-ietf-ipsecme-traffic-visibility-05</SPAN></FONT><o:p></o:p></P></=
DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
    <DIV>
    <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Hi,=20
    Ken</SPAN></FONT><o:p></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Agree that&nbsp;Option 1 =
is=20
    better as it applies lesser new IANA numbers. But in this case, it=20
    seems&nbsp;redundancy to copy the value of Next Header field in the ESP=
=20
    trailer to here. How about simply&nbsp;setting the value as ESP here? I=
=20
    think it more meet the original concept of Next=20
    Header.</SPAN></FONT><o:p></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Maybe I am missing=20
    something</SPAN></FONT><o:p></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Regards</SPAN></FONT><o:p=
></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Qiu=20
    Ying</SPAN></FONT><o:p></o:p></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
    <BLOCKQUOTE=20
    style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0cm; BORDER-TOP: med=
ium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0cm; MARGIN: 5pt 0cm 5pt 3.75p=
t; BORDER-LEFT: black 1.5pt solid; PADDING-TOP: 0cm; BORDER-BOTTOM: medium =
none">
      <DIV>
      <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">----- Original Message =
-----=20
      <o:p></o:p></SPAN></FONT></P></DIV>
      <DIV style=3D"font-color: black">
      <P class=3DMsoNormal style=3D"BACKGROUND: #e4e4e4"><B><FONT face=3DAr=
ial=20
      size=3D2><SPAN=20
      style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">From=
:</SPAN></FONT></B><FONT=20
      face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Ar=
ial"> <A=20
      title=3Dken.grewal@intel.com href=3D"mailto:ken.grewal@intel.com">Gre=
wal,=20
      Ken</A> <o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">To:<=
/SPAN></FONT></B><FONT=20
      face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Ar=
ial"> <A=20
      title=3Dqiuying@i2r.a-star.edu.sg=20
      href=3D"mailto:qiuying@i2r.a-star.edu.sg">QIU Ying</A> ; <A=20
      title=3Dyaronf@checkpoint.com href=3D"mailto:yaronf@checkpoint.com">Y=
aron=20
      Sheffer</A> ; <A title=3Dipsec@ietf.org=20
      href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A>=20
      <o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">Sent=
:</SPAN></FONT></B><FONT=20
      face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Ar=
ial">=20
      Wednesday, July 15, 2009 1:31 AM<o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">Subj=
ect:</SPAN></FONT></B><FONT=20
      face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Ar=
ial"> RE:=20
      [IPsec] WG Last Call:=20
      draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FONT></P>=
</DIV>
      <DIV>
      <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
      style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DIV>
      <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Thanks Qiu=
 Ying -=20
      great observation. <o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp=
;</o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">We had ori=
ginally=20
      proposed using a bit from the WESP flags (integrity only) for=20
      differentiating between ESP-encrypted and ESP-NULL traffic, but chang=
ed=20
      this to using a value of zero in the next header for efficient encodi=
ng,=20
      although this is overloading the meaning of next header.=20
      <o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">With your=
=20
      observation, the current definition is not practical so we have the=20
      following options:<o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp=
;</o:p></SPAN></FONT></P>
      <OL style=3D"MARGIN-TOP: 0cm" type=3D1>
        <LI class=3DMsoNormal style=3D"COLOR: navy; mso-list: l0 level1 lfo=
1"><FONT=20
        face=3DArial color=3Dnavy size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Revert back to using =
a bit=20
        in the flags to differentiate between encrypted / NULL=20
        traffic.</SPAN></FONT> <FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><o:p></o:p></SPAN></F=
ONT>
        <LI class=3DMsoNormal style=3D"COLOR: navy; mso-list: l0 level1 lfo=
1"><FONT=20
        face=3DArial color=3Dnavy size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Allocate a new protoc=
ol=20
        value for the next header field to indicate encrypted data, which s=
eems=20
        like an overkill.</SPAN></FONT> <FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><o:p></o:p></SPAN></F=
ONT></LI></OL>
      <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp=
;</o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">As we are =
already=20
      asking for a new protocol value for WESP, option 1 seems to be the be=
tter=20
      choice.<o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp=
;</o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Other=20
      opinions?<o:p></o:p></SPAN></FONT></P>
      <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp=
;</o:p></SPAN></FONT></P>
      <DIV>
      <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy size=
=3D3><SPAN=20
      style=3D"FONT-SIZE: 12pt; COLOR: navy">Thanks, <o:p></o:p></SPAN></FO=
NT></P>
      <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy size=
=3D3><SPAN=20
      style=3D"FONT-SIZE: 12pt; COLOR: navy">-=20
      Ken<o:p></o:p></SPAN></FONT></P></DIV>
      <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp=
;</o:p></SPAN></FONT></P>
      <DIV=20
      style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0cm; BORDER-TOP: m=
edium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0cm; BORDER-LEFT: blue 1.5pt=
 solid; PADDING-TOP: 0cm; BORDER-BOTTOM: medium none">
      <DIV>
      <DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" align=3Dcenter><F=
ONT=20
      face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt">
      <HR tabIndex=3D-1 align=3Dcenter width=3D"100%" SIZE=3D2>
      </SPAN></FONT></DIV>
      <P class=3DMsoNormal><B><FONT face=3DTahoma size=3D2><SPAN=20
      style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Tahoma">Fro=
m:</SPAN></FONT></B><FONT=20
      face=3DTahoma size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: T=
ahoma">=20
      <st1:PersonName w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonName>=20
      [mailto:<st1:PersonName w:st=3D"on">ipsec-bounces@ietf.org</st1:Perso=
nName>]=20
      <B><SPAN style=3D"FONT-WEIGHT: bold">On Behalf Of </SPAN></B>QIU=20
      Ying<BR><B><SPAN style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Tuesday=
, July=20
      14, 2009 12:37 AM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN><=
/B> QIU=20
      Ying; <st1:PersonName w:st=3D"on">Yaron Sheffer</st1:PersonName>;=20
      <st1:PersonName w:st=3D"on">ipsec@ietf.org</st1:PersonName><BR><B><SP=
AN=20
      style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [IPsec] WG Last C=
all:=20
      draft-ietf-ipsecme-traffic-visibility-05</SPAN></FONT><o:p></o:p></P>=
</DIV>
      <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
      style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
      <DIV>
      <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Since the zero of&nbsp;=
next=20
      header&nbsp;value is used for HOPOPT already, maybe applying a new va=
lue=20
      for this intention is better to avoid the=20
      confliction.</SPAN></FONT><o:p></o:p></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
      style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Regards</SPAN></FONT><o=
:p></o:p></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
      style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Qiu=20
      Ying</SPAN></FONT><o:p></o:p></P></DIV>
      <DIV>
      <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
      style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
      <BLOCKQUOTE=20
      style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0cm; BORDER-TOP: m=
edium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0cm; MARGIN: 5pt 0cm 5pt 3.7=
5pt; BORDER-LEFT: black 1.5pt solid; PADDING-TOP: 0cm; BORDER-BOTTOM: mediu=
m none">
        <DIV>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">----- Original Messag=
e -----=20
        <o:p></o:p></SPAN></FONT></P></DIV>
        <DIV style=3D"font-color: black">
        <P class=3DMsoNormal style=3D"BACKGROUND: #e4e4e4"><B><FONT face=3D=
Arial=20
        size=3D2><SPAN=20
        style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">Fr=
om:</SPAN></FONT></B><FONT=20
        face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial"> <A=20
        title=3Dqiuying@i2r.a-star.edu.sg=20
        href=3D"mailto:qiuying@i2r.a-star.edu.sg">QIU Ying</A>=20
        <o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">To=
:</SPAN></FONT></B><FONT=20
        face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial"> <A=20
        title=3Dyaronf@checkpoint.com href=3D"mailto:yaronf@checkpoint.com"=
>Yaron=20
        Sheffer</A> ; <A title=3Dipsec@ietf.org=20
        href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A>=20
        <o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">Se=
nt:</SPAN></FONT></B><FONT=20
        face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial">=20
        Tuesday, July 14, 2009 3:30 PM<o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">Su=
bject:</SPAN></FONT></B><FONT=20
        face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial"> Re:=20
        [IPsec] WG Last Call:=20
        draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FONT></=
P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=
=20
        style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Regarding the Next He=
ader in=20
        section 2, what will be happened if the value of Next Header is zer=
o=20
        (i.e. IPv6 Hop-by-Hop option) and the packet is not=20
        encrypted?</SPAN></FONT><o:p></o:p></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=
=20
        style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Regards</SPAN></FONT>=
<o:p></o:p></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
        style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Qiu=20
        Ying</SPAN></FONT><o:p></o:p></P></DIV>
        <DIV>
        <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=
=20
        style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
        <BLOCKQUOTE=20
        style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0cm; BORDER-TOP:=
 medium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0cm; MARGIN: 5pt 0cm 5pt 3=
.75pt; BORDER-LEFT: black 1.5pt solid; PADDING-TOP: 0cm; BORDER-BOTTOM: med=
ium none">
          <DIV>
          <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">----- Original Mess=
age=20
          ----- <o:p></o:p></SPAN></FONT></P></DIV>
          <DIV style=3D"font-color: black">
          <P class=3DMsoNormal style=3D"BACKGROUND: #e4e4e4"><B><FONT face=
=3DArial=20
          size=3D2><SPAN=20
          style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">=
From:</SPAN></FONT></B><FONT=20
          face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY=
: Arial">=20
          <A title=3Dyaronf@checkpoint.com=20
          href=3D"mailto:yaronf@checkpoint.com">Yaron Sheffer</A>=20
          <o:p></o:p></SPAN></FONT></P></DIV>
          <DIV>
          <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">=
To:</SPAN></FONT></B><FONT=20
          face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY=
: Arial">=20
          <A title=3Dipsec@ietf.org=20
          href=3D"mailto:ipsec@ietf.org">ipsec@ietf.org</A>=20
          <o:p></o:p></SPAN></FONT></P></DIV>
          <DIV>
          <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">=
Sent:</SPAN></FONT></B><FONT=20
          face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY=
: Arial">=20
          Sunday, July 05, 2009 3:48 AM<o:p></o:p></SPAN></FONT></P></DIV>
          <DIV>
          <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: Arial">=
Subject:</SPAN></FONT></B><FONT=20
          face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY=
: Arial">=20
          [IPsec] WG Last Call:=20
          draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></SPAN></FONT>=
</P></DIV>
          <DIV>
          <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPA=
N=20
          style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DI=
V>
          <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">This is the beginni=
ng of a=20
          two-week WG Last Call, which will end July 18. The target status =
for=20
          this document is Proposed Standard. The current document is at <A=
=20
          href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-vis=
ibility-05">http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibilit=
y-05</A>.<o:p></o:p></SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><o:p>&nbsp;</o:p></=
SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">If you have not rea=
d the=20
          document before now, please do so. Having fresh eyes on the docum=
ent=20
          often brings up important issues. If you HAVE read it before, ple=
ase=20
          note that there have been several revisions since <st1:place=20
          w:st=3D"on"><st1:City w:st=3D"on">San Francisco</st1:City></st1:p=
lace>, so=20
          you might want to read it again (plus it&#8217;s a short document=
). Send any=20
          comments to the list, even if they are as simple as "I read it an=
d it=20
          seems fine".<o:p></o:p></SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><o:p>&nbsp;</o:p></=
SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Please clearly indi=
cate=20
          the position of any issue in the Internet Draft, and if possible=
=20
          provide alternative text. Please also indicate the nature or seve=
rity=20
          of the error or correction, e.g. major technical, minor technical=
,=20
          nit, so that we can quickly judge the extent of problems with the=
=20
          document.<o:p></o:p></SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><o:p>&nbsp;</o:p></=
SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Thanks,<o:p></o:p><=
/SPAN></FONT></P>
          <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
          style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
          Yaron<o:p></o:p></SPAN></FONT></P>
          <DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" align=3Dcente=
r><FONT=20
          face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt"=
>
          <HR align=3Dcenter width=3D"100%" SIZE=3D2>
          </SPAN></FONT></DIV>
          <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPA=
N=20
          style=3D"FONT-SIZE: 12pt">_______________________________________=
________<BR>IPsec=20
          mailing=20
          list<BR>IPsec@ietf.org<BR>https://www.ietf.org/mailman/listinfo/i=
psec<o:p></o:p></SPAN></FONT></P></BLOCKQUOTE></BLOCKQUOTE>
      <DIV>
      <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
      style=3D"FONT-SIZE: 12pt">Institute for Infocomm Research disclaimer:=
 "This=20
      email is confidential and may be privileged. If you are not the inten=
ded=20
      recipient, please delete it and notify us immediately. Please do not =
copy=20
      or use it for any purpose, or disclose its contents to any other pers=
on.=20
      Thank you."<o:p></o:p></SPAN></FONT></P></DIV></DIV></BLOCKQUOTE>
    <DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt">Institute for Infocomm Research disclaimer: "=
This=20
    email is confidential and may be privileged. If you are not the intende=
d=20
    recipient, please delete it and notify us immediately. Please do not co=
py or=20
    use it for any purpose, or disclose its contents to any other person. T=
hank=20
    you."<o:p></o:p></SPAN></FONT></P></DIV></DIV></BLOCKQUOTE>
  <P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><FONT face=3D"Times Ne=
w Roman"=20
  size=3D3><SPAN style=3D"FONT-SIZE: 12pt"><BR><BR>Scanned by Check Point T=
otal=20
  Security Gateway.=20
<o:p></o:p></SPAN></FONT></P></DIV></DIV></BLOCKQUOTE></BODY></HTML>

--_000_7C362EEF9C7896468B36C9B79200D8350A1C4BC38DINBANSXCHMBSA_--

From ken.grewal@intel.com  Thu Jul 16 21:19:24 2009
Return-Path: <ken.grewal@intel.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F17683A657C for <ipsec@core3.amsl.com>; Thu, 16 Jul 2009 21:19:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mzTtdOD-7dMp for <ipsec@core3.amsl.com>; Thu, 16 Jul 2009 21:19:14 -0700 (PDT)
Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by core3.amsl.com (Postfix) with ESMTP id AF29E3A68E5 for <ipsec@ietf.org>; Thu, 16 Jul 2009 21:19:06 -0700 (PDT)
Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga101.fm.intel.com with ESMTP; 16 Jul 2009 21:04:24 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="4.42,416,1243839600";  d="scan'208,217";a="708594358"
Received: from rrsmsx604.amr.corp.intel.com ([10.31.0.170]) by fmsmga001.fm.intel.com with ESMTP; 16 Jul 2009 21:22:54 -0700
Received: from rrsmsx601.amr.corp.intel.com (10.31.0.151) by rrsmsx604.amr.corp.intel.com (10.31.0.170) with Microsoft SMTP Server (TLS) id 8.1.358.0; Thu, 16 Jul 2009 22:19:37 -0600
Received: from rrsmsx505.amr.corp.intel.com ([10.31.0.36]) by rrsmsx601.amr.corp.intel.com ([10.31.0.151]) with mapi; Thu, 16 Jul 2009 22:19:37 -0600
From: "Grewal, Ken" <ken.grewal@intel.com>
To: "Bhatia, Manav (Manav)" <manav@alcatel-lucent.com>, Yaron Sheffer <yaronf@checkpoint.com>, QIU Ying <qiuying@i2r.a-star.edu.sg>, "ipsec@ietf.org" <ipsec@ietf.org>
Date: Thu, 16 Jul 2009 22:19:02 -0600
Thread-Topic: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
Thread-Index: AcoE9mMzRspYXvBER22PFG5Az3HTWQAaYrjwAB+bSHAABQv/oAAA9vOAACfHjHA=
Message-ID: <C49B4B6450D9AA48AB99694D2EB0A4832C2AE1EC@rrsmsx505.amr.corp.intel.com>
References: <2E5D69B62A99425C894AA9B258004990@t3400> <C49B4B6450D9AA48AB99694D2EB0A4832C2438DC@rrsmsx505.amr.corp.intel.com> <E12B577D22E64DE1806D838CDC751259@t3400> <C49B4B6450D9AA48AB99694D2EB0A4832C24406A@rrsmsx505.amr.corp.intel.com> <7C362EEF9C7896468B36C9B79200D8350A1C4BC25F@INBANSXCHMBSA1.in.alcatel-lucent.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC801295365570A@il-ex01.ad.checkpoint.com> <7C362EEF9C7896468B36C9B79200D8350A1C4BC38D@INBANSXCHMBSA1.in.alcatel-lucent.com>
In-Reply-To: <7C362EEF9C7896468B36C9B79200D8350A1C4BC38D@INBANSXCHMBSA1.in.alcatel-lucent.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C49B4B6450D9AA48AB99694D2EB0A4832C2AE1ECrrsmsx505amrcor_"
MIME-Version: 1.0
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Jul 2009 04:19:25 -0000

--_000_C49B4B6450D9AA48AB99694D2EB0A4832C2AE1ECrrsmsx505amrcor_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

After further offline discussion with Manav, we agree with Yaron that a dis=
crete encryption bit is probably the best approach.

Thanks,
- Ken

________________________________
From: Bhatia, Manav (Manav) [mailto:manav@alcatel-lucent.com]
Sent: Thursday, July 16, 2009 2:22 AM
To: Yaron Sheffer; Grewal, Ken; QIU Ying; ipsec@ietf.org
Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

If we're to go with the encryption bit then we need more verbiage on what t=
he Next Header should carry (and would mean) when that bit is set and when =
it is not set. Also, what happens when there is a disconnect between the tw=
o, etc. This is certainly doable, but involves more moving parts then simpl=
y deriving the state from the Next Header field.

Cheers, Manav

________________________________
From: Yaron Sheffer [mailto:yaronf@checkpoint.com]
Sent: Thursday, July 16, 2009 2.21 PM
To: Bhatia, Manav (Manav); Grewal, Ken; QIU Ying; ipsec@ietf.org
Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
I'll vote for the Encryption Bit...

________________________________
From: Bhatia, Manav (Manav) [mailto:manav@alcatel-lucent.com]
Sent: Thursday, July 16, 2009 7:27
To: Grewal, Ken; QIU Ying; Yaron Sheffer; ipsec@ietf.org
Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

We can use ESP as the next header to denote encryption being used as long a=
s we are sure that we will never have an ESP packet inside the WESP encapsu=
lation. In my view there is nothing that precludes that from happening, whi=
ch means that we may have some corner cases where WESP may actually be carr=
ying an ESP packet inside it. Given this, i would rather that we don't use =
the ESP value to denote encryption being used.

I am also not a big fan of the encryption bit as that takes away one bit fr=
om the already limited number of bits that we have at our disposal in the f=
lags field.

Given that a packet will never carry a protocol ID of 0xFF i propose to use=
 this value in the next-header to denote encryption being used. Would this =
work?

Cheers, Manav

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of G=
rewal, Ken
Sent: Wednesday, July 15, 2009 8.57 PM
To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05
Qiu Ying,
Copying the value of the ESP next header to the WESP next header is useful =
for efficient HW parsing when using ESP-NULL.
You are correct that in the case of encrypted traffic, we can set this valu=
e to 'ESP', which could denote that the payload is encrypted.
Having said that, some people in the past have mentioned that it may be cle=
aner to have a dedicated bit to denote whether the payload is encrypted or =
using ESP-NULL.

Either way works, as long as there is a discrete, unambiguous way to denote=
 this.

Thanks,
- Ken

________________________________
From: QIU Ying [mailto:qiuying@i2r.a-star.edu.sg]
Sent: Tuesday, July 14, 2009 7:42 PM
To: Grewal, Ken; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Hi, Ken

Agree that Option 1 is better as it applies lesser new IANA numbers. But in=
 this case, it seems redundancy to copy the value of Next Header field in t=
he ESP trailer to here. How about simply setting the value as ESP here? I t=
hink it more meet the original concept of Next Header.

Maybe I am missing something

Regards
Qiu Ying

----- Original Message -----
From: Grewal, Ken<mailto:ken.grewal@intel.com>
To: QIU Ying<mailto:qiuying@i2r.a-star.edu.sg> ; Yaron Sheffer<mailto:yaron=
f@checkpoint.com> ; ipsec@ietf.org<mailto:ipsec@ietf.org>
Sent: Wednesday, July 15, 2009 1:31 AM
Subject: RE: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Thanks Qiu Ying - great observation.

We had originally proposed using a bit from the WESP flags (integrity only)=
 for differentiating between ESP-encrypted and ESP-NULL traffic, but change=
d this to using a value of zero in the next header for efficient encoding, =
although this is overloading the meaning of next header.
With your observation, the current definition is not practical so we have t=
he following options:


 1.  Revert back to using a bit in the flags to differentiate between encry=
pted / NULL traffic.
 2.  Allocate a new protocol value for the next header field to indicate en=
crypted data, which seems like an overkill.

As we are already asking for a new protocol value for WESP, option 1 seems =
to be the better choice.

Other opinions?

Thanks,
- Ken

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Q=
IU Ying
Sent: Tuesday, July 14, 2009 12:37 AM
To: QIU Ying; Yaron Sheffer; ipsec@ietf.org
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Since the zero of next header value is used for HOPOPT already, maybe apply=
ing a new value for this intention is better to avoid the confliction.

Regards
Qiu Ying

----- Original Message -----
From: QIU Ying<mailto:qiuying@i2r.a-star.edu.sg>
To: Yaron Sheffer<mailto:yaronf@checkpoint.com> ; ipsec@ietf.org<mailto:ips=
ec@ietf.org>
Sent: Tuesday, July 14, 2009 3:30 PM
Subject: Re: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

Regarding the Next Header in section 2, what will be happened if the value =
of Next Header is zero (i.e. IPv6 Hop-by-Hop option) and the packet is not =
encrypted?

Regards
Qiu Ying

----- Original Message -----
From: Yaron Sheffer<mailto:yaronf@checkpoint.com>
To: ipsec@ietf.org<mailto:ipsec@ietf.org>
Sent: Sunday, July 05, 2009 3:48 AM
Subject: [IPsec] WG Last Call: draft-ietf-ipsecme-traffic-visibility-05

This is the beginning of a two-week WG Last Call, which will end July 18. T=
he target status for this document is Proposed Standard. The current docume=
nt is at http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-0=
5.

If you have not read the document before now, please do so. Having fresh ey=
es on the document often brings up important issues. If you HAVE read it be=
fore, please note that there have been several revisions since San Francisc=
o, so you might want to read it again (plus it's a short document). Send an=
y comments to the list, even if they are as simple as "I read it and it see=
ms fine".

Please clearly indicate the position of any issue in the Internet Draft, an=
d if possible provide alternative text. Please also indicate the nature or =
severity of the error or correction, e.g. major technical, minor technical,=
 nit, so that we can quickly judge the extent of problems with the document=
.

Thanks,
            Yaron
________________________________
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
Institute for Infocomm Research disclaimer: "This email is confidential and=
 may be privileged. If you are not the intended recipient, please delete it=
 and notify us immediately. Please do not copy or use it for any purpose, o=
r disclose its contents to any other person. Thank you."
Institute for Infocomm Research disclaimer: "This email is confidential and=
 may be privileged. If you are not the intended recipient, please delete it=
 and notify us immediately. Please do not copy or use it for any purpose, o=
r disclose its contents to any other person. Thank you."


Scanned by Check Point Total Security Gateway.

--_000_C49B4B6450D9AA48AB99694D2EB0A4832C2AE1ECrrsmsx505amrcor_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:p=3D"urn:schemas-m=
icrosoft-com:office:powerpoint" xmlns:a=3D"urn:schemas-microsoft-com:office=
:access" xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s=3D"=
uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs=3D"urn:schemas-microsof=
t-com:rowset" xmlns:z=3D"#RowsetSchema" xmlns:b=3D"urn:schemas-microsoft-co=
m:office:publisher" xmlns:ss=3D"urn:schemas-microsoft-com:office:spreadshee=
t" xmlns:c=3D"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns=
:odc=3D"urn:schemas-microsoft-com:office:odc" xmlns:oa=3D"urn:schemas-micro=
soft-com:office:activation" xmlns:html=3D"http://www.w3.org/TR/REC-html40" =
xmlns:q=3D"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc=3D"http://m=
icrosoft.com/officenet/conferencing" xmlns:D=3D"DAV:" xmlns:Repl=3D"http://=
schemas.microsoft.com/repl/" xmlns:mt=3D"http://schemas.microsoft.com/share=
point/soap/meetings/" xmlns:x2=3D"http://schemas.microsoft.com/office/excel=
/2003/xml" xmlns:ppda=3D"http://www.passport.com/NameSpace.xsd" xmlns:ois=
=3D"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir=3D"http://=
schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds=3D"http://www.w3=
.org/2000/09/xmldsig#" xmlns:dsp=3D"http://schemas.microsoft.com/sharepoint=
/dsp" xmlns:udc=3D"http://schemas.microsoft.com/data/udc" xmlns:xsd=3D"http=
://www.w3.org/2001/XMLSchema" xmlns:sub=3D"http://schemas.microsoft.com/sha=
repoint/soap/2002/1/alerts/" xmlns:ec=3D"http://www.w3.org/2001/04/xmlenc#"=
 xmlns:sp=3D"http://schemas.microsoft.com/sharepoint/" xmlns:sps=3D"http://=
schemas.microsoft.com/sharepoint/soap/" xmlns:xsi=3D"http://www.w3.org/2001=
/XMLSchema-instance" xmlns:udcs=3D"http://schemas.microsoft.com/data/udc/so=
ap" xmlns:udcxf=3D"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udc=
p2p=3D"http://schemas.microsoft.com/data/udc/parttopart" xmlns:st=3D"&#1;" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" xmlns=3D"http://ww=
w.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" name=3D"place"=
/>
<o:SmartTagType namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"City"/>
<o:SmartTagType namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PersonName"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman";}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:Arial;
	color:windowtext;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:Arial;
	color:navy;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:Arial;
	color:navy;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:Arial;
	color:navy;}
span.EmailStyle22
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
 /* List Definitions */
 @list l0
	{mso-list-id:1983273534;
	mso-list-template-ids:-1415693858;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body bgcolor=3Dwhite lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>After further offline discussion with
Manav, we agree with Yaron that a discrete encryption bit is probably the b=
est
approach.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt;color:navy'>Thanks, <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt;color:navy'>- Ken<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> Bhatia, =
Manav
(Manav) [mailto:manav@alcatel-lucent.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Thursday, July 16, 200=
9 2:22
AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Yaron Sheffer; Grewal, K=
en;
QIU Ying; ipsec@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> RE: [IPsec] WG Last=
 Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>If we're to go with the encryption bit
then we need more verbiage on what the Next Header should carry (and would
mean) when that bit is set and when it is not set. Also, what happens when =
there
is a disconnect between the two, etc. This is certainly doable, but involve=
s
more moving parts then simply deriving the state from the Next Header field=
.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Cheers, Manav</span></font><o:p></o:p>=
</p>

<blockquote style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0=
in 0in 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><b><font size=3D2 face=
=3DTahoma><span
style=3D'font-size:10.0pt;font-family:Tahoma;font-weight:bold'>From:</span>=
</font></b><font
size=3D2 face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>=
 Yaron
Sheffer [mailto:yaronf@checkpoint.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Thursday, July 16, 200=
9 2.21
PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Bhatia, Manav (Manav); G=
rewal,
Ken; QIU Ying; ipsec@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> RE: [IPsec] WG Last=
 Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I&#8217;ll vote for the Encryption Bit=
&#8230;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> <st1:Per=
sonName
w:st=3D"on">Bhatia, Manav</st1:PersonName> (Manav) [mailto:manav@alcatel-lu=
cent.com]
<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Thursday, July 16, 200=
9 7:27<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName w:st=3D"=
on">Grewal,
 Ken</st1:PersonName>; QIU Ying; <st1:PersonName w:st=3D"on">Yaron Sheffer<=
/st1:PersonName>;
<st1:PersonName w:st=3D"on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> RE: [IPsec] WG Last=
 Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>We can use ESP as the next header to
denote encryption being used as long as we are sure that we will never have=
 an
ESP packet inside the WESP encapsulation. In my view there is nothing that
precludes that from happening, which means that we may have some corner cas=
es
where WESP may actually be carrying an ESP packet inside it. Given this, i
would rather that we don't use the ESP value to denote encryption being use=
d.</span></font><o:p></o:p></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>I am also not a big fan of the encrypt=
ion
bit as that takes away one bit from the already limited number of bits that=
 we
have at our disposal in&nbsp;the flags field.</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Given that a packet will never carry a
protocol ID of 0xFF i propose to&nbsp;use&nbsp;this value in the next-heade=
r to
denote encryption being used. Would this work?</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Cheers, Manav</span></font><o:p></o:p>=
</p>

</div>

<blockquote style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0=
in 0in 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><b><font size=3D2 face=
=3DTahoma><span
style=3D'font-size:10.0pt;font-family:Tahoma;font-weight:bold'>From:</span>=
</font></b><font
size=3D2 face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <b><span
style=3D'font-weight:bold'>On Behalf Of </span></b><st1:PersonName w:st=3D"=
on">Grewal,
 Ken</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Wednesday, July 15, 20=
09
8.57 PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> QIU Ying; <st1:PersonNam=
e
w:st=3D"on">Yaron Sheffer</st1:PersonName>; <st1:PersonName w:st=3D"on">ips=
ec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] WG Last=
 Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Qiu Ying, <o:p></o:p></span></font></p=
>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Copying the value of the ESP next head=
er
to the WESP next header is useful for efficient HW parsing when using ESP-N=
ULL.
<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>You are correct that in the case of
encrypted traffic, we can set this value to &#8216;ESP&#8217;, which could =
denote that the
payload is encrypted. <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Having said that, some people in the p=
ast
have mentioned that it may be cleaner to have a dedicated bit to denote whe=
ther
the payload is encrypted or using ESP-NULL.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Either way works, as long as there is =
a
discrete, unambiguous way to denote this. &nbsp;<o:p></o:p></span></font></=
p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt;color:navy'>Thanks, <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt;color:navy'>- Ken<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> QIU Ying
[mailto:qiuying@i2r.a-star.edu.sg] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Tuesday, July 14, 2009=
 7:42
PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName w:st=3D"=
on">Grewal,
 Ken</st1:PersonName>; <st1:PersonName w:st=3D"on">Yaron Sheffer</st1:Perso=
nName>;
<st1:PersonName w:st=3D"on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] WG Last=
 Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Hi, Ken</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Agree that&nbsp;Option 1 is better as it applies lesser =
new
IANA numbers. But in this case, it seems&nbsp;redundancy to copy the value =
of
Next Header field in the ESP trailer to here. How about simply&nbsp;setting=
 the
value as ESP here? I think it more meet the original concept of Next Header=
.</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Maybe I am missing something</span></font><o:p></o:p></p=
>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Regards</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Qiu Ying</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid black 1.5pt;padding:0in =
0in 0in 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>----- Original Message ----- <o:p></o:p></span></font></=
p>

</div>

<div style=3D'font-color:black'>

<p class=3DMsoNormal style=3D'background:#E4E4E4'><b><font size=3D2 face=3D=
Arial><span
style=3D'font-size:10.0pt;font-family:Arial;font-weight:bold'>From:</span><=
/font></b><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <=
a
href=3D"mailto:ken.grewal@intel.com" title=3D"ken.grewal@intel.com">Grewal,=
 Ken</a>
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>To:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:qiuying@i2r.a-star.edu.sg" title=3D"qiuying@i2r.a-star.edu.s=
g">QIU
Ying</a> ; <a href=3D"mailto:yaronf@checkpoint.com" title=3D"yaronf@checkpo=
int.com">Yaron
Sheffer</a> ; <a href=3D"mailto:ipsec@ietf.org" title=3D"ipsec@ietf.org">ip=
sec@ietf.org</a>
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Sent:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> Wednesday,=
 July
15, 2009 1:31 AM<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Subject:</span></font></b><font size=3D=
2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> RE: [IPsec=
] WG
Last Call: draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></span></font=
></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Thanks Qiu Ying - great observation. <=
o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>We had originally proposed using a bit
from the WESP flags (integrity only) for differentiating between ESP-encryp=
ted
and ESP-NULL traffic, but changed this to using a value of zero in the next
header for efficient encoding, although this is overloading the meaning of =
next
header. <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>With your observation, the current
definition is not practical so we have the following options:<o:p></o:p></s=
pan></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<ol style=3D'margin-top:0in' start=3D1 type=3D1>
 <li class=3DMsoNormal style=3D'color:navy;mso-list:l0 level1 lfo1'><font s=
ize=3D2
     color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt;font-family:=
Arial'>Revert
     back to using a bit in the flags to differentiate between encrypted / =
NULL
     traffic.</span></font> <font size=3D2 face=3DArial><span style=3D'font=
-size:
     10.0pt;font-family:Arial'><o:p></o:p></span></font></li>
 <li class=3DMsoNormal style=3D'color:navy;mso-list:l0 level1 lfo1'><font s=
ize=3D2
     color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt;font-family:=
Arial'>Allocate
     a new protocol value for the next header field to indicate encrypted d=
ata,
     which seems like an overkill.</span></font> <font size=3D2 face=3DAria=
l><span
     style=3D'font-size:10.0pt;font-family:Arial'><o:p></o:p></span></font>=
</li>
</ol>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>As we are already asking for a new
protocol value for WESP, option 1 seems to be the better choice.<o:p></o:p>=
</span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Other opinions?<o:p></o:p></span></fon=
t></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt;color:navy'>Thanks, <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 color=3Dnavy face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt;color:navy'>- Ken<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> <st1:Per=
sonName
w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonName> [mailto:<st1:PersonName
w:st=3D"on">ipsec-bounces@ietf.org</st1:PersonName>] <b><span style=3D'font=
-weight:
bold'>On Behalf Of </span></b>QIU Ying<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Tuesday, July 14, 2009=
 12:37
AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> QIU Ying; <st1:PersonNam=
e
w:st=3D"on">Yaron Sheffer</st1:PersonName>; <st1:PersonName w:st=3D"on">ips=
ec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] WG Last=
 Call:
draft-ietf-ipsecme-traffic-visibility-05</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Since the zero of&nbsp;next header&nbsp;value is used fo=
r
HOPOPT already, maybe applying a new value for this intention is better to
avoid the confliction.</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Regards</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Qiu Ying</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid black 1.5pt;padding:0in =
0in 0in 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>----- Original Message ----- <o:p></o:p></span></font></=
p>

</div>

<div style=3D'font-color:black'>

<p class=3DMsoNormal style=3D'background:#E4E4E4'><b><font size=3D2 face=3D=
Arial><span
style=3D'font-size:10.0pt;font-family:Arial;font-weight:bold'>From:</span><=
/font></b><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <=
a
href=3D"mailto:qiuying@i2r.a-star.edu.sg" title=3D"qiuying@i2r.a-star.edu.s=
g">QIU
Ying</a> <o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>To:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:yaronf@checkpoint.com" title=3D"yaronf@checkpoint.com">Yaron=
 Sheffer</a>
; <a href=3D"mailto:ipsec@ietf.org" title=3D"ipsec@ietf.org">ipsec@ietf.org=
</a> <o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Sent:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> Tuesday, J=
uly 14,
2009 3:30 PM<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Subject:</span></font></b><font size=3D=
2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> Re: [IPsec=
] WG
Last Call: draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></span></font=
></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Regarding the Next Header in section 2, what will be
happened if the value of Next Header is zero (i.e. IPv6 Hop-by-Hop option) =
and
the packet is not encrypted?</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Regards</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Qiu Ying</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<blockquote style=3D'border:none;border-left:solid black 1.5pt;padding:0in =
0in 0in 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>----- Original Message ----- <o:p></o:p></span></font></=
p>

</div>

<div style=3D'font-color:black'>

<p class=3DMsoNormal style=3D'background:#E4E4E4'><b><font size=3D2 face=3D=
Arial><span
style=3D'font-size:10.0pt;font-family:Arial;font-weight:bold'>From:</span><=
/font></b><font
size=3D2 face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <=
a
href=3D"mailto:yaronf@checkpoint.com" title=3D"yaronf@checkpoint.com">Yaron=
 Sheffer</a>
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>To:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:ipsec@ietf.org" title=3D"ipsec@ietf.org">ipsec@ietf.org</a> =
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Sent:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> Sunday, Ju=
ly 05,
2009 3:48 AM<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span style=3D'font-siz=
e:10.0pt;
font-family:Arial;font-weight:bold'>Subject:</span></font></b><font size=3D=
2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> [IPsec] WG=
 Last
Call: draft-ietf-ipsecme-traffic-visibility-05<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>This is the beginning of a two-week WG Last Call, which =
will
end July 18. The target status for this document is Proposed Standard. The
current document is at <a
href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05=
">http://tools.ietf.org/html/draft-ietf-ipsecme-traffic-visibility-05</a>.<=
o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>If you have not read the document before now, please do =
so.
Having fresh eyes on the document often brings up important issues. If you =
HAVE
read it before, please note that there have been several revisions since <s=
t1:place
w:st=3D"on"><st1:City w:st=3D"on">San Francisco</st1:City></st1:place>, so =
you
might want to read it again (plus it&#8217;s a short document). Send any co=
mments to
the list, even if they are as simple as &quot;I read it and it seems
fine&quot;.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Please clearly indicate the position of any issue in the
Internet Draft, and if possible provide alternative text. Please also indic=
ate
the nature or severity of the error or correction, e.g. major technical, mi=
nor
technical, nit, so that we can quickly judge the extent of problems with th=
e
document.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>Thanks,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span style=3D'font-size:1=
0.0pt;
font-family:Arial'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;
Yaron<o:p></o:p></span></font></p>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>_______________________________________________<br>
IPsec mailing list<br>
IPsec@ietf.org<br>
https://www.ietf.org/mailman/listinfo/ipsec<o:p></o:p></span></font></p>

</blockquote>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Institute for Infocomm Research disclaimer: &quot;This email is
confidential and may be privileged. If you are not the intended recipient,
please delete it and notify us immediately. Please do not copy or use it fo=
r
any purpose, or disclose its contents to any other person. Thank you.&quot;=
<o:p></o:p></span></font></p>

</div>

</div>

</blockquote>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>Institute for Infocomm Research disclaimer: &quot;This email is
confidential and may be privileged. If you are not the intended recipient,
please delete it and notify us immediately. Please do not copy or use it fo=
r
any purpose, or disclose its contents to any other person. Thank you.&quot;=
<o:p></o:p></span></font></p>

</div>

</div>

</blockquote>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
Scanned by Check Point Total Security Gateway. <o:p></o:p></span></font></p=
>

</div>

</blockquote>

</div>

</div>

</body>

</html>

--_000_C49B4B6450D9AA48AB99694D2EB0A4832C2AE1ECrrsmsx505amrcor_--

From latten@austin.ibm.com  Fri Jul 17 08:57:58 2009
Return-Path: <latten@austin.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CBD3928C0EF for <ipsec@core3.amsl.com>; Fri, 17 Jul 2009 08:57:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kPXzbVWu5tHo for <ipsec@core3.amsl.com>; Fri, 17 Jul 2009 08:57:57 -0700 (PDT)
Received: from e4.ny.us.ibm.com (e4.ny.us.ibm.com [32.97.182.144]) by core3.amsl.com (Postfix) with ESMTP id CA9C128C11F for <ipsec@ietf.org>; Fri, 17 Jul 2009 08:57:54 -0700 (PDT)
Received: from d01relay04.pok.ibm.com (d01relay04.pok.ibm.com [9.56.227.236]) by e4.ny.us.ibm.com (8.13.1/8.13.1) with ESMTP id n6HFp1ej024913 for <ipsec@ietf.org>; Fri, 17 Jul 2009 11:51:01 -0400
Received: from d01av02.pok.ibm.com (d01av02.pok.ibm.com [9.56.224.216]) by d01relay04.pok.ibm.com (8.13.8/8.13.8/NCO v9.2) with ESMTP id n6HFucF9253272 for <ipsec@ietf.org>; Fri, 17 Jul 2009 11:56:38 -0400
Received: from d01av02.pok.ibm.com (loopback [127.0.0.1]) by d01av02.pok.ibm.com (8.12.11.20060308/8.13.3) with ESMTP id n6HFs38L026239 for <ipsec@ietf.org>; Fri, 17 Jul 2009 11:54:03 -0400
Received: from austin.ibm.com (netmail1.austin.ibm.com [9.41.248.175]) by d01av02.pok.ibm.com (8.12.11.20060308/8.12.11) with ESMTP id n6HFs32Y026221; Fri, 17 Jul 2009 11:54:03 -0400
Received: from faith.austin.ibm.com (faith.austin.ibm.com [9.41.41.43]) by austin.ibm.com (8.13.8/8.12.10) with ESMTP id n6HFucuY029154; Fri, 17 Jul 2009 10:56:38 -0500
Received: from faith.austin.ibm.com (localhost.localdomain [127.0.0.1]) by faith.austin.ibm.com (8.14.3/8.14.3) with ESMTP id n6HFk0gX006162; Fri, 17 Jul 2009 10:46:00 -0500
Received: (from jml@localhost) by faith.austin.ibm.com (8.14.3/8.14.3/Submit) id n6HFk0Cr006160; Fri, 17 Jul 2009 10:46:00 -0500
From: Joy Latten <jml@austin.ibm.com>
Message-Id: <200907171546.n6HFk0Cr006160@faith.austin.ibm.com>
Date: Fri, 17 Jul 2009 10:46:00 -0500
To: hoskuld@hotmail.com
References: <1247261166.2783.39.camel@faith.austin.ibm.com> <BAY114-W44AD4FD1DE94975DBF211FAD250@phx.gbl>
In-Reply-To: <BAY114-W44AD4FD1DE94975DBF211FAD250@phx.gbl>
User-Agent: Heirloom mailx 12.4 7/29/08
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Cc: ipsec@ietf.org
Subject: Re: [IPsec] New version of labeled ipsec drafts
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Jul 2009 15:57:59 -0000

Hi Greg,

Greg Daley <hoskuld@hotmail.com> wrote:

>
>
> Hi Joy,
>
> Couldn't the security context information be expressed in the IKEv2
> version as a new Traffic Selector type?
>
> It seems that the IKEv2 negotiation exchanges a parameter set 
> that describes the upper-layer data to pass over the ESP or AH 
> SA.
>
> This is what the Traffic Selectors in IKEv2 do.
>
Thanks for reviewing. This sounds like an idea I would like
to look into. I am on vacation, but will look into it as soon as I get
back.

Thanks!

regards,
Joy Latten



From yaronf@checkpoint.com  Tue Jul 21 13:22:09 2009
Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4D8073A6AAF for <ipsec@core3.amsl.com>; Tue, 21 Jul 2009 13:22:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.469
X-Spam-Level: 
X-Spam-Status: No, score=-1.469 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w+pfdlE-CoI8 for <ipsec@core3.amsl.com>; Tue, 21 Jul 2009 13:22:08 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id 5C2223A6A9D for <ipsec@ietf.org>; Tue, 21 Jul 2009 13:22:07 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 9990F29C00C; Tue, 21 Jul 2009 23:22:22 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 56D8429C00A for <ipsec@ietf.org>; Tue, 21 Jul 2009 23:22:22 +0300 (IDT)
X-CheckPoint: {4A66226E-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n6LKM53d027269 for <ipsec@ietf.org>; Tue, 21 Jul 2009 23:22:06 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Tue, 21 Jul 2009 23:22:05 +0300
From: Yaron Sheffer <yaronf@checkpoint.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Date: Tue, 21 Jul 2009 23:22:03 +0300
Thread-Topic: Agenda and WESP
Thread-Index: AcoKQOkNQjyUB3dNSrimMn3LOYTAIw==
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC8012953655CB8@il-ex01.ad.checkpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_00E6_01CA0A5A.0E620640"
MIME-Version: 1.0
Subject: [IPsec] Agenda and WESP
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Jul 2009 20:22:09 -0000

------=_NextPart_000_00E6_01CA0A5A.0E620640
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi,

We have updated the agenda for Stockholm. There are now 4 presentations on
the "proposed future work items" slot. You can find it here:
http://tools.ietf.org/wg/ipsecme/agenda.

For those planning to attend the meeting remotely (and those just flying
into Stockholm), here's a reminder that ipsecme will be on the very first
session Monday morning.

In other news, we have just completed the WGLC for the WESP protocol. There
were some good comments made, so we're expecting a new revision before
moving this draft to AD Review.

Thanks,
	Yaron

------=_NextPart_000_00E6_01CA0A5A.0E620640
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIPTTCCBDIw
ggMaoAMCAQICAQEwDQYJKoZIhvcNAQEFBQAwezELMAkGA1UEBhMCR0IxGzAZBgNVBAgMEkdyZWF0
ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBwwHU2FsZm9yZDEaMBgGA1UECgwRQ29tb2RvIENBIExpbWl0
ZWQxITAfBgNVBAMMGEFBQSBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczAeFw0wNDAxMDEwMDAwMDBaFw0y
ODEyMzEyMzU5NTlaMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQIDBJHcmVhdGVyIE1hbmNoZXN0ZXIx
EDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoMEUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhB
QUEgQ2VydGlmaWNhdGUgU2VydmljZXMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC+
QJ30buHqdoccTUVEjr5GyIMGncEq/hgfjuQC+vOrXVCKFjELmgbQxXAizUktVGPMtm5oRgtT6stM
JMC8ck7q8RWu9FSaEgrDerIzYOLaiVXzIljz3tzP74OGooyUT59o8piQRoQnx3a/48w1LIteB2Rl
gsBIsKiR+WGfdiBQqJHHZrXreGIDVvCKGhPqMaMeoJn9OPb2JzJYbwf1a7j7FCuvt6rM1mNfc4za
BZmoOKjLF3g2UazpnvR4Oo3PD9lC4pgMqy+fDgHe75+ZSfEt36x0TRuYtUfF5SnR+ZAYx2KcvoPH
Jns+iiXHwN2d5jVoECCdj9je0sOEnA1e6C/JAgMBAAGjgcAwgb0wHQYDVR0OBBYEFKARCiM+lvEH
7OKvKe+CpX/QMKS0MA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MHsGA1UdHwR0MHIw
OKA2oDSGMmh0dHA6Ly9jcmwuY29tb2RvY2EuY29tL0FBQUNlcnRpZmljYXRlU2VydmljZXMuY3Js
MDagNKAyhjBodHRwOi8vY3JsLmNvbW9kby5uZXQvQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmww
DQYJKoZIhvcNAQEFBQADggEBAAhW/ALwm+j/pPrWe8ZEgM5PxMX2AFjMpra8FEloBHbo5u5d7AIP
YNaNUBhPJk4B4+awpe6/vHRUQb/9/BK4x09a9IlgBX9gtwVK8/bxwr/EuXSGti19a8zS80bdL8bg
asPDNAMsfZbdWsIOpwqZwQWLqwwv81w6z2w3VQmH3lNAbFjv/LarZW4E9hvcPOBaFcae2fFZSDAh
ZQNs7Okhc+ybA6HgN62gFRiP+roCzqcsqRATLNTlCCarIpdg+JBedNSimlO98qlo4KJuwtdssaMP
nr/raOdW8q7y4ys4OgmBtWuF174t7T8at7Jj4vViLILUagBBUPE5g5+V6TaWmG4wggTdMIIDxaAD
AgECAhBxkvvmGV+sTRKFdHE0ohinMA0GCSqGSIb3DQEBBQUAMHsxCzAJBgNVBAYTAkdCMRswGQYD
VQQIDBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoMEUNvbW9k
byBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2VydmljZXMwHhcNMDQwMTAx
MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjCBrjELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYD
VQQHEw5TYWx0IExha2UgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYD
VQQLExhodHRwOi8vd3d3LnVzZXJ0cnVzdC5jb20xNjA0BgNVBAMTLVVUTi1VU0VSRmlyc3QtQ2xp
ZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBFbWFpbDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
ggEBALI5haTyfatBO2JGN67NwWB1vDll+UoaR6K5zEjMapjVTTUZuaRC5c5J4oovHnzSMQfHTrSD
ZJ0uKdWiZMSFvYVRNXmkTmiQexx6pJKoF/KYFfKTzMmkMpW7DE8wvZigC4vlbhuiRvp4vKJvq1le
pS/Pytptqi/rrKGzaqq3Lmc1i3nhHmmI4uZGzaCl6r4LznY6eg6b6vzaJ1s9cx8i5khhxkzzabGo
Lhu21DEgLLyCio6kDqXXiUP8FlqvHXHXEVnauocNr/rz4cLwpMVnjNbWVDreCqS6A3ezZcj9HtN0
YqoYymiTHqGFfvVHZcv4TVcodNI0/zC27vZiMBSMLOsCAwEAAaOCAScwggEjMB8GA1UdIwQYMBaA
FKARCiM+lvEH7OKvKe+CpX/QMKS0MB0GA1UdDgQWBBSJgmd9xJ0mcABLtFBIfN49rgRufTAOBgNV
HQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUH
AwQwEQYDVR0gBAowCDAGBgRVHSAAMHsGA1UdHwR0MHIwOKA2oDSGMmh0dHA6Ly9jcmwuY29tb2Rv
Y2EuY29tL0FBQUNlcnRpZmljYXRlU2VydmljZXMuY3JsMDagNKAyhjBodHRwOi8vY3JsLmNvbW9k
by5uZXQvQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwEQYJYIZIAYb4QgEBBAQDAgEGMA0GCSqG
SIb3DQEBBQUAA4IBAQCdlcs8uH6lCcQevwvCx3aOOTyUxhCqTwzJ4KuEXYlU4GU7820cfDcsJVRf
liH8N4SRnRXcFE+Bz1Qda2xFYMct+ZdRTPlmyjyggoymyPDi6dRK+ew/VsnddozDggFPbADzHhph
dARHA6nGQFeRvGUixSdnT1fbZFrZjR+6hi/0Bq6cae3p9M8pF9jgSp8aIC+XTFG7RgfEijdOIOMJ
MWjHnsSLneh+EbwyaBCWEZhE2CpRYE2I63Q630MGMsg5Vow6EVLTQaRDA/Tt7zMn2zngFE4mydj1
OeKJuJNdtykmQeqzm66D/Hd1yujKtf7iZUpjPkTE0MNeh3OpmByvfxV/MIIGMjCCBRqgAwIBAgIR
AIDKyDfd56zXUq4aqXlC1iYwDQYJKoZIhvcNAQEFBQAwga4xCzAJBgNVBAYTAlVTMQswCQYDVQQI
EwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtlIENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0
d29yazEhMB8GA1UECxMYaHR0cDovL3d3dy51c2VydHJ1c3QuY29tMTYwNAYDVQQDEy1VVE4tVVNF
UkZpcnN0LUNsaWVudCBBdXRoZW50aWNhdGlvbiBhbmQgRW1haWwwHhcNMDgwOTEwMDAwMDAwWhcN
MDkwOTEwMjM1OTU5WjCB3jE1MDMGA1UECxMsQ29tb2RvIFRydXN0IE5ldHdvcmsgLSBQRVJTT05B
IE5PVCBWQUxJREFURUQxRjBEBgNVBAsTPVRlcm1zIGFuZCBDb25kaXRpb25zIG9mIHVzZTogaHR0
cDovL3d3dy5jb21vZG8ubmV0L3JlcG9zaXRvcnkxHzAdBgNVBAsTFihjKTIwMDMgQ29tb2RvIExp
bWl0ZWQxFjAUBgNVBAMTDVlhcm9uIFNoZWZmZXIxJDAiBgkqhkiG9w0BCQEWFXlhcm9uZkBjaGVj
a3BvaW50LmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALqGr14AEP/lS7OgXTYs
8LjmDZYg3KegpdGXufAXa93NbmAAQ1EmqkVBw8vC/EcYCM+D9uUWeK0uC7BpmCalFDh28AMMIUKI
W0VGvDF+kE8zjnch/j7whoWvOvj6yFxYZNe9zfUlZZ7xBc+LEPzqsd4oLbK7a7WkvZAuUHfH0oiH
k2miEZkXZF/mhpGp/LplLeA8b51fvQhv8UqIzwRghVTLDCAnIhVk/w+WMmRhcHptYZDa0gOhjyza
a/4kG1oHw44Ae9cZpws8TXL+JOrUdmJG6uFY3wB0YvPw9b/u0WeY7Snq0bDF58vDNw0jaQsfIoxx
EE+MscA9JbuaPaXIFdkCAwEAAaOCAhcwggITMB8GA1UdIwQYMBaAFImCZ33EnSZwAEu0UEh83j2u
BG59MB0GA1UdDgQWBBSNbKhiJVIDkhy5HRA+njy+oWiKMDAOBgNVHQ8BAf8EBAMCBaAwDAYDVR0T
AQH/BAIwADAgBgNVHSUEGTAXBggrBgEFBQcDBAYLKwYBBAGyMQEDBQIwEQYJYIZIAYb4QgEBBAQD
AgUgMEYGA1UdIAQ/MD0wOwYMKwYBBAGyMQECAQEBMCswKQYIKwYBBQUHAgEWHWh0dHBzOi8vc2Vj
dXJlLmNvbW9kby5uZXQvQ1BTMIGlBgNVHR8EgZ0wgZowTKBKoEiGRmh0dHA6Ly9jcmwuY29tb2Rv
Y2EuY29tL1VUTi1VU0VSRmlyc3QtQ2xpZW50QXV0aGVudGljYXRpb25hbmRFbWFpbC5jcmwwSqBI
oEaGRGh0dHA6Ly9jcmwuY29tb2RvLm5ldC9VVE4tVVNFUkZpcnN0LUNsaWVudEF1dGhlbnRpY2F0
aW9uYW5kRW1haWwuY3JsMGwGCCsGAQUFBwEBBGAwXjA2BggrBgEFBQcwAoYqaHR0cDovL2NydC5j
b21vZG9jYS5jb20vVVROQUFBQ2xpZW50Q0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5j
b21vZG9jYS5jb20wIAYDVR0RBBkwF4EVeWFyb25mQGNoZWNrcG9pbnQuY29tMA0GCSqGSIb3DQEB
BQUAA4IBAQBemghknp7tCcWJ+Pzvopk4bHBaaYF/NJtkrSLXJdOb8p286uOS+7po0DIE+zh9iIyV
MTq5GFkleVzIVQHWOIOfCMnxbYh6tgrJUZKdDHMJG2vhz2i2dFOJzWnMnosWmKsDDMpmtLMH1mn+
31lQkp+rgUAkuFUruAPrG6ms5BVaO/Ta+yBGdEJ0ecLOKuA3zmKnmy8beceXpm4OdkBGWWdLvBGu
P/+v8n8KwVf2zzNTaZeEy+139MH9GTrVTiHnOsgdkvvsTu7cAl3mhRxR+o60XU0fQdk3jtbPrzeF
uK5fTY6yKlW2e/rlJg3hAr3FkIpszNRgnu+BUDYFg9VnYjjYMYIEaDCCBGQCAQEwgcQwga4xCzAJ
BgNVBAYTAlVTMQswCQYDVQQIEwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtlIENpdHkxHjAcBgNVBAoT
FVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8GA1UECxMYaHR0cDovL3d3dy51c2VydHJ1c3QuY29t
MTYwNAYDVQQDEy1VVE4tVVNFUkZpcnN0LUNsaWVudCBBdXRoZW50aWNhdGlvbiBhbmQgRW1haWwC
EQCAysg33ees11KuGql5QtYmMAkGBSsOAwIaBQCgggJ4MBgGCSqGSIb3DQEJAzELBgkqhkiG9w0B
BwEwHAYJKoZIhvcNAQkFMQ8XDTA5MDcyMTIwMjIwM1owIwYJKoZIhvcNAQkEMRYEFEVhr7c0isAt
usxtCyiM1v1fc1IMMGcGCSqGSIb3DQEJDzFaMFgwCgYIKoZIhvcNAwcwDgYIKoZIhvcNAwICAgCA
MA0GCCqGSIb3DQMCAgFAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgEoMAcGBSsOAwIaMAoGCCqGSIb3
DQIFMIHVBgkrBgEEAYI3EAQxgccwgcQwga4xCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJVVDEXMBUG
A1UEBxMOU2FsdCBMYWtlIENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8G
A1UECxMYaHR0cDovL3d3dy51c2VydHJ1c3QuY29tMTYwNAYDVQQDEy1VVE4tVVNFUkZpcnN0LUNs
aWVudCBBdXRoZW50aWNhdGlvbiBhbmQgRW1haWwCEQCAysg33ees11KuGql5QtYmMIHXBgsqhkiG
9w0BCRACCzGBx6CBxDCBrjELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYDVQQHEw5TYWx0
IExha2UgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYDVQQLExhodHRw
Oi8vd3d3LnVzZXJ0cnVzdC5jb20xNjA0BgNVBAMTLVVUTi1VU0VSRmlyc3QtQ2xpZW50IEF1dGhl
bnRpY2F0aW9uIGFuZCBFbWFpbAIRAIDKyDfd56zXUq4aqXlC1iYwDQYJKoZIhvcNAQEBBQAEggEA
bTY4wiBrk8PXE92lbnW0Lkf8vBpEHLv7tQve8qlWs1/6fIMLMdoeCnnim/G+nD6T4qxvm6/Q6okP
S7GMT9fcytmZCUZ68vpA6VTSQDAnI/gR4ajp67jKvSKHnZeWWB3x60wgifRZQ/JjbW0gMGxrhMLV
0uoNpDlYYQkr95F8d+ARJx8BdrT8Uh6PC/oSD0gaIGIbhRVcL3aAlA86Fvvzbm7Ba+oenKh5kgFd
9LahoBU3WvsK6LRncWo4OMDJkeCUXS5vcr6RfysuWlLMO5V4xrpTi7+jz+IBVq7ip5yPIMjOM/lJ
bm/YpaVHTHwtHkYYq4Lu4qVRsmQC7wVGi+LY3wAAAAAAAA==

------=_NextPart_000_00E6_01CA0A5A.0E620640--

From rsjenwar@gmail.com  Tue Jul 21 22:59:27 2009
Return-Path: <rsjenwar@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 788B63A6BC1 for <ipsec@core3.amsl.com>; Tue, 21 Jul 2009 22:59:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nSVB1NOMLP-K for <ipsec@core3.amsl.com>; Tue, 21 Jul 2009 22:59:26 -0700 (PDT)
Received: from mail-px0-f184.google.com (mail-px0-f184.google.com [209.85.216.184]) by core3.amsl.com (Postfix) with ESMTP id 08C2E3A69AE for <ipsec@ietf.org>; Tue, 21 Jul 2009 22:58:39 -0700 (PDT)
Received: by pxi14 with SMTP id 14so1112331pxi.29 for <ipsec@ietf.org>; Tue, 21 Jul 2009 22:57:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:date:message-id:subject :from:to:content-type; bh=wVogxtHJDelg+Vcf/HKiYji0KwGAjPktTk4ZKFVb+lQ=; b=VhLPQ8AmLGk26yEMl453/qin0oImmWLYmkURD1ZCkC3tKH6J0lYON14l1pDrqvpFMu tP3HsN0kY815ZlI+x9V6qhgEm7zviWfxbTuzbrbydosZJM6BhvrCfp40/YSojwjGTlw4 Uc9OOHs+/4siNmEBEwbi3wfqSeCUyr0GJ83jg=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=iMvsFK3bjKDkk8sOCaGrMt8WJWp8TumJ/mAzDRc/e0rb7K0OjRS5Msr2bOYJM4sEbN WA/P1+wxpq9hCX9OR70yRiDvNwOrVLL28IGd7FpYd3AeXSZYBCqzOjb/a6gPv119g1Bz FtGaNY9FT0uBDOYu5JcsjtA5wCq45Cqy8iWX4=
MIME-Version: 1.0
Received: by 10.142.204.11 with SMTP id b11mr116991wfg.186.1248241945448; Tue,  21 Jul 2009 22:52:25 -0700 (PDT)
Date: Wed, 22 Jul 2009 11:22:25 +0530
Message-ID: <7ccecf670907212252i56e27960g41304a0e871ed533@mail.gmail.com>
From: Raj Singh <rsjenwar@gmail.com>
To: ipsec@ietf.org
Content-Type: multipart/alternative; boundary=000e0cd17c82c092a2046f44f9e5
Subject: [IPsec] [IKEv2] Questions on windowing in IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jul 2009 05:59:27 -0000

--000e0cd17c82c092a2046f44f9e5
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Group,

According to IKEv2bis-04, section 2.3

-----------------------------------------

   An IKE endpoint MUST NOT exceed the peer's stated window size for
   transmitted IKE requests.  In other words, if the responder stated
   its window size is N, then when the initiator needs to make a request
   X, it MUST wait until it has received responses to all requests up
   through request X-N.  An IKE endpoint MUST keep a copy of (or be able
   to regenerate exactly) each request it has sent until it receives the
   corresponding response.  An IKE endpoint MUST keep a copy of (or be
   able to regenerate exactly) the number of previous responses equal to
   its declared window size in case its response was lost and the
   initiator requests its retransmission by retransmitting the request.

----------------------------

Now, suppose responder window size is N.
Initiator send a request (X-N) but Initiator does get
response for request no (X-N) say due to n/w flapping.
So initiator schedules this request for re-transmissions
but between the time intervals of re-transmission n/w comes UP
and request no. (X-N+1) to (X) goes fine i.e. these request get response.
Now, initiator wants to make another request i.e. request no.
(X+1). But according to draft it can't make that request as it has
not received the response for request no (X-N) even though there is
only one outstanding request in transit.

Also draft says:
---------------------------
 The SET_WINDOW_SIZE notification asserts that the sending endpoint is
   capable of keeping state for multiple outstanding exchanges,
   permitting the recipient to send multiple requests before getting a
   response to the first.
------------------------

That means windowing is for outstanding request.
So in above mentioned scenario even though there is only 1
outstanding request and window size is N but we are not able to send
next request because of windowing definition.

Maybe i am missing something here.
Please elaborate the on the behavior in above scenario.

Regards,
Raj

--000e0cd17c82c092a2046f44f9e5
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Group,<br><br>According to IKEv2bis-04, section 2.3<br><br>-------------=
----------------------------<br><br><pre class=3D"newpage">   An IKE endpoi=
nt MUST NOT exceed the peer&#39;s stated window size for<br>   transmitted =
IKE requests.  In other words, if the responder stated<br>
   its window size is N, then when the initiator needs to make a request<br=
>   X, it MUST wait until it has received responses to all requests up<br> =
  through request X-N.  An IKE endpoint MUST keep a copy of (or be able<br>
   to regenerate exactly) each request it has sent until it receives the<br=
>   corresponding response.  An IKE endpoint MUST keep a copy of (or be<br>=
   able to regenerate exactly) the number of previous responses equal to<br=
>
   its declared window size in case its response was lost and the<br>   ini=
tiator requests its retransmission by retransmitting the request.<br><br>--=
--------------------------<br><br><font size=3D"4">Now, suppose responder w=
indow size is N.<br>
Initiator send a request (X-N) but Initiator does get <br>response for requ=
est no (X-N) say due to n/w flapping.<br>So initiator schedules this reques=
t for re-transmissions <br>but between the time intervals of re-transmissio=
n n/w comes UP <br>
and request no. (X-N+1) to (X) goes fine i.e. these request get response.<b=
r>Now, initiator wants to make another request i.e. request no.<br>(X+1). B=
ut according to draft it can&#39;t make that request as it has<br>not recei=
ved the response for request no (X-N) even though there is <br>
only one outstanding request in transit.<br><br>Also draft says:<br>-------=
--------------------<br></font> The SET_WINDOW_SIZE notification asserts th=
at the sending endpoint is<br>   capable of keeping state for multiple outs=
tanding exchanges,<br>
   permitting the recipient to send multiple requests before getting a<br> =
  response to the first.<br><font size=3D"4">------------------------<br><b=
r>That means windowing is for outstanding request.<br>So in above mentioned=
 scenario even though there is only 1<br>
outstanding request and window size is N but we are not able to send<br>nex=
t request because of windowing definition.<br><br>Maybe i am missing someth=
ing here.<br>Please elaborate the on the behavior in above scenario.<br>
<br>Regards,<br>Raj <br><br></font></pre>

--000e0cd17c82c092a2046f44f9e5--

From amjads@cisco.com  Wed Jul 22 00:25:41 2009
Return-Path: <amjads@cisco.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D25C43A6BBE for <ipsec@core3.amsl.com>; Wed, 22 Jul 2009 00:25:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zdTioYeWoQYN for <ipsec@core3.amsl.com>; Wed, 22 Jul 2009 00:25:40 -0700 (PDT)
Received: from syd-iport-1.cisco.com (syd-iport-1.cisco.com [64.104.193.196]) by core3.amsl.com (Postfix) with ESMTP id 4D8203A685A for <ipsec@ietf.org>; Wed, 22 Jul 2009 00:25:40 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AuoEAG9bZkoKS+eh/2dsb2JhbACCJi22CogjkF0FhA6BRQ
X-IronPort-AV: E=Sophos;i="4.43,245,1246838400"; d="scan'208,217";a="58379191"
Received: from hkg-dkim-1.cisco.com ([10.75.231.161]) by syd-iport-1.cisco.com with ESMTP; 22 Jul 2009 07:24:16 +0000
Received: from hkg-core-1.cisco.com (hkg-core-1.cisco.com [64.104.123.94]) by hkg-dkim-1.cisco.com (8.12.11/8.12.11) with ESMTP id n6M7OGAX002412 for <ipsec@ietf.org>; Wed, 22 Jul 2009 15:24:16 +0800
Received: from xbh-bgl-411.cisco.com (xbh-bgl-411.cisco.com [72.163.129.201]) by hkg-core-1.cisco.com (8.13.8/8.14.3) with ESMTP id n6M7O4Eb009310 for <ipsec@ietf.org>; Wed, 22 Jul 2009 07:24:15 GMT
Received: from xmb-bgl-417.cisco.com ([72.163.129.213]) by xbh-bgl-411.cisco.com with Microsoft SMTPSVC(6.0.3790.3959);  Wed, 22 Jul 2009 12:53:41 +0530
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01CA0A9D.568B10CA"
Date: Wed, 22 Jul 2009 12:53:40 +0530
Message-ID: <1CFAB1B15A6C1142BD1FC07D1CA82AB297293D@XMB-BGL-417.cisco.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: Clarification on IKEv2 window size
Thread-Index: AcoKnVZBTiiyO2vLSdiNmWS02lYZ/A==
From: "Amjad Inamdar (amjads)" <amjads@cisco.com>
To: <ipsec@ietf.org>
X-OriginalArrivalTime: 22 Jul 2009 07:23:41.0194 (UTC) FILETIME=[569096A0:01CA0A9D]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=2901; t=1248247456; x=1249111456; c=relaxed/simple; s=hkgdkim1002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=amjads@cisco.com; z=From:=20=22Amjad=20Inamdar=20(amjads)=22=20<amjads@cisco.c om> |Subject:=20Clarification=20on=20IKEv2=20window=20size |Sender:=20; bh=IdKmDhwWPW/1zjPP11iqCuDuiA4mLdzUYm7/Zt3A66g=; b=joPu8FDpZQeCrR/1Nfq2a9vzZmYoH0O8ziP1vqT2Ni/covqDFtIHRKWBWw S7QTQZDWu9xLEbgYuENDQSZXRC+BFfJJlp6KRuYOb/oe+H2zDajC1nFCSMb5 p30mHJ0wrvokulNi7TJieE0t1lrythQVZ7nLMdXIv45LbS4Hc8zbI=;
Authentication-Results: hkg-dkim-1; header.From=amjads@cisco.com; dkim=pass ( sig from cisco.com/hkgdkim1002 verified; ); 
Subject: [IPsec] Clarification on IKEv2 window size
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jul 2009 07:32:59 -0000

This is a multi-part message in MIME format.

------_=_NextPart_001_01CA0A9D.568B10CA
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

Hi,
=20
Could someone please clarify if the below interpretation of IKEv2 window
size is correct.
=20
IKEv2 window size of N implies that there can be N un-acknowledged
requests at any given time - without any relation to the message-ids of
the requests in transit.
=20
For example,  consider an IKEv2 peer with a window size of 2 that has
sent below requests.
1) Request-1 (msg-id =3D 3) - un-acknowledged
2) Request-2 (msg-id =3D 4) - acknowledged=20
=20
IKEv2 peer can now send the next request with msg-id=3D5, as there is =
only
one request in transit and window size allows 2 in-transit requests.
=20
Thanks,
-Amjad


------_=_NextPart_001_01CA0A9D.568B10CA
Content-Type: text/html;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.2900.3562" name=3DGENERATOR></HEAD>
<BODY>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D228052107-22072009>Hi,</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D228052107-22072009></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D228052107-22072009>Could=20
someone&nbsp;please clarify if the below interpretation of IKEv2 window =
size is=20
correct.</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D228052107-22072009>IKEv2 =
window size of=20
N implies that there can be N un-acknowledged requests at any given time =
-=20
without any relation&nbsp;to the message-ids of the requests in=20
transit.</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D228052107-22072009>For =
example,&nbsp;=20
consider an IKEv2 peer with a window size of 2 that has sent below=20
requests.</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D228052107-22072009>1) =
Request-1 (msg-id=20
=3D 3) - un-acknowledged<BR>2) Request-2 (msg-id =3D 4) - acknowledged=20
</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D228052107-22072009>IKEv2 =
peer can now=20
send the next request with msg-id=3D5, as there is only one request in =
transit and=20
window size allows 2 in-transit requests.</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D228052107-22072009>Thanks,</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D228052107-22072009>-Amjad<BR></DIV></SPAN></FONT></BODY></HTML>

------_=_NextPart_001_01CA0A9D.568B10CA--

From ynir@checkpoint.com  Wed Jul 22 00:40:28 2009
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6A5E83A6B93 for <ipsec@core3.amsl.com>; Wed, 22 Jul 2009 00:40:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d3T-42wzBWkh for <ipsec@core3.amsl.com>; Wed, 22 Jul 2009 00:40:21 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id B615328C10C for <ipsec@ietf.org>; Wed, 22 Jul 2009 00:40:20 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 7388029C010; Wed, 22 Jul 2009 10:39:47 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 2B70229C00A; Wed, 22 Jul 2009 10:39:47 +0300 (IDT)
X-CheckPoint: {4A66C12D-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n6M7dU3d020479; Wed, 22 Jul 2009 10:39:30 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Wed, 22 Jul 2009 10:39:30 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: "'Raj Singh'" <rsjenwar@gmail.com>, "ipsec@ietf.org" <ipsec@ietf.org>
Date: Wed, 22 Jul 2009 10:39:28 +0300
Thread-Topic: [IPsec] [IKEv2] Questions on windowing in IKEv2
Thread-Index: AcoKkZhanC9O3B2rSym7INm8g6NXAAADWa9Q
Message-ID: <006FEB08D9C6444AB014105C9AEB133F608151F7EE@il-ex01.ad.checkpoint.com>
References: <7ccecf670907212252i56e27960g41304a0e871ed533@mail.gmail.com>
In-Reply-To: <7ccecf670907212252i56e27960g41304a0e871ed533@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_006FEB08D9C6444AB014105C9AEB133F608151F7EEilex01adcheck_"
MIME-Version: 1.0
Subject: Re: [IPsec] [IKEv2] Questions on windowing in IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jul 2009 07:40:28 -0000

--_000_006FEB08D9C6444AB014105C9AEB133F608151F7EEilex01adcheck_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Raj.

Too many variables, let's assume values without loss of generality.

Suppose N=3D3, and you have send requests 17, 18 and 19. Because of the net=
work problems, you got responses for 18 and 19, but not *yet* for 17.

What the draft (and RFC 4306) says, is that you keep retransmitting 17, unt=
il you get a response.  Before that, you can't begin transmitting #20. If y=
our retransmissions of #17 time out (after "at least a dozen retransmission=
s over at least 2 minutes") then you assume that the peer has died, and sil=
ently discard the IKE SA.  This will usually not happen in the above scenar=
io, because once the network is back, the responder will also reply to #17.

Hope this helps

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of R=
aj Singh
Sent: Wednesday, July 22, 2009 8:52 AM
To: ipsec@ietf.org
Subject: [IPsec] [IKEv2] Questions on windowing in IKEv2

Hi Group,

According to IKEv2bis-04, section 2.3

-----------------------------------------

   An IKE endpoint MUST NOT exceed the peer's stated window size for

   transmitted IKE requests.  In other words, if the responder stated





   its window size is N, then when the initiator needs to make a request

   X, it MUST wait until it has received responses to all requests up

   through request X-N.  An IKE endpoint MUST keep a copy of (or be able





   to regenerate exactly) each request it has sent until it receives the

   corresponding response.  An IKE endpoint MUST keep a copy of (or be

   able to regenerate exactly) the number of previous responses equal to





   its declared window size in case its response was lost and the

   initiator requests its retransmission by retransmitting the request.



----------------------------



Now, suppose responder window size is N.





Initiator send a request (X-N) but Initiator does get

response for request no (X-N) say due to n/w flapping.

So initiator schedules this request for re-transmissions

but between the time intervals of re-transmission n/w comes UP





and request no. (X-N+1) to (X) goes fine i.e. these request get response.

Now, initiator wants to make another request i.e. request no.

(X+1). But according to draft it can't make that request as it has

not received the response for request no (X-N) even though there is





only one outstanding request in transit.



Also draft says:

---------------------------

 The SET_WINDOW_SIZE notification asserts that the sending endpoint is

   capable of keeping state for multiple outstanding exchanges,





   permitting the recipient to send multiple requests before getting a

   response to the first.

------------------------



That means windowing is for outstanding request.

So in above mentioned scenario even though there is only 1





outstanding request and window size is N but we are not able to send

next request because of windowing definition.



Maybe i am missing something here.

Please elaborate the on the behavior in above scenario.






Regards,

Raj


Scanned by Check Point Total Security Gateway.

=0D=0A
Email secured by Check Point=0D=0A

--_000_006FEB08D9C6444AB014105C9AEB133F608151F7EEilex01adcheck_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" xmlns=3D"http://ww=
w.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" name=3D"Person=
Name"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
pre
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Hi Raj.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Too many variables, let&#8217;s assume=
 values
without loss of generality.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Suppose N=3D3, and you have send reque=
sts
17, 18 and 19. Because of the network problems, you got responses for 18 an=
d
19, but not *<b><span style=3D'font-weight:bold'>yet</span></b>* for 17.&nb=
sp; <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>What the draft (and RFC 4306) says, is
that you keep retransmitting 17, until you get a response. &nbsp;Before tha=
t, you
can&#8217;t begin transmitting #20. If your retransmissions of #17 time out=
 (after &#8220;at
least a dozen retransmissions over at least 2 minutes&#8221;) then you assu=
me that
the peer has died, and silently discard the IKE SA.&nbsp; This will usually=
 not
happen in the above scenario, because once the network is back, the respond=
er
will also reply to #17.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Hope this helps<o:p></o:p></span></fon=
t></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <b><span
style=3D'font-weight:bold'>On Behalf Of </span></b>Raj Singh<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Wednesday, July 22, 20=
09
8:52 AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName w:st=3D"=
on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> [IPsec] [IKEv2] Que=
stions
on windowing in IKEv2</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>Hi Group,<br>
<br>
According to IKEv2bis-04, section 2.3<br>
<br>
-----------------------------------------<o:p></o:p></span></font></p>

<pre><font size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&=
nbsp;&nbsp; An IKE endpoint MUST NOT exceed the peer's stated window size f=
or<br>
&nbsp;&nbsp; transmitted IKE requests.&nbsp; In other words, if the respond=
er stated<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;&nbsp; its window size is N, then when the=
 initiator needs to make a request<br>
&nbsp;&nbsp; X, it MUST wait until it has received responses to all request=
s up<br>
&nbsp;&nbsp; through request X-N.&nbsp; An IKE endpoint MUST keep a copy of=
 (or be able<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;&nbsp; to regenerate exactly) each request=
 it has sent until it receives the<br>
&nbsp;&nbsp; corresponding response.&nbsp; An IKE endpoint MUST keep a copy=
 of (or be<br>
&nbsp;&nbsp; able to regenerate exactly) the number of previous responses e=
qual to<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;&nbsp; its declared window size in case it=
s response was lost and the<br>
&nbsp;&nbsp; initiator requests its retransmission by retransmitting the re=
quest.<br>
<br>
----------------------------<br>
<br>
</span></font><font size=3D4><span style=3D'font-size:13.5pt'>Now, suppose =
responder window size is N.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>Initiator send a request (X-N) but Initiator doe=
s get <br>
response for request no (X-N) say due to n/w flapping.<br>
So initiator schedules this request for re-transmissions <br>
but between the time intervals of re-transmission n/w comes UP <br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>and request no. (X-N+1) to (X) goes fine i.e. th=
ese request get response.<br>
Now, initiator wants to make another request i.e. request no.<br>
(X+1). But according to draft it can't make that request as it has<br>
not received the response for request no (X-N) even though there is <br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>only one outstanding request in transit.<br>
<br>
Also draft says:<br>
---------------------------<br>
</span></font>&nbsp;The SET_WINDOW_SIZE notification asserts that the sendi=
ng endpoint is<br>
&nbsp;&nbsp; capable of keeping state for multiple outstanding exchanges,<b=
r>
<br>
<o:p></o:p></pre><pre><font size=3D2 face=3D"Courier New"><span style=3D'fo=
nt-size:
10.0pt'>&nbsp;&nbsp; permitting the recipient to send multiple requests bef=
ore getting a<br>
&nbsp;&nbsp; response to the first.<br>
</span></font><font size=3D4><span style=3D'font-size:13.5pt'>-------------=
-----------<br>
<br>
That means windowing is for outstanding request.<br>
So in above mentioned scenario even though there is only 1<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>outstanding request and window size is N but we =
are not able to send<br>
next request because of windowing definition.<br>
<br>
Maybe i am missing something here.<br>
Please elaborate the on the behavior in above scenario.<br>
<br>
<o:p></o:p></span></font></pre><pre style=3D'margin-bottom:12.0pt'><font si=
ze=3D4
face=3D"Courier New"><span style=3D'font-size:13.5pt'><br>
Regards,<br>
Raj </span></font><o:p></o:p></pre>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
Scanned by Check Point Total Security Gateway. <o:p></o:p></span></font></p=
>

</div>


<br>=
=0D=0A
<br>Email secured by Check Point=0D=0A
<br>
<br>=
</body>

</html>

--_000_006FEB08D9C6444AB014105C9AEB133F608151F7EEilex01adcheck_--

From ynir@checkpoint.com  Wed Jul 22 02:04:16 2009
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 28FE13A6BD1 for <ipsec@core3.amsl.com>; Wed, 22 Jul 2009 02:04:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4uNPMPtatzgV for <ipsec@core3.amsl.com>; Wed, 22 Jul 2009 02:04:08 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id 6F36C3A6BEA for <ipsec@ietf.org>; Wed, 22 Jul 2009 02:04:07 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 314C729C005; Wed, 22 Jul 2009 12:04:01 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id C982C29C002; Wed, 22 Jul 2009 12:04:00 +0300 (IDT)
X-CheckPoint: {4A66D4EA-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n6M93i3d015617; Wed, 22 Jul 2009 12:03:44 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Wed, 22 Jul 2009 12:03:43 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: "'Raj Singh'" <rsjenwar@gmail.com>
Date: Wed, 22 Jul 2009 12:03:43 +0300
Thread-Topic: [IPsec] [IKEv2] Questions on windowing in IKEv2
Thread-Index: AcoKqu++DDxoXuUYS2icwspvbPx+vAAAFhLA
Message-ID: <006FEB08D9C6444AB014105C9AEB133F608151F7F4@il-ex01.ad.checkpoint.com>
References: <7ccecf670907212252i56e27960g41304a0e871ed533@mail.gmail.com> <006FEB08D9C6444AB014105C9AEB133F608151F7EE@il-ex01.ad.checkpoint.com> <7ccecf670907220157sca2035bvb7be832f2dc165a7@mail.gmail.com>
In-Reply-To: <7ccecf670907220157sca2035bvb7be832f2dc165a7@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_006FEB08D9C6444AB014105C9AEB133F608151F7F4ilex01adcheck_"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] [IKEv2] Questions on windowing in IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jul 2009 09:04:16 -0000

--_000_006FEB08D9C6444AB014105C9AEB133F608151F7F4ilex01adcheck_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

No. All the draft says, is that to send 20, you need to have received answe=
rs to everything up to and including 17. You don't get to always have three=
 outstanding requests.

________________________________
From: Raj Singh [mailto:rsjenwar@gmail.com]
Sent: Wednesday, July 22, 2009 11:57 AM
To: Yoav Nir
Cc: ipsec@ietf.org
Subject: Re: [IPsec] [IKEv2] Questions on windowing in IKEv2

Hi Yoav,

Do you think this behavior contradicts with definition of windowing mention=
ed in draft that if responder window is 3, initiator can have 3 outstanding=
 request ?

Regards,
Raj
On Wed, Jul 22, 2009 at 1:09 PM, Yoav Nir <ynir@checkpoint.com<mailto:ynir@=
checkpoint.com>> wrote:

Hi Raj.



Too many variables, let's assume values without loss of generality.



Suppose N=3D3, and you have send requests 17, 18 and 19. Because of the net=
work problems, you got responses for 18 and 19, but not *yet* for 17.



What the draft (and RFC 4306) says, is that you keep retransmitting 17, unt=
il you get a response.  Before that, you can't begin transmitting #20. If y=
our retransmissions of #17 time out (after "at least a dozen retransmission=
s over at least 2 minutes") then you assume that the peer has died, and sil=
ently discard the IKE SA.  This will usually not happen in the above scenar=
io, because once the network is back, the responder will also reply to #17.



Hope this helps



________________________________

From: ipsec-bounces@ietf.org<mailto:ipsec-bounces@ietf.org> [mailto:ipsec-b=
ounces@ietf.org<mailto:ipsec-bounces@ietf.org>] On Behalf Of Raj Singh
Sent: Wednesday, July 22, 2009 8:52 AM
To: ipsec@ietf.org<mailto:ipsec@ietf.org>
Subject: [IPsec] [IKEv2] Questions on windowing in IKEv2



Hi Group,

According to IKEv2bis-04, section 2.3

-----------------------------------------

   An IKE endpoint MUST NOT exceed the peer's stated window size for





   transmitted IKE requests.  In other words, if the responder stated










   its window size is N, then when the initiator needs to make a request





   X, it MUST wait until it has received responses to all requests up





   through request X-N.  An IKE endpoint MUST keep a copy of (or be able










   to regenerate exactly) each request it has sent until it receives the





   corresponding response.  An IKE endpoint MUST keep a copy of (or be





   able to regenerate exactly) the number of previous responses equal to










   its declared window size in case its response was lost and the





   initiator requests its retransmission by retransmitting the request.










----------------------------










Now, suppose responder window size is N.










Initiator send a request (X-N) but Initiator does get





response for request no (X-N) say due to n/w flapping.





So initiator schedules this request for re-transmissions





but between the time intervals of re-transmission n/w comes UP










and request no. (X-N+1) to (X) goes fine i.e. these request get response.





Now, initiator wants to make another request i.e. request no.





(X+1). But according to draft it can't make that request as it has





not received the response for request no (X-N) even though there is










only one outstanding request in transit.










Also draft says:





---------------------------





 The SET_WINDOW_SIZE notification asserts that the sending endpoint is





   capable of keeping state for multiple outstanding exchanges,










   permitting the recipient to send multiple requests before getting a





   response to the first.





------------------------










That means windowing is for outstanding request.





So in above mentioned scenario even though there is only 1










outstanding request and window size is N but we are not able to send





next request because of windowing definition.










Maybe i am missing something here.





Please elaborate the on the behavior in above scenario.















Regards,





Raj


Scanned by Check Point Total Security Gateway.


Email secured by Check Point


=0D=0A
Email secured by Check Point=0D=0A

--_000_006FEB08D9C6444AB014105C9AEB133F608151F7F4ilex01adcheck_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" xmlns=3D"http://ww=
w.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" name=3D"Person=
Name"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:12.0pt;
	font-family:"Times New Roman";}
pre
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>No. All the draft says, is that to sen=
d
20, you need to have received answers to everything up to and including 17.=
 You
don&#8217;t get to always have three outstanding requests.<o:p></o:p></span=
></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> Raj Sing=
h
[mailto:rsjenwar@gmail.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Wednesday, July 22, 20=
09
11:57 AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Yoav Nir<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> <st1:PersonName w:st=3D"=
on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] [IKEv2]
Questions on windowing in IKEv2</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>Hi Yoav,<br>
<br>
Do you think this behavior contradicts with definition of windowing mention=
ed
in draft that if responder window is 3, initiator can have 3 outstanding
request ?<br>
<br>
Regards,<br>
Raj<o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>On Wed, Jul 22, 2009 at 1:09 PM, Yoav Nir &lt;<a
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&gt; wrote:<o:p>=
</o:p></span></font></p>

<div link=3Dblue vlink=3Dpurple>

<div>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>Hi Raj.</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>Too many variables, let&#8217;s assume values without los=
s of
generality.</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>Suppose N=3D3, and you have send requests 17, 18 and 19.
Because of the network problems, you got responses for 18 and 19, but not *=
<b><span
style=3D'font-weight:bold'>yet</span></b>* for 17.&nbsp; </span></font><o:p=
></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>What the draft (and RFC 4306) says, is that you keep
retransmitting 17, until you get a response. &nbsp;Before that, you can&#82=
17;t begin
transmitting #20. If your retransmissions of #17 time out (after &#8220;at =
least a
dozen retransmissions over at least 2 minutes&#8221;) then you assume that =
the peer
has died, and silently discard the IKE SA.&nbsp; This will usually not happ=
en
in the above scenario, because once the network is back, the responder will
also reply to #17.</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>Hope this helps</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>

<p><b><font size=3D2 face=3DTahoma><span style=3D'font-size:10.0pt;font-fam=
ily:Tahoma;
font-weight:bold'>From:</span></font></b><font size=3D2 face=3DTahoma><span
style=3D'font-size:10.0pt;font-family:Tahoma'> <a
href=3D"mailto:ipsec-bounces@ietf.org" target=3D"_blank">ipsec-bounces@ietf=
.org</a>
[mailto:<a href=3D"mailto:ipsec-bounces@ietf.org" target=3D"_blank">ipsec-b=
ounces@ietf.org</a>]
<b><span style=3D'font-weight:bold'>On Behalf Of </span></b>Raj Singh<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Wednesday, July 22, 20=
09
8:52 AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <a href=3D"mailto:ipsec@=
ietf.org"
target=3D"_blank">ipsec@ietf.org</a><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> [IPsec] [IKEv2] Que=
stions
on windowing in IKEv2</span></font><o:p></o:p></p>

</div>

<div>

<div>

<p><font size=3D3 face=3D"Times New Roman"><span style=3D'font-size:12.0pt'=
>&nbsp;<o:p></o:p></span></font></p>

<p style=3D'margin-bottom:12.0pt'><font size=3D3 face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt'>Hi Group,<br>
<br>
According to IKEv2bis-04, section 2.3<br>
<br>
-----------------------------------------<o:p></o:p></span></font></p>

<pre><font size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&=
nbsp;&nbsp; An IKE endpoint MUST NOT exceed the peer's stated window size f=
or<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;&nbsp; transmitted IKE requests.&nbsp; In =
other words, if the responder stated<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;&nbsp; its window size is N, then when the=
 initiator needs to make a request<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;&nbsp; X, it MUST wait until it has receiv=
ed responses to all requests up<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;&nbsp; through request X-N.&nbsp; An IKE e=
ndpoint MUST keep a copy of (or be able<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;&nbsp; to regenerate exactly) each request=
 it has sent until it receives the<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;&nbsp; corresponding response.&nbsp; An IK=
E endpoint MUST keep a copy of (or be<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;&nbsp; able to regenerate exactly) the num=
ber of previous responses equal to<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;&nbsp; its declared window size in case it=
s response was lost and the<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;&nbsp; initiator requests its retransmissi=
on by retransmitting the request.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>----------------------------<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>Now, suppose responder window size is N.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>Initiator send a request (X-N) but Initiator doe=
s get <br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>response for request no (X-N) say due to n/w fla=
pping.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>So initiator schedules this request for re-trans=
missions <br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>but between the time intervals of re-transmissio=
n n/w comes UP <br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>and request no. (X-N+1) to (X) goes fine i.e. th=
ese request get response.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>Now, initiator wants to make another request i.e=
. request no.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>(X+1). But according to draft it can't make that=
 request as it has<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>not received the response for request no (X-N) e=
ven though there is <br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>only one outstanding request in transit.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>Also draft says:<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>---------------------------<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;The SET_WINDOW_SIZE notification asserts t=
hat the sending endpoint is<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;&nbsp; capable of keeping state for multip=
le outstanding exchanges,<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;&nbsp; permitting the recipient to send mu=
ltiple requests before getting a<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'>&nbsp;&nbsp; response to the first.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>------------------------<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>That means windowing is for outstanding request.=
<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>So in above mentioned scenario even though there=
 is only 1<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>outstanding request and window size is N but we =
are not able to send<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>next request because of windowing definition.<br=
>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>Maybe i am missing something here.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'>Please elaborate the on the behavior in above sc=
enario.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre style=3D'margin-bottom:12.0pt'><font si=
ze=3D4
face=3D"Courier New"><span style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre style=3D'margin-bottom:12.0pt'><font si=
ze=3D4
face=3D"Courier New"><span style=3D'font-size:13.5pt'>Regards,<br>
<br>
<o:p></o:p></span></font></pre><pre style=3D'margin-bottom:12.0pt'><font si=
ze=3D4
face=3D"Courier New"><span style=3D'font-size:13.5pt'>Raj </span></font><o:=
p></o:p></pre></div>

</div>

<p style=3D'margin-bottom:12.0pt'><font size=3D3 face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt'><br>
<br>
Scanned by Check Point Total Security Gateway. <o:p></o:p></span></font></p=
>

</div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
Email secured by Check Point <o:p></o:p></span></font></p>

</div>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>


<br>=
=0D=0A
<br>Email secured by Check Point=0D=0A
<br>
<br>=
</body>

</html>

--_000_006FEB08D9C6444AB014105C9AEB133F608151F7F4ilex01adcheck_--

From rsjenwar@gmail.com  Wed Jul 22 02:05:34 2009
Return-Path: <rsjenwar@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 354A43A6DA9 for <ipsec@core3.amsl.com>; Wed, 22 Jul 2009 02:05:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qba93pAZbQk9 for <ipsec@core3.amsl.com>; Wed, 22 Jul 2009 02:05:28 -0700 (PDT)
Received: from mail-pz0-f196.google.com (mail-pz0-f196.google.com [209.85.222.196]) by core3.amsl.com (Postfix) with ESMTP id 631223A6BED for <ipsec@ietf.org>; Wed, 22 Jul 2009 02:05:28 -0700 (PDT)
Received: by pzk34 with SMTP id 34so42579pzk.29 for <ipsec@ietf.org>; Wed, 22 Jul 2009 02:05:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=cAHvsUBRxNTm7MEmVDg6ub2Qqpz49IigqJBP1WGbQGo=; b=RsFAxSGCeyN0ELZBeGIOj+fEYXc1cNfrsizpItX5B4ka4WAT2VUq4a2UypISg1SCMp cWdUeiV5RY64x2l65p9ULKurmXTkzb3b5W/nmHc8t7IZTaX41L4F/SIN8Q882GU8Egc5 Um1wsmDNOABc8LAuO989ry6Mtur4rChkA+Q5I=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=Z1zzeOGpbA5R4vMIPsRW56Y3LUtnQWiFOFPNeZxi6E6s+PobPnqxtN68jEHzRfIQnz XIxYUKZmLqv9qlUJrD0o7I0ZLPrpGBz8BQKrL8//elNKqEdEwAPU+X9EF2RqrzXeO8V/ NwLNvKJC2nVvzY17Ru9cROkWAUnMFqUESRIxM=
MIME-Version: 1.0
Received: by 10.142.170.20 with SMTP id s20mr154063wfe.137.1248253040987; Wed,  22 Jul 2009 01:57:20 -0700 (PDT)
In-Reply-To: <006FEB08D9C6444AB014105C9AEB133F608151F7EE@il-ex01.ad.checkpoint.com>
References: <7ccecf670907212252i56e27960g41304a0e871ed533@mail.gmail.com> <006FEB08D9C6444AB014105C9AEB133F608151F7EE@il-ex01.ad.checkpoint.com>
Date: Wed, 22 Jul 2009 14:27:20 +0530
Message-ID: <7ccecf670907220157sca2035bvb7be832f2dc165a7@mail.gmail.com>
From: Raj Singh <rsjenwar@gmail.com>
To: Yoav Nir <ynir@checkpoint.com>
Content-Type: multipart/alternative; boundary=000e0cd16e8e190ddb046f478fd6
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] [IKEv2] Questions on windowing in IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jul 2009 09:05:34 -0000

--000e0cd16e8e190ddb046f478fd6
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Yoav,

Do you think this behavior contradicts with definition of windowing
mentioned in draft that if responder window is 3, initiator can have 3
outstanding request ?

Regards,
Raj

On Wed, Jul 22, 2009 at 1:09 PM, Yoav Nir <ynir@checkpoint.com> wrote:

>  Hi Raj.
>
>
>
> Too many variables, let=E2=80=99s assume values without loss of generalit=
y.
>
>
>
> Suppose N=3D3, and you have send requests 17, 18 and 19. Because of the
> network problems, you got responses for 18 and 19, but not **yet** for
> 17.
>
>
>
> What the draft (and RFC 4306) says, is that you keep retransmitting 17,
> until you get a response.  Before that, you can=E2=80=99t begin transmitt=
ing #20. If
> your retransmissions of #17 time out (after =E2=80=9Cat least a dozen
> retransmissions over at least 2 minutes=E2=80=9D) then you assume that th=
e peer has
> died, and silently discard the IKE SA.  This will usually not happen in t=
he
> above scenario, because once the network is back, the responder will also
> reply to #17.
>
>
>
> Hope this helps
>
>
>  ------------------------------
>
> *From:* ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] *On Behalf
> Of *Raj Singh
> *Sent:* Wednesday, July 22, 2009 8:52 AM
> *To:* ipsec@ietf.org
> *Subject:* [IPsec] [IKEv2] Questions on windowing in IKEv2
>
>
>
> Hi Group,
>
> According to IKEv2bis-04, section 2.3
>
> -----------------------------------------
>
>    An IKE endpoint MUST NOT exceed the peer's stated window size for
>
>    transmitted IKE requests.  In other words, if the responder stated
>
>    its window size is N, then when the initiator needs to make a request
>
>    X, it MUST wait until it has received responses to all requests up
>
>    through request X-N.  An IKE endpoint MUST keep a copy of (or be able
>
>    to regenerate exactly) each request it has sent until it receives the
>
>    corresponding response.  An IKE endpoint MUST keep a copy of (or be
>
>    able to regenerate exactly) the number of previous responses equal to
>
>    its declared window size in case its response was lost and the
>
>    initiator requests its retransmission by retransmitting the request.
>
>
> ----------------------------
>
> Now, suppose responder window size is N.
>
> Initiator send a request (X-N) but Initiator does get
>
> response for request no (X-N) say due to n/w flapping.
>
> So initiator schedules this request for re-transmissions
>
> but between the time intervals of re-transmission n/w comes UP
>
> and request no. (X-N+1) to (X) goes fine i.e. these request get response.
>
> Now, initiator wants to make another request i.e. request no.
>
> (X+1). But according to draft it can't make that request as it has
>
> not received the response for request no (X-N) even though there is
>
> only one outstanding request in transit.
>
>
> Also draft says:
>
> ---------------------------
>  The SET_WINDOW_SIZE notification asserts that the sending endpoint is
>
>    capable of keeping state for multiple outstanding exchanges,
>
>    permitting the recipient to send multiple requests before getting a
>
>    response to the first.
> ------------------------
>
>
> That means windowing is for outstanding request.
>
> So in above mentioned scenario even though there is only 1
>
> outstanding request and window size is N but we are not able to send
>
> next request because of windowing definition.
>
>
> Maybe i am missing something here.
>
> Please elaborate the on the behavior in above scenario.
>
>
>
> Regards,
>
> Raj
>
>
>
> Scanned by Check Point Total Security Gateway.
>
>
> Email secured by Check Point
>
>

--000e0cd16e8e190ddb046f478fd6
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Yoav,<br><br>Do you think this behavior contradicts with definition of w=
indowing mentioned in draft that if responder window is 3, initiator can ha=
ve 3 outstanding request ?<br><br>Regards,<br>Raj<br><br><div class=3D"gmai=
l_quote">
On Wed, Jul 22, 2009 at 1:09 PM, Yoav Nir <span dir=3D"ltr">&lt;<a href=3D"=
mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&gt;</span> wrote:<br><b=
lockquote class=3D"gmail_quote" style=3D"border-left: 1px solid rgb(204, 20=
4, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">











<div link=3D"blue" vlink=3D"purple" lang=3D"EN-US">

<div>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">Hi Raj.</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">Too many variables, let=E2=80=99s =
assume values
without loss of generality.</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">Suppose N=3D3, and you have send r=
equests
17, 18 and 19. Because of the network problems, you got responses for 18 an=
d
19, but not *<b><span style=3D"font-weight: bold;">yet</span></b>* for 17.=
=C2=A0 </span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">What the draft (and RFC 4306) says=
, is
that you keep retransmitting 17, until you get a response. =C2=A0Before tha=
t, you
can=E2=80=99t begin transmitting #20. If your retransmissions of #17 time o=
ut (after =E2=80=9Cat
least a dozen retransmissions over at least 2 minutes=E2=80=9D) then you as=
sume that
the peer has died, and silently discard the IKE SA.=C2=A0 This will usually=
 not
happen in the above scenario, because once the network is back, the respond=
er
will also reply to #17.</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">Hope this helps</span></font></p>

<p><font size=3D"2" color=3D"navy" face=3D"Arial"><span style=3D"font-size:=
 10pt; font-family: Arial; color: navy;">=C2=A0</span></font></p>

<div>

<div style=3D"text-align: center;" align=3D"center"><font size=3D"3" face=
=3D"Times New Roman"><span style=3D"font-size: 12pt;">

<hr size=3D"2" width=3D"100%" align=3D"center">

</span></font></div>

<p><b><font size=3D"2" face=3D"Tahoma"><span style=3D"font-size: 10pt; font=
-family: Tahoma; font-weight: bold;">From:</span></font></b><font size=3D"2=
" face=3D"Tahoma"><span style=3D"font-size: 10pt; font-family: Tahoma;">
<a href=3D"mailto:ipsec-bounces@ietf.org" target=3D"_blank">ipsec-bounces@i=
etf.org</a> [mailto:<a href=3D"mailto:ipsec-bounces@ietf.org" target=3D"_bl=
ank">ipsec-bounces@ietf.org</a>] <b><span style=3D"font-weight: bold;">On B=
ehalf Of </span></b>Raj Singh<br>

<b><span style=3D"font-weight: bold;">Sent:</span></b> Wednesday, July 22, =
2009
8:52 AM<br>
<b><span style=3D"font-weight: bold;">To:</span></b> <a href=3D"mailto:ipse=
c@ietf.org" target=3D"_blank">ipsec@ietf.org</a><br>
<b><span style=3D"font-weight: bold;">Subject:</span></b> [IPsec] [IKEv2] Q=
uestions
on windowing in IKEv2</span></font></p>

</div><div><div></div><div class=3D"h5">

<p><font size=3D"3" face=3D"Times New Roman"><span style=3D"font-size: 12pt=
;">=C2=A0</span></font></p>

<p style=3D"margin-bottom: 12pt;"><font size=3D"3" face=3D"Times New Roman"=
><span style=3D"font-size: 12pt;">Hi Group,<br>
<br>
According to IKEv2bis-04, section 2.3<br>
<br>
-----------------------------------------</span></font></p>

<pre><font size=3D"2" face=3D"Courier New"><span style=3D"font-size: 10pt;"=
>=C2=A0=C2=A0 An IKE endpoint MUST NOT exceed the peer&#39;s stated window =
size for<br>
=C2=A0=C2=A0 transmitted IKE requests.=C2=A0 In other words, if the respond=
er stated<br>
<br>
</span></font></pre><pre><font size=3D"2" face=3D"Courier New"><span style=
=3D"font-size: 10pt;">=C2=A0=C2=A0 its window size is N, then when the init=
iator needs to make a request<br>
=C2=A0=C2=A0 X, it MUST wait until it has received responses to all request=
s up<br>
=C2=A0=C2=A0 through request X-N.=C2=A0 An IKE endpoint MUST keep a copy of=
 (or be able<br>
<br>
</span></font></pre><pre><font size=3D"2" face=3D"Courier New"><span style=
=3D"font-size: 10pt;">=C2=A0=C2=A0 to regenerate exactly) each request it h=
as sent until it receives the<br>
=C2=A0=C2=A0 corresponding response.=C2=A0 An IKE endpoint MUST keep a copy=
 of (or be<br>
=C2=A0=C2=A0 able to regenerate exactly) the number of previous responses e=
qual to<br>
<br>
</span></font></pre><pre><font size=3D"2" face=3D"Courier New"><span style=
=3D"font-size: 10pt;">=C2=A0=C2=A0 its declared window size in case its res=
ponse was lost and the<br>
=C2=A0=C2=A0 initiator requests its retransmission by retransmitting the re=
quest.<br>
<br>
----------------------------<br>
<br>
</span></font><font size=3D"4"><span style=3D"font-size: 13.5pt;">Now, supp=
ose responder window size is N.<br>
<br>
</span></font></pre><pre><font size=3D"4" face=3D"Courier New"><span style=
=3D"font-size: 13.5pt;">Initiator send a request (X-N) but Initiator does g=
et <br>
response for request no (X-N) say due to n/w flapping.<br>
So initiator schedules this request for re-transmissions <br>
but between the time intervals of re-transmission n/w comes UP <br>
<br>
</span></font></pre><pre><font size=3D"4" face=3D"Courier New"><span style=
=3D"font-size: 13.5pt;">and request no. (X-N+1) to (X) goes fine i.e. these=
 request get response.<br>
Now, initiator wants to make another request i.e. request no.<br>
(X+1). But according to draft it can&#39;t make that request as it has<br>
not received the response for request no (X-N) even though there is <br>
<br>
</span></font></pre><pre><font size=3D"4" face=3D"Courier New"><span style=
=3D"font-size: 13.5pt;">only one outstanding request in transit.<br>
<br>
Also draft says:<br>
---------------------------<br>
</span></font>=C2=A0The SET_WINDOW_SIZE notification asserts that the sendi=
ng endpoint is<br>
=C2=A0=C2=A0 capable of keeping state for multiple outstanding exchanges,<b=
r>
<br>
</pre><pre><font size=3D"2" face=3D"Courier New"><span style=3D"font-size: =
10pt;">=C2=A0=C2=A0 permitting the recipient to send multiple requests befo=
re getting a<br>
=C2=A0=C2=A0 response to the first.<br>
</span></font><font size=3D"4"><span style=3D"font-size: 13.5pt;">---------=
---------------<br>
<br>
That means windowing is for outstanding request.<br>
So in above mentioned scenario even though there is only 1<br>
<br>
</span></font></pre><pre><font size=3D"4" face=3D"Courier New"><span style=
=3D"font-size: 13.5pt;">outstanding request and window size is N but we are=
 not able to send<br>
next request because of windowing definition.<br>
<br>
Maybe i am missing something here.<br>
Please elaborate the on the behavior in above scenario.<br>
<br>
</span></font></pre><pre style=3D"margin-bottom: 12pt;"><font size=3D"4" fa=
ce=3D"Courier New"><span style=3D"font-size: 13.5pt;"><br>
Regards,<br>
Raj </span></font></pre>

</div></div><p style=3D"margin-bottom: 12pt;"><font size=3D"3" face=3D"Time=
s New Roman"><span style=3D"font-size: 12pt;"><br>
<br>
Scanned by Check Point Total Security Gateway. </span></font></p>

</div>


<br>

<br>Email secured by Check Point

<br>
<br></div>


</blockquote></div><br>

--000e0cd16e8e190ddb046f478fd6--

From amjads@cisco.com  Wed Jul 22 02:24:39 2009
Return-Path: <amjads@cisco.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6691A28C10C for <ipsec@core3.amsl.com>; Wed, 22 Jul 2009 02:24:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.482
X-Spam-Level: 
X-Spam-Status: No, score=-6.482 tagged_above=-999 required=5 tests=[AWL=0.116,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5Gaaib6a91Ao for <ipsec@core3.amsl.com>; Wed, 22 Jul 2009 02:24:32 -0700 (PDT)
Received: from syd-iport-1.cisco.com (syd-iport-1.cisco.com [64.104.193.196]) by core3.amsl.com (Postfix) with ESMTP id 6625A3A687F for <ipsec@ietf.org>; Wed, 22 Jul 2009 02:24:31 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvAEAI93ZkoKS+eh/2dsb2JhbACCKBQYtQ2II5BiBYQOgUU
X-IronPort-AV: E=Sophos;i="4.43,245,1246838400"; d="scan'208,217";a="58385532"
Received: from hkg-dkim-1.cisco.com ([10.75.231.161]) by syd-iport-1.cisco.com with ESMTP; 22 Jul 2009 09:23:55 +0000
Received: from hkg-core-1.cisco.com (hkg-core-1.cisco.com [64.104.123.94]) by hkg-dkim-1.cisco.com (8.12.11/8.12.11) with ESMTP id n6M9Nq8C028977;  Wed, 22 Jul 2009 17:23:52 +0800
Received: from xbh-bgl-412.cisco.com (xbh-bgl-412.cisco.com [72.163.129.202]) by hkg-core-1.cisco.com (8.13.8/8.14.3) with ESMTP id n6M9NloB006916; Wed, 22 Jul 2009 09:23:51 GMT
Received: from xmb-bgl-417.cisco.com ([72.163.129.213]) by xbh-bgl-412.cisco.com with Microsoft SMTPSVC(6.0.3790.3959);  Wed, 22 Jul 2009 14:53:21 +0530
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01CA0AAE.0E4644EA"
Date: Wed, 22 Jul 2009 14:53:19 +0530
Message-ID: <1CFAB1B15A6C1142BD1FC07D1CA82AB29729A0@XMB-BGL-417.cisco.com>
In-Reply-To: <006FEB08D9C6444AB014105C9AEB133F608151F7F4@il-ex01.ad.checkpoint.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [IPsec] [IKEv2] Questions on windowing in IKEv2
Thread-Index: AcoKqu++DDxoXuUYS2icwspvbPx+vAAAFhLAAAB2URA=
References: <7ccecf670907212252i56e27960g41304a0e871ed533@mail.gmail.com><006FEB08D9C6444AB014105C9AEB133F608151F7EE@il-ex01.ad.checkpoint.com><7ccecf670907220157sca2035bvb7be832f2dc165a7@mail.gmail.com> <006FEB08D9C6444AB014105C9AEB133F608151F7F4@il-ex01.ad.checkpoint.com>
From: "Amjad Inamdar (amjads)" <amjads@cisco.com>
To: "Yoav Nir" <ynir@checkpoint.com>, "Raj Singh" <rsjenwar@gmail.com>
X-OriginalArrivalTime: 22 Jul 2009 09:23:21.0600 (UTC) FILETIME=[0E6B9800:01CA0AAE]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=23646; t=1248254635; x=1249118635; c=relaxed/simple; s=hkgdkim1002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=amjads@cisco.com; z=From:=20=22Amjad=20Inamdar=20(amjads)=22=20<amjads@cisco.c om> |Subject:=20RE=3A=20[IPsec]=20[IKEv2]=20Questions=20on=20wi ndowing=20in=20IKEv2 |Sender:=20; bh=k7sc1ZyYSxtFIEcC0KXtBJ0kW4AfqvfZMMCLHMRY9w8=; b=oDCEHojXqyINKkiZe4qapCriStVexQTN/YQGcRIJNRPqGpKXTDGU1sEf2o m3arN7VkzIsCPoBUaUBdM3tE1H19BW7XwBREzkcwMaJtG8c+eqIBf5n2B2Sr ZKNX7PWMDdPRm5EPSrj/SiO0AxWtgnw9prijxvqlXVvG2uDdidM1I=;
Authentication-Results: hkg-dkim-1; header.From=amjads@cisco.com; dkim=pass ( sig from cisco.com/hkgdkim1002 verified; ); 
Cc: ipsec@ietf.org
Subject: Re: [IPsec] [IKEv2] Questions on windowing in IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jul 2009 09:24:39 -0000

This is a multi-part message in MIME format.

------_=_NextPart_001_01CA0AAE.0E4644EA
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

Hi Yoav,
=20
Any benefits of this behaviour over allowing 'window-size' outstanding
requests at any given time.
=20
Thanks,
-Amjad

________________________________

From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf
Of Yoav Nir
Sent: Wednesday, July 22, 2009 2:34 PM
To: 'Raj Singh'
Cc: ipsec@ietf.org
Subject: Re: [IPsec] [IKEv2] Questions on windowing in IKEv2



No. All the draft says, is that to send 20, you need to have received
answers to everything up to and including 17. You don't get to always
have three outstanding requests.

=20

________________________________

From: Raj Singh [mailto:rsjenwar@gmail.com]=20
Sent: Wednesday, July 22, 2009 11:57 AM
To: Yoav Nir
Cc: ipsec@ietf.org
Subject: Re: [IPsec] [IKEv2] Questions on windowing in IKEv2

=20

Hi Yoav,

Do you think this behavior contradicts with definition of windowing
mentioned in draft that if responder window is 3, initiator can have 3
outstanding request ?

Regards,
Raj

On Wed, Jul 22, 2009 at 1:09 PM, Yoav Nir <ynir@checkpoint.com> wrote:

Hi Raj.

=20

Too many variables, let's assume values without loss of generality.

=20

Suppose N=3D3, and you have send requests 17, 18 and 19. Because of the
network problems, you got responses for 18 and 19, but not *yet* for 17.


=20

What the draft (and RFC 4306) says, is that you keep retransmitting 17,
until you get a response.  Before that, you can't begin transmitting
#20. If your retransmissions of #17 time out (after "at least a dozen
retransmissions over at least 2 minutes") then you assume that the peer
has died, and silently discard the IKE SA.  This will usually not happen
in the above scenario, because once the network is back, the responder
will also reply to #17.

=20

Hope this helps

=20

________________________________

From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf
Of Raj Singh
Sent: Wednesday, July 22, 2009 8:52 AM
To: ipsec@ietf.org
Subject: [IPsec] [IKEv2] Questions on windowing in IKEv2

=20

Hi Group,

According to IKEv2bis-04, section 2.3

-----------------------------------------

   An IKE endpoint MUST NOT exceed the peer's stated window size for




   transmitted IKE requests.  In other words, if the responder stated









   its window size is N, then when the initiator needs to make a request




   X, it MUST wait until it has received responses to all requests up




   through request X-N.  An IKE endpoint MUST keep a copy of (or be able









   to regenerate exactly) each request it has sent until it receives the




   corresponding response.  An IKE endpoint MUST keep a copy of (or be




   able to regenerate exactly) the number of previous responses equal to









   its declared window size in case its response was lost and the




   initiator requests its retransmission by retransmitting the request.









----------------------------









Now, suppose responder window size is N.









Initiator send a request (X-N) but Initiator does get=20




response for request no (X-N) say due to n/w flapping.




So initiator schedules this request for re-transmissions=20




but between the time intervals of re-transmission n/w comes UP=20









and request no. (X-N+1) to (X) goes fine i.e. these request get
response.




Now, initiator wants to make another request i.e. request no.




(X+1). But according to draft it can't make that request as it has




not received the response for request no (X-N) even though there is=20









only one outstanding request in transit.









Also draft says:




---------------------------




 The SET_WINDOW_SIZE notification asserts that the sending endpoint is




   capable of keeping state for multiple outstanding exchanges,









   permitting the recipient to send multiple requests before getting a




   response to the first.




------------------------









That means windowing is for outstanding request.




So in above mentioned scenario even though there is only 1









outstanding request and window size is N but we are not able to send




next request because of windowing definition.









Maybe i am missing something here.




Please elaborate the on the behavior in above scenario.














Regards,




Raj=20



Scanned by Check Point Total Security Gateway.=20



Email secured by Check Point=20

=20



Email secured by Check Point=20



------_=_NextPart_001_01CA0AAE.0E4644EA
Content-Type: text/html;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D=20
"urn:schemas-microsoft-com:vml" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word" xmlns:st1 =3D=20
"urn:schemas-microsoft-com:office:smarttags"><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.2900.3562" name=3DGENERATOR><!--[if !mso]>
<STYLE>v\:* {
	BEHAVIOR: url(#default#VML)
}
o\:* {
	BEHAVIOR: url(#default#VML)
}
w\:* {
	BEHAVIOR: url(#default#VML)
}
.shape {
	BEHAVIOR: url(#default#VML)
}
</STYLE>
<![endif]--><o:SmartTagType name=3D"PersonName"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTagT=
ype><!--[if !mso]>
<STYLE>st1\:* {
	BEHAVIOR: url(#default#ieooui)
}
</STYLE>
<![endif]-->
<STYLE>@font-face {
	font-family: Tahoma;
}
@page Section1 {size: 612.0pt 792.0pt; margin: 72.0pt 90.0pt 72.0pt =
90.0pt; }
P.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0cm 0cm 0pt; FONT-FAMILY: "Times New Roman"
}
LI.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0cm 0cm 0pt; FONT-FAMILY: "Times New Roman"
}
DIV.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0cm 0cm 0pt; FONT-FAMILY: "Times New Roman"
}
A:link {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlink {
	COLOR: blue; TEXT-DECORATION: underline
}
A:visited {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlinkFollowed {
	COLOR: blue; TEXT-DECORATION: underline
}
P {
	FONT-SIZE: 12pt; MARGIN-LEFT: 0cm; MARGIN-RIGHT: 0cm; FONT-FAMILY: =
"Times New Roman"; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto
}
PRE {
	FONT-SIZE: 10pt; MARGIN: 0cm 0cm 0pt; FONT-FAMILY: "Courier New"
}
SPAN.EmailStyle19 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal-reply
}
DIV.Section1 {
	page: Section1
}
</STYLE>
</HEAD>
<BODY lang=3DEN-US vLink=3Dblue link=3Dblue>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D848431609-22072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2>Hi Yoav,</FONT></SPAN></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D848431609-22072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D848431609-22072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2>Any benefits of this behaviour over allowing =
'window-size'=20
outstanding requests at any given time.</FONT></SPAN></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D848431609-22072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D848431609-22072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2>Thanks,</FONT></SPAN></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D848431609-22072009><FONT =
face=3DArial=20
color=3D#0000ff size=3D2>-Amjad</FONT></SPAN></DIV><BR>
<DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr align=3Dleft>
<HR tabIndex=3D-1>
<FONT face=3DTahoma size=3D2><B>From:</B> ipsec-bounces@ietf.org=20
[mailto:ipsec-bounces@ietf.org] <B>On Behalf Of </B>Yoav =
Nir<BR><B>Sent:</B>=20
Wednesday, July 22, 2009 2:34 PM<BR><B>To:</B> 'Raj Singh'<BR><B>Cc:</B> =

ipsec@ietf.org<BR><B>Subject:</B> Re: [IPsec] [IKEv2] Questions on =
windowing in=20
IKEv2<BR></FONT><BR></DIV>
<DIV></DIV>
<DIV class=3DSection1>
<P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">No. All the =
draft says,=20
is that to send 20, you need to have received answers to everything up =
to and=20
including 17. You don&#8217;t get to always have three outstanding=20
requests.<o:p></o:p></SPAN></FONT></P>
<P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
<DIV>
<DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" align=3Dcenter><FONT =

face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt">
<HR tabIndex=3D-1 align=3Dcenter width=3D"100%" SIZE=3D2>
</SPAN></FONT></DIV>
<P class=3DMsoNormal><B><FONT face=3DTahoma size=3D2><SPAN=20
style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: =
Tahoma">From:</SPAN></FONT></B><FONT=20
face=3DTahoma size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Tahoma"> Raj Singh=20
[mailto:rsjenwar@gmail.com] <BR><B><SPAN=20
style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Wednesday, July 22, 2009 =
11:57=20
AM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> Yoav =
Nir<BR><B><SPAN=20
style=3D"FONT-WEIGHT: bold">Cc:</SPAN></B> <st1:PersonName=20
w:st=3D"on">ipsec@ietf.org</st1:PersonName><BR><B><SPAN=20
style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [IPsec] [IKEv2] =
Questions on=20
windowing in IKEv2</SPAN></FONT><o:p></o:p></P></DIV>
<P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
<P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><FONT face=3D"Times =
New Roman"=20
size=3D3><SPAN style=3D"FONT-SIZE: 12pt">Hi Yoav,<BR><BR>Do you think =
this behavior=20
contradicts with definition of windowing mentioned in draft that if =
responder=20
window is 3, initiator can have 3 outstanding request=20
?<BR><BR>Regards,<BR>Raj<o:p></o:p></SPAN></FONT></P>
<DIV>
<P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
style=3D"FONT-SIZE: 12pt">On Wed, Jul 22, 2009 at 1:09 PM, Yoav Nir =
&lt;<A=20
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</A>&gt;=20
wrote:<o:p></o:p></SPAN></FONT></P>
<DIV vlink=3D"purple" link=3D"blue">
<DIV>
<P><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Hi=20
Raj.</SPAN></FONT><o:p></o:p></P>
<P><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial">&nbsp;</SPAN></FONT><o:p></o:p></P>
<P><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Too many =
variables,=20
let&#8217;s assume values without loss of =
generality.</SPAN></FONT><o:p></o:p></P>
<P><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial">&nbsp;</SPAN></FONT><o:p></o:p></P>
<P><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Suppose =
N=3D3, and you=20
have send requests 17, 18 and 19. Because of the network problems, you =
got=20
responses for 18 and 19, but not *<B><SPAN=20
style=3D"FONT-WEIGHT: bold">yet</SPAN></B>* for 17.&nbsp;=20
</SPAN></FONT><o:p></o:p></P>
<P><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial">&nbsp;</SPAN></FONT><o:p></o:p></P>
<P><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">What the =
draft (and RFC=20
4306) says, is that you keep retransmitting 17, until you get a =
response.=20
&nbsp;Before that, you can&#8217;t begin transmitting #20. If your =
retransmissions of=20
#17 time out (after &#8220;at least a dozen retransmissions over at =
least 2 minutes&#8221;)=20
then you assume that the peer has died, and silently discard the IKE =
SA.&nbsp;=20
This will usually not happen in the above scenario, because once the =
network is=20
back, the responder will also reply to #17.</SPAN></FONT><o:p></o:p></P>
<P><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial">&nbsp;</SPAN></FONT><o:p></o:p></P>
<P><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Hope this=20
helps</SPAN></FONT><o:p></o:p></P>
<P><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial">&nbsp;</SPAN></FONT><o:p></o:p></P>
<DIV>
<DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" align=3Dcenter><FONT =

face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt">
<HR align=3Dcenter width=3D"100%" SIZE=3D2>
</SPAN></FONT></DIV>
<P><B><FONT face=3DTahoma size=3D2><SPAN=20
style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: =
Tahoma">From:</SPAN></FONT></B><FONT=20
face=3DTahoma size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Tahoma"> <A=20
href=3D"mailto:ipsec-bounces@ietf.org" =
target=3D_blank>ipsec-bounces@ietf.org</A>=20
[mailto:<A href=3D"mailto:ipsec-bounces@ietf.org"=20
target=3D_blank>ipsec-bounces@ietf.org</A>] <B><SPAN =
style=3D"FONT-WEIGHT: bold">On=20
Behalf Of </SPAN></B>Raj Singh<BR><B><SPAN=20
style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Wednesday, July 22, 2009 =
8:52=20
AM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> <A=20
href=3D"mailto:ipsec@ietf.org" =
target=3D_blank>ipsec@ietf.org</A><BR><B><SPAN=20
style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> [IPsec] [IKEv2] =
Questions on=20
windowing in IKEv2</SPAN></FONT><o:p></o:p></P></DIV>
<DIV>
<DIV>
<P><FONT face=3D"Times New Roman" size=3D3><SPAN=20
style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P>
<P style=3D"MARGIN-BOTTOM: 12pt"><FONT face=3D"Times New Roman" =
size=3D3><SPAN=20
style=3D"FONT-SIZE: 12pt">Hi Group,<BR><BR>According to IKEv2bis-04, =
section=20
2.3<BR><BR>-----------------------------------------<o:p></o:p></SPAN></F=
ONT></P><PRE><FONT face=3D"Courier New" size=3D2><SPAN =
style=3D"FONT-SIZE: 10pt">&nbsp;&nbsp; An IKE endpoint MUST NOT exceed =
the peer's stated window size for<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp;&nbsp; transmitted IKE =
requests.&nbsp; In other words, if the responder stated<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt"><BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp;&nbsp; its window size is =
N, then when the initiator needs to make a request<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp;&nbsp; X, it MUST wait =
until it has received responses to all requests up<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp;&nbsp; through request =
X-N.&nbsp; An IKE endpoint MUST keep a copy of (or be able<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt"><BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp;&nbsp; to regenerate =
exactly) each request it has sent until it receives the<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp;&nbsp; corresponding =
response.&nbsp; An IKE endpoint MUST keep a copy of (or be<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp;&nbsp; able to regenerate =
exactly) the number of previous responses equal to<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt"><BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp;&nbsp; its declared =
window size in case its response was lost and the<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp;&nbsp; initiator requests =
its retransmission by retransmitting the request.<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt"><BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">----------------------------<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt"><BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">Now, suppose responder window =
size is N.<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt"><BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">Initiator send a request =
(X-N) but Initiator does get <BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">response for request no (X-N) =
say due to n/w flapping.<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">So initiator schedules this =
request for re-transmissions <BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">but between the time =
intervals of re-transmission n/w comes UP <BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt"><BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">and request no. (X-N+1) to =
(X) goes fine i.e. these request get response.<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">Now, initiator wants to make =
another request i.e. request no.<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">(X+1). But according to draft =
it can't make that request as it has<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">not received the response for =
request no (X-N) even though there is <BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt"><BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">only one outstanding request =
in transit.<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt"><BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">Also draft says:<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: =
13.5pt">---------------------------<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp;The SET_WINDOW_SIZE =
notification asserts that the sending endpoint is<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp;&nbsp; capable of keeping =
state for multiple outstanding exchanges,<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt"><BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp;&nbsp; permitting the =
recipient to send multiple requests before getting a<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp;&nbsp; response to the =
first.<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">------------------------<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt"><BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">That means windowing is for =
outstanding request.<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">So in above mentioned =
scenario even though there is only 1<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt"><BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">outstanding request and =
window size is N but we are not able to send<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">next request because of =
windowing definition.<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt"><BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">Maybe i am missing something =
here.<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">Please elaborate the on the =
behavior in above scenario.<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE><FONT face=3D"Courier New" =
size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt"><BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE style=3D"MARGIN-BOTTOM: 12pt"><FONT =
face=3D"Courier New" size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt"><BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE style=3D"MARGIN-BOTTOM: 12pt"><FONT =
face=3D"Courier New" size=3D4><SPAN style=3D"FONT-SIZE: =
13.5pt">Regards,<BR>
<BR>
<o:p></o:p></SPAN></FONT></PRE><PRE style=3D"MARGIN-BOTTOM: 12pt"><FONT =
face=3D"Courier New" size=3D4><SPAN style=3D"FONT-SIZE: 13.5pt">Raj =
</SPAN></FONT><o:p></o:p></PRE></DIV></DIV>
<P style=3D"MARGIN-BOTTOM: 12pt"><FONT face=3D"Times New Roman" =
size=3D3><SPAN=20
style=3D"FONT-SIZE: 12pt"><BR><BR>Scanned by Check Point Total Security =
Gateway.=20
<o:p></o:p></SPAN></FONT></P></DIV>
<P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><FONT face=3D"Times =
New Roman"=20
size=3D3><SPAN style=3D"FONT-SIZE: 12pt"><BR><BR>Email secured by Check =
Point=20
<o:p></o:p></SPAN></FONT></P></DIV></DIV>
<P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
style=3D"FONT-SIZE: =
12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DIV><BR><BR>Email=20
secured by Check Point <BR><BR></BODY></HTML>

------_=_NextPart_001_01CA0AAE.0E4644EA--

From ynir@checkpoint.com  Wed Jul 22 03:06:35 2009
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 802F13A6A89 for <ipsec@core3.amsl.com>; Wed, 22 Jul 2009 03:06:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I+nGHZP-5fqi for <ipsec@core3.amsl.com>; Wed, 22 Jul 2009 03:06:28 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id D3D6A28C1EE for <ipsec@ietf.org>; Wed, 22 Jul 2009 03:06:26 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id EEF7829C005; Wed, 22 Jul 2009 13:05:31 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 8F3B129C002; Wed, 22 Jul 2009 13:05:28 +0300 (IDT)
X-CheckPoint: {4A66E351-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n6MA5B3d003761; Wed, 22 Jul 2009 13:05:12 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Wed, 22 Jul 2009 13:05:11 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: "'Amjad Inamdar (amjads)'" <amjads@cisco.com>, Raj Singh <rsjenwar@gmail.com>
Date: Wed, 22 Jul 2009 13:05:10 +0300
Thread-Topic: [IPsec] [IKEv2] Questions on windowing in IKEv2
Thread-Index: AcoKqu++DDxoXuUYS2icwspvbPx+vAAAFhLAAAB2URAAAaE18A==
Message-ID: <006FEB08D9C6444AB014105C9AEB133F608151F7F5@il-ex01.ad.checkpoint.com>
References: <7ccecf670907212252i56e27960g41304a0e871ed533@mail.gmail.com><006FEB08D9C6444AB014105C9AEB133F608151F7EE@il-ex01.ad.checkpoint.com><7ccecf670907220157sca2035bvb7be832f2dc165a7@mail.gmail.com> <006FEB08D9C6444AB014105C9AEB133F608151F7F4@il-ex01.ad.checkpoint.com> <1CFAB1B15A6C1142BD1FC07D1CA82AB29729A0@XMB-BGL-417.cisco.com>
In-Reply-To: <1CFAB1B15A6C1142BD1FC07D1CA82AB29729A0@XMB-BGL-417.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_006FEB08D9C6444AB014105C9AEB133F608151F7F5ilex01adcheck_"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] [IKEv2] Questions on windowing in IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jul 2009 10:06:35 -0000

--_000_006FEB08D9C6444AB014105C9AEB133F608151F7F5ilex01adcheck_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Window size limits the amount of responses that the responder has to rememb=
er.

After receiving requests 17, 18 and 19, the responder needs to remember tho=
se three responses, because if it gets a retransmission, it should reply wi=
th the old response.

When request #20 arrives, it is safe to discard #17.  If it was still valid=
 for the initiator to send request #17 again, the responder would have to r=
etain all the old responses indefinitely.

________________________________
From: Amjad Inamdar (amjads) [mailto:amjads@cisco.com]
Sent: Wednesday, July 22, 2009 12:23 PM
To: Yoav Nir; Raj Singh
Cc: ipsec@ietf.org
Subject: RE: [IPsec] [IKEv2] Questions on windowing in IKEv2

Hi Yoav,

Any benefits of this behaviour over allowing 'window-size' outstanding requ=
ests at any given time.

Thanks,
-Amjad

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Y=
oav Nir
Sent: Wednesday, July 22, 2009 2:34 PM
To: 'Raj Singh'
Cc: ipsec@ietf.org
Subject: Re: [IPsec] [IKEv2] Questions on windowing in IKEv2
No. All the draft says, is that to send 20, you need to have received answe=
rs to everything up to and including 17. You don't get to always have three=
 outstanding requests.

________________________________
From: Raj Singh [mailto:rsjenwar@gmail.com]
Sent: Wednesday, July 22, 2009 11:57 AM
To: Yoav Nir
Cc: ipsec@ietf.org
Subject: Re: [IPsec] [IKEv2] Questions on windowing in IKEv2

Hi Yoav,

Do you think this behavior contradicts with definition of windowing mention=
ed in draft that if responder window is 3, initiator can have 3 outstanding=
 request ?

Regards,
Raj
On Wed, Jul 22, 2009 at 1:09 PM, Yoav Nir <ynir@checkpoint.com<mailto:ynir@=
checkpoint.com>> wrote:

Hi Raj.



Too many variables, let's assume values without loss of generality.



Suppose N=3D3, and you have send requests 17, 18 and 19. Because of the net=
work problems, you got responses for 18 and 19, but not *yet* for 17.



What the draft (and RFC 4306) says, is that you keep retransmitting 17, unt=
il you get a response.  Before that, you can't begin transmitting #20. If y=
our retransmissions of #17 time out (after "at least a dozen retransmission=
s over at least 2 minutes") then you assume that the peer has died, and sil=
ently discard the IKE SA.  This will usually not happen in the above scenar=
io, because once the network is back, the responder will also reply to #17.



Hope this helps



________________________________

From: ipsec-bounces@ietf.org<mailto:ipsec-bounces@ietf.org> [mailto:ipsec-b=
ounces@ietf.org<mailto:ipsec-bounces@ietf.org>] On Behalf Of Raj Singh
Sent: Wednesday, July 22, 2009 8:52 AM
To: ipsec@ietf.org<mailto:ipsec@ietf.org>
Subject: [IPsec] [IKEv2] Questions on windowing in IKEv2



Hi Group,

According to IKEv2bis-04, section 2.3

-----------------------------------------

   An IKE endpoint MUST NOT exceed the peer's stated window size for












   transmitted IKE requests.  In other words, if the responder stated
























   its window size is N, then when the initiator needs to make a request












   X, it MUST wait until it has received responses to all requests up












   through request X-N.  An IKE endpoint MUST keep a copy of (or be able
























   to regenerate exactly) each request it has sent until it receives the












   corresponding response.  An IKE endpoint MUST keep a copy of (or be












   able to regenerate exactly) the number of previous responses equal to
























   its declared window size in case its response was lost and the












   initiator requests its retransmission by retransmitting the request.
























----------------------------
























Now, suppose responder window size is N.
























Initiator send a request (X-N) but Initiator does get












response for request no (X-N) say due to n/w flapping.












So initiator schedules this request for re-transmissions












but between the time intervals of re-transmission n/w comes UP
























and request no. (X-N+1) to (X) goes fine i.e. these request get response.












Now, initiator wants to make another request i.e. request no.












(X+1). But according to draft it can't make that request as it has












not received the response for request no (X-N) even though there is
























only one outstanding request in transit.
























Also draft says:












---------------------------












 The SET_WINDOW_SIZE notification asserts that the sending endpoint is












   capable of keeping state for multiple outstanding exchanges,
























   permitting the recipient to send multiple requests before getting a












   response to the first.












------------------------
























That means windowing is for outstanding request.












So in above mentioned scenario even though there is only 1
























outstanding request and window size is N but we are not able to send












next request because of windowing definition.
























Maybe i am missing something here.












Please elaborate the on the behavior in above scenario.




































Regards,












Raj


Scanned by Check Point Total Security Gateway.


Email secured by Check Point



Email secured by Check Point

=0D=0A
Email secured by Check Point=0D=0A

--_000_006FEB08D9C6444AB014105C9AEB133F608151F7F5ilex01adcheck_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" xmlns=3D"http://ww=
w.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" name=3D"Person=
Name"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:12.0pt;
	font-family:"Times New Roman";}
pre
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:Arial;
	color:navy;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Window size limits the amount of respo=
nses
that the responder has to remember.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>After receiving requests 17, 18 and 19=
,
the responder needs to remember those three responses, because if it gets a=
 retransmission,
it should reply with the old response.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>When request #20 arrives, it is safe t=
o
discard #17. &nbsp;If it was still valid for the initiator to send request =
#17
again, the responder would have to retain all the old responses indefinitel=
y.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> Amjad In=
amdar
(amjads) [mailto:amjads@cisco.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Wednesday, July 22, 20=
09
12:23 PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Yoav Nir; Raj Singh<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> <st1:PersonName w:st=3D"=
on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> RE: [IPsec] [IKEv2]
Questions on windowing in IKEv2</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Hi Yoav,</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Any benefits of this behaviour over
allowing 'window-size' outstanding requests at any given time.</span></font=
><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Thanks,</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:blue'>-Amjad</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><b><font size=3D2 face=
=3DTahoma><span
style=3D'font-size:10.0pt;font-family:Tahoma;font-weight:bold'>From:</span>=
</font></b><font
size=3D2 face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] <b><span
style=3D'font-weight:bold'>On Behalf Of </span></b>Yoav Nir<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Wednesday, July 22, 20=
09
2:34 PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName w:st=3D"=
on">'Raj
 Singh'</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> <st1:PersonName w:st=3D"=
on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] [IKEv2]
Questions on windowing in IKEv2</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'>No. All the draft says, is that to sen=
d
20, you need to have received answers to everything up to and including 17.=
 You
don&#8217;t get to always have three outstanding requests.<o:p></o:p></span=
></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span style=
=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span style=3D'font-si=
ze:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> Raj Sing=
h
[mailto:rsjenwar@gmail.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Wednesday, July 22, 20=
09
11:57 AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Yoav Nir<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> <st1:PersonName w:st=3D"=
on">ipsec@ietf.org</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [IPsec] [IKEv2]
Questions on windowing in IKEv2</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>Hi Yoav,<br>
<br>
Do you think this behavior contradicts with definition of windowing mention=
ed
in draft that if responder window is 3, initiator can have 3 outstanding
request ?<br>
<br>
Regards,<br>
Raj<o:p></o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'>On Wed, Jul 22, 2009 at 1:09 PM, Yoav Nir &lt;<a
href=3D"mailto:ynir@checkpoint.com">ynir@checkpoint.com</a>&gt; wrote:<o:p>=
</o:p></span></font></p>

<div vlink=3Dpurple link=3Dblue>

<div>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>Hi Raj.</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>Too many variables, let&#8217;s assume values without los=
s of
generality.</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>Suppose N=3D3, and you have send requests 17, 18 and 19.
Because of the network problems, you got responses for 18 and 19, but not *=
<b><span
style=3D'font-weight:bold'>yet</span></b>* for 17.&nbsp; </span></font><o:p=
></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>What the draft (and RFC 4306) says, is that you keep
retransmitting 17, until you get a response. &nbsp;Before that, you can&#82=
17;t begin
transmitting #20. If your retransmissions of #17 time out (after &#8220;at =
least a
dozen retransmissions over at least 2 minutes&#8221;) then you assume that =
the peer
has died, and silently discard the IKE SA.&nbsp; This will usually not happ=
en
in the above scenario, because once the network is back, the responder will
also reply to #17.</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>Hope this helps</span></font><o:p></o:p></p>

<p><font size=3D2 color=3Dnavy face=3DArial><span style=3D'font-size:10.0pt=
;font-family:
Arial;color:navy'>&nbsp;</span></font><o:p></o:p></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font siz=
e=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>

<p><b><font size=3D2 face=3DTahoma><span style=3D'font-size:10.0pt;font-fam=
ily:Tahoma;
font-weight:bold'>From:</span></font></b><font size=3D2 face=3DTahoma><span
style=3D'font-size:10.0pt;font-family:Tahoma'> <a
href=3D"mailto:ipsec-bounces@ietf.org" target=3D"_blank">ipsec-bounces@ietf=
.org</a>
[mailto:<a href=3D"mailto:ipsec-bounces@ietf.org" target=3D"_blank">ipsec-b=
ounces@ietf.org</a>]
<b><span style=3D'font-weight:bold'>On Behalf Of </span></b>Raj Singh<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Wednesday, July 22, 20=
09
8:52 AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <a href=3D"mailto:ipsec@=
ietf.org"
target=3D"_blank">ipsec@ietf.org</a><br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> [IPsec] [IKEv2] Que=
stions
on windowing in IKEv2</span></font><o:p></o:p></p>

</div>

<div>

<div>

<p><font size=3D3 face=3D"Times New Roman"><span style=3D'font-size:12.0pt'=
>&nbsp;<o:p></o:p></span></font></p>

<p style=3D'margin-bottom:12.0pt'><font size=3D3 face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt'>Hi Group,<br>
<br>
According to IKEv2bis-04, section 2.3<br>
<br>
-----------------------------------------<o:p></o:p></span></font></p>

<pre><font size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&=
nbsp;&nbsp; An IKE endpoint MUST NOT exceed the peer's stated window size f=
or<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&nbsp;&nbsp;=
 transmitted IKE requests.&nbsp; In other words, if the responder stated<br=
>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&nbsp;&nbsp;=
 its window size is N, then when the initiator needs to make a request<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&nbsp;&nbsp;=
 X, it MUST wait until it has received responses to all requests up<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&nbsp;&nbsp;=
 through request X-N.&nbsp; An IKE endpoint MUST keep a copy of (or be able=
<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&nbsp;&nbsp;=
 to regenerate exactly) each request it has sent until it receives the<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&nbsp;&nbsp;=
 corresponding response.&nbsp; An IKE endpoint MUST keep a copy of (or be<b=
r>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&nbsp;&nbsp;=
 able to regenerate exactly) the number of previous responses equal to<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&nbsp;&nbsp;=
 its declared window size in case its response was lost and the<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&nbsp;&nbsp;=
 initiator requests its retransmission by retransmitting the request.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>------------=
----------------<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>Now, suppose=
 responder window size is N.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>Initiator se=
nd a request (X-N) but Initiator does get <br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>response for=
 request no (X-N) say due to n/w flapping.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>So initiator=
 schedules this request for re-transmissions <br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>but between =
the time intervals of re-transmission n/w comes UP <br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>and request =
no. (X-N+1) to (X) goes fine i.e. these request get response.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>Now, initiat=
or wants to make another request i.e. request no.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>(X+1). But a=
ccording to draft it can't make that request as it has<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>not received=
 the response for request no (X-N) even though there is <br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>only one out=
standing request in transit.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>Also draft s=
ays:<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>------------=
---------------<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&nbsp;The SE=
T_WINDOW_SIZE notification asserts that the sending endpoint is<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&nbsp;&nbsp;=
 capable of keeping state for multiple outstanding exchanges,<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&nbsp;&nbsp;=
 permitting the recipient to send multiple requests before getting a<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'>&nbsp;&nbsp;=
 response to the first.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D2 face=3D"Courier New"><sp=
an
style=3D'font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>------------=
------------<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>That means w=
indowing is for outstanding request.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>So in above =
mentioned scenario even though there is only 1<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>outstanding =
request and window size is N but we are not able to send<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>next request=
 because of windowing definition.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>Maybe i am m=
issing something here.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'>Please elabo=
rate the on the behavior in above scenario.<br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre><font
size=3D4 face=3D"Courier New"><span style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre><font size=3D4 face=3D"Courier New"><sp=
an
style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></span></font></pre><pre
style=3D'margin-bottom:12.0pt'><font size=3D4 face=3D"Courier New"><span
style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre style=3D'margin-bottom:12.0pt'><font si=
ze=3D4
face=3D"Courier New"><span style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre style=3D'margin-bottom:12.0pt'><font si=
ze=3D4
face=3D"Courier New"><span style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></sp=
an></font></pre><pre
style=3D'margin-bottom:12.0pt'><font size=3D4 face=3D"Courier New"><span
style=3D'font-size:13.5pt'>Regards,<br>
<br>
<o:p></o:p></span></font></pre><pre style=3D'margin-bottom:12.0pt'><font si=
ze=3D4
face=3D"Courier New"><span style=3D'font-size:13.5pt'><br>
<br>
<o:p></o:p></span></font></pre><pre style=3D'margin-bottom:12.0pt'><font si=
ze=3D4
face=3D"Courier New"><span style=3D'font-size:13.5pt'><o:p>&nbsp;</o:p></sp=
an></font></pre><pre
style=3D'margin-bottom:12.0pt'><font size=3D4 face=3D"Courier New"><span
style=3D'font-size:13.5pt'>Raj </span></font><o:p></o:p></pre></div>

</div>

<p style=3D'margin-bottom:12.0pt'><font size=3D3 face=3D"Times New Roman"><=
span
style=3D'font-size:12.0pt'><br>
<br>
Scanned by Check Point Total Security Gateway. <o:p></o:p></span></font></p=
>

</div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
Email secured by Check Point <o:p></o:p></span></font></p>

</div>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span style=3D=
'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
Email secured by Check Point <o:p></o:p></span></font></p>

</div>


<br>=
=0D=0A
<br>Email secured by Check Point=0D=0A
<br>
<br>=
</body>

</html>

--_000_006FEB08D9C6444AB014105C9AEB133F608151F7F5ilex01adcheck_--

From ssmurthy.nittala@freescale.com  Thu Jul 23 07:58:02 2009
Return-Path: <ssmurthy.nittala@freescale.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C67EA3A6939 for <ipsec@core3.amsl.com>; Thu, 23 Jul 2009 07:58:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.416
X-Spam-Level: 
X-Spam-Status: No, score=0.416 tagged_above=-999 required=5 tests=[BAYES_40=-0.185, HTML_MESSAGE=0.001, J_CHICKENPOX_33=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MQnwpi4GCNxD for <ipsec@core3.amsl.com>; Thu, 23 Jul 2009 07:58:02 -0700 (PDT)
Received: from az33egw02.freescale.net (az33egw02.freescale.net [192.88.158.103]) by core3.amsl.com (Postfix) with ESMTP id E77A73A687C for <ipsec@ietf.org>; Thu, 23 Jul 2009 07:58:01 -0700 (PDT)
Received: from de01smr02.am.mot.com (de01smr02.freescale.net [10.208.0.151]) by az33egw02.freescale.net (8.14.3/az33egw02) with ESMTP id n6NEV34s023051 for <ipsec@ietf.org>; Thu, 23 Jul 2009 07:31:21 -0700 (MST)
Received: from zin33exm29.fsl.freescale.net (zin33exm29.ap.freescale.net [10.232.192.28]) by de01smr02.am.mot.com (8.13.1/8.13.0) with ESMTP id n6NEV2RF026718 for <ipsec@ietf.org>; Thu, 23 Jul 2009 09:31:03 -0500 (CDT)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01CA0BA2.32BFB51C"
Date: Thu, 23 Jul 2009 20:00:57 +0530
Message-ID: <2E13B90533934A499FD727F9B353613C261485@zin33exm29.fsl.freescale.net>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: assignment of IPV6 prefixes in road warrior scenarios
Thread-Index: AcoLojE9bx4noQfSTE2UJRGliSZW8Q==
From: "Murthy N Srinivas-B22237" <ssmurthy.nittala@freescale.com>
To: <ipsec@ietf.org>
X-Brightmail-Tracker: AAAAAQAAAWE=
X-Brightmail-Tracker: AAAAAQAAAWE=
Subject: [IPsec] assignment of IPV6 prefixes in road warrior scenarios
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Jul 2009 14:58:02 -0000

This is a multi-part message in MIME format.

------_=_NextPart_001_01CA0BA2.32BFB51C
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

Hi,
=20
Can hosts behind road-warrior client  communicate with hosts on the IRAS
side?
If yes,how do we assign IPV6 addresses to such clients behind
road-warrior client from IRAS?
Is there any facility to configure ipv6 prefixes from IRAS  to
road-warrior client so that this client=20
can serve prefixes to hosts behind it?=20
=20
Thanks in advance
-ns murthy

------_=_NextPart_001_01CA0BA2.32BFB51C
Content-Type: text/html;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.2900.3562" name=3DGENERATOR></HEAD>
<BODY>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D140181814-23072009>Hi,</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D140181814-23072009></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D140181814-23072009>Can =
hosts=20
behind&nbsp;road-warrior&nbsp;client&nbsp;&nbsp;communicate with hosts =
on the=20
IRAS side?</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D140181814-23072009>If =
yes,how do we=20
assign IPV6 addresses to such clients behind road-warrior client from=20
IRAS?</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D140181814-23072009>Is =
there any=20
facility to configure ipv6 prefixes from&nbsp;IRAS =
&nbsp;to&nbsp;road-warrior=20
client so that this client </SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D140181814-23072009>can =
serve prefixes=20
to hosts behind it?&nbsp;</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D140181814-23072009></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D140181814-23072009>Thanks =
in=20
advance</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D140181814-23072009>-ns=20
murthy</SPAN></FONT></DIV></BODY></HTML>

------_=_NextPart_001_01CA0BA2.32BFB51C--

From ssmurthy.nittala@freescale.com  Thu Jul 23 08:12:52 2009
Return-Path: <ssmurthy.nittala@freescale.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AD0F73A6B34 for <ipsec@core3.amsl.com>; Thu, 23 Jul 2009 08:12:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.047
X-Spam-Level: 
X-Spam-Status: No, score=-0.047 tagged_above=-999 required=5 tests=[AWL=0.463,  BAYES_05=-1.11, HTML_MESSAGE=0.001, J_CHICKENPOX_33=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oF2u1EGPwe5h for <ipsec@core3.amsl.com>; Thu, 23 Jul 2009 08:12:52 -0700 (PDT)
Received: from az33egw02.freescale.net (az33egw02.freescale.net [192.88.158.103]) by core3.amsl.com (Postfix) with ESMTP id F2CD23A6A85 for <ipsec@ietf.org>; Thu, 23 Jul 2009 08:12:51 -0700 (PDT)
Received: from de01smr02.am.mot.com (de01smr02.freescale.net [10.208.0.151]) by az33egw02.freescale.net (8.14.3/az33egw02) with ESMTP id n6NEkcPH027239 for <ipsec@ietf.org>; Thu, 23 Jul 2009 07:46:39 -0700 (MST)
Received: from zin33exm29.fsl.freescale.net (zin33exm29.ap.freescale.net [10.232.192.28]) by de01smr02.am.mot.com (8.13.1/8.13.0) with ESMTP id n6NEkbZb027412 for <ipsec@ietf.org>; Thu, 23 Jul 2009 09:46:39 -0500 (CDT)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01CA0BA4.6064E2E8"
Date: Thu, 23 Jul 2009 20:16:33 +0530
Message-ID: <2E13B90533934A499FD727F9B353613C261486@zin33exm29.fsl.freescale.net>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: assignment of IPV6 prefixes in road warrior scenarios
Thread-Index: AcoLpF80x12Pq8j5Qiioeh5m3swTHQ==
From: "Murthy N Srinivas-B22237" <ssmurthy.nittala@freescale.com>
To: <ipsec@ietf.org>
X-Brightmail-Tracker: AAAAAQAAAWE=
X-Brightmail-Tracker: AAAAAQAAAWE=
Subject: [IPsec] assignment of IPV6 prefixes in road warrior scenarios
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Jul 2009 15:12:52 -0000

This is a multi-part message in MIME format.

------_=_NextPart_001_01CA0BA4.6064E2E8
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

Hi,
=20
Can hosts behind road-warrior client  communicate with hosts on the IRAS
side?
If yes,how do we assign IPV6 addresses to such clients behind
road-warrior client from IRAS?
Is there any facility to configure ipv6 prefixes from IRAS  to
road-warrior client so that this client=20
can serve prefixes to hosts behind it?=20
=20
Thanks in advance
-ns murthy

------_=_NextPart_001_01CA0BA4.6064E2E8
Content-Type: text/html;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.2900.3562" name=3DGENERATOR></HEAD>
<BODY>
<DIV><FONT face=3DArial size=3D2>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D140181814-23072009>Hi,</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D140181814-23072009></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D140181814-23072009>Can =
hosts=20
behind&nbsp;road-warrior&nbsp;client&nbsp;&nbsp;communicate with hosts =
on the=20
IRAS side?</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D140181814-23072009>If =
yes,how do we=20
assign IPV6 addresses to such clients behind road-warrior client from=20
IRAS?</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D140181814-23072009>Is =
there any=20
facility to configure ipv6 prefixes from&nbsp;IRAS =
&nbsp;to&nbsp;road-warrior=20
client so that this client </SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D140181814-23072009>can =
serve prefixes=20
to hosts behind it?&nbsp;</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D140181814-23072009></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D140181814-23072009>Thanks =
in=20
advance</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D140181814-23072009>-ns=20
murthy</SPAN></FONT></DIV></FONT></DIV></BODY></HTML>

------_=_NextPart_001_01CA0BA4.6064E2E8--

From kivinen@iki.fi  Sat Jul 25 09:15:07 2009
Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 47B4D3A67F2 for <ipsec@core3.amsl.com>; Sat, 25 Jul 2009 09:15:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1qwsb+rPsPsU for <ipsec@core3.amsl.com>; Sat, 25 Jul 2009 09:15:06 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) by core3.amsl.com (Postfix) with ESMTP id F21313A6876 for <ipsec@ietf.org>; Sat, 25 Jul 2009 09:15:05 -0700 (PDT)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.14.3/8.13.8) with ESMTP id n6PGExc0012094 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 25 Jul 2009 19:14:59 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.14.3/8.12.11) id n6PGExpO014318; Sat, 25 Jul 2009 19:14:59 +0300 (EEST)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <19051.12163.335927.934631@fireball.kivinen.iki.fi>
Date: Sat, 25 Jul 2009 19:14:59 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Greg Daley <hoskuld@hotmail.com>
In-Reply-To: <BAY114-W46C914B413819B5E72C1DCAD2D0@phx.gbl>
References: <BAY114-W46C914B413819B5E72C1DCAD2D0@phx.gbl>
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 13 min
X-Total-Time: 13 min
Cc: ipsec@ietf.org
Subject: [IPsec] New draft about issues in alternative Traffic Selectors in IPSec/IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 Jul 2009 16:15:07 -0000

Greg Daley writes:
> A new draft has been published regarding the use of non-traditional
> traffic selectors in IPsec.   This document discusses some of the
> issues of relevance if one is to define new Traffic Selectors
> (TS Type other than 7 and 8).

I quickly read the draft, but as it didn't seem to have any actual
protocol content, it is hard to give any direct feedback.

The first example using Diffserv is completely bogus, and does not
need any changes to the traffic selectors we already have, as IPsec
architecture asnd IKEv2 already supports that. Traffic selectors are
only needed if the responder is REQUIRED to check that the incoming
traffic matches the traffic selectors. This is not the case of the
diffserv.

If implementations does what RFC4301 document describes in section 4.1
i.e. put different QoS levels to different SAs, there will not be
loosing of packets or packet reordering. The responder does not need
to know which SA is picked for which traffic to process them correctly
and everything will just work.

For returninging traffic other end picks again some different SA for
different QoS levels, and the selection can be different than what was
in other direction and everything still works, as replay windows etc
are separate in each direction. Here is relevant text from RFC4301:

----------------------------------------------------------------------
   If different classes of traffic (distinguished by Differentiated
   Services Code Point (DSCP) bits [NiBlBaBL98], [Gro02]) are sent on
   the same SA, and if the receiver is employing the optional
   anti-replay feature available in both AH and ESP, this could result
   in inappropriate discarding of lower priority packets due to the
   windowing mechanism used by this feature.  Therefore, a sender SHOULD
   put traffic of different classes, but with the same selector values,
   on different SAs to support Quality of Service (QoS) appropriately.
   To permit this, the IPsec implementation MUST permit establishment
   and maintenance of multiple SAs between a given sender and receiver,
   with the same selectors.  Distribution of traffic among these
   parallel SAs to support QoS is locally determined by the sender and
   is not negotiated by IKE.  The receiver MUST process the packets from
   the different SAs without prejudice.  These requirements apply to
   both transport and tunnel mode SAs.  In the case of tunnel mode SAs,
   the DSCP values in question appear in the inner IP header.  In
   transport mode, the DSCP value might change en route, but this should
   not cause problems with respect to IPsec processing since the value
   is not employed for SA selection and MUST NOT be checked as part of
   SA/packet validation.  However, if significant re-ordering of packets
   occurs in an SA, e.g., as a result of changes to DSCP values en
   route, this may trigger packet discarding by a receiver due to
   application of the anti-replay mechanism.
----------------------------------------------------------------------

So the first example does not require any changes to the traffic
selectors.

The second example about using MPLS label stack entry as traffic
selector would be correct use of creating new traffic selector, in
which case the new MPLS specific traffic selector could be created.
The current document does not list any format for it.

When defining traffic selectors it should be noted, at as RFC4301
supports decorrelated policies all the traffic selectors should be
such that they can be used to express full ranges. The current traffic
selectors are not doing that and that has caused problems as there is
no way to explain hole without lots of entries.

I.e. if you have two overlapping traffic selectors which one is very
specific (down to ip, protocol and port) and other is more generic
(for example any port) the current traffic selector set cannot
efficently express that, as the more generic traffic selector will
have one hole in the middle, and as formats 7 and 8 do not have
protocol ranges, there is no way to efficiently express protocols 0 ..
n-1 and n+1 .. 255.

This SHOULD NOT be repeated in any new traffic selectors. All new
traffic selectors should have ranges for all fields.

I do not think the current document yet "extendes traffic selectors to
allow more generic definitions of interesting traffic", as it does not
define any actual formats yet. 
-- 
kivinen@iki.fi

From kivinen@iki.fi  Sat Jul 25 09:50:06 2009
Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 698893A686D for <ipsec@core3.amsl.com>; Sat, 25 Jul 2009 09:50:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QnFsVRcIBYGn for <ipsec@core3.amsl.com>; Sat, 25 Jul 2009 09:50:05 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) by core3.amsl.com (Postfix) with ESMTP id 420653A684C for <ipsec@ietf.org>; Sat, 25 Jul 2009 09:50:05 -0700 (PDT)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.14.3/8.13.8) with ESMTP id n6PGnxps014597 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 25 Jul 2009 19:49:59 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.14.3/8.12.11) id n6PGnwhp014672; Sat, 25 Jul 2009 19:49:58 +0300 (EEST)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <19051.14262.929788.317581@fireball.kivinen.iki.fi>
Date: Sat, 25 Jul 2009 19:49:58 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <p06240828c67c1fab51c3@[10.20.30.158]>
References: <p06240828c67c1fab51c3@[10.20.30.158]>
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 3 min
X-Total-Time: 10 min
Cc: IPsecme WG <ipsec@ietf.org>
Subject: [IPsec] Fwd: Last Call: draft-solinas-rfc4753bis (ECP Groups for	IKE and
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 Jul 2009 16:50:06 -0000

Paul Hoffman writes:
> >IKEv2) to Informational RFC
> >
> >The IESG has received a request from an individual submitter to consider
> >the following document:
> >
> >- 'ECP Groups for IKE and IKEv2 '
> >   <draft-solinas-rfc4753bis-00.txt> as an Informational RFC
> >
> >The IESG plans to make a decision in the next few weeks, and solicits
> >final comments on this action.  Please send substantive comments to the
> >ietf@ietf.org mailing lists by 2009-08-06. Exceptionally,
> >comments may be sent to iesg@ietf.org instead. In either case, please
> >retain the beginning of the Subject line to allow automated sorting.

I read this document, and I think it is ok.

One note is that when this document is published as RFC, we might need
to issue errata against RFC5114 to say that the format does not follow
groups specified there does not follow RFC4753 format but this new
document. Or perhaps it is enough that when implementors follow to
RFC4753, they will see it has been obsoleted by this document?
-- 
kivinen@iki.fi

From yaronf@checkpoint.com  Sun Jul 26 07:46:19 2009
Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D035B3A6A63 for <ipsec@core3.amsl.com>; Sun, 26 Jul 2009 07:46:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.222
X-Spam-Level: 
X-Spam-Status: No, score=-2.222 tagged_above=-999 required=5 tests=[AWL=0.376,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DGwNV2i-jeA0 for <ipsec@core3.amsl.com>; Sun, 26 Jul 2009 07:46:19 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id 694333A697F for <ipsec@ietf.org>; Sun, 26 Jul 2009 07:46:18 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id B986D29C005; Sun, 26 Jul 2009 17:46:35 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 7E90E29C002 for <ipsec@ietf.org>; Sun, 26 Jul 2009 17:46:35 +0300 (IDT)
X-CheckPoint: {4A6C6AFE-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n6QEkH3d021530 for <ipsec@ietf.org>; Sun, 26 Jul 2009 17:46:18 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Sun, 26 Jul 2009 17:46:17 +0300
From: Yaron Sheffer <yaronf@checkpoint.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Date: Sun, 26 Jul 2009 17:46:15 +0300
Thread-Topic: Audio streaming for tomorrow's meeting
Thread-Index: AcoN/9PXtiDKj3HaQVakyiN3zMWBPg==
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC801295379A109@il-ex01.ad.checkpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_007C_01CA0E10.97675E40"
MIME-Version: 1.0
Subject: [IPsec] Audio streaming for tomorrow's meeting
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 Jul 2009 14:46:19 -0000

------=_NextPart_000_007C_01CA0E10.97675E40
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_007D_01CA0E10.97675E40"


------=_NextPart_001_007D_01CA0E10.97675E40
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi,

 

The streaming URLs have not been posted yet, but the list was sent to the
general discussion list, here:
http://www.ietf.org/mail-archive/web/ietf/current/msg57766.html (ipsecme
will be at room 307).

 

Thanks,

            Yaron


------=_NextPart_001_007D_01CA0E10.97675E40
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:Arial;
	color:windowtext;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Hi,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>The streaming URLs have not been posted yet, but the =
list was
sent to the general discussion list, here: </span></font><a
href=3D"http://www.ietf.org/mail-archive/web/ietf/current/msg57766.html">=
http://www.ietf.org/mail-archive/web/ietf/current/msg57766.html</a>
(ipsecme will be at room 307).<o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>Thanks,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
; Yaron</span></font><font size=3D2 face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'><o:p></o:p></span></font></p=
>

</div>

</body>

</html>

------=_NextPart_001_007D_01CA0E10.97675E40--

------=_NextPart_000_007C_01CA0E10.97675E40
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_007C_01CA0E10.97675E40--

From hoskuld@hotmail.com  Sun Jul 26 21:57:17 2009
Return-Path: <hoskuld@hotmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8F89B28B23E for <ipsec@core3.amsl.com>; Sun, 26 Jul 2009 21:57:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JKkdFjHypLya for <ipsec@core3.amsl.com>; Sun, 26 Jul 2009 21:57:16 -0700 (PDT)
Received: from bay0-omc2-s39.bay0.hotmail.com (bay0-omc2-s39.bay0.hotmail.com [65.54.246.175]) by core3.amsl.com (Postfix) with ESMTP id 2443A3A69BF for <ipsec@ietf.org>; Sun, 26 Jul 2009 21:57:16 -0700 (PDT)
Received: from BAY114-W39 ([65.54.169.139]) by bay0-omc2-s39.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959);  Sun, 26 Jul 2009 21:57:17 -0700
Message-ID: <BAY114-W3933A2D1014068248CD9B2AD140@phx.gbl>
X-Originating-IP: [203.8.7.222]
From: Greg Daley <hoskuld@hotmail.com>
To: <kivinen@iki.fi>
Date: Mon, 27 Jul 2009 14:57:17 +1000
Importance: Normal
In-Reply-To: <19051.12163.335927.934631@fireball.kivinen.iki.fi>
References: <BAY114-W46C914B413819B5E72C1DCAD2D0@phx.gbl> <19051.12163.335927.934631@fireball.kivinen.iki.fi>
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginalArrivalTime: 27 Jul 2009 04:57:17.0734 (UTC) FILETIME=[B747B460:01CA0E76]
Cc: ipsec@ietf.org
Subject: Re: [IPsec] New draft about issues in alternative Traffic Selectors in IPSec/IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jul 2009 04:57:17 -0000

Hi Tero=2C=20

Thanks for your feedback.  As you pointed out=2C there are no formats defin=
ed
in this document (and perhaps the Abstract needs to be updated to reflect t=
hat).

At this stage=2C we were much more interested in getting feedback as to whi=
ch
problems are real and solvable.

Apologies about misleading with respect to the DSCP example.

I think what I was trying to identify with DSCP is that there's an=20
underlying lack of expression of QoS related policy in the existing=20
Traffic Selectors=2C which mismatches the expression permissible in some SP=
Ds.

Your reference to 4301 regarding the use of multiple parallel SAs solving
the example is helpful.  I will remove the example for clarity.

My feeling is that the selectors cannot express the case where specific=20
traffic is to be encrypted/authenticated and others are not though.
For example=2C if EF and AF31 are to be encrypted but other data is to trav=
el clear.

Do you think this is sufficiently covered by the current definitions?  This=
 seems
more like your example with regard to protocol numbers.

I will try to cover your concerns on ensuring decorrelated selectors in the=
 next=20
revision.

With respect to defining formats=2C we will probably look at a separate fol=
low up
document to identify any specific Traffic Selectors.  This would probably b=
e clearer.

Please let me know if you think the definitions should be held within this =
document instead.

Thanks again=2C

Greg Daley



----------------------------------------
> Date: Sat=2C 25 Jul 2009 19:14:59 +0300
> From: kivinen@iki.fi
> To: hoskuld@hotmail.com
> CC: ipsec@ietf.org
> Subject: [IPsec] New draft about issues in alternative Traffic Selectors =
in IPSec/IKEv2
>
> Greg Daley writes:
>> A new draft has been published regarding the use of non-traditional
>> traffic selectors in IPsec. This document discusses some of the
>> issues of relevance if one is to define new Traffic Selectors
>> (TS Type other than 7 and 8).
>
> I quickly read the draft=2C but as it didn't seem to have any actual
> protocol content=2C it is hard to give any direct feedback.


> The first example using Diffserv is completely bogus=2C and does not
> need any changes to the traffic selectors we already have=2C as IPsec
> architecture asnd IKEv2 already supports that. Traffic selectors are
> only needed if the responder is REQUIRED to check that the incoming
> traffic matches the traffic selectors. This is not the case of the
> diffserv.
>
> If implementations does what RFC4301 document describes in section 4.1
> i.e. put different QoS levels to different SAs=2C there will not be
> loosing of packets or packet reordering. The responder does not need
> to know which SA is picked for which traffic to process them correctly
> and everything will just work.
>
> For returninging traffic other end picks again some different SA for
> different QoS levels=2C and the selection can be different than what was
> in other direction and everything still works=2C as replay windows etc
> are separate in each direction. Here is relevant text from RFC4301:
>
> ----------------------------------------------------------------------
> If different classes of traffic (distinguished by Differentiated
> Services Code Point (DSCP) bits [NiBlBaBL98]=2C [Gro02]) are sent on
> the same SA=2C and if the receiver is employing the optional
> anti-replay feature available in both AH and ESP=2C this could result
> in inappropriate discarding of lower priority packets due to the
> windowing mechanism used by this feature. Therefore=2C a sender SHOULD
> put traffic of different classes=2C but with the same selector values=2C
> on different SAs to support Quality of Service (QoS) appropriately.
> To permit this=2C the IPsec implementation MUST permit establishment
> and maintenance of multiple SAs between a given sender and receiver=2C
> with the same selectors. Distribution of traffic among these
> parallel SAs to support QoS is locally determined by the sender and
> is not negotiated by IKE. The receiver MUST process the packets from
> the different SAs without prejudice. These requirements apply to
> both transport and tunnel mode SAs. In the case of tunnel mode SAs=2C
> the DSCP values in question appear in the inner IP header. In
> transport mode=2C the DSCP value might change en route=2C but this should
> not cause problems with respect to IPsec processing since the value
> is not employed for SA selection and MUST NOT be checked as part of
> SA/packet validation. However=2C if significant re-ordering of packets
> occurs in an SA=2C e.g.=2C as a result of changes to DSCP values en
> route=2C this may trigger packet discarding by a receiver due to
> application of the anti-replay mechanism.
> ----------------------------------------------------------------------
>
> So the first example does not require any changes to the traffic
> selectors.
>
> The second example about using MPLS label stack entry as traffic
> selector would be correct use of creating new traffic selector=2C in
> which case the new MPLS specific traffic selector could be created.
> The current document does not list any format for it.
>
> When defining traffic selectors it should be noted=2C at as RFC4301
> supports decorrelated policies all the traffic selectors should be
> such that they can be used to express full ranges. The current traffic
> selectors are not doing that and that has caused problems as there is
> no way to explain hole without lots of entries.
>
> I.e. if you have two overlapping traffic selectors which one is very
> specific (down to ip=2C protocol and port) and other is more generic
> (for example any port) the current traffic selector set cannot
> efficently express that=2C as the more generic traffic selector will
> have one hole in the middle=2C and as formats 7 and 8 do not have
> protocol ranges=2C there is no way to efficiently express protocols 0 ..
> n-1 and n+1 .. 255.
>
> This SHOULD NOT be repeated in any new traffic selectors. All new
> traffic selectors should have ranges for all fields.
>
> I do not think the current document yet "extendes traffic selectors to
> allow more generic definitions of interesting traffic"=2C as it does not
> define any actual formats yet.
> --
> kivinen@iki.fi

_________________________________________________________________
View photos of singles in your area Click Here
http://a.ninemsn.com.au/b.aspx?URL=3Dhttp%3A%2F%2Fdating%2Eninemsn%2Ecom%2E=
au%2Fsearch%2Fsearch%2Easpx%3Fexec%3Dgo%26tp%3Dq%26gc%3D2%26tr%3D1%26lage%3=
D18%26uage%3D55%26cl%3D14%26sl%3D0%26dist%3D50%26po%3D1%26do%3D2%26tracking=
id%3D1046138%26r2s%3D1&_t=3D773166090&_r=3DHotmail_Endtext&_m=3DEXT=

From root@core3.amsl.com  Mon Jul 27 04:30:01 2009
Return-Path: <root@core3.amsl.com>
X-Original-To: ipsec@ietf.org
Delivered-To: ipsec@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 0) id 2EA6628C10E; Mon, 27 Jul 2009 04:30:01 -0700 (PDT)
From: Internet-Drafts@ietf.org
To: i-d-announce@ietf.org
Content-Type: Multipart/Mixed; Boundary="NextPart"
Mime-Version: 1.0
Message-Id: <20090727113001.2EA6628C10E@core3.amsl.com>
Date: Mon, 27 Jul 2009 04:30:01 -0700 (PDT)
Cc: ipsec@ietf.org
Subject: [IPsec] I-D Action:draft-ietf-ipsecme-aes-ctr-ikev2-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jul 2009 11:30:01 -0000

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Security Maintenance and Extensions Working Group of the IETF.


	Title           : Using Advanced Encryption Standard (AES) Counter Mode with IKEv2
	Author(s)       : S. Shen, et al.
	Filename        : draft-ietf-ipsecme-aes-ctr-ikev2-00.txt
	Pages           : 14
	Date            : 2009-07-27

This document describes the usage of Advanced Encryption Standard
Counter Mode (AES_CTR), with an explicit initialization vector, by
IKEv2 for encrypting the IKEv2 exchanges that follow the IKE_SA_INIT
exchange.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-aes-ctr-ikev2-00.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Message/External-body;
	name="draft-ietf-ipsecme-aes-ctr-ikev2-00.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2009-07-27042239.I-D@ietf.org>


--NextPart--

From paav.cisco@gmail.com  Mon Jul 27 06:34:17 2009
Return-Path: <paav.cisco@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1CAC03A6C7B for <ipsec@core3.amsl.com>; Mon, 27 Jul 2009 06:34:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KmZLkWu0DeEM for <ipsec@core3.amsl.com>; Mon, 27 Jul 2009 06:34:15 -0700 (PDT)
Received: from ey-out-2122.google.com (ey-out-2122.google.com [74.125.78.25]) by core3.amsl.com (Postfix) with ESMTP id 52F9F3A6C20 for <ipsec@ietf.org>; Mon, 27 Jul 2009 06:34:15 -0700 (PDT)
Received: by ey-out-2122.google.com with SMTP id 22so774290eye.31 for <ipsec@ietf.org>; Mon, 27 Jul 2009 06:34:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:content-type; bh=fn0zhA3DZMEI4lu46R4idGz+PDHsm0POJlh2tHp5s5k=; b=LByEM2sU6pPR7EeB/YLddRYu+4aovjq7aeeOwBrVOOTA8tF7XPV/JnBBi0JB38968E M0OJD0NAhO/VYSRb0qHAdGfNHNRQ/JLBsfADG3uaBV9rlO7B8SjNsJgoBRHJlqUWOBPq +FQpb50sEsO9VNfQlmyHtOrqPGG7RUkfwG5Gc=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; b=s67H3UKJfqMrKZ+aezSI29Bz3EY+KgE0BTTYzkfBPOrapAw/brIou+37FquQH5tuYE 1sBbTmEeuC5h3LqsXc9I+DsaTYjEPcBOn1JV7tZXFY0n/ZzULUiHGmRsHYYZEr9e56Kd ms7Zx6Pbw0ZRfzCtpZE/VjPwfWDgrGMprcuHc=
MIME-Version: 1.0
Received: by 10.210.20.17 with SMTP id 17mr8243079ebt.80.1248701653889; Mon,  27 Jul 2009 06:34:13 -0700 (PDT)
In-Reply-To: <20090727130002.0D1743A6BEB@core3.amsl.com>
References: <20090727130002.0D1743A6BEB@core3.amsl.com>
Date: Mon, 27 Jul 2009 19:04:13 +0530
Message-ID: <40e68ca20907270634g2b95dd3ep8ecd71b67a1f386f@mail.gmail.com>
From: Padmakumar AV <paav.cisco@gmail.com>
To: ipsec@ietf.org
Content-Type: multipart/alternative; boundary=0015174be73282b303046fb002cc
Subject: [IPsec] Fwd: I-D Action:draft-padmakumar-ikev2-redirect-and-auth-offload-01.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jul 2009 13:34:17 -0000

--0015174be73282b303046fb002cc
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

Hi,

We have published a new version of the IKEv2 Redirect and Authentication
Offload draft (draft-padmakumar-ikev2-redirect-and-auth-offload-01).

The draft may be accessed at:
http://www.ietf.org/internet-drafts/draft-padmakumar-ikev2-redirect-and-auth-offload-01.txt

Abstract:

IKEv2 supports multiple authentication mechanisms like public key
signatures, shared secrets and EAP.  EAP based authentication requires
server to maintain information about the client until EAP completes.  Public
key based authentication mechanisms are highly computational intensive and
demands server CPU resources.

Redirect Mechanism for IKEv2 proposes a mechanism for IKEv2 that enables a
VPN gateway to redirect the VPN client to another VPN gateway, for example,
based on the load condition.

Redirect mechanism can also be used to redirect a client to another router
(trust anchor) to do mutual authentication on behalf of the server.  This
redirection happens during the IKE_SA_INIT and server does not maintain any
information about the redirected client.  After mutual authentication Trust
anchor can redirect the client back to the server with an Access Token which
can be used as a dynamic pre- shared key between the server and client for
password based IKE_AUTH exchange.  Mechanism described here allows servers
to compute the same pre-shared key dynamically, without contacting trust
anchors, based on the information provided by the client during IKE_AUTH
exchange.  Such a mechanism is useful especially for low power devices like
handsets.  For example, a mobile node can redirect such authentications to
its home agent.  This proposal explains a mechanism to offload such
verifications to a set of less critical routers or to a service provider who
offers trust as a service.

We would appreciate your comments.

Thanks,

Pratima, Manik, Padmakumar


---------- Forwarded message ----------
From: <Internet-Drafts@ietf.org>
Date: Mon, Jul 27, 2009 at 6:30 PM
Subject: I-D Action:draft-padmakumar-ikev2-redirect-and-auth-offload-01.txt
To: i-d-announce@ietf.org


A New Internet-Draft is available from the on-line Internet-Drafts
directories.

       Title           : IKEv2 Redirect and Authentication Offload
       Author(s)       : A. Padmakumar, et al.
       Filename        :
draft-padmakumar-ikev2-redirect-and-auth-offload-01.txt
       Pages           : 17
       Date            : 2009-07-27

IKEv2 supports multiple authentication mechanisms like public key
signatures, shared secrets and EAP.  EAP based authentication
requires server to maintain information about the client until EAP
completes.  Public key based authentication mechanisms are highly
computational intensive and demands server CPU resources.

Redirect Mechanism for IKEv2 proposes a mechanism for IKEv2 that
enables a VPN gateway to redirect the VPN client to another VPN
gateway, for example, based on the load condition.

Redirect mechanism can also be used to redirect a client to another
router (trust anchor) to do mutual authentication on behalf of the
server.  This redirection happens during the IKE_SA_INIT and server
does not maintain any information about the redirected client.  After
mutual authentication Trust anchor can redirect the client back to
the server with an Access Token which can be used as a dynamic pre-
shared key between the server and client for password based IKE_AUTH
exchange.  Mechanism described here allows servers to compute the
same pre-shared key dynamically, without contacting trust anchors,
based on the information provided by the client during IKE_AUTH
exchange.  Such a mechanism is useful especially for low power
devices like handsets.  For example, a mobile node can redirect such
authentications to its home agent.  This proposal explains a
mechanism to offload such verifications to a set of less critical
routers or to a service provider who offers trust as a service.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-padmakumar-ikev2-redirect-and-auth-offload-01.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.


_______________________________________________
I-D-Announce mailing list
I-D-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/i-d-announce
Internet-Draft<https://www.ietf.org/mailman/listinfo/i-d-announce%0AInternet-Draft>directories:
http://www.ietf.org/shadow.html
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt

--0015174be73282b303046fb002cc
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<p></p><p>Hi,</p><p>We have published a new version of the IKEv2 Redirect a=
nd Authentication Offload draft (draft-padmakumar-ikev2-redirect-and-auth-o=
ffload-01).</p>
<p>The draft may be accessed at:=A0<a href=3D"http://www.ietf.org/internet-=
drafts/draft-padmakumar-ikev2-redirect-and-auth-offload-01.txt" target=3D"_=
blank">http://www.ietf.org/internet-drafts/draft-padmakumar-ikev2-redirect-=
and-auth-offload-01.txt</a></p>
<p><font class=3D"Apple-style-span" color=3D"#500050"><span class=3D"Apple-=
style-span" style=3D"border-collapse: collapse;"></span></font></p><font cl=
ass=3D"Apple-style-span" color=3D"#500050"><p class=3D"MsoPlainText">Abstra=
ct:</p>

<p class=3D"MsoPlainText">IKEv2 supports multiple authentication mechanisms=
 like
public key signatures, shared secrets and EAP.<span style=3D"mso-spacerun:y=
es">=A0
</span>EAP based authentication requires server to maintain information abo=
ut
the client until EAP completes.<span style=3D"mso-spacerun:yes">=A0 </span>=
Public
key based authentication mechanisms are highly computational intensive and
demands server CPU resources.=A0</p>

<p class=3D"MsoPlainText">Redirect Mechanism for IKEv2 proposes a mechanism=
 for
IKEv2 that enables a VPN gateway to redirect the VPN client to another VPN
gateway, for example, based on the load condition.=A0</p>

<p class=3D"MsoPlainText">Redirect mechanism can also be used to redirect a=
 client
to another router (trust anchor) to do mutual authentication on behalf of t=
he
server.<span style=3D"mso-spacerun:yes">=A0 </span>This redirection happens=
 during
the IKE_SA_INIT and server does not maintain any information about the
redirected client.<span style=3D"mso-spacerun:yes">=A0 </span>After mutual
authentication Trust anchor can redirect the client back to the server with=
 an
Access Token which can be used as a dynamic pre- shared key between the ser=
ver
and client for password based IKE_AUTH exchange.<span style=3D"mso-spacerun=
:yes">=A0 </span>Mechanism described here allows servers to
compute the same pre-shared key dynamically, without contacting trust ancho=
rs, based
on the information provided by the client during IKE_AUTH exchange.<span st=
yle=3D"mso-spacerun:yes">=A0 </span>Such a mechanism is useful especially f=
or low
power devices like handsets.<span style=3D"mso-spacerun:yes">=A0 </span>For
example, a mobile node can redirect such authentications to its home
agent.<span style=3D"mso-spacerun:yes">=A0 </span>This proposal explains a
mechanism to offload such verifications to a set of less critical routers o=
r to
a service provider who offers trust as a service.</p></font><p></p>
<p>We would appreciate your comments.</p><p>Thanks,</p><p>Pratima, Manik, P=
admakumar</p><p><br></p><p></p><div class=3D"gmail_quote">---------- Forwar=
ded message ----------<br>
From: <b class=3D"gmail_sendername"></b> <span dir=3D"ltr">&lt;<a href=3D"m=
ailto:Internet-Drafts@ietf.org" target=3D"_blank">Internet-Drafts@ietf.org<=
/a>&gt;</span><br>Date: Mon, Jul 27, 2009 at 6:30 PM<br>Subject: I-D Action=
:draft-padmakumar-ikev2-redirect-and-auth-offload-01.txt<br>

To: <a href=3D"mailto:i-d-announce@ietf.org" target=3D"_blank">i-d-announce=
@ietf.org</a><br><br><br>A New Internet-Draft is available from the on-line=
 Internet-Drafts directories.<br>
<br>
 =A0 =A0 =A0 =A0Title =A0 =A0 =A0 =A0 =A0 : IKEv2 Redirect and Authenticati=
on Offload<br>
 =A0 =A0 =A0 =A0Author(s) =A0 =A0 =A0 : A. Padmakumar, et al.<br>
 =A0 =A0 =A0 =A0Filename =A0 =A0 =A0 =A0: draft-padmakumar-ikev2-redirect-a=
nd-auth-offload-01.txt<br>
 =A0 =A0 =A0 =A0Pages =A0 =A0 =A0 =A0 =A0 : 17<br>
 =A0 =A0 =A0 =A0Date =A0 =A0 =A0 =A0 =A0 =A0: 2009-07-27<br>
<br>
IKEv2 supports multiple authentication mechanisms like public key<br>
signatures, shared secrets and EAP. =A0EAP based authentication<br>
requires server to maintain information about the client until EAP<br>
completes. =A0Public key based authentication mechanisms are highly<br>
computational intensive and demands server CPU resources.<br>
<br>
Redirect Mechanism for IKEv2 proposes a mechanism for IKEv2 that<br>
enables a VPN gateway to redirect the VPN client to another VPN<br>
gateway, for example, based on the load condition.<br>
<br>
Redirect mechanism can also be used to redirect a client to another<br>
router (trust anchor) to do mutual authentication on behalf of the<br>
server. =A0This redirection happens during the IKE_SA_INIT and server<br>
does not maintain any information about the redirected client. =A0After<br>
mutual authentication Trust anchor can redirect the client back to<br>
the server with an Access Token which can be used as a dynamic pre-<br>
shared key between the server and client for password based IKE_AUTH<br>
exchange. =A0Mechanism described here allows servers to compute the<br>
same pre-shared key dynamically, without contacting trust anchors,<br>
based on the information provided by the client during IKE_AUTH<br>
exchange. =A0Such a mechanism is useful especially for low power<br>
devices like handsets. =A0For example, a mobile node can redirect such<br>
authentications to its home agent. =A0This proposal explains a<br>
mechanism to offload such verifications to a set of less critical<br>
routers or to a service provider who offers trust as a service.<br>
<br>
A URL for this Internet-Draft is:<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-padmakumar-ikev2-redir=
ect-and-auth-offload-01.txt" target=3D"_blank">http://www.ietf.org/internet=
-drafts/draft-padmakumar-ikev2-redirect-and-auth-offload-01.txt</a><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
<br><br>_______________________________________________<br>
I-D-Announce mailing list<br>
<a href=3D"mailto:I-D-Announce@ietf.org" target=3D"_blank">I-D-Announce@iet=
f.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i-d-announce%0AInternet-Dr=
aft" target=3D"_blank">https://www.ietf.org/mailman/listinfo/i-d-announce<b=
r>
Internet-Draft</a> directories: <a href=3D"http://www.ietf.org/shadow.html"=
 target=3D"_blank">http://www.ietf.org/shadow.html</a><br>
or <a href=3D"ftp://ftp.ietf.org/ietf/1shadow-sites.txt" target=3D"_blank">=
ftp://ftp.ietf.org/ietf/1shadow-sites.txt</a><br>
<br></div><br>

--0015174be73282b303046fb002cc--

From kent@bbn.com  Mon Jul 27 08:20:27 2009
Return-Path: <kent@bbn.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DB5B928C1B9 for <ipsec@core3.amsl.com>; Mon, 27 Jul 2009 08:20:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.516
X-Spam-Level: 
X-Spam-Status: No, score=-2.516 tagged_above=-999 required=5 tests=[AWL=0.083,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I9oZsObGyvNM for <ipsec@core3.amsl.com>; Mon, 27 Jul 2009 08:20:27 -0700 (PDT)
Received: from mx3.bbn.com (mx3.bbn.com [128.33.1.81]) by core3.amsl.com (Postfix) with ESMTP id 1DC5F3A6AD4 for <ipsec@ietf.org>; Mon, 27 Jul 2009 08:20:27 -0700 (PDT)
Received: from dommiel.bbn.com ([192.1.122.15] helo=[78.64.88.74]) by mx3.bbn.com with esmtp (Exim 4.63) (envelope-from <kent@bbn.com>) id 1MVRzo-0000wl-B3; Mon, 27 Jul 2009 11:20:12 -0400
Mime-Version: 1.0
Message-Id: <p06240802c692ff4b4807@[78.64.88.74]>
In-Reply-To: <BAY114-W3933A2D1014068248CD9B2AD140@phx.gbl>
References: <BAY114-W46C914B413819B5E72C1DCAD2D0@phx.gbl> <19051.12163.335927.934631@fireball.kivinen.iki.fi> <BAY114-W3933A2D1014068248CD9B2AD140@phx.gbl>
Date: Mon, 27 Jul 2009 11:20:09 -0400
To: Greg Daley <hoskuld@hotmail.com>
From: Stephen Kent <kent@bbn.com>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
Cc: ipsec@ietf.org, kivinen@iki.fi
Subject: Re: [IPsec] New draft about issues in alternative Traffic Selectors in IPSec/IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jul 2009 15:20:27 -0000

At 2:57 PM +1000 7/27/09, Greg Daley wrote:
...

>Your reference to 4301 regarding the use of multiple parallel SAs solving
>the example is helpful.  I will remove the example for clarity.

As Tero noted, RFC 4301 provides a discussion of how an 
implementation can, on a local basis, deal with mapping traffic of 
different priorities to different SAs, without the need to define 
additional traffic selectors.  That's why it has not been seen as 
necessary to create traffic selectors for this purpose.

>My feeling is that the selectors cannot express the case where specific
>traffic is to be encrypted/authenticated and others are not though.
>For example, if EF and AF31 are to be encrypted but other data is to 
>travel clear.
>
>Do you think this is sufficiently covered by the current 
>definitions?  This seems
>more like your example with regard to protocol numbers.

The protocol number example refers to the fact that we cannot express 
protocol  number ranges in IKE, and that caused us to remove support 
for this feature from IPsec. IO agree with Tero that, going forward, 
we should require support for ranges of values for ALL new TS values 
that we define.

If you are asking whether IPsec supports a policy where the basis for 
protecting traffic is exclusively a DSCP, the answer is no. It also 
is not clear that the ability to do so is a real requirement.

Steve

From yaronf@checkpoint.com  Mon Jul 27 12:06:38 2009
Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 97ADF3A6B31 for <ipsec@core3.amsl.com>; Mon, 27 Jul 2009 12:06:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.373
X-Spam-Level: 
X-Spam-Status: No, score=-2.373 tagged_above=-999 required=5 tests=[AWL=0.226,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3ABxytLCKdKk for <ipsec@core3.amsl.com>; Mon, 27 Jul 2009 12:06:37 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id 184CC3A6AD4 for <ipsec@ietf.org>; Mon, 27 Jul 2009 12:06:37 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 181ED29C005; Mon, 27 Jul 2009 22:06:43 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id BAA4129C002 for <ipsec@ietf.org>; Mon, 27 Jul 2009 22:06:39 +0300 (IDT)
X-CheckPoint: {4A6DF963-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n6RJ6L3d008079 for <ipsec@ietf.org>; Mon, 27 Jul 2009 22:06:21 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Mon, 27 Jul 2009 22:06:21 +0300
From: Yaron Sheffer <yaronf@checkpoint.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Date: Mon, 27 Jul 2009 22:06:19 +0300
Thread-Topic: [IPsec] I-D Action:draft-ietf-ipsecme-aes-ctr-ikev2-00.txt
Thread-Index: AcoOrZi9Umfd7CZWSMqjGrxLnLh+NAAPqXFw
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC80133E557C7ED@il-ex01.ad.checkpoint.com>
References: <20090727113001.2EA6628C10E@core3.amsl.com>
In-Reply-To: <20090727113001.2EA6628C10E@core3.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0008_01CA0EFE.162695F0"
MIME-Version: 1.0
Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-aes-ctr-ikev2-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jul 2009 19:06:38 -0000

------=_NextPart_000_0008_01CA0EFE.162695F0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Thanks for getting this draft out. Here's a few comments, in general I would
like to copy RFC 3686 as much as possible. Specifically, more of Sec. 2.1 of
that RFC needs to appear here.

2.1: All IKEv2 implementations *that implement AES-CTR* MUST support...
(after all, this is a SHOULD algorithm).

3.2: RFC 4306, sec. 3.14 says the integrity checksum is a MUST in this
payload. So there's no need to justify it. Also, instead of pointing out a
"likely choice", please refer the reader to RFC 4307.

4. The second paragraph is critical to understanding how the Encrypted
Payload is created. But it's extremely unclear: is this "counter block" put
explicitly into the payload? Where? In fact, why is the counter block
different from that defined by RFC 3686?

Block Counter: the sentence "The block counter field is the least
significant 32 bits of the counter block" is confusing. Why not just say
that the counter is 32 bits, and it's allowed to wrap around when it reaches
0xFFFF.

Thanks,
	Yaron

> -----Original Message-----
> From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of
> Internet-Drafts@ietf.org
> Sent: Monday, July 27, 2009 13:30
> To: i-d-announce@ietf.org
> Cc: ipsec@ietf.org
> Subject: [IPsec] I-D Action:draft-ietf-ipsecme-aes-ctr-ikev2-00.txt
> 
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the IP Security Maintenance and Extensions
> Working Group of the IETF.
> 
> 
> 	Title           : Using Advanced Encryption Standard (AES) Counter
> Mode with IKEv2
> 	Author(s)       : S. Shen, et al.
> 	Filename        : draft-ietf-ipsecme-aes-ctr-ikev2-00.txt
> 	Pages           : 14
> 	Date            : 2009-07-27
> 
> This document describes the usage of Advanced Encryption Standard
> Counter Mode (AES_CTR), with an explicit initialization vector, by
> IKEv2 for encrypting the IKEv2 exchanges that follow the IKE_SA_INIT
> exchange.
> 
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-aes-ctr-ikev2-
> 00.txt
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> Below is the data which will enable a MIME compliant mail reader
> implementation to automatically retrieve the ASCII version of the
> Internet-Draft.

------=_NextPart_000_0008_01CA0EFE.162695F0
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_0008_01CA0EFE.162695F0--

From sshen@huawei.com  Mon Jul 27 14:20:40 2009
Return-Path: <sshen@huawei.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CF1423A6CCD for <ipsec@core3.amsl.com>; Mon, 27 Jul 2009 14:20:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 4.35
X-Spam-Level: ****
X-Spam-Status: No, score=4.35 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, CHARSET_FARAWAY_HEADER=3.2, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, MIME_8BIT_HEADER=0.3, RDNS_NONE=0.1, SARE_SUB_ENC_GB2312=1.345]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FGg5t36P9w+i for <ipsec@core3.amsl.com>; Mon, 27 Jul 2009 14:20:39 -0700 (PDT)
Received: from szxga04-in.huawei.com (unknown [119.145.14.67]) by core3.amsl.com (Postfix) with ESMTP id B51313A6AE1 for <ipsec@ietf.org>; Mon, 27 Jul 2009 14:20:37 -0700 (PDT)
Received: from huawei.com (szxga04-in [172.24.2.12]) by szxga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0KNG0086QLXOOL@szxga04-in.huawei.com> for ipsec@ietf.org; Tue, 28 Jul 2009 05:20:13 +0800 (CST)
Received: from huawei.com ([172.17.1.36]) by szxga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0KNG002WALXONY@szxga04-in.huawei.com> for ipsec@ietf.org; Tue, 28 Jul 2009 05:20:12 +0800 (CST)
Received: from [172.24.1.6] (Forwarded-For: [78.64.88.187]) by szxmc04-in.huawei.com (mshttpd); Tue, 28 Jul 2009 05:20:12 +0800
Date: Tue, 28 Jul 2009 05:20:12 +0800
From: shenshuo 00102542 <sshen@huawei.com>
In-reply-to: <7F9A6D26EB51614FBF9F81C0DA4CFEC80133E557C7ED@il-ex01.ad.checkpoint.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Message-id: <fbb7cbeb212c7.212c7fbb7cbeb@huawei.com>
MIME-version: 1.0
X-Mailer: iPlanet Messenger Express 5.2 HotFix 2.14 (built Aug  8 2006)
Content-type: text/plain; charset=us-ascii
Content-language: zh-CN
Content-transfer-encoding: 7BIT
Content-disposition: inline
X-Accept-Language: zh-CN
Priority: normal
References: <20090727113001.2EA6628C10E@core3.amsl.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC80133E557C7ED@il-ex01.ad.checkpoint.com>
Cc: maoyu@h3c.com, ssmurthy.nittala@freescale.com
Subject: [IPsec] =?gb2312?b?u9i4tCA6UmU6ICBJLUQgQWN0aW9uOmRyYWZ0LWlldGYt?= =?gb2312?b?aXBzZWNtZS1hZXMtY3RyLWlrZXYyLTAwLnR4dA==?=
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jul 2009 21:20:40 -0000

Hi, Yaron,
Thanks for the detailed comments. We will address these following issues soon in the next version.

Sean

> Thanks for getting this draft out. Here's a few comments, in 
> general I would
> like to copy RFC 3686 as much as possible. Specifically, more of 
> Sec. 2.1 of
> that RFC needs to appear here.
> 
> 2.1: All IKEv2 implementations *that implement AES-CTR* MUST 
> support...(after all, this is a SHOULD algorithm).
> 
> 3.2: RFC 4306, sec. 3.14 says the integrity checksum is a MUST in this
> payload. So there's no need to justify it. Also, instead of 
> pointing out a
> "likely choice", please refer the reader to RFC 4307.
> 
> 4. The second paragraph is critical to understanding how the Encrypted
> Payload is created. But it's extremely unclear: is this "counter 
> block" put
> explicitly into the payload? Where? In fact, why is the counter block
> different from that defined by RFC 3686?
> 
> Block Counter: the sentence "The block counter field is the least
> significant 32 bits of the counter block" is confusing. Why not 
> just say
> that the counter is 32 bits, and it's allowed to wrap around when 
> it reaches
> 0xFFFF.
> 
> Thanks,
> 	Yaron
> 
> > -----Original Message-----
> > From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On 
> Behalf Of
> > Internet-Drafts@ietf.org
> > Sent: Monday, July 27, 2009 13:30
> > To: i-d-announce@ietf.org
> > Cc: ipsec@ietf.org
> > Subject: [IPsec] I-D Action:draft-ietf-ipsecme-aes-ctr-ikev2-00.txt
> > 
> > A New Internet-Draft is available from the on-line Internet-Drafts
> > directories.
> > This draft is a work item of the IP Security Maintenance and 
> Extensions> Working Group of the IETF.
> > 
> > 
> > 	Title           : Using Advanced Encryption Standard (AES) Counter
> > Mode with IKEv2
> > 	Author(s)       : S. Shen, et al.
> > 	Filename        : draft-ietf-ipsecme-aes-ctr-ikev2-00.txt
> > 	Pages           : 14
> > 	Date            : 2009-07-27
> > 
> > This document describes the usage of Advanced Encryption Standard
> > Counter Mode (AES_CTR), with an explicit initialization vector, by
> > IKEv2 for encrypting the IKEv2 exchanges that follow the IKE_SA_INIT
> > exchange.
> > 
> > A URL for this Internet-Draft is:
> > http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-aes-ctr-
> ikev2-
> > 00.txt
> > 
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> > 
> > Below is the data which will enable a MIME compliant mail reader
> > implementation to automatically retrieve the ASCII version of the
> > Internet-Draft.
> 

From hoskuld@hotmail.com  Mon Jul 27 16:22:16 2009
Return-Path: <hoskuld@hotmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 43ED63A69D3 for <ipsec@core3.amsl.com>; Mon, 27 Jul 2009 16:22:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.29
X-Spam-Level: 
X-Spam-Status: No, score=-2.29 tagged_above=-999 required=5 tests=[AWL=-0.310,  BAYES_00=-2.599, RCVD_IN_SORBS_WEB=0.619]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i6Hfq7WiRW1P for <ipsec@core3.amsl.com>; Mon, 27 Jul 2009 16:22:15 -0700 (PDT)
Received: from bay0-omc2-s15.bay0.hotmail.com (bay0-omc2-s15.bay0.hotmail.com [65.54.246.151]) by core3.amsl.com (Postfix) with ESMTP id 31D1D3A694C for <ipsec@ietf.org>; Mon, 27 Jul 2009 16:22:15 -0700 (PDT)
Received: from BAY114-W35 ([65.54.169.135]) by bay0-omc2-s15.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959);  Mon, 27 Jul 2009 16:22:16 -0700
Message-ID: <BAY114-W35CE66AD866870A9D25212AD140@phx.gbl>
X-Originating-IP: [203.8.7.222]
From: Greg Daley <hoskuld@hotmail.com>
To: <kent@bbn.com>
Date: Tue, 28 Jul 2009 09:22:16 +1000
Importance: Normal
In-Reply-To: <p06240802c692ff4b4807@[78.64.88.74]>
References: <BAY114-W46C914B413819B5E72C1DCAD2D0@phx.gbl> <19051.12163.335927.934631@fireball.kivinen.iki.fi> <BAY114-W3933A2D1014068248CD9B2AD140@phx.gbl>  <p06240802c692ff4b4807@[78.64.88.74]>
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginalArrivalTime: 27 Jul 2009 23:22:16.0293 (UTC) FILETIME=[144CF950:01CA0F11]
Cc: ipsec@ietf.org, kivinen@iki.fi
Subject: Re: [IPsec] New draft about issues in alternative Traffic Selectors in IPSec/IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jul 2009 23:22:16 -0000

Hi Steve=2C=20

Thanks for your feedback.

We will add focus on the ability to provide expression of ranges=2C and hol=
d off
on any DSCP related issues until there is a solid use case.

Greg

----------------------------------------
> Date: Mon=2C 27 Jul 2009 11:20:09 -0400
> To: hoskuld@hotmail.com
> From: kent@bbn.com
> CC: ipsec@ietf.org=3B kivinen@iki.fi
> Subject: Re: [IPsec] New draft about issues in alternative Traffic Select=
ors in IPSec/IKEv2
>
> At 2:57 PM +1000 7/27/09=2C Greg Daley wrote:
> ...
>
>>Your reference to 4301 regarding the use of multiple parallel SAs solving
>>the example is helpful. I will remove the example for clarity.
>
> As Tero noted=2C RFC 4301 provides a discussion of how an
> implementation can=2C on a local basis=2C deal with mapping traffic of
> different priorities to different SAs=2C without the need to define
> additional traffic selectors. That's why it has not been seen as
> necessary to create traffic selectors for this purpose.
>
>>My feeling is that the selectors cannot express the case where specific
>>traffic is to be encrypted/authenticated and others are not though.
>>For example=2C if EF and AF31 are to be encrypted but other data is to
>>travel clear.
>>
>>Do you think this is sufficiently covered by the current
>>definitions? This seems
>>more like your example with regard to protocol numbers.
>
> The protocol number example refers to the fact that we cannot express
> protocol number ranges in IKE=2C and that caused us to remove support
> for this feature from IPsec. IO agree with Tero that=2C going forward=2C
> we should require support for ranges of values for ALL new TS values
> that we define.
>
> If you are asking whether IPsec supports a policy where the basis for
> protecting traffic is exclusively a DSCP=2C the answer is no. It also
> is not clear that the ability to do so is a real requirement.
>
> Steve
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

_________________________________________________________________
What goes online=2C stays online Check the daily blob for the latest on wha=
t's happening around the web
http://windowslive.ninemsn.com.au/blog.aspx=

From scott.yoshizawa@gmail.com  Tue Jul 28 07:49:20 2009
Return-Path: <scott.yoshizawa@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 008CC3A67F6 for <ipsec@core3.amsl.com>; Tue, 28 Jul 2009 07:49:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2ssfSVt3Ugr9 for <ipsec@core3.amsl.com>; Tue, 28 Jul 2009 07:49:19 -0700 (PDT)
Received: from mail-qy0-f203.google.com (mail-qy0-f203.google.com [209.85.221.203]) by core3.amsl.com (Postfix) with ESMTP id 2E2183A6E36 for <ipsec@ietf.org>; Tue, 28 Jul 2009 07:49:19 -0700 (PDT)
Received: by qyk41 with SMTP id 41so98018qyk.29 for <ipsec@ietf.org>; Tue, 28 Jul 2009 07:49:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:date:message-id:subject :from:to:content-type:content-transfer-encoding; bh=Nu0V2gGqhcD8DGzbC5y3HaLe0GXkTXAPR0tjJM7h/0Y=; b=sv9wpo5Bm/kOqnJ4qdUCIoc8MXmzPEhe9+FglRUsDI/Gq81N+Xr8hzZSzX7AvxX2Lo QGe6gTEYQLtB5H+azNHZ6544TLqOM2s+XqK9P8V5herakM+5fZC2pbGIltbq1QCsrt9O NbvSFY5SSICHqzcN05Cdv+to0AnJh8Hu8ofDE=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type :content-transfer-encoding; b=da+CVOAOb8OB6vaLHfwFhwyr2e+O/YAe3pLih+s/w0kE8DtRJ0h15NzScJYFAeHokA 32GI46Ec5fzYDui1qhmqPKotZpTY9TL2wMeZHzxdWqXcqYp68TjzF1hsc1sMVZIfUZuB O93jCYFo71PwUx1/7yKM0VRe/wxsztvX707YA=
MIME-Version: 1.0
Received: by 10.231.17.7 with SMTP id q7mr769341iba.10.1248792546422; Tue, 28  Jul 2009 07:49:06 -0700 (PDT)
Date: Tue, 28 Jul 2009 10:49:06 -0400
Message-ID: <30ed24b10907280749v5350a9e7gad8446b97e6e527e@mail.gmail.com>
From: "Shuichi (Scott) Yoshizawa" <scott.yoshizawa@gmail.com>
To: ipsec@ietf.org
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Subject: [IPsec] Question for searching web site for x.509 bundle files?
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Jul 2009 14:51:24 -0000

Hi Group,

I'm looking for a web site which has x.509 bundle files.  I'm also
looking for tools to create or view/check the bundle files.  I want to
download the bundle files and manipulate them.  Do you have any ideas?


Scott Yoshizawa

From vijay@wichorus.com  Wed Jul 29 15:32:54 2009
Return-Path: <vijay@wichorus.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2BC8428C113 for <ipsec@core3.amsl.com>; Wed, 29 Jul 2009 15:32:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.087
X-Spam-Level: 
X-Spam-Status: No, score=0.087 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, RCVD_IN_SORBS_WEB=0.619, RCVD_NUMERIC_HELO=2.067]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ATqA3mDx+-TK for <ipsec@core3.amsl.com>; Wed, 29 Jul 2009 15:32:53 -0700 (PDT)
Received: from outbound.mse15.exchange.ms (outbound.mse15.exchange.ms [216.52.164.185]) by core3.amsl.com (Postfix) with ESMTP id 5C5EC28C11A for <ipsec@ietf.org>; Wed, 29 Jul 2009 15:32:53 -0700 (PDT)
Received: from 12.204.153.98 ([12.204.153.98]) by mse15be2.mse15.exchange.ms ([172.30.10.130]) via Exchange Front-End Server owa.mse15.exchange.ms ([172.30.10.124]) with Microsoft Exchange Server HTTP-DAV ; Wed, 29 Jul 2009 22:32:54 +0000
User-Agent: Microsoft-Entourage/12.10.0.080409
Date: Wed, 29 Jul 2009 15:32:54 -0700
From: Vijay Devarapalli <vijay@wichorus.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Message-ID: <C6961C26.96B9%vijay@wichorus.com>
Thread-Topic: Handling Redirect Loops
Thread-Index: AcoQnIN2/iNBfSAISU+b1O5XZOe5xQ==
Mime-version: 1.0
Content-type: text/plain; charset="US-ASCII"
Content-transfer-encoding: 7bit
Subject: [IPsec] Handling Redirect Loops
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Jul 2009 22:32:54 -0000

Hello,

During the IESG review of draft-ietf-ipsecme-ikev2-redirect, it was brought
up that the text about handling redirect loops should be in the main body of
the draft instead of the security considerations section. One of the ADs
also wanted some default values to detect a loop. Here is the modified text.
The changes to the original text are minor, basically adding the default
values and using "SHOULD" and "MUST" (RFC 2119 language).

7.  Handling Redirect Loops

   The client could end up getting redirected multiple times in a
   sequence, either because of wrong configuration or a DoS attack.  The
   client could even end up in a loop with two or more gateways
   redirecting the client to each other.  This could deny service to the
   client.  To prevent this, the client SHOULD be configured not to
   accept more than a certain number of redirects (MAX_REDIRECTS) within
   a short time period (REDIRECT_LOOP_DETECT_PERIOD) for a particular
   IKEv2 SA setup.  The default value for MAX_REDIRECTS configuration
   variable is 5.  The default value for REDIRECT_LOOP_DETECT_PERIOD
   configuration variable is 300 seconds.  These values MUST be
   configurable on the client.

Please let me know if any one has comments on this.

Vijay




From ynir@checkpoint.com  Wed Jul 29 21:14:36 2009
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 42BA63A6BDB for <ipsec@core3.amsl.com>; Wed, 29 Jul 2009 21:14:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZHU4pebJRECk for <ipsec@core3.amsl.com>; Wed, 29 Jul 2009 21:14:35 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id 2A5C128C121 for <ipsec@ietf.org>; Wed, 29 Jul 2009 21:13:59 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 6E9F829C005; Thu, 30 Jul 2009 07:14:17 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 2DC8F29C002; Thu, 30 Jul 2009 07:14:17 +0300 (IDT)
X-CheckPoint: {4A711C9E-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n6U4Dw3d024550; Thu, 30 Jul 2009 07:13:59 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Thu, 30 Jul 2009 07:13:58 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: "'Vijay Devarapalli'" <vijay@wichorus.com>, "ipsec@ietf.org" <ipsec@ietf.org>
Date: Thu, 30 Jul 2009 07:13:57 +0300
Thread-Topic: Handling Redirect Loops
Thread-Index: AcoQnIN2/iNBfSAISU+b1O5XZOe5xQALzvBQ
Message-ID: <006FEB08D9C6444AB014105C9AEB133F855207C896@il-ex01.ad.checkpoint.com>
References: <C6961C26.96B9%vijay@wichorus.com>
In-Reply-To: <C6961C26.96B9%vijay@wichorus.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [IPsec] Handling Redirect Loops
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jul 2009 04:14:36 -0000

Hi Vijay.

"default" is usually associated with a particular implementation or product=
. I think it would be better to say "suggested value" rather than "default =
value". Also, I don't see a point in mandating that all products should hav=
e an extra knob for setting this value. For example, for an IKEv2 client yo=
u usually try to have as little local configuration as possible, so this va=
lue may very well be hard coded.

                    The suggested value for MAX_REDIRECTS configuration
   variable is 5.  The suggested value for REDIRECT_LOOP_DETECT_PERIOD
   configuration variable is 300 seconds.  These values MAY be
   configurable on the client.


-----Original Message-----
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of V=
ijay Devarapalli
Sent: Thursday, July 30, 2009 1:33 AM
To: ipsec@ietf.org
Subject: [IPsec] Handling Redirect Loops

Hello,

During the IESG review of draft-ietf-ipsecme-ikev2-redirect, it was brought
up that the text about handling redirect loops should be in the main body o=
f
the draft instead of the security considerations section. One of the ADs
also wanted some default values to detect a loop. Here is the modified text=
.
The changes to the original text are minor, basically adding the default
values and using "SHOULD" and "MUST" (RFC 2119 language).

7.  Handling Redirect Loops

   The client could end up getting redirected multiple times in a
   sequence, either because of wrong configuration or a DoS attack.  The
   client could even end up in a loop with two or more gateways
   redirecting the client to each other.  This could deny service to the
   client.  To prevent this, the client SHOULD be configured not to
   accept more than a certain number of redirects (MAX_REDIRECTS) within
   a short time period (REDIRECT_LOOP_DETECT_PERIOD) for a particular
   IKEv2 SA setup.  The default value for MAX_REDIRECTS configuration
   variable is 5.  The default value for REDIRECT_LOOP_DETECT_PERIOD
   configuration variable is 300 seconds.  These values MUST be
   configurable on the client.

Please let me know if any one has comments on this.

Vijay


Email secured by Check Point

From vijay@wichorus.com  Wed Jul 29 22:00:14 2009
Return-Path: <vijay@wichorus.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 95E133A6B32 for <ipsec@core3.amsl.com>; Wed, 29 Jul 2009 22:00:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.633
X-Spam-Level: 
X-Spam-Status: No, score=-0.633 tagged_above=-999 required=5 tests=[AWL=-0.101, BAYES_00=-2.599, RCVD_NUMERIC_HELO=2.067]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lcxW3jcSY+e4 for <ipsec@core3.amsl.com>; Wed, 29 Jul 2009 22:00:13 -0700 (PDT)
Received: from outbound.mse15.exchange.ms (outbound.mse15.exchange.ms [216.52.164.185]) by core3.amsl.com (Postfix) with ESMTP id 596073A6A4C for <ipsec@ietf.org>; Wed, 29 Jul 2009 22:00:13 -0700 (PDT)
Received: from 67.161.28.136 ([67.161.28.136]) by mse15be2.mse15.exchange.ms ([172.30.10.130]) via Exchange Front-End Server owa.mse15.exchange.ms ([172.30.10.124]) with Microsoft Exchange Server HTTP-DAV ; Thu, 30 Jul 2009 05:00:14 +0000
User-Agent: Microsoft-Entourage/12.10.0.080409
Date: Wed, 29 Jul 2009 22:00:13 -0700
From: Vijay Devarapalli <vijay@wichorus.com>
To: Yoav Nir <ynir@checkpoint.com>, "ipsec@ietf.org" <ipsec@ietf.org>
Message-ID: <C69676ED.96F5%vijay@wichorus.com>
Thread-Topic: Handling Redirect Loops
Thread-Index: AcoQnIN2/iNBfSAISU+b1O5XZOe5xQALzvBQAAG38YQ=
In-Reply-To: <006FEB08D9C6444AB014105C9AEB133F855207C896@il-ex01.ad.checkpoint.com>
Mime-version: 1.0
Content-type: text/plain; charset="US-ASCII"
Content-transfer-encoding: 7bit
Subject: Re: [IPsec] Handling Redirect Loops
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jul 2009 05:00:15 -0000

Hi Yoav,

On 7/29/09 9:13 PM, "Yoav Nir" wrote:

> Hi Vijay.
> 
> "default" is usually associated with a particular implementation or product. I
> think it would be better to say "suggested value" rather than "default value".

"default value" is the right terminology to use here.

> Also, I don't see a point in mandating that all products should have an extra
> knob for setting this value. For example, for an IKEv2 client you usually try
> to have as little local configuration as possible, so this value may very well
> be hard coded.
> 
>                     The suggested value for MAX_REDIRECTS configuration
>    variable is 5.  The suggested value for REDIRECT_LOOP_DETECT_PERIOD
>    configuration variable is 300 seconds.  These values MAY be
>    configurable on the client.

If you want to change it "MAY", you might as well say nothing about it. A
sentence that says "These values MAY be configurable on the client" doesn't
say much. I would be fine with "SHOULD" instead of "MUST".

Vijay

> 
> 
> -----Original Message-----
> From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of
> Vijay Devarapalli
> Sent: Thursday, July 30, 2009 1:33 AM
> To: ipsec@ietf.org
> Subject: [IPsec] Handling Redirect Loops
> 
> Hello,
> 
> During the IESG review of draft-ietf-ipsecme-ikev2-redirect, it was brought
> up that the text about handling redirect loops should be in the main body of
> the draft instead of the security considerations section. One of the ADs
> also wanted some default values to detect a loop. Here is the modified text.
> The changes to the original text are minor, basically adding the default
> values and using "SHOULD" and "MUST" (RFC 2119 language).
> 
> 7.  Handling Redirect Loops
> 
>    The client could end up getting redirected multiple times in a
>    sequence, either because of wrong configuration or a DoS attack.  The
>    client could even end up in a loop with two or more gateways
>    redirecting the client to each other.  This could deny service to the
>    client.  To prevent this, the client SHOULD be configured not to
>    accept more than a certain number of redirects (MAX_REDIRECTS) within
>    a short time period (REDIRECT_LOOP_DETECT_PERIOD) for a particular
>    IKEv2 SA setup.  The default value for MAX_REDIRECTS configuration
>    variable is 5.  The default value for REDIRECT_LOOP_DETECT_PERIOD
>    configuration variable is 300 seconds.  These values MUST be
>    configurable on the client.
> 
> Please let me know if any one has comments on this.
> 
> Vijay
> 
> 
> Email secured by Check Point


From rsjenwar@gmail.com  Wed Jul 29 22:07:13 2009
Return-Path: <rsjenwar@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E59553A6A4C for <ipsec@core3.amsl.com>; Wed, 29 Jul 2009 22:07:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.112
X-Spam-Level: 
X-Spam-Status: No, score=-2.112 tagged_above=-999 required=5 tests=[AWL=-0.114, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_46=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W7cjvNkzeOl8 for <ipsec@core3.amsl.com>; Wed, 29 Jul 2009 22:07:13 -0700 (PDT)
Received: from wf-out-1314.google.com (wf-out-1314.google.com [209.85.200.171]) by core3.amsl.com (Postfix) with ESMTP id CBFCD3A6F85 for <ipsec@ietf.org>; Wed, 29 Jul 2009 22:07:12 -0700 (PDT)
Received: by wf-out-1314.google.com with SMTP id 28so346556wff.31 for <ipsec@ietf.org>; Wed, 29 Jul 2009 22:07:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:date:message-id:subject :from:to:content-type; bh=zYMzBneOEXeSBe6graTboTsByH6HH28FVPLrJq8vKhg=; b=qL+Gk5lHDiil9WLYXjOP6vNbpow8BhyziBfSiwL42GhCzt+7wbMijYYXnOUObdhoPN IAuZShRKGvqckHH5NhW9GEiobpCg6wEzgow+cAxywuMCXhcF/cITbV5+QLma0YYg2KSg 1v1XkCLH46WaDM4dZSmZSsbPKrhmjBWbDu/rc=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=FHuldWu9KljaF+P9uPHnb729M7aqCIW131/MG8lT0oKmZn0O9wlGNinYPa3t0Nw1wo 9kbIgvwyGsnidnC0zCwAwFlvnX5Fm8b0gUOu4meDBwsxh0xKO6kXvsZzv8KAtW0r7FtH 4UWYy2zaFu+DWGWxgWjKeIlf9beO55z5KTXaA=
MIME-Version: 1.0
Received: by 10.142.221.14 with SMTP id t14mr49937wfg.318.1248930432759; Wed,  29 Jul 2009 22:07:12 -0700 (PDT)
Date: Thu, 30 Jul 2009 10:37:12 +0530
Message-ID: <7ccecf670907292207s7d697d87pac793861f7453f0a@mail.gmail.com>
From: Raj Singh <rsjenwar@gmail.com>
To: ipsec@ietf.org
Content-Type: multipart/alternative; boundary=000e0cd14f90cb3779046fe546df
Subject: [IPsec] Question regarding security considerations with NAT-T scenario in IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jul 2009 05:07:14 -0000

--000e0cd14f90cb3779046fe546df
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Group,

I have question regarding security considerations with NAT-T scenario in
IKEv2.
According to ikev2-bis-04, section 2.23
---------------------------------------------------------------


      There are cases where a NAT box decides to remove mappings that
      are still alive (for example, the keepalive interval is too long,
      or the NAT box is rebooted).  To recover in these cases, hosts

      that do not support other methods of recovery such as MOBIKE
      [MOBIKE <http://tools.ietf.org/html/draft-ietf-ipsecme-ikev2bis-04#ref-MOBIKE>],
and that are not behind a NAT, SHOULD send all packets

      (including retransmission packets) to the IP address and port from
      the last valid authenticated packet from the other end (that is,
      they should dynamically update the address).  A host behind a NAT

      SHOULD NOT do this because it opens a possible denial-of-service
      attack.  Any authenticated IKE packet or any authenticated UDP-
      encapsulated ESP packet can be used to detect that the IP address

      or the port has changed.  When IKEv2 is used with MOBIKE,
      dynamically updating the addresses described above interferes with
      MOBIKE's way of recovering from the same situation, so this method

      MUST NOT be used when MOBIKE is used.  See Section 3.8
<http://tools.ietf.org/html/draft-ietf-ipsecme-ikev2bis-04#section-3.8>
of [MOBIKE <http://tools.ietf.org/html/draft-ietf-ipsecme-ikev2bis-04#ref-MOBIKE>]

      for more information.

----------------------------------------------------------------------------------------------------------

1. Initiator is behind N(P)AT and float the port to (4500, 4500)

and send IKE_AUTH  with source port 4500 now N(P)AT changes source port
as 1024 but there is a man-in-the-middle who changes the port to other
host behind N(P)AT's port say 1025, still IKE_AUTH packet is authenticated.

The responder establishes the SA with destination port as 1025 instead of
1024 and sends the reply back to destination port 1025, so it will never
reach to original initiator . So the IKE SA will does not get established
on initiator But there is no mention of this DoS attack in the draft ?

2. The draft says the host that is NOT behind NAT SHOULD send packet to
IP address and port from which it received last authenticated packet.
A host behind behind a NAT SHOULD NOT do this because it opens a
DoS attack.

But how the location of host(Behind NAT or NOT) avoid DoS attack, say
when responder is having public IP, send an UDP encapsulated packet, some
man-in-the-middle changes the port, then initiator which is behind NAT wil
use ports from packet and will never reach the responder. This is also a
DoS attack.
Please let me how location of host (behind NAT or not) helps in avoiding
DoS attack ?

Thanks & Regards,
Raj

--000e0cd14f90cb3779046fe546df
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Group,<br><br>I have question regarding security considerations with NAT=
-T scenario in IKEv2.<br>According to ikev2-bis-04, section 2.23<br>-------=
--------------------------------------------------------<br><br><br><pre>
     <font size=3D"4"> There are cases where a NAT box decides to remove ma=
ppings that<br>      are still alive (for example, the keepalive interval i=
s too long,<br>      or the NAT box is rebooted).  To recover in these case=
s, hosts<br>

      that do not support other methods of recovery such as MOBIKE<br>     =
 [<a href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme-ikev2bis-04#ref-=
MOBIKE" title=3D"&quot;IKEv2 Mobility and Multihoming Protocol (MOBIKE)&quo=
t;" target=3D"_blank">MOBIKE</a>], and that are not behind a NAT, SHOULD se=
nd all packets<br>

      (including retransmission packets) to the IP address and port from<br=
>      the last valid authenticated packet from the other end (that is,<br>=
      they should dynamically update the address).  A host behind a NAT<br>

      SHOULD NOT do this because it opens a possible denial-of-service<br> =
     attack.  Any authenticated IKE packet or any authenticated UDP-<br>   =
   encapsulated ESP packet can be used to detect that the IP address<br>

      or the port has changed.  When IKEv2 is used with MOBIKE,<br>      dy=
namically updating the addresses described above interferes with<br>      M=
OBIKE&#39;s way of recovering from the same situation, so this method<br>

      MUST NOT be used when MOBIKE is used.  See <a href=3D"http://tools.ie=
tf.org/html/draft-ietf-ipsecme-ikev2bis-04#section-3.8" target=3D"_blank">S=
ection 3.8</a> of [<a href=3D"http://tools.ietf.org/html/draft-ietf-ipsecme=
-ikev2bis-04#ref-MOBIKE" title=3D"&quot;IKEv2 Mobility and Multihoming Prot=
ocol (MOBIKE)&quot;" target=3D"_blank">MOBIKE</a>]<br>

      for more information.</font><br><br>---------------------------------=
-------------------------------------------------------------------------<b=
r><br><font size=3D"4">1.</font><font size=3D"4"> Initiator is behind N(P)A=
T and float the port to (4500, 4500)<br>

and send IKE_AUTH  with source port 4500 now N(P)AT changes </font><font si=
ze=3D"4">source port<br>as 1024 but there is a man-in-the-middle who change=
s the port to other <br>host behind N(P)AT&#39;s port say 1025, still IKE_A=
UTH packet is authenticated.<br>

The responder establishes the SA with destination port as 1025 instead of <=
br>1024 and sends the reply back to destination port 1025, so it will never=
 <br>reach to original initiator . So the IKE SA will does not get establis=
hed <br>
on initiator But there is no mention of this DoS attack in the draft ?<br><=
br>2. The draft says the host that is NOT behind NAT SHOULD send packet to<=
br>IP address and port from which it received last authenticated packet.<br=
>
A host behind behind a NAT SHOULD NOT do this because it opens a <br>DoS at=
tack. <br><br>But how the location of host(Behind NAT or NOT) avoid DoS att=
ack, say <br>when responder is having public IP, send an UDP encapsulated p=
acket, some<br>
man-in-the-middle changes the port, then initiator which is behind NAT wil<=
br>use ports from packet and will never reach the responder. This is also a=
 <br>DoS attack. <br>Please let me how location of host (behind NAT or not)=
 helps in avoiding<br>
DoS attack ?<br><br>Thanks &amp; Regards,<br>Raj<br><br></font></pre><br>

--000e0cd14f90cb3779046fe546df--

From kivinen@iki.fi  Thu Jul 30 01:36:27 2009
Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5E6A43A7192 for <ipsec@core3.amsl.com>; Thu, 30 Jul 2009 01:36:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IsGNVj1+II90 for <ipsec@core3.amsl.com>; Thu, 30 Jul 2009 01:36:26 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) by core3.amsl.com (Postfix) with ESMTP id 3D2533A6C2F for <ipsec@ietf.org>; Thu, 30 Jul 2009 01:36:26 -0700 (PDT)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.14.3/8.13.8) with ESMTP id n6U8aNu4012248 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Jul 2009 11:36:23 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.14.3/8.12.11) id n6U8aMuo013300; Thu, 30 Jul 2009 11:36:22 +0300 (EEST)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <19057.23430.850983.867001@fireball.kivinen.iki.fi>
Date: Thu, 30 Jul 2009 11:36:22 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Vijay Devarapalli <vijay@wichorus.com>
In-Reply-To: <C6961C26.96B9%vijay@wichorus.com>
References: <C6961C26.96B9%vijay@wichorus.com>
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 2 min
X-Total-Time: 1 min
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: [IPsec]  Handling Redirect Loops
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jul 2009 08:36:27 -0000

Vijay Devarapalli writes:
> 7.  Handling Redirect Loops
> 
>    The client could end up getting redirected multiple times in a
>    sequence, either because of wrong configuration or a DoS attack.  The
>    client could even end up in a loop with two or more gateways
>    redirecting the client to each other.  This could deny service to the
>    client.  To prevent this, the client SHOULD be configured not to
>    accept more than a certain number of redirects (MAX_REDIRECTS) within
>    a short time period (REDIRECT_LOOP_DETECT_PERIOD) for a particular
>    IKEv2 SA setup.  The default value for MAX_REDIRECTS configuration
>    variable is 5.  The default value for REDIRECT_LOOP_DETECT_PERIOD
>    configuration variable is 300 seconds.  These values MUST be
>    configurable on the client.

Is there really any reason to have the last "MUST" I.e. what is the
reason to force those parameters to be changeable? I do not really see
reason to change those in most cases, and if someone really uses some
really wierd setup where 5 is not enough for the max redirects, then
he can use some implementation where those are configurable...
-- 
kivinen@iki.fi

From kivinen@iki.fi  Thu Jul 30 01:46:26 2009
Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4C2B63A6C2F for <ipsec@core3.amsl.com>; Thu, 30 Jul 2009 01:46:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.299
X-Spam-Level: 
X-Spam-Status: No, score=-2.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_46=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6TGQYHXcEFyJ for <ipsec@core3.amsl.com>; Thu, 30 Jul 2009 01:46:25 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) by core3.amsl.com (Postfix) with ESMTP id 1C8DF3A69A0 for <ipsec@ietf.org>; Thu, 30 Jul 2009 01:46:24 -0700 (PDT)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.14.3/8.13.8) with ESMTP id n6U8kMgs007999 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Jul 2009 11:46:22 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.14.3/8.12.11) id n6U8kLeK015980; Thu, 30 Jul 2009 11:46:21 +0300 (EEST)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <19057.24029.777309.954522@fireball.kivinen.iki.fi>
Date: Thu, 30 Jul 2009 11:46:21 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: Raj Singh <rsjenwar@gmail.com>
In-Reply-To: <7ccecf670907292207s7d697d87pac793861f7453f0a@mail.gmail.com>
References: <7ccecf670907292207s7d697d87pac793861f7453f0a@mail.gmail.com>
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 7 min
X-Total-Time: 6 min
Cc: ipsec@ietf.org
Subject: [IPsec] Question regarding security considerations with NAT-T	scenario in IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jul 2009 08:46:26 -0000

Raj Singh writes:
> 1. Initiator is behind N(P)AT and float the port to (4500, 4500)
> 
> and send IKE_AUTH  with source port 4500 now N(P)AT changes source port
> as 1024 but there is a man-in-the-middle who changes the port to other
> host behind N(P)AT's port say 1025, still IKE_AUTH packet is authenticated.
> 
> The responder establishes the SA with destination port as 1025 instead of
> 1024 and sends the reply back to destination port 1025, so it will never
> reach to original initiator . So the IKE SA will does not get established
> on initiator But there is no mention of this DoS attack in the draft
> ?

When the initiator does not get packets, it will retrasnmit its packet
and if the man-in-the-middle attacker is no longer there it will reach
the other end and has source port of 1024. This will then be
authenticated retransmission packet for the other end which will then
retransmit its previous packet to the address where port numbers were
swapped. As the packet was not new packet it will not update the SA,
but next packet from the responder will cause it to update the port
numbers.

If the man-in-the-middle is still there then the attack is still
ongoing and he can prevent communications between two peers. He does
not even need to modify the ports, he can simply delete those
packets... 


> 2. The draft says the host that is NOT behind NAT SHOULD send packet to
> IP address and port from which it received last authenticated packet.
> A host behind behind a NAT SHOULD NOT do this because it opens a
> DoS attack.

Yes.

> But how the location of host(Behind NAT or NOT) avoid DoS attack, say
> when responder is having public IP, send an UDP encapsulated packet, some
> man-in-the-middle changes the port, then initiator which is behind NAT wil
> use ports from packet and will never reach the responder. This is also a
> DoS attack.
> Please let me how location of host (behind NAT or not) helps in avoiding
> DoS attack ?

If we take the most common case where the initiator / client is behind
NAT and responder/server is not behind the NAT. Now the
responder/server has fixed IP address which will NOT change. Thus if
host which knows that other end is not behind NAT (i.e. initiator /
client in this case) does not update IP-addresses at all, as it knows
the other end has fixed IP-address the attacker cannot force both ends
to change addresses at the same time. If client would take any packet
and change other ends address to be as claimed in the headers then
attacker could simply send one packet that would change client's view
where the server is, and as the client is behind NAT his old NAT
mapping would get destroyed after a time, and after that server cannot
communicate to the client anymore at all. 
-- 
kivinen@iki.fi

From ynir@checkpoint.com  Thu Jul 30 01:55:38 2009
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C75EF3A718A for <ipsec@core3.amsl.com>; Thu, 30 Jul 2009 01:55:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WtDPQhBjdrky for <ipsec@core3.amsl.com>; Thu, 30 Jul 2009 01:55:38 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id 8E7423A7198 for <ipsec@ietf.org>; Thu, 30 Jul 2009 01:55:37 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 31CDD29C00C; Thu, 30 Jul 2009 11:55:56 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 02ACA29C00B; Thu, 30 Jul 2009 11:55:56 +0300 (IDT)
X-CheckPoint: {4A715E9F-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n6U8tb3d007516; Thu, 30 Jul 2009 11:55:38 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Thu, 30 Jul 2009 11:55:37 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: "'Vijay Devarapalli'" <vijay@wichorus.com>, "ipsec@ietf.org" <ipsec@ietf.org>
Date: Thu, 30 Jul 2009 11:55:36 +0300
Thread-Topic: Handling Redirect Loops
Thread-Index: AcoQnIN2/iNBfSAISU+b1O5XZOe5xQALzvBQAAG38YQAB8ZtoA==
Message-ID: <006FEB08D9C6444AB014105C9AEB133F855207C89F@il-ex01.ad.checkpoint.com>
References: <006FEB08D9C6444AB014105C9AEB133F855207C896@il-ex01.ad.checkpoint.com> <C69676ED.96F5%vijay@wichorus.com>
In-Reply-To: <C69676ED.96F5%vijay@wichorus.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [IPsec] Handling Redirect Loops
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jul 2009 08:55:38 -0000

Vijar Devarapalli wrote:

>Hi Yoav,
>
>On 7/29/09 9:13 PM, "Yoav Nir" wrote:
>
>> Hi Vijay.
>>=20
>> "default" is usually associated with a particular implementation or
>> product. I think it would be better to say "suggested value" rather=20
>> than "default value".
>
> "default value" is the right terminology to use here.

Disagree. A default is what you get in a particular implementation if you d=
on't change it. For example, IKE SA default lifetimes are 2 hours in Check =
Point products, and 8 hours in Microsoft products. A standard cannot have a=
 default.

>> Also, I don't see a point in mandating that all products should have an
>> extra knob for setting this value. For example, for an IKEv2 client you
>> usually try to have as little local configuration as possible, so this
>> value may very well be hard coded.
>>=20
>>                   The suggested value for MAX_REDIRECTS configuration
>>  variable is 5.  The suggested value for REDIRECT_LOOP_DETECT_PERIOD
>>  configuration variable is 300 seconds.  These values MAY be
>>  configurable on the client.
>
>If you want to change it "MAY", you might as well say nothing about it. A
>sentence that says "These values MAY be configurable on the client" doesn'=
t
>say much. I would be fine with "SHOULD" instead of "MUST".

Disagree again. No client will have this configuration, because clients are=
 made to be used by non-technical people. Clients that are centrally-config=
ured may have such a setting, but we can't put that in a MUST, or even a SH=
OULD.

>
>Vijay
=20


Email secured by Check Point

From rsjenwar@gmail.com  Thu Jul 30 03:07:44 2009
Return-Path: <rsjenwar@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CBD153A7139 for <ipsec@core3.amsl.com>; Thu, 30 Jul 2009 03:07:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.093
X-Spam-Level: 
X-Spam-Status: No, score=-2.093 tagged_above=-999 required=5 tests=[AWL=-0.095, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_46=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rN2PAjjDZ361 for <ipsec@core3.amsl.com>; Thu, 30 Jul 2009 03:07:43 -0700 (PDT)
Received: from mail-pz0-f184.google.com (mail-pz0-f184.google.com [209.85.222.184]) by core3.amsl.com (Postfix) with ESMTP id BFA583A6A97 for <ipsec@ietf.org>; Thu, 30 Jul 2009 03:07:43 -0700 (PDT)
Received: by pzk14 with SMTP id 14so431926pzk.29 for <ipsec@ietf.org>; Thu, 30 Jul 2009 03:07:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=3q0s37az+931mKQoLTVTbglfzeTDypZXsCoajLVsFfQ=; b=gt4OWN3FrcQnxeQTmH+Sw92z+yMSpZ/LF+c9vxfGFyFhiWi2FrE7I0QDLa6iCPU6/6 e4cW4VGO5Ot6IRFq/OsbKt+yTRTKk5UH6Mz0A0DNvrG4ooEwEnEKIfcRWcroPS0EGHVH gW4MuhBEGnh+qz/jKYqK1sUXC4D/PHVGB1LJ0=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=LhajenampqXvrtdGej1ONwgB+kSbtqbWg3U2+T+ku+3n7dj2NxpB2gO7giujwYfJ41 9hAV3L2x/V4gS1QbtnrzcfYJ9b4zPdjkHWirKmm6M3+W30FQiFqImypJ+0Vbpo0Idqwe JUScbqcGVO95t2n0T3txiWP19QwEU4CM7zXFg=
MIME-Version: 1.0
Received: by 10.142.148.1 with SMTP id v1mr73074wfd.84.1248948463549; Thu, 30  Jul 2009 03:07:43 -0700 (PDT)
In-Reply-To: <19057.24029.777309.954522@fireball.kivinen.iki.fi>
References: <7ccecf670907292207s7d697d87pac793861f7453f0a@mail.gmail.com> <19057.24029.777309.954522@fireball.kivinen.iki.fi>
Date: Thu, 30 Jul 2009 15:37:43 +0530
Message-ID: <7ccecf670907300307r2c87111eg2d7d7f4decabb82@mail.gmail.com>
From: Raj Singh <rsjenwar@gmail.com>
To: Tero Kivinen <kivinen@iki.fi>
Content-Type: multipart/alternative; boundary=000e0cd23d4e833cc1046fe979e8
Cc: ipsec@ietf.org
Subject: Re: [IPsec] Question regarding security considerations with NAT-T scenario in IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jul 2009 10:07:44 -0000

--000e0cd23d4e833cc1046fe979e8
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Tero,


On Thu, Jul 30, 2009 at 2:16 PM, Tero Kivinen <kivinen@iki.fi> wrote:

> Raj Singh writes:
> > 1. Initiator is behind N(P)AT and float the port to (4500, 4500)
> >
> > and send IKE_AUTH  with source port 4500 now N(P)AT changes source port
> > as 1024 but there is a man-in-the-middle who changes the port to other
> > host behind N(P)AT's port say 1025, still IKE_AUTH packet is
> authenticated.
> >
> > The responder establishes the SA with destination port as 1025 instead of
> > 1024 and sends the reply back to destination port 1025, so it will never
> > reach to original initiator . So the IKE SA will does not get established
> > on initiator But there is no mention of this DoS attack in the draft
> > ?
>
> When the initiator does not get packets, it will retrasnmit its packet
> and if the man-in-the-middle attacker is no longer there it will reach
> the other end and has source port of 1024. This will then be
> authenticated retransmission packet for the other end which will then
> retransmit its previous packet to the address where port numbers were
> swapped. As the packet was not new packet it will not update the SA,
> but next packet from the responder will cause it to update the port
> numbers.
>
> If the man-in-the-middle is still there then the attack is still
> ongoing and he can prevent communications between two peers. He does
> not even need to modify the ports, he can simply delete those
> packets...
>


Agree. But draft does NOT mention about this DoS attack in security
considerations.
We'll have a mention of it in draft as the parent SA itself will come UP
with wrong ports.


>
> > 2. The draft says the host that is NOT behind NAT SHOULD send packet to
> > IP address and port from which it received last authenticated packet.
> > A host behind behind a NAT SHOULD NOT do this because it opens a
> > DoS attack.
>
> Yes.
>
> > But how the location of host(Behind NAT or NOT) avoid DoS attack, say
> > when responder is having public IP, send an UDP encapsulated packet, some
> > man-in-the-middle changes the port, then initiator which is behind NAT
> wil
> > use ports from packet and will never reach the responder. This is also a
> > DoS attack.
> > Please let me how location of host (behind NAT or not) helps in avoiding
> > DoS attack ?
>
> If we take the most common case where the initiator / client is behind
> NAT and responder/server is not behind the NAT. Now the
> responder/server has fixed IP address which will NOT change. Thus if
> host which knows that other end is not behind NAT (i.e. initiator /
> client in this case) does not update IP-addresses at all, as it knows
> the other end has fixed IP-address the attacker cannot force both ends
> to change addresses at the same time. If client would take any packet
> and change other ends address to be as claimed in the headers then
> attacker could simply send one packet that would change client's view
> where the server is, and as the client is behind NAT his old NAT
> mapping would get destroyed after a time, and after that server cannot
> communicate to the client anymore at all.


> --
> kivinen@iki.fi
>

Thanks and Regards,
Raj

--000e0cd23d4e833cc1046fe979e8
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Tero,<br><br><br><div class=3D"gmail_quote">On Thu, Jul 30, 2009 at 2:16=
 PM, Tero Kivinen <span dir=3D"ltr">&lt;<a href=3D"mailto:kivinen@iki.fi">k=
ivinen@iki.fi</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" st=
yle=3D"border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex=
; padding-left: 1ex;">
<div class=3D"im">Raj Singh writes:<br>
&gt; 1. Initiator is behind N(P)AT and float the port to (4500, 4500)<br>
&gt;<br>
&gt; and send IKE_AUTH =C2=A0with source port 4500 now N(P)AT changes sourc=
e port<br>
&gt; as 1024 but there is a man-in-the-middle who changes the port to other=
<br>
&gt; host behind N(P)AT&#39;s port say 1025, still IKE_AUTH packet is authe=
nticated.<br>
&gt;<br>
&gt; The responder establishes the SA with destination port as 1025 instead=
 of<br>
&gt; 1024 and sends the reply back to destination port 1025, so it will nev=
er<br>
&gt; reach to original initiator . So the IKE SA will does not get establis=
hed<br>
&gt; on initiator But there is no mention of this DoS attack in the draft<b=
r>
&gt; ?<br>
<br>
</div>When the initiator does not get packets, it will retrasnmit its packe=
t<br>
and if the man-in-the-middle attacker is no longer there it will reach<br>
the other end and has source port of 1024. This will then be<br>
authenticated retransmission packet for the other end which will then<br>
retransmit its previous packet to the address where port numbers were<br>
swapped. As the packet was not new packet it will not update the SA,<br>
but next packet from the responder will cause it to update the port<br>
numbers.<br>
<br>
If the man-in-the-middle is still there then the attack is still<br>
ongoing and he can prevent communications between two peers. He does<br>
not even need to modify the ports, he can simply delete those<br>
packets...<br>
<div class=3D"im"></div>=C2=A0</blockquote><div><br>Agree. But draft does N=
OT mention about this DoS attack in security considerations. <br>We&#39;ll =
have a mention of it in draft as the parent SA itself will come UP with wro=
ng ports.<br>
<br></div><blockquote class=3D"gmail_quote" style=3D"border-left: 1px solid=
 rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;"><div cl=
ass=3D"im"><br>
<br>
&gt; 2. The draft says the host that is NOT behind NAT SHOULD send packet t=
o<br>
&gt; IP address and port from which it received last authenticated packet.<=
br>
&gt; A host behind behind a NAT SHOULD NOT do this because it opens a<br>
&gt; DoS attack.<br>
<br>
</div>Yes.<br>
<div class=3D"im"><br>
&gt; But how the location of host(Behind NAT or NOT) avoid DoS attack, say<=
br>
&gt; when responder is having public IP, send an UDP encapsulated packet, s=
ome<br>
&gt; man-in-the-middle changes the port, then initiator which is behind NAT=
 wil<br>
&gt; use ports from packet and will never reach the responder. This is also=
 a<br>
&gt; DoS attack.<br>
&gt; Please let me how location of host (behind NAT or not) helps in avoidi=
ng<br>
&gt; DoS attack ?<br>
<br>
</div>If we take the most common case where the initiator / client is behin=
d<br>
NAT and responder/server is not behind the NAT. Now the<br>
responder/server has fixed IP address which will NOT change. Thus if<br>
host which knows that other end is not behind NAT (i.e. initiator /<br>
client in this case) does not update IP-addresses at all, as it knows<br>
the other end has fixed IP-address the attacker cannot force both ends<br>
to change addresses at the same time. If client would take any packet<br>
and change other ends address to be as claimed in the headers then<br>
attacker could simply send one packet that would change client&#39;s view<b=
r>
where the server is, and as the client is behind NAT his old NAT<br>
mapping would get destroyed after a time, and after that server cannot<br>
communicate to the client anymore at all.</blockquote><blockquote class=3D"=
gmail_quote" style=3D"border-left: 1px solid rgb(204, 204, 204); margin: 0p=
t 0pt 0pt 0.8ex; padding-left: 1ex;"><br>
<font color=3D"#888888">--<br>
<a href=3D"mailto:kivinen@iki.fi">kivinen@iki.fi</a><br>
</font></blockquote></div><br>Thanks and Regards,<br>Raj<br>

--000e0cd23d4e833cc1046fe979e8--

From vijay@wichorus.com  Thu Jul 30 14:54:40 2009
Return-Path: <vijay@wichorus.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 172DB3A6CDB for <ipsec@core3.amsl.com>; Thu, 30 Jul 2009 14:54:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.087
X-Spam-Level: 
X-Spam-Status: No, score=0.087 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, RCVD_IN_SORBS_WEB=0.619, RCVD_NUMERIC_HELO=2.067]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PGz1ZniGDu-x for <ipsec@core3.amsl.com>; Thu, 30 Jul 2009 14:54:39 -0700 (PDT)
Received: from outbound.mse15.exchange.ms (outbound.mse15.exchange.ms [216.52.164.185]) by core3.amsl.com (Postfix) with ESMTP id 49AB83A6AFD for <ipsec@ietf.org>; Thu, 30 Jul 2009 14:54:38 -0700 (PDT)
Received: from 12.204.153.98 ([12.204.153.98]) by mse15be2.mse15.exchange.ms ([172.30.10.130]) via Exchange Front-End Server owa.mse15.exchange.ms ([172.30.10.124]) with Microsoft Exchange Server HTTP-DAV ; Thu, 30 Jul 2009 21:54:39 +0000
User-Agent: Microsoft-Entourage/12.10.0.080409
Date: Thu, 30 Jul 2009 14:54:38 -0700
From: Vijay Devarapalli <vijay@wichorus.com>
To: Tero Kivinen <kivinen@iki.fi>
Message-ID: <C69764AE.976F%vijay@wichorus.com>
Thread-Topic: [IPsec] Handling Redirect Loops
Thread-Index: AcoRYFValS6UixeIp0y8HcMI3CHTtw==
In-Reply-To: <19057.23430.850983.867001@fireball.kivinen.iki.fi>
Mime-version: 1.0
Content-type: text/plain; charset="US-ASCII"
Content-transfer-encoding: 7bit
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] Handling Redirect Loops
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jul 2009 21:54:40 -0000

On 7/30/09 1:36 AM, "Tero Kivinen" wrote:

> Vijay Devarapalli writes:
>> 7.  Handling Redirect Loops
>> 
>>    The client could end up getting redirected multiple times in a
>>    sequence, either because of wrong configuration or a DoS attack.  The
>>    client could even end up in a loop with two or more gateways
>>    redirecting the client to each other.  This could deny service to the
>>    client.  To prevent this, the client SHOULD be configured not to
>>    accept more than a certain number of redirects (MAX_REDIRECTS) within
>>    a short time period (REDIRECT_LOOP_DETECT_PERIOD) for a particular
>>    IKEv2 SA setup.  The default value for MAX_REDIRECTS configuration
>>    variable is 5.  The default value for REDIRECT_LOOP_DETECT_PERIOD
>>    configuration variable is 300 seconds.  These values MUST be
>>    configurable on the client.
> 
> Is there really any reason to have the last "MUST" I.e. what is the
> reason to force those parameters to be changeable? I do not really see
> reason to change those in most cases, and if someone really uses some
> really wierd setup where 5 is not enough for the max redirects, then
> he can use some implementation where those are configurable...

Modified the last sentence to

  Client implementations may allow these variables to be
  configured depending on a specific deployment or system
  configuration.

Vijay


From root@core3.amsl.com  Thu Jul 30 15:15:01 2009
Return-Path: <root@core3.amsl.com>
X-Original-To: ipsec@ietf.org
Delivered-To: ipsec@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 0) id E6D333A6D0C; Thu, 30 Jul 2009 15:15:01 -0700 (PDT)
From: Internet-Drafts@ietf.org
To: i-d-announce@ietf.org
Content-Type: Multipart/Mixed; Boundary="NextPart"
Mime-Version: 1.0
Message-Id: <20090730221501.E6D333A6D0C@core3.amsl.com>
Date: Thu, 30 Jul 2009 15:15:01 -0700 (PDT)
Cc: ipsec@ietf.org
Subject: [IPsec] I-D Action:draft-ietf-ipsecme-ikev2-redirect-12.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jul 2009 22:15:02 -0000

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Security Maintenance and Extensions Working Group of the IETF.


	Title           : Redirect Mechanism for IKEv2
	Author(s)       : V. Devarapalli, K. Weniger
	Filename        : draft-ietf-ipsecme-ikev2-redirect-12.txt
	Pages           : 15
	Date            : 2009-07-30

IKEv2 is a protocol for setting up Virtual Private Network (VPN)
tunnels from a remote location to a gateway so that the VPN client
can access services in the network behind the gateway.  This document
defines an IKEv2 extension that allows an overloaded VPN gateway or a
VPN gateway that is being shot down for maintenance to redirect the
VPN client to attach to another gateway.  The proposed mechanism can
also be used in Mobile IPv6 to enable the home agent to redirect the
mobile node to another home agent.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-ikev2-redirect-12.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Message/External-body;
	name="draft-ietf-ipsecme-ikev2-redirect-12.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2009-07-30150055.I-D@ietf.org>


--NextPart--

From svanru@gmail.com  Fri Jul 31 01:01:08 2009
Return-Path: <svanru@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C84D728C2D3 for <ipsec@core3.amsl.com>; Fri, 31 Jul 2009 01:01:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.486
X-Spam-Level: 
X-Spam-Status: No, score=-3.486 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, GB_I_LETTER=-2, J_CHICKENPOX_36=0.6, XMAILER_MIMEOLE_OL_7533E=0.513]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2gKrQSJLIKo8 for <ipsec@core3.amsl.com>; Fri, 31 Jul 2009 01:01:08 -0700 (PDT)
Received: from ey-out-2122.google.com (ey-out-2122.google.com [74.125.78.26]) by core3.amsl.com (Postfix) with ESMTP id B07C728C2D4 for <ipsec@ietf.org>; Fri, 31 Jul 2009 01:01:02 -0700 (PDT)
Received: by ey-out-2122.google.com with SMTP id 22so525968eye.31 for <ipsec@ietf.org>; Fri, 31 Jul 2009 01:00:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:from:to:references :subject:date:mime-version:content-type:content-transfer-encoding :x-priority:x-msmail-priority:x-mailer:x-mimeole; bh=yJXjPMHEfCZ4w8/fhoT6mRggj7bcSZZ4kxd9W8HhXn0=; b=RcWsmW38dQaWOO/a7Ao3DnqxwSAAUoHWIq8ybjY8TOEQBEkc0D860OVr1GHMqAmpsn IwkuadAw9f4RzvGVADXKi3XYhP09e0ZG2lnBrdjVSjLwR0FBbm4o20R6xpLkYlTiLeCJ qzIIM/PrMIaAAG9tQkkxZZKjWLEtjol/tJ8vA=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:from:to:references:subject:date:mime-version :content-type:content-transfer-encoding:x-priority:x-msmail-priority :x-mailer:x-mimeole; b=nAYFHirrsJsv9W+bpm1hxzs69+/HFzQFWxRLLFUu9/9NBSl1Xd86/vX8SsaeFdDIOJ jkmmglNumJRvvy57egnTFVPILNN48gI1oI0AgSpK/ByG6Wjj8erO3I7V9TkYrN1kl1dJ B9a0tjxUYU0R5+9iRNA0iJS8qRkwyY1dZ5CbY=
Received: by 10.216.54.202 with SMTP id i52mr416551wec.196.1249027256991; Fri, 31 Jul 2009 01:00:56 -0700 (PDT)
Received: from svanpc ([82.138.51.4]) by mx.google.com with ESMTPS id 7sm3406913eyg.15.2009.07.31.01.00.55 (version=SSLv3 cipher=RC4-MD5); Fri, 31 Jul 2009 01:00:56 -0700 (PDT)
Message-ID: <1DB792CD814843BEA2EE1C9E3732FFF5@trustworks.com>
From: "Valery Smyslov" <svanru@gmail.com>
To: <ipsec@ietf.org>
References: <C6961C26.96B9%vijay@wichorus.com>
Date: Fri, 31 Jul 2009 11:58:29 +0400
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4963.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4963.1700
Subject: [IPsec]  Preshared key authentication in IKEv2
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 31 Jul 2009 08:01:08 -0000

Hi all,

I found text describing preshared key authentication in IKEv2 confusing.

First, in section 2.15 four different terms are used: "shared secret",
"Shared Secret" (with capital letters), "shared key" and "pre-shared key".
This is a bit confusing, especially taking into consideration that terms
"shared keys" and "shared secret" are also used in the draft for SK_* and
result of ephemeral Diffie-Hellman exchange. I'd propose to use
only one term, "pre-shared key".

Then, in section 2.15 the very first sentence states:

     When not using extensible authentication (see Section 2.16), the
     peers are authenticated by having each sign (or MAC using a shared
     secret as the key) a block of data.

But in the last paragraph of this section it is shown, that not sole "shared
secret"
is used as the key, but the following construction:

    prf( Shared Secret,"Key Pad for IKEv2")

So, the first sentence of 2.15 is misleading.

Then, the following rationale for padding is given:

     The pad string is added so that if the shared secret is derived from a
     password, the IKE implementation need not store the password in
     cleartext, but rather can store the value prf(Shared Secret,"Key Pad
     for IKEv2"), which could not be used as a password equivalent for
     protocols other than IKEv2.

I found this rationale a bit weired, because which prf should be used cannot
be known at the time of entering pre-shared key - it is known only after
IKE_SA_INIT exchange is finished. It is possible to compute values
for all possible prfs, but this doesn't work in all cases - for example
in case of pluggable crypto. So, in general, storing of "Shared
Secret"/password
in unavoidable.

And last, but not least. The following section 2.16, describing
authentication
with EAP, states:

     For EAP methods that create a shared key as a side effect of
     authentication, that shared key MUST be used by both the initiator
     and responder to generate AUTH payloads in messages 7 and 8 using the
     syntax for shared secrets specified in Section 2.15.

and later:

     If EAP methods that do not generate a
     shared key are used, the AUTH payloads in messages 7 and 8 MUST be
     generated using SK_pi and SK_pr, respectively.

It is a bit unclear, whether these shared secrets (EAP generated or SK_p*)
must be used as key "as is", or as  prf( Shared Secret, "Key Pad for
IKEv2").
I suspect that the latter is right answer, but this probably must be written
excplicitly.

Regards,
Valery Smyslov.


