
From ynir@checkpoint.com  Mon Jan  3 07:49:45 2011
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5BDE33A69E8 for <ipsec@core3.amsl.com>; Mon,  3 Jan 2011 07:49:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.876
X-Spam-Level: 
X-Spam-Status: No, score=-9.876 tagged_above=-999 required=5 tests=[AWL=0.723,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FLrqxncWF29k for <ipsec@core3.amsl.com>; Mon,  3 Jan 2011 07:49:44 -0800 (PST)
Received: from michael.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by core3.amsl.com (Postfix) with ESMTP id 00E3B3A69E3 for <ipsec@ietf.org>; Mon,  3 Jan 2011 07:49:40 -0800 (PST)
X-CheckPoint: {4D21F093-0-1B221DC2-2FFFF}
Received: from il-ex01.ad.checkpoint.com (il-ex01.checkpoint.com [194.29.34.26]) by michael.checkpoint.com (8.13.8/8.13.8) with ESMTP id p03FplAL020136 for <ipsec@ietf.org>; Mon, 3 Jan 2011 17:51:47 +0200
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Mon, 3 Jan 2011 17:51:47 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Date: Mon, 3 Jan 2011 17:51:45 +0200
Thread-Topic: [IPsec] Failure Detection - Issue #200
Thread-Index: AcurXh/6eConFlLYQEOuTtk1fPYnRw==
Message-ID: <FF4B0BF2-19F9-41DA-8CF2-EEC7DD37A434@checkpoint.com>
References: <4482BE0E-93AF-44B0-A4DF-302994312D31@checkpoint.com>
In-Reply-To: <4482BE0E-93AF-44B0-A4DF-302994312D31@checkpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [IPsec] Failure Detection - Issue #200
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jan 2011 15:49:45 -0000

Reminder...

On Dec 26, 2010, at 11:38 AM, Yoav Nir wrote:

> Hi all.=20
>=20
> Issue #200 is about some text in section 8 ("Interaction with Session Res=
umption"). The text says that a rebooted peer (and thus a defunct SA) may g=
o undetected for the lifetime of the SA. However, RFC 5996 says that at som=
e point, a peer that did not receive incoming traffic on a particular IKE S=
A or its children, has to initiate a liveness check.
>=20
> Here's how I propose to resolve this.  Seeing as it's the holiday season,=
 I won't close the issue until January 10th, but please get your comments i=
n by then.
>=20
> Existing text:
>   What Session Resumption does not help is the problem of detecting
>   that the peer gateway has failed.  A failed gateway may go undetected
>   for as long as the lifetime of a child SA, because IPsec does not
>   have packet acknowledgement, and applications cannot signal the IPsec
>   layer that the tunnel "does not work".  Before establishing a new IKE
>   SA using Session Resumption, a client should ascertain that the
>   gateway has indeed failed.  This could be done using either a
>   liveness check (as in RFC 5996) or using the QCD tokens described in
>   this document.
>=20
> My proposed text:
>   What Session Resumption does not help is the problem of detecting
>   that the peer gateway has failed.  A failed gateway may go undetected
>   for an arbitrarily long time, because IPsec does not have packet
>   acknowledgement, and applications cannot signal the IPsec layer that
>   the tunnel "does not work".  Section 2.4 of RFC 5996 does not specify
>   how long an implementation needs to wait before beginning a liveness
>   check, and only says "not recently" (see full quote in Section 2).
>   In practice some mobile devices wait a very long time before
>   beginning liveness check, in order to extend battery life by allowing
>   parts of the device to remain in low-power modes.
>=20
>   QCD tokens provide a way to detect the failure of the peer in the
>   case where liveness check has not yet ended (or begun).


From smoonen@us.ibm.com  Tue Jan  4 07:43:28 2011
Return-Path: <smoonen@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 97E773A6CAA; Tue,  4 Jan 2011 07:43:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.746
X-Spam-Level: 
X-Spam-Status: No, score=-3.746 tagged_above=-999 required=5 tests=[AWL=0.889,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, SARE_GIF_ATTACH=1.42, TVD_FW_GRAPHIC_NAME_MID=0.543]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rqlXe-bfBAn7; Tue,  4 Jan 2011 07:43:27 -0800 (PST)
Received: from e36.co.us.ibm.com (e36.co.us.ibm.com [32.97.110.154]) by core3.amsl.com (Postfix) with ESMTP id 0B6023A6CA9; Tue,  4 Jan 2011 07:43:26 -0800 (PST)
Received: from d03relay02.boulder.ibm.com (d03relay02.boulder.ibm.com [9.17.195.227]) by e36.co.us.ibm.com (8.14.4/8.13.1) with ESMTP id p04FeRMD001587; Tue, 4 Jan 2011 08:40:27 -0700
Received: from d03av03.boulder.ibm.com (d03av03.boulder.ibm.com [9.17.195.169]) by d03relay02.boulder.ibm.com (8.13.8/8.13.8/NCO v9.1) with ESMTP id p04FjEAU249582; Tue, 4 Jan 2011 08:45:15 -0700
Received: from d03av03.boulder.ibm.com (loopback [127.0.0.1]) by d03av03.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p04FjEiT001781; Tue, 4 Jan 2011 08:45:14 -0700
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av03.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p04FjEWI001776; Tue, 4 Jan 2011 08:45:14 -0700
In-Reply-To: <FF4B0BF2-19F9-41DA-8CF2-EEC7DD37A434@checkpoint.com>
References: <4482BE0E-93AF-44B0-A4DF-302994312D31@checkpoint.com> <FF4B0BF2-19F9-41DA-8CF2-EEC7DD37A434@checkpoint.com>
X-KeepSent: 1971B1D7:1AEA856A-8525780E:0054F363; type=4; name=$KeepSent
To: Yoav Nir <ynir@checkpoint.com>
X-Mailer: Lotus Notes Release 8.5.1FP5 SHF29 November 12, 2010
Message-ID: <OF1971B1D7.1AEA856A-ON8525780E.0054F363-8525780E.005664B0@us.ibm.com>
From: Scott C Moonen <smoonen@us.ibm.com>
Date: Tue, 4 Jan 2011 10:43:38 -0500
X-MIMETrack: Serialize by Router on D03NM118/03/M/IBM(Release 8.5.1FP4|July 25, 2010) at 01/04/2011 08:45:13
MIME-Version: 1.0
Content-type: multipart/related;  Boundary="0__=0ABBF29DDFC775F38f9e8a93df938690918c0ABBF29DDFC775F3"
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, ipsec-bounces@ietf.org
Subject: Re: [IPsec] Failure Detection - Issue #200
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Jan 2011 15:43:28 -0000

--0__=0ABBF29DDFC775F38f9e8a93df938690918c0ABBF29DDFC775F3
Content-type: multipart/alternative; 
	Boundary="1__=0ABBF29DDFC775F38f9e8a93df938690918c0ABBF29DDFC775F3"

--1__=0ABBF29DDFC775F38f9e8a93df938690918c0ABBF29DDFC775F3
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: quoted-printable


Yoav, I am ok with your suggested change.

Side comment: in my reading of RFC 5996 I think we could still say "as =
long
as the lifetime of a child SA."  I read the RFC as requiring liveness
checking only in the case where we have sent but not received traffic. =
 (In
other words, I think the sentences "If there has only been ..." and "If=
 no
cryptographically protected ..." are related, with the second being
subordinate to the first.)


Scott Moonen (smoonen@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://www.linkedin.com/in/smoonen



From:	Yoav Nir <ynir@checkpoint.com>
To:	"ipsec@ietf.org" <ipsec@ietf.org>
Date:	01/03/2011 10:52 AM
Subject:	Re: [IPsec] Failure Detection - Issue #200
Sent by:	ipsec-bounces@ietf.org



Reminder...

On Dec 26, 2010, at 11:38 AM, Yoav Nir wrote:

> Hi all.
>
> Issue #200 is about some text in section 8 ("Interaction with Session=

Resumption"). The text says that a rebooted peer (and thus a defunct SA=
)
may go undetected for the lifetime of the SA. However, RFC 5996 says th=
at
at some point, a peer that did not receive incoming traffic on a partic=
ular
IKE SA or its children, has to initiate a liveness check.
>
> Here's how I propose to resolve this.  Seeing as it's the holiday sea=
son,
I won't close the issue until January 10th, but please get your comment=
s in
by then.
>
> Existing text:
>   What Session Resumption does not help is the problem of detecting
>   that the peer gateway has failed.  A failed gateway may go undetect=
ed
>   for as long as the lifetime of a child SA, because IPsec does not
>   have packet acknowledgement, and applications cannot signal the IPs=
ec
>   layer that the tunnel "does not work".  Before establishing a new I=
KE
>   SA using Session Resumption, a client should ascertain that the
>   gateway has indeed failed.  This could be done using either a
>   liveness check (as in RFC 5996) or using the QCD tokens described i=
n
>   this document.
>
> My proposed text:
>   What Session Resumption does not help is the problem of detecting
>   that the peer gateway has failed.  A failed gateway may go undetect=
ed
>   for an arbitrarily long time, because IPsec does not have packet
>   acknowledgement, and applications cannot signal the IPsec layer tha=
t
>   the tunnel "does not work".  Section 2.4 of RFC 5996 does not speci=
fy
>   how long an implementation needs to wait before beginning a livenes=
s
>   check, and only says "not recently" (see full quote in Section 2).
>   In practice some mobile devices wait a very long time before
>   beginning liveness check, in order to extend battery life by allowi=
ng
>   parts of the device to remain in low-power modes.
>
>   QCD tokens provide a way to detect the failure of the peer in the
>   case where liveness check has not yet ended (or begun).

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
=

--1__=0ABBF29DDFC775F38f9e8a93df938690918c0ABBF29DDFC775F3
Content-type: text/html; charset=US-ASCII
Content-Disposition: inline
Content-transfer-encoding: quoted-printable

<html><body>
<p>Yoav, I am ok with your suggested change.<br>
<br>
Side comment: in my reading of RFC 5996 I think we could still say &quo=
t;as long as the lifetime of a child SA.&quot;  I read the RFC as requi=
ring liveness checking only in the case where we have sent but not rece=
ived traffic.  (In other words, I think the sentences &quot;If there ha=
s only been ...&quot; and &quot;If no cryptographically protected ...&q=
uot; are related, with the second being subordinate to the first.)<br>
<br>
<br>
Scott Moonen (smoonen@us.ibm.com)<br>
z/OS Communications Server TCP/IP Development<br>
<a href=3D"http://www.linkedin.com/in/smoonen">http://www.linkedin.com/=
in/smoonen</a><br>
<br>
<img width=3D"16" height=3D"16" src=3D"cid:1__=3D0ABBF29DDFC775F38f9e8a=
93df938@us.ibm.com" border=3D"0" alt=3D"Inactive hide details for Yoav =
Nir ---01/03/2011 10:52:15 AM---Reminder... On Dec 26, 2010, at 11:38 A=
M, Yoav Nir wrote:"><font color=3D"#424282">Yoav Nir ---01/03/2011 10:5=
2:15 AM---Reminder... On Dec 26, 2010, at 11:38 AM, Yoav Nir wrote:</fo=
nt><br>
<br>
<font size=3D"2" color=3D"#5F5F5F">From:	</font><font size=3D"2">Yoav N=
ir &lt;ynir@checkpoint.com&gt;</font><br>
<font size=3D"2" color=3D"#5F5F5F">To:	</font><font size=3D"2">&quot;ip=
sec@ietf.org&quot; &lt;ipsec@ietf.org&gt;</font><br>
<font size=3D"2" color=3D"#5F5F5F">Date:	</font><font size=3D"2">01/03/=
2011 10:52 AM</font><br>
<font size=3D"2" color=3D"#5F5F5F">Subject:	</font><font size=3D"2">Re:=
 [IPsec] Failure Detection - Issue #200</font><br>
<font size=3D"2" color=3D"#5F5F5F">Sent by:	</font><font size=3D"2">ips=
ec-bounces@ietf.org</font><br>
<hr width=3D"100%" size=3D"2" align=3D"left" noshade style=3D"color:#80=
91A5; "><br>
<br>
<br>
<tt>Reminder...<br>
<br>
On Dec 26, 2010, at 11:38 AM, Yoav Nir wrote:<br>
<br>
&gt; Hi all. <br>
&gt; <br>
&gt; Issue #200 is about some text in section 8 (&quot;Interaction with=
 Session Resumption&quot;). The text says that a rebooted peer (and thu=
s a defunct SA) may go undetected for the lifetime of the SA. However, =
RFC 5996 says that at some point, a peer that did not receive incoming =
traffic on a particular IKE SA or its children, has to initiate a liven=
ess check.<br>
&gt; <br>
&gt; Here's how I propose to resolve this. &nbsp;Seeing as it's the hol=
iday season, I won't close the issue until January 10th, but please get=
 your comments in by then.<br>
&gt; <br>
&gt; Existing text:<br>
&gt; &nbsp; What Session Resumption does not help is the problem of det=
ecting<br>
&gt; &nbsp; that the peer gateway has failed. &nbsp;A failed gateway ma=
y go undetected<br>
&gt; &nbsp; for as long as the lifetime of a child SA, because IPsec do=
es not<br>
&gt; &nbsp; have packet acknowledgement, and applications cannot signal=
 the IPsec<br>
&gt; &nbsp; layer that the tunnel &quot;does not work&quot;. &nbsp;Befo=
re establishing a new IKE<br>
&gt; &nbsp; SA using Session Resumption, a client should ascertain that=
 the<br>
&gt; &nbsp; gateway has indeed failed. &nbsp;This could be done using e=
ither a<br>
&gt; &nbsp; liveness check (as in RFC 5996) or using the QCD tokens des=
cribed in<br>
&gt; &nbsp; this document.<br>
&gt; <br>
&gt; My proposed text:<br>
&gt; &nbsp; What Session Resumption does not help is the problem of det=
ecting<br>
&gt; &nbsp; that the peer gateway has failed. &nbsp;A failed gateway ma=
y go undetected<br>
&gt; &nbsp; for an arbitrarily long time, because IPsec does not have p=
acket<br>
&gt; &nbsp; acknowledgement, and applications cannot signal the IPsec l=
ayer that<br>
&gt; &nbsp; the tunnel &quot;does not work&quot;. &nbsp;Section 2.4 of =
RFC 5996 does not specify<br>
&gt; &nbsp; how long an implementation needs to wait before beginning a=
 liveness<br>
&gt; &nbsp; check, and only says &quot;not recently&quot; (see full quo=
te in Section 2).<br>
&gt; &nbsp; In practice some mobile devices wait a very long time befor=
e<br>
&gt; &nbsp; beginning liveness check, in order to extend battery life b=
y allowing<br>
&gt; &nbsp; parts of the device to remain in low-power modes.<br>
&gt; <br>
&gt; &nbsp; QCD tokens provide a way to detect the failure of the peer =
in the<br>
&gt; &nbsp; case where liveness check has not yet ended (or begun).<br>=

<br>
_______________________________________________<br>
IPsec mailing list<br>
IPsec@ietf.org<br>
</tt><tt><a href=3D"https://www.ietf.org/mailman/listinfo/ipsec">https:=
//www.ietf.org/mailman/listinfo/ipsec</a></tt><tt><br>
</tt><br>
</body></html>=


--1__=0ABBF29DDFC775F38f9e8a93df938690918c0ABBF29DDFC775F3--


--0__=0ABBF29DDFC775F38f9e8a93df938690918c0ABBF29DDFC775F3
Content-type: image/gif; 
	name="graycol.gif"
Content-Disposition: inline; filename="graycol.gif"
Content-ID: <1__=0ABBF29DDFC775F38f9e8a93df938@us.ibm.com>
Content-transfer-encoding: base64

R0lGODlhEAAQAKECAMzMzAAAAP///wAAACH5BAEAAAIALAAAAAAQABAAAAIXlI+py+0PopwxUbpu
ZRfKZ2zgSJbmSRYAIf4fT3B0aW1pemVkIGJ5IFVsZWFkIFNtYXJ0U2F2ZXIhAAA7

--0__=0ABBF29DDFC775F38f9e8a93df938690918c0ABBF29DDFC775F3--


From paul.hoffman@vpnc.org  Tue Jan  4 17:13:16 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0652E3A679C for <ipsec@core3.amsl.com>; Tue,  4 Jan 2011 17:13:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.64
X-Spam-Level: 
X-Spam-Status: No, score=-101.64 tagged_above=-999 required=5 tests=[AWL=0.406, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SNMvizwsobVp for <ipsec@core3.amsl.com>; Tue,  4 Jan 2011 17:13:15 -0800 (PST)
Received: from hoffman.proper.com (Hoffman.Proper.COM [207.182.41.81]) by core3.amsl.com (Postfix) with ESMTP id 303C03A66B4 for <ipsec@ietf.org>; Tue,  4 Jan 2011 17:13:15 -0800 (PST)
Received: from MacBook-08.local (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p051FLHC092879 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Tue, 4 Jan 2011 18:15:22 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Message-ID: <4D23C629.3040306@vpnc.org>
Date: Tue, 04 Jan 2011 17:15:21 -0800
From: Paul Hoffman <paul.hoffman@vpnc.org>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: IPsecme WG <ipsec@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: [IPsec] Proposed virtual interim WG January 25
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jan 2011 01:13:16 -0000

We propose have a virtual interim WG meeting near the end of this month 
to discuss any remaining issues with the failure detection document. We 
propose a conference call on Tuesday January 25, 16:00 GMT (21:30 
Kolkata, 18:00 Israel, 17:00 CET, 11:00 EST, 8:00 PST), for up to 2 
hours. We are planning on the same format as the previous time: a VoIP 
conference bridge and posted slides (if needed). Technical details here: 
http://trac.tools.ietf.org/wg/ipsecme/trac/wiki/ConferenceCalls. Let us 
know in the next few days if you have any major issues with the time 
and/or the format.

From paul.hoffman@vpnc.org  Wed Jan  5 18:58:08 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 711733A6E59 for <ipsec@core3.amsl.com>; Wed,  5 Jan 2011 18:58:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.922
X-Spam-Level: 
X-Spam-Status: No, score=-100.922 tagged_above=-999 required=5 tests=[AWL=-0.365, BAYES_05=-1.11, HELO_MISMATCH_COM=0.553, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8kr7eiRUYzao for <ipsec@core3.amsl.com>; Wed,  5 Jan 2011 18:58:07 -0800 (PST)
Received: from hoffman.proper.com (Hoffman.Proper.COM [207.182.41.81]) by core3.amsl.com (Postfix) with ESMTP id CA6203A6E57 for <ipsec@ietf.org>; Wed,  5 Jan 2011 18:58:07 -0800 (PST)
Received: from MacBook-08.local (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p06305PH048213 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO); Wed, 5 Jan 2011 20:00:06 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Message-ID: <4D253035.3060204@vpnc.org>
Date: Wed, 05 Jan 2011 19:00:05 -0800
From: Paul Hoffman <paul.hoffman@vpnc.org>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: ipsec@ietf.org
References: <4482BE0E-93AF-44B0-A4DF-302994312D31@checkpoint.com>
In-Reply-To: <4482BE0E-93AF-44B0-A4DF-302994312D31@checkpoint.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: Yoav Nir <ynir@checkpoint.com>
Subject: Re: [IPsec] Failure Detection - Issue #200
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jan 2011 02:58:08 -0000

I am closing this open issue. Yaron: please use your proposed text.

Failure detection authors: please have a new draft ready by Monday and 
close out all the resolved issues on the issue tracker. I think we are 
getting ready for a WG Last Call.

--Paul Hoffman, Director
--VPN Consortium


From paul.hoffman@vpnc.org  Fri Jan  7 08:51:04 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3A6C83A691C; Fri,  7 Jan 2011 08:51:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.679
X-Spam-Level: 
X-Spam-Status: No, score=-101.679 tagged_above=-999 required=5 tests=[AWL=0.367, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T06WdNXvJG8H; Fri,  7 Jan 2011 08:51:03 -0800 (PST)
Received: from hoffman.proper.com (Hoffman.Proper.COM [207.182.41.81]) by core3.amsl.com (Postfix) with ESMTP id 842E73A68D0; Fri,  7 Jan 2011 08:51:03 -0800 (PST)
Received: from MacBook-08.local (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p07Gr9GK035692 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO); Fri, 7 Jan 2011 09:53:10 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Message-ID: <4D2744F5.3090205@vpnc.org>
Date: Fri, 07 Jan 2011 08:53:09 -0800
From: Paul Hoffman <paul.hoffman@vpnc.org>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: IPsecme WG <ipsec@ietf.org>
References: <4D23C629.3040306@vpnc.org> <4D254266.4070804@ieca.com>
In-Reply-To: <4D254266.4070804@ieca.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: iesg-secretary@ietf.org
Subject: Re: [IPsec] Proposed virtual interim WG January 25
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jan 2011 16:51:04 -0000

The IPsecME WG will have a virtual interim WG meeting on Tuesday January 
25, 16:00 GMT (21:30 Kolkata, 18:00 Israel, 17:00 CET, 11:00 EST, 8:00 
PST), for up to 2 hours. The agenda is to discuss any remaining issues 
with draft-ietf-ipsecme-failure-detection. The meeting will be held as a 
conference call using a VoIP conference bridge and posted slides (if 
needed). Technical details here: 
http://trac.tools.ietf.org/wg/ipsecme/trac/wiki/ConferenceCalls.

--Paul Hoffman, Director
--VPN Consortium


From wwwrun@core3.amsl.com  Fri Jan  7 12:18:41 2011
Return-Path: <wwwrun@core3.amsl.com>
X-Original-To: ipsec@ietf.org
Delivered-To: ipsec@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 30) id 6CF563A6962; Fri,  7 Jan 2011 12:18:41 -0800 (PST)
From: IESG Secretary <iesg-secretary@ietf.org>
To: IETF Announcement list <ietf-announce@ietf.org>
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0
Message-Id: <20110107201841.6CF563A6962@core3.amsl.com>
Date: Fri,  7 Jan 2011 12:18:41 -0800 (PST)
Cc: ipsec@ietf.org
Subject: [IPsec] IPSECME WG Virtual Interim Meeting, January 25, 2010
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jan 2011 20:18:41 -0000

The IPsecME WG will have a virtual interim WG meeting on Tuesday January
25, 16:00 GMT (21:30 Kolkata, 18:00 Israel, 17:00 CET, 11:00 EST, 8:00
PST), for up to 2 hours. The agenda is to discuss any remaining issues
with draft-ietf-ipsecme-failure-detection. The meeting will be held as a
conference call using a VoIP conference bridge and posted slides (if
needed). Technical details here:
http://trac.tools.ietf.org/wg/ipsecme/trac/wiki/ConferenceCalls.

From Internet-Drafts@ietf.org  Sun Jan  9 23:45:04 2011
Return-Path: <Internet-Drafts@ietf.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8F5C228C0EF; Sun,  9 Jan 2011 23:45:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.516
X-Spam-Level: 
X-Spam-Status: No, score=-102.516 tagged_above=-999 required=5 tests=[AWL=0.083, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id somTNGKUgqTN; Sun,  9 Jan 2011 23:45:02 -0800 (PST)
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 07D7A28C0E4; Sun,  9 Jan 2011 23:45:02 -0800 (PST)
MIME-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
From: Internet-Drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 3.10
Message-ID: <20110110074502.22466.22300.idtracker@localhost>
Date: Sun, 09 Jan 2011 23:45:02 -0800
Cc: ipsec@ietf.org
Subject: [IPsec] I-D Action:draft-ietf-ipsecme-failure-detection-03.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2011 07:45:04 -0000

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Security Maintenance and Extensions Working Group of the IETF.


	Title           : A Quick Crash Detection Method for IKE
	Author(s)       : Y. Nir, et al.
	Filename        : draft-ietf-ipsecme-failure-detection-03.txt
	Pages           : 23
	Date            : 2011-01-09

This document describes an extension to the IKEv2 protocol that
allows for faster detection of SA desynchronization using a saved
token.

When an IPsec tunnel between two IKEv2 peers is disconnected due to a
restart of one peer, it can take as much as several minutes for the
other peer to discover that the reboot has occurred, thus delaying
recovery.  In this text we propose an extension to the protocol, that
allows for recovery immediately following the restart.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-failure-detection-03.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Message/External-body;
	name="draft-ietf-ipsecme-failure-detection-03.txt";
	site="ftp.ietf.org"; access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2011-01-09234005.I-D@ietf.org>


--NextPart--

From ynir@checkpoint.com  Mon Jan 10 00:01:34 2011
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 72EFD28C0DF for <ipsec@core3.amsl.com>; Mon, 10 Jan 2011 00:01:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.917
X-Spam-Level: 
X-Spam-Status: No, score=-9.917 tagged_above=-999 required=5 tests=[AWL=0.682,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dEeiPaUF3hgM for <ipsec@core3.amsl.com>; Mon, 10 Jan 2011 00:01:33 -0800 (PST)
Received: from michael.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by core3.amsl.com (Postfix) with ESMTP id 554EC28C0D9 for <ipsec@ietf.org>; Mon, 10 Jan 2011 00:01:33 -0800 (PST)
X-CheckPoint: {4D2ABD61-0-1B221DC2-2FFFF}
Received: from il-ex01.ad.checkpoint.com (il-ex01.checkpoint.com [194.29.34.26]) by michael.checkpoint.com (8.13.8/8.13.8) with ESMTP id p0A834IZ022514 for <ipsec@ietf.org>; Mon, 10 Jan 2011 10:03:45 +0200
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Mon, 10 Jan 2011 10:03:15 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Date: Mon, 10 Jan 2011 10:03:15 +0200
Thread-Topic: Issue #202: Token makers generating the same tokens without synchronized DB
Thread-Index: AcuwnNU2DeUYQT7YSc+chV9E7CdKBw==
Message-ID: <D2C73D1D-0B5A-4812-B66A-561939693821@checkpoint.com>
References: <20110110074502.22466.22300.idtracker@localhost>
In-Reply-To: <20110110074502.22466.22300.idtracker@localhost>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [IPsec] Issue #202: Token makers generating the same tokens without synchronized DB
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2011 08:01:34 -0000

Greetings.

We have just submitted version -03 of the draft.  This closes issues, #198,=
 #199, #200, and #201.

Which leaves us with just one issue: #202


=3D=3D=3D=3D=3D=3D=3D=3D=3D Issue #202: Token makers generating the same to=
kens without synchronized DB
Section 10.4 of the draft has a use-case where a cluster of gateways share =
the same QCD token secret, because they back each other up.

The twist in this case, is that they don't have synchronized databases, so =
a fail-over is very much like a reboot - the IKE SA is gone, and QCD is eff=
ective in getting the other side to restart IKE quickly.

The problem is, that without a failover, it may be possible to get a member=
 that does not own the IKE SA to send the QCD token to an attacker. The att=
acker can then use this QCD token to tear down the IKE SA.

The method in section 5.2 tries to address this, by considering the IP addr=
ess of the token taker in the calculation.

Tero claims that this is a scenario that we should not address, and that pr=
edicting or prescribing load balancer behavior in inherently dangerous.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Please send your opinions to the list. This one actually addresses the scop=
e of the document, so it's strange that this comes up as the last issue, bu=
t we still have to decide on this.

Yoav



From gpoothia@microsoft.com  Mon Jan 10 14:19:21 2011
Return-Path: <gpoothia@microsoft.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F1C113A63C9 for <ipsec@core3.amsl.com>; Mon, 10 Jan 2011 14:19:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4znashyRfySz for <ipsec@core3.amsl.com>; Mon, 10 Jan 2011 14:19:17 -0800 (PST)
Received: from smtp.microsoft.com (mail3.microsoft.com [131.107.115.214]) by core3.amsl.com (Postfix) with ESMTP id 3A2823A63CA for <ipsec@ietf.org>; Mon, 10 Jan 2011 14:19:17 -0800 (PST)
Received: from TK5EX14HUBC104.redmond.corp.microsoft.com (157.54.80.25) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.176.0; Mon, 10 Jan 2011 14:21:31 -0800
Received: from TK5EX14MBXC118.redmond.corp.microsoft.com ([169.254.9.92]) by TK5EX14HUBC104.redmond.corp.microsoft.com ([157.54.80.25]) with mapi id 14.01.0255.003; Mon, 10 Jan 2011 14:21:31 -0800
From: Gaurav Poothia <gpoothia@microsoft.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Thread-Topic: Question about TS construction on IKEv2 initiator
Thread-Index: AcuxFLq/Ri5WB3/gR6mu963YIt/3rA==
Date: Mon, 10 Jan 2011 22:21:30 +0000
Message-ID: <B69601AD18064F4BBA2D61CA82AEAFA9281EF444@TK5EX14MBXC118.redmond.corp.microsoft.com>
Accept-Language: en-CA, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.76]
Content-Type: multipart/alternative; boundary="_000_B69601AD18064F4BBA2D61CA82AEAFA9281EF444TK5EX14MBXC118r_"
MIME-Version: 1.0
Cc: Brian Swander <briansw@microsoft.com>, Gabriel Montenegro <gmonte@microsoft.com>
Subject: [IPsec] Question about TS construction on IKEv2 initiator
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2011 22:19:21 -0000

--_000_B69601AD18064F4BBA2D61CA82AEAFA9281EF444TK5EX14MBXC118r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Excerpt from RFC 5996 Sec 2.9
"To enable the responder to choose the appropriate range in this case,
   if the initiator has requested the SA due to a data packet, the
   initiator SHOULD include as the first Traffic Selector in each of TSi
   and TSr a very specific Traffic Selector including the addresses in
   the packet triggering the request."

I am not sure if there is a RFC dictated upper bound on the number of Traff=
ic Selectors in each of TSi and TSr.
Looking at the examples in the RFC you can surely have 1 or 2 selectors.  B=
ut are any more allowed?

The answer obviously effects the complexity of the responder's TS narrowing=
 algo where a union of the incoming Traffic Selectors is an input.

Thanks



--_000_B69601AD18064F4BBA2D61CA82AEAFA9281EF444TK5EX14MBXC118r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:p=3D"urn:schemas-m=
icrosoft-com:office:powerpoint" xmlns:a=3D"urn:schemas-microsoft-com:office=
:access" xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s=3D"=
uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs=3D"urn:schemas-microsof=
t-com:rowset" xmlns:z=3D"#RowsetSchema" xmlns:b=3D"urn:schemas-microsoft-co=
m:office:publisher" xmlns:ss=3D"urn:schemas-microsoft-com:office:spreadshee=
t" xmlns:c=3D"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns=
:odc=3D"urn:schemas-microsoft-com:office:odc" xmlns:oa=3D"urn:schemas-micro=
soft-com:office:activation" xmlns:html=3D"http://www.w3.org/TR/REC-html40" =
xmlns:q=3D"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc=3D"http://m=
icrosoft.com/officenet/conferencing" xmlns:D=3D"DAV:" xmlns:Repl=3D"http://=
schemas.microsoft.com/repl/" xmlns:mt=3D"http://schemas.microsoft.com/share=
point/soap/meetings/" xmlns:x2=3D"http://schemas.microsoft.com/office/excel=
/2003/xml" xmlns:ppda=3D"http://www.passport.com/NameSpace.xsd" xmlns:ois=
=3D"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir=3D"http://=
schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds=3D"http://www.w3=
.org/2000/09/xmldsig#" xmlns:dsp=3D"http://schemas.microsoft.com/sharepoint=
/dsp" xmlns:udc=3D"http://schemas.microsoft.com/data/udc" xmlns:xsd=3D"http=
://www.w3.org/2001/XMLSchema" xmlns:sub=3D"http://schemas.microsoft.com/sha=
repoint/soap/2002/1/alerts/" xmlns:ec=3D"http://www.w3.org/2001/04/xmlenc#"=
 xmlns:sp=3D"http://schemas.microsoft.com/sharepoint/" xmlns:sps=3D"http://=
schemas.microsoft.com/sharepoint/soap/" xmlns:xsi=3D"http://www.w3.org/2001=
/XMLSchema-instance" xmlns:udcs=3D"http://schemas.microsoft.com/data/udc/so=
ap" xmlns:udcxf=3D"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udc=
p2p=3D"http://schemas.microsoft.com/data/udc/parttopart" xmlns:wf=3D"http:/=
/schemas.microsoft.com/sharepoint/soap/workflow/" xmlns:dsss=3D"http://sche=
mas.microsoft.com/office/2006/digsig-setup" xmlns:dssi=3D"http://schemas.mi=
crosoft.com/office/2006/digsig" xmlns:mdssi=3D"http://schemas.openxmlformat=
s.org/package/2006/digital-signature" xmlns:mver=3D"http://schemas.openxmlf=
ormats.org/markup-compatibility/2006" xmlns:m=3D"http://schemas.microsoft.c=
om/office/2004/12/omml" xmlns:mrels=3D"http://schemas.openxmlformats.org/pa=
ckage/2006/relationships" xmlns:spwp=3D"http://microsoft.com/sharepoint/web=
partpages" xmlns:ex12t=3D"http://schemas.microsoft.com/exchange/services/20=
06/types" xmlns:ex12m=3D"http://schemas.microsoft.com/exchange/services/200=
6/messages" xmlns:pptsl=3D"http://schemas.microsoft.com/sharepoint/soap/Sli=
deLibrary/" xmlns:spsl=3D"http://microsoft.com/webservices/SharePointPortal=
Server/PublishedLinksService" xmlns:Z=3D"urn:schemas-microsoft-com:" xmlns:=
st=3D"&#1;" xmlns=3D"http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Excerpt from RFC 5996 Sec 2.9<o:p></o:p></p>
<p class=3D"MsoNormal">&#8220;To enable the responder to choose the appropr=
iate range in this case,<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp; if the initiator has requested the SA d=
ue to a data packet, the<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp; initiator SHOULD include as the first T=
raffic Selector in each of TSi<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp; and TSr a very specific Traffic Selecto=
r including the addresses in<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp; the packet triggering the request.&#822=
1;<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I am not sure if there is a RFC dictated upper bound=
 on the number of Traffic Selectors in each of TSi and TSr.<o:p></o:p></p>
<p class=3D"MsoNormal">Looking at the examples in the RFC you can surely ha=
ve 1 or 2 selectors. &nbsp;But are any more allowed?<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">The answer obviously effects the complexity of the r=
esponder&#8217;s TS narrowing algo where a union of the incoming Traffic Se=
lectors is an input.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Thanks<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b><o:p>&nbsp;</o:p></b></p>
</div>
</body>
</html>

--_000_B69601AD18064F4BBA2D61CA82AEAFA9281EF444TK5EX14MBXC118r_--

From ynir@checkpoint.com  Mon Jan 10 15:25:49 2011
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2E7BE3A67F4 for <ipsec@core3.amsl.com>; Mon, 10 Jan 2011 15:25:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.972
X-Spam-Level: 
X-Spam-Status: No, score=-9.972 tagged_above=-999 required=5 tests=[AWL=0.626,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VYAF2VGZZlyf for <ipsec@core3.amsl.com>; Mon, 10 Jan 2011 15:25:48 -0800 (PST)
Received: from michael.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by core3.amsl.com (Postfix) with ESMTP id 5A4713A679F for <ipsec@ietf.org>; Mon, 10 Jan 2011 15:25:47 -0800 (PST)
X-CheckPoint: {4D2B9601-0-1B221DC2-2FFFF}
Received: from il-ex01.ad.checkpoint.com (il-ex01.checkpoint.com [194.29.34.26]) by michael.checkpoint.com (8.13.8/8.13.8) with ESMTP id p0ANS0DQ011549;  Tue, 11 Jan 2011 01:28:00 +0200
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Tue, 11 Jan 2011 01:28:00 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: Gaurav Poothia <gpoothia@microsoft.com>
Date: Tue, 11 Jan 2011 01:27:59 +0200
Thread-Topic: [IPsec] Question about TS construction on IKEv2 initiator
Thread-Index: AcuxHgT/IBi6Z9GGTxGYRLsSnI22ZA==
Message-ID: <042F8512-F1F5-42ED-942E-45873BE045B0@checkpoint.com>
References: <B69601AD18064F4BBA2D61CA82AEAFA9281EF444@TK5EX14MBXC118.redmond.corp.microsoft.com>
In-Reply-To: <B69601AD18064F4BBA2D61CA82AEAFA9281EF444@TK5EX14MBXC118.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_042F8512F1F542ED942E45873BE045B0checkpointcom_"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Brian Swander <briansw@microsoft.com>, Gabriel Montenegro <gmonte@microsoft.com>
Subject: Re: [IPsec] Question about TS construction on IKEv2 initiator
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2011 23:25:49 -0000

--_000_042F8512F1F542ED942E45873BE045B0checkpointcom_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Hi Gaurav

There's a 1-octet field called "Number of TSs", so there can be at most 255=
 traffic selectors for each of initiator and responder.

And yes, as many selectors are allowed as you need to describe your policy.=
  In practice, some implementations can't handle complex policies, and requ=
ire SAs to cover entire subnets or single ranges. If your algorithms only h=
andles the first two selectors of each kind, I think it will work fine, but=
 will produce more SAs than policy dictates.

On Jan 11, 2011, at 12:21 AM, Gaurav Poothia wrote:

Excerpt from RFC 5996 Sec 2.9
=93To enable the responder to choose the appropriate range in this case,
   if the initiator has requested the SA due to a data packet, the
   initiator SHOULD include as the first Traffic Selector in each of TSi
   and TSr a very specific Traffic Selector including the addresses in
   the packet triggering the request.=94

I am not sure if there is a RFC dictated upper bound on the number of Traff=
ic Selectors in each of TSi and TSr.
Looking at the examples in the RFC you can surely have 1 or 2 selectors.  B=
ut are any more allowed?

The answer obviously effects the complexity of the responder=92s TS narrowi=
ng algo where a union of the incoming Traffic Selectors is an input.

Thanks


<ATT00001..txt>


--_000_042F8512F1F542ED942E45873BE045B0checkpointcom_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<html><head><base href=3D"x-msg://12/"></head><body style=3D"word-wrap: bre=
ak-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "=
>Hi Gaurav<div><br></div><div>There's a 1-octet field called "Number of TSs=
", so there can be at most 255 traffic selectors for each of initiator and =
responder.</div><div><br></div><div>And yes, as many selectors are allowed =
as you need to describe your policy. &nbsp;In practice, some implementation=
s can't handle complex policies, and require SAs to cover entire subnets or=
 single ranges. If your algorithms only handles the first two selectors of =
each kind, I think it will work fine, but will produce more SAs than policy=
 dictates.</div><div><br><div><div>On Jan 11, 2011, at 12:21 AM, Gaurav Poo=
thia wrote:</div><br class=3D"Apple-interchange-newline"><blockquote type=
=3D"cite"><span class=3D"Apple-style-span" style=3D"border-collapse: separa=
te; font-family: Tahoma; font-style: normal; font-variant: normal; font-wei=
ght: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-=
indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spa=
cing: 0px; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-=
spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-a=
djust: auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div lang=
=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" style=
=3D"page: WordSection1; "><div style=3D"margin-top: 0in; margin-right: 0in;=
 margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font-family: C=
alibri, sans-serif; ">Excerpt from RFC 5996 Sec 2.9<o:p></o:p></div><div st=
yle=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-=
left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; ">=93To enabl=
e the responder to choose the appropriate range in this case,<o:p></o:p></d=
iv><div style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001p=
t; margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; ">&=
nbsp;&nbsp; if the initiator has requested the SA due to a data packet, the=
<o:p></o:p></div><div style=3D"margin-top: 0in; margin-right: 0in; margin-b=
ottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font-family: Calibri, s=
ans-serif; ">&nbsp;&nbsp; initiator SHOULD include as the first Traffic Sel=
ector in each of TSi<o:p></o:p></div><div style=3D"margin-top: 0in; margin-=
right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; fon=
t-family: Calibri, sans-serif; ">&nbsp;&nbsp; and TSr a very specific Traff=
ic Selector including the addresses in<o:p></o:p></div><div style=3D"margin=
-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; fo=
nt-size: 11pt; font-family: Calibri, sans-serif; ">&nbsp;&nbsp; the packet =
triggering the request.=94<o:p></o:p></div><div style=3D"margin-top: 0in; m=
argin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11p=
t; font-family: Calibri, sans-serif; "><o:p>&nbsp;</o:p></div><div style=3D=
"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: =
0in; font-size: 11pt; font-family: Calibri, sans-serif; ">I am not sure if =
there is a RFC dictated upper bound on the number of Traffic Selectors in e=
ach of TSi and TSr.<o:p></o:p></div><div style=3D"margin-top: 0in; margin-r=
ight: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font=
-family: Calibri, sans-serif; ">Looking at the examples in the RFC you can =
surely have 1 or 2 selectors. &nbsp;But are any more allowed?<o:p></o:p></d=
iv><div style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001p=
t; margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; "><=
o:p>&nbsp;</o:p></div><div style=3D"margin-top: 0in; margin-right: 0in; mar=
gin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">The answer obviously effects the complexity of the respon=
der=92s TS narrowing algo where a union of the incoming Traffic Selectors i=
s an input.<o:p></o:p></div><div style=3D"margin-top: 0in; margin-right: 0i=
n; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font-family:=
 Calibri, sans-serif; "><o:p>&nbsp;</o:p></div><div style=3D"margin-top: 0i=
n; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size:=
 11pt; font-family: Calibri, sans-serif; ">Thanks<o:p></o:p></div><div styl=
e=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-le=
ft: 0in; font-size: 11pt; font-family: Calibri, sans-serif; "><o:p>&nbsp;</=
o:p></div><div style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: =
0.0001pt; margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-ser=
if; "><b><o:p>&nbsp;</o:p></b></div></div><span>&lt;ATT00001..txt&gt;</span=
></div></span></blockquote></div><br></div></body></html>=

--_000_042F8512F1F542ED942E45873BE045B0checkpointcom_--

From kaushalshriyan@gmail.com  Mon Jan 10 23:10:20 2011
Return-Path: <kaushalshriyan@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8C7073A69C2 for <ipsec@core3.amsl.com>; Mon, 10 Jan 2011 23:10:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RZnzuU3pVE5Y for <ipsec@core3.amsl.com>; Mon, 10 Jan 2011 23:10:19 -0800 (PST)
Received: from mail-yx0-f172.google.com (mail-yx0-f172.google.com [209.85.213.172]) by core3.amsl.com (Postfix) with ESMTP id 411223A69C0 for <IPsec@ietf.org>; Mon, 10 Jan 2011 23:10:16 -0800 (PST)
Received: by yxt33 with SMTP id 33so8822230yxt.31 for <IPsec@ietf.org>; Mon, 10 Jan 2011 23:12:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:mime-version:received:from:date :message-id:subject:to:content-type; bh=cKx25xlk4WAaW8Pfx+UqNq31ioviud2uqDKvefvfBsk=; b=YwZvkdsIRKF3faSW3aaR6JXd3qTjA0BaSkbesilM+dfDn6KBi6d9DbVmpp+G/z106+ xeNB3rO4D7z1A0WOSGZE1st4pWII2NbmkK3oHxanR2lmu9GAKrNYosQO/xiqb60w6buZ o5rRDunvl58zlIHkqWsHS1D/cICjDrfA9TltQ=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:from:date:message-id:subject:to:content-type; b=O+5qwAmXc/nRIf/o8yLTNiw4XnYLV4LA7Fr3hMI/7BByYOGTXi6XNvoWIMlAObvK1t tYla6IZwMtU6CkzUsMVvvwDG67j921diJRislkx+W9aRTXroMK5Y/1zCY/0W1H8pE9fl UA6HTm3Uj8oKtwlTgvLM47bUsJ8iqFs0hKvZA=
Received: by 10.90.74.1 with SMTP id w1mr311758aga.97.1294729951916; Mon, 10 Jan 2011 23:12:31 -0800 (PST)
MIME-Version: 1.0
Received: by 10.90.67.12 with HTTP; Mon, 10 Jan 2011 23:12:11 -0800 (PST)
From: Kaushal Shriyan <kaushalshriyan@gmail.com>
Date: Tue, 11 Jan 2011 12:42:11 +0530
Message-ID: <AANLkTinXiP5LHWJa=jJBcaqPQJ-Syf6genLukHL7YPbR@mail.gmail.com>
To: IPsec@ietf.org
Content-Type: multipart/alternative; boundary=001636283570dd33dc04998ccec0
Subject: [IPsec] IPsec on ubuntu linux server 8.04
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jan 2011 07:12:52 -0000

--001636283570dd33dc04998ccec0
Content-Type: text/plain; charset=ISO-8859-1

Hi,

I did add local4.debug /var/log/ipsec.log in /etc/syslog.conf and restarted
sysklogd and also restarted ipsec service.

There is nothing in ipsec.log. The file is empty

Please suggest/guide.

Thanks

Kaushal

--001636283570dd33dc04998ccec0
Content-Type: text/html; charset=ISO-8859-1

Hi,<br><br>I did add local4.debug /var/log/ipsec.log in /etc/syslog.conf and restarted sysklogd and also restarted ipsec service. <br><br>There is nothing in ipsec.log. The file is empty<br><br>Please suggest/guide.<br><br>

Thanks<br><br>Kaushal<br>

--001636283570dd33dc04998ccec0--

From ynir@checkpoint.com  Mon Jan 10 23:28:45 2011
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 929903A69C0 for <ipsec@core3.amsl.com>; Mon, 10 Jan 2011 23:28:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.985
X-Spam-Level: 
X-Spam-Status: No, score=-9.985 tagged_above=-999 required=5 tests=[AWL=0.614,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pPhgsEUr0jpY for <ipsec@core3.amsl.com>; Mon, 10 Jan 2011 23:28:44 -0800 (PST)
Received: from michael.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by core3.amsl.com (Postfix) with ESMTP id F19913A69B8 for <IPsec@ietf.org>; Mon, 10 Jan 2011 23:28:43 -0800 (PST)
X-CheckPoint: {4D2C0733-0-1B221DC2-2FFFF}
Received: from il-ex01.ad.checkpoint.com (il-ex01.checkpoint.com [194.29.34.26]) by michael.checkpoint.com (8.13.8/8.13.8) with ESMTP id p0B7UvRT002798;  Tue, 11 Jan 2011 09:30:57 +0200
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Tue, 11 Jan 2011 09:30:57 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: Kaushal Shriyan <kaushalshriyan@gmail.com>
Date: Tue, 11 Jan 2011 09:30:57 +0200
Thread-Topic: [IPsec] IPsec on ubuntu linux server 8.04
Thread-Index: AcuxYXyA3bnbtMEiSfyrHMzWf+unNQ==
Message-ID: <B2F9807B-88F1-412C-AE39-758C77355F94@checkpoint.com>
References: <AANLkTinXiP5LHWJa=jJBcaqPQJ-Syf6genLukHL7YPbR@mail.gmail.com>
In-Reply-To: <AANLkTinXiP5LHWJa=jJBcaqPQJ-Syf6genLukHL7YPbR@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "IPsec@ietf.org" <IPsec@ietf.org>
Subject: Re: [IPsec] IPsec on ubuntu linux server 8.04
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jan 2011 07:28:45 -0000

Hi Kaushal.

This mailing list is about the IKE and IPsec protocols, not some particular=
 implementation.

IIRC on Ubuntu you can install either StrongSwan or racoon, with StrongSwan=
 being the default on recent versions.

I suggest you seek support either at the StrongSwan site ( http://www.stron=
gswan.org/ ) or at the Ubuntu forums, which are less specific, but tend to =
be very friendly.

Yoav

On Jan 11, 2011, at 9:12 AM, Kaushal Shriyan wrote:

> Hi,
>=20
> I did add local4.debug /var/log/ipsec.log in /etc/syslog.conf and restart=
ed sysklogd and also restarted ipsec service.=20
>=20
> There is nothing in ipsec.log. The file is empty
>=20
> Please suggest/guide.
>=20
> Thanks
>=20
> Kaushal
>=20
>=20
> Scanned by Check Point Total Security Gateway.=20
>=20
> <ATT00001..txt>


From paul.hoffman@vpnc.org  Tue Jan 11 07:31:19 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7C4A23A6A47 for <ipsec@core3.amsl.com>; Tue, 11 Jan 2011 07:31:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.771
X-Spam-Level: 
X-Spam-Status: No, score=-100.771 tagged_above=-999 required=5 tests=[AWL=-0.584, BAYES_20=-0.74, HELO_MISMATCH_COM=0.553, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0Qu4hJ7QUiR1 for <ipsec@core3.amsl.com>; Tue, 11 Jan 2011 07:31:18 -0800 (PST)
Received: from hoffman.proper.com (Hoffman.Proper.COM [207.182.41.81]) by core3.amsl.com (Postfix) with ESMTP id B56C13A6A40 for <ipsec@ietf.org>; Tue, 11 Jan 2011 07:31:18 -0800 (PST)
Received: from MacBook-08.local (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p0BFXNxS028460 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO); Tue, 11 Jan 2011 08:33:24 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Message-ID: <4D2C7843.7070407@vpnc.org>
Date: Tue, 11 Jan 2011 07:33:23 -0800
From: Paul Hoffman <paul.hoffman@vpnc.org>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: Yoav Nir <ynir@checkpoint.com>
References: <20110110074502.22466.22300.idtracker@localhost> <D2C73D1D-0B5A-4812-B66A-561939693821@checkpoint.com>
In-Reply-To: <D2C73D1D-0B5A-4812-B66A-561939693821@checkpoint.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] Issue #202: Token makers generating the same tokens without synchronized DB
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jan 2011 15:31:19 -0000

On 1/10/11 12:03 AM, Yoav Nir wrote:
> Greetings.
>
> We have just submitted version -03 of the draft.  This closes issues, #198, #199, #200, and #201.
>
> Which leaves us with just one issue: #202

So far, there have been no posts on this thread. I encourage the 
document authors to weigh in on the topic soon so that others can see 
whether they want to as well.

From wierbows@us.ibm.com  Tue Jan 11 09:36:45 2011
Return-Path: <wierbows@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DA28628C0DC; Tue, 11 Jan 2011 09:36:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.599
X-Spam-Level: 
X-Spam-Status: No, score=-4.599 tagged_above=-999 required=5 tests=[AWL=-2.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HaYEFnWcV1yo; Tue, 11 Jan 2011 09:36:44 -0800 (PST)
Received: from e9.ny.us.ibm.com (e9.ny.us.ibm.com [32.97.182.139]) by core3.amsl.com (Postfix) with ESMTP id 886993A6A6D; Tue, 11 Jan 2011 09:36:44 -0800 (PST)
Received: from d01dlp02.pok.ibm.com (d01dlp02.pok.ibm.com [9.56.224.85]) by e9.ny.us.ibm.com (8.14.4/8.13.1) with ESMTP id p0BHF0dL021808; Tue, 11 Jan 2011 12:15:00 -0500
Received: from d01relay06.pok.ibm.com (d01relay06.pok.ibm.com [9.56.227.116]) by d01dlp02.pok.ibm.com (Postfix) with ESMTP id 438574DE803F; Tue, 11 Jan 2011 12:35:59 -0500 (EST)
Received: from d01av01.pok.ibm.com (d01av01.pok.ibm.com [9.56.224.215]) by d01relay06.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p0BHcwi82248882; Tue, 11 Jan 2011 12:38:58 -0500
Received: from d01av01.pok.ibm.com (loopback [127.0.0.1]) by d01av01.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p0BHcwpB025189; Tue, 11 Jan 2011 12:38:58 -0500
Received: from d01ml084.pok.ibm.com (d01ml084.pok.ibm.com [9.63.10.23]) by d01av01.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p0BHcwB9025176; Tue, 11 Jan 2011 12:38:58 -0500
In-Reply-To: <D2C73D1D-0B5A-4812-B66A-561939693821@checkpoint.com>
References: <20110110074502.22466.22300.idtracker@localhost> <D2C73D1D-0B5A-4812-B66A-561939693821@checkpoint.com>
X-KeepSent: D2804B47:27EE4BAD-85257815:005D9A8D; type=4; name=$KeepSent
To: "ipsec@ietf.org" <ipsec@ietf.org>, ipsec-bounces@ietf.org
X-Mailer: Lotus Notes Release 8.5.1FP1 SHF20 February 10, 2010
Message-ID: <OFD2804B47.27EE4BAD-ON85257815.005D9A8D-85257815.0060F346@us.ibm.com>
From: David Wierbowski <wierbows@us.ibm.com>
Date: Tue, 11 Jan 2011 12:38:56 -0500
X-MIMETrack: Serialize by Router on D01ML084/01/M/IBM(Release 8.0.2FP6|July 15, 2010) at 01/11/2011 12:38:57
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
X-Content-Scanned: Fidelis XPS MAILER
Cc: Yoav Nir <ynir@checkpoint.com>
Subject: Re: [IPsec] Issue #202: Token makers generating the same tokens without synchronized DB
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jan 2011 17:36:46 -0000

I agree with Tero that it is unsafe to assume how a load balancer decides
to distribute traffic.  Since section 9.4 (previously 10.4) is in the
Security Considerations section it seems reasonable to me that we'd warn
that the algorithms in 5.1 and 5.2 should not be used in cases where load
balancing cluster members share the same QCD token and do not share IKE SA
state.

I don't think this restriction precludes the use of QCD in the hot-standby
cluster scenario that Yoav mentioned in his previous append.  By definition
in a hot-standby cluster only one of the cluster members is active at any
one time and it is not doing load balancing with its standby members.

In the same append Yoav stated that to achieve scalability with your hot
standby-cluster, you implement load sharing.  If you add load balancing to
your hot standby-cluster then the warning in the previous paragraph
applies.  In otherwords if you want one of your standby members to be a
load balancing target for the active member in the cluster then you need to
share the IKE SA state between the active member and the standby member.

I'd recommend that the following text from 9.4 be changed:

   To thwart this possible attack, such configurations should use a
   method that considers the taker's IP address, such as the method
   described in Section 5.2.



Dave Wierbowski




From:       Yoav Nir <ynir@checkpoint.com>
To:         "ipsec@ietf.org" <ipsec@ietf.org>
Date:       01/10/2011 03:04 AM
Subject:    [IPsec] Issue #202: Token makers generating the same tokens
            without synchronized DB
Sent by:    ipsec-bounces@ietf.org



Greetings.

We have just submitted version -03 of the draft.  This closes issues, #198,
#199, #200, and #201.

Which leaves us with just one issue: #202


========= Issue #202: Token makers generating the same tokens without
synchronized DB
Section 10.4 of the draft has a use-case where a cluster of gateways share
the same QCD token secret, because they back each other up.

The twist in this case, is that they don't have synchronized databases, so
a fail-over is very much like a reboot - the IKE SA is gone, and QCD is
effective in getting the other side to restart IKE quickly.

The problem is, that without a failover, it may be possible to get a member
that does not own the IKE SA to send the QCD token to an attacker. The
attacker can then use this QCD token to tear down the IKE SA.

The method in section 5.2 tries to address this, by considering the IP
address of the token taker in the calculation.

Tero claims that this is a scenario that we should not address, and that
predicting or prescribing load balancer behavior in inherently dangerous.
=======================

Please send your opinions to the list. This one actually addresses the
scope of the document, so it's strange that this comes up as the last
issue, but we still have to decide on this.

Yoav


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec



From paul.hoffman@vpnc.org  Wed Jan 12 09:51:29 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 836E33A69B7 for <ipsec@core3.amsl.com>; Wed, 12 Jan 2011 09:51:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.769
X-Spam-Level: 
X-Spam-Status: No, score=-100.769 tagged_above=-999 required=5 tests=[AWL=-0.582, BAYES_20=-0.74, HELO_MISMATCH_COM=0.553, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DDBTrK5FVXw3 for <ipsec@core3.amsl.com>; Wed, 12 Jan 2011 09:51:27 -0800 (PST)
Received: from hoffman.proper.com (Hoffman.Proper.COM [207.182.41.81]) by core3.amsl.com (Postfix) with ESMTP id E882D3A6A6D for <ipsec@ietf.org>; Wed, 12 Jan 2011 09:51:26 -0800 (PST)
Received: from MacBook-08.local (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p0CHrkE1096065 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Wed, 12 Jan 2011 10:53:46 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Message-ID: <4D2DEAA9.2050301@vpnc.org>
Date: Wed, 12 Jan 2011 09:53:45 -0800
From: Paul Hoffman <paul.hoffman@vpnc.org>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: IPsecme WG <ipsec@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: [IPsec] WG Last Call on draft-ietf-ipsecme-failure-detection
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Jan 2011 17:51:29 -0000

Greetings again. This starts the two-week WG Last Call on 
draft-ietf-ipsecme-failure-detection, currently the -03 draft. There has 
been very little comment on this document lately, but please not that 
issue #202 (see <http://trac.tools.ietf.org/wg/ipsecme/trac/ticket/202>) 
is still open. Also note that our virtual interim meeting, which is 
meant to focus on this document, happens the day before this WG LC 
closes. If there continues to be little comment on the document or on 
issue #202, that will be a very short meeting.

--Paul Hoffman, Director
--VPN Consortium

From welterk@us.ibm.com  Wed Jan 12 12:29:58 2011
Return-Path: <welterk@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EF41D3A6A96 for <ipsec@core3.amsl.com>; Wed, 12 Jan 2011 12:29:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tTL5jnGRb4Lg for <ipsec@core3.amsl.com>; Wed, 12 Jan 2011 12:29:57 -0800 (PST)
Received: from e3.ny.us.ibm.com (e3.ny.us.ibm.com [32.97.182.143]) by core3.amsl.com (Postfix) with ESMTP id 064C33A6A93 for <ipsec@ietf.org>; Wed, 12 Jan 2011 12:29:56 -0800 (PST)
Received: from d01dlp02.pok.ibm.com (d01dlp02.pok.ibm.com [9.56.224.85]) by e3.ny.us.ibm.com (8.14.4/8.13.1) with ESMTP id p0CKDIBY020505 for <ipsec@ietf.org>; Wed, 12 Jan 2011 15:13:18 -0500
Received: from d01relay02.pok.ibm.com (d01relay02.pok.ibm.com [9.56.227.234]) by d01dlp02.pok.ibm.com (Postfix) with ESMTP id 2E16A4DE803F for <ipsec@ietf.org>; Wed, 12 Jan 2011 15:29:05 -0500 (EST)
Received: from d03av05.boulder.ibm.com (d03av05.boulder.ibm.com [9.17.195.85]) by d01relay02.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p0CKW8dg478856 for <ipsec@ietf.org>; Wed, 12 Jan 2011 15:32:08 -0500
Received: from d03av05.boulder.ibm.com (loopback [127.0.0.1]) by d03av05.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p0CKW8JF001163 for <ipsec@ietf.org>; Wed, 12 Jan 2011 13:32:08 -0700
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av05.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p0CKW834001157 for <ipsec@ietf.org>; Wed, 12 Jan 2011 13:32:08 -0700
To: ipsec@ietf.org
MIME-Version: 1.0
X-KeepSent: 83382F06:D21E6F23-88257816:0070A15A; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2FP3 SHF32 December 02, 2009
From: Keith Welter <welterk@us.ibm.com>
Message-ID: <OF83382F06.D21E6F23-ON88257816.0070A15A-88257816.0070D005@us.ibm.com>
Date: Wed, 12 Jan 2011 12:32:07 -0800
X-MIMETrack: Serialize by Router on D03NM118/03/M/IBM(Release 8.5.1FP4|July 25, 2010) at 01/12/2011 13:32:08, Serialize complete at 01/12/2011 13:32:08
Content-Type: multipart/alternative; boundary="=_alternative 0070CE5988257816_="
X-Content-Scanned: Fidelis XPS MAILER
Subject: [IPsec] draft-welter-ipsecme-ikev2-reauth-01
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Jan 2011 20:29:58 -0000

This is a multipart message in MIME format.
--=_alternative 0070CE5988257816_=
Content-Type: text/plain; charset="US-ASCII"

A new version of I-D, draft-welter-ipsecme-ikev2-reauth-01.txt has been 
successfully submitted by Keith Welter and posted to the IETF repository.

Filename:                 draft-welter-ipsecme-ikev2-reauth
Revision:                 01
Title:                            Reauthentication Extension for IKEv2
Creation_date:            2011-01-12
WG ID:                            Independent Submission
Number_of_pages: 6

Abstract:
This document describes an extension to the Internet Key Exchange
version 2 (IKEv2) protocol that allows an IKEv2 Security Association
(SA) to be reauthenticated without creating a new IKE SA or new Child
SAs.
  


The IETF Secretariat.




--=_alternative 0070CE5988257816_=
Content-Type: text/html; charset="US-ASCII"


<br><tt><font size=2>A new version of I-D, draft-welter-ipsecme-ikev2-reauth-01.txt
has been successfully submitted by Keith Welter and posted to the IETF
repository.<br>
<br>
Filename: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp;draft-welter-ipsecme-ikev2-reauth<br>
Revision: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp;01<br>
Title: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
Reauthentication Extension for IKEv2<br>
Creation_date: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp;2011-01-12<br>
WG ID: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
Independent Submission<br>
Number_of_pages: 6<br>
<br>
Abstract:<br>
This document describes an extension to the Internet Key Exchange<br>
version 2 (IKEv2) protocol that allows an IKEv2 Security Association<br>
(SA) to be reauthenticated without creating a new IKE SA or new Child<br>
SAs.<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br>
<br>
<br>
The IETF Secretariat.<br>
<br>
<br>
</font></tt>
<br>
--=_alternative 0070CE5988257816_=--

From smoonen@us.ibm.com  Wed Jan 12 12:43:50 2011
Return-Path: <smoonen@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 623AB3A69A4 for <ipsec@core3.amsl.com>; Wed, 12 Jan 2011 12:43:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.191
X-Spam-Level: 
X-Spam-Status: No, score=-4.191 tagged_above=-999 required=5 tests=[AWL=0.444,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, SARE_GIF_ATTACH=1.42, TVD_FW_GRAPHIC_NAME_MID=0.543]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZnKjCN356BBL for <ipsec@core3.amsl.com>; Wed, 12 Jan 2011 12:43:48 -0800 (PST)
Received: from e32.co.us.ibm.com (e32.co.us.ibm.com [32.97.110.150]) by core3.amsl.com (Postfix) with ESMTP id 29BC83A67E7 for <ipsec@ietf.org>; Wed, 12 Jan 2011 12:43:48 -0800 (PST)
Received: from d03relay02.boulder.ibm.com (d03relay02.boulder.ibm.com [9.17.195.227]) by e32.co.us.ibm.com (8.14.4/8.13.1) with ESMTP id p0CKa8Tc020732 for <ipsec@ietf.org>; Wed, 12 Jan 2011 13:36:08 -0700
Received: from d03av06.boulder.ibm.com (d03av06.boulder.ibm.com [9.17.195.245]) by d03relay02.boulder.ibm.com (8.13.8/8.13.8/NCO v9.1) with ESMTP id p0CKk4U8239036 for <ipsec@ietf.org>; Wed, 12 Jan 2011 13:46:04 -0700
Received: from d03av06.boulder.ibm.com (loopback [127.0.0.1]) by d03av06.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p0CKoVDj021678 for <ipsec@ietf.org>; Wed, 12 Jan 2011 13:50:31 -0700
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av06.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p0CKoU4A021673 for <ipsec@ietf.org>; Wed, 12 Jan 2011 13:50:30 -0700
In-Reply-To: <20110110074502.22466.22300.idtracker@localhost>
References: <20110110074502.22466.22300.idtracker@localhost>
X-KeepSent: A8BE8798:B3640724-85257816:0065945B; type=4; name=$KeepSent
To: ipsec@ietf.org
X-Mailer: Lotus Notes Release 8.5.1FP5 SHF29 November 12, 2010
Message-ID: <OFA8BE8798.B3640724-ON85257816.0065945B-85257816.007201DF@us.ibm.com>
From: Scott C Moonen <smoonen@us.ibm.com>
Date: Wed, 12 Jan 2011 15:45:15 -0500
X-MIMETrack: Serialize by Router on D03NM118/03/M/IBM(Release 8.5.1FP4|July 25, 2010) at 01/12/2011 13:46:03
MIME-Version: 1.0
Content-type: multipart/related;  Boundary="0__=0ABBF285DFF612CB8f9e8a93df938690918c0ABBF285DFF612CB"
Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-failure-detection-03.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Jan 2011 20:43:50 -0000

--0__=0ABBF285DFF612CB8f9e8a93df938690918c0ABBF285DFF612CB
Content-type: multipart/alternative; 
	Boundary="1__=0ABBF285DFF612CB8f9e8a93df938690918c0ABBF285DFF612CB"

--1__=0ABBF285DFF612CB8f9e8a93df938690918c0ABBF285DFF612CB
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: quoted-printable


Comments on the draft, mostly editorial in nature:

(1) There are still some blockquotes that start with excessive first-li=
ne
indents, eg., the three quotes on page 5.
(2) Page 5, should add comma after "system" in "Reboot, depending on th=
e
system."
(3) Page 5, should pluralize "implementation" in "IKEv2 implementation =
can
detect."
(4) Page 5, should remove "the" in "rules given in the section."
(5) Page 6, correct "even has change" to "even has a chance."
(6) Page 6, change comma to semicolon in "immediately, in those cases."=

(7) Page 6, suggest improving sentence beginning "Note, that" to read "=
Note
that the IKEv2 specification specifically gives no guidance for the num=
ber
of retries or the length of timeouts, as these do not affect
interoperability."
(8) Page 6, suggest changing "messages as hints that will shorten" to r=
ead
"messages to shorten."
(9) Global, need commas after "i.e."
(10) Page 6, change "that kind of hints" to either "this kind of hint" =
or
"these kinds of hints."
(11) Page 7, pluralize first word in "Implementation that are not token=

takers."
(12) Section 4.1, should we specify that the critical bit is set to 0?
(13) Page 8, the last line is an orphan.
(14) Section 4.2 says the payload "MUST follow . . . and precede . . ."=
  In
general I think the IKEv2 specs have tried to say SHOULD for ordering
considerations; should we do so here?
(15) Section 4.3 says "SHOULD send a new ticket."  I think we mean to s=
ay
"QCD_TOKEN notification" instead of "ticket."
(16) Section 4.5, is it correct to denote the unprotected message as a
"request" in the flow diagrams?  I think we were careful in RFC 5996 to=

denote standalone messages as informational messages rather than
informational requests.
(17) Section 7, change "new IKE SA consume" to "new IKE SA to consume."=

(18) Section 7, suggest changing "re-establishment should occur" to eit=
her
"would occur" or "will occur."
(19) Section 8.1, suggest changing "inter-domain VPN gateway" to either=
 add
"an" before it or pluralize "gateway."


Scott Moonen (smoonen@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://www.linkedin.com/in/smoonen



From:	Internet-Drafts@ietf.org
To:	i-d-announce@ietf.org
Cc:	ipsec@ietf.org
Date:	01/10/2011 02:48 AM
Subject:	[IPsec] I-D Action:draft-ietf-ipsecme-failure-detection-03.txt=

Sent by:	ipsec-bounces@ietf.org



A New Internet-Draft is available from the on-line Internet-Drafts
directories.
This draft is a work item of the IP Security Maintenance and Extensions=

Working Group of the IETF.


		 Title           : A Quick Crash Detection Method for IKE
		 Author(s)       : Y. Nir, et al.
		 Filename        : draft-ietf-ipsecme-failure-detection-03.txt
		 Pages           : 23
		 Date            : 2011-01-09

This document describes an extension to the IKEv2 protocol that
allows for faster detection of SA desynchronization using a saved
token.

When an IPsec tunnel between two IKEv2 peers is disconnected due to a
restart of one peer, it can take as much as several minutes for the
other peer to discover that the reboot has occurred, thus delaying
recovery.  In this text we propose an extension to the protocol, that
allows for recovery immediately following the restart.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-failure-detectio=
n-03.txt


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.
ftp://anonymous@ftp.ietf.org/internet-drafts/draft-ietf-ipsecme-failure=
-detection-03.txt
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
=

--1__=0ABBF285DFF612CB8f9e8a93df938690918c0ABBF285DFF612CB
Content-type: text/html; charset=US-ASCII
Content-Disposition: inline
Content-transfer-encoding: quoted-printable

<html><body>
<p>Comments on the draft, mostly editorial in nature:<br>
<br>
(1) There are still some blockquotes that start with excessive first-li=
ne indents, eg., the three quotes on page 5.<br>
(2) Page 5, should add comma after &quot;system&quot; in &quot;Reboot, =
depending on the system.&quot;<br>
(3) Page 5, should pluralize &quot;implementation&quot; in &quot;IKEv2 =
implementation can detect.&quot;<br>
(4) Page 5, should remove &quot;the&quot; in &quot;rules given in the s=
ection.&quot;<br>
(5) Page 6, correct &quot;even has change&quot; to &quot;even has <b>a<=
/b> chan<b>c</b>e.&quot;<br>
(6) Page 6, change comma to semicolon in &quot;immediately, in those ca=
ses.&quot;<br>
(7) Page 6, suggest improving sentence beginning &quot;Note, that&quot;=
 to read &quot;Note that the IKEv2 specification specifically gives no =
guidance for the number of retries or the length of timeouts, as these =
do not affect interoperability.&quot;<br>
(8) Page 6, suggest changing &quot;messages as hints that will shorten&=
quot; to read &quot;messages to shorten.&quot;<br>
(9) Global, need commas after &quot;i.e.&quot;<br>
(10) Page 6, change &quot;that kind of hints&quot; to either &quot;this=
 kind of hint&quot; or &quot;these kinds of hints.&quot;<br>
(11) Page 7, pluralize first word in &quot;Implementation that are not =
token takers.&quot;<br>
(12) Section 4.1, should we specify that the critical bit is set to 0?<=
br>
(13) Page 8, the last line is an orphan.<br>
(14) Section 4.2 says the payload &quot;MUST follow . . . and precede .=
 . .&quot;  In general I think the IKEv2 specs have tried to say SHOULD=
 for ordering considerations; should we do so here?<br>
(15) Section 4.3 says &quot;SHOULD send a new ticket.&quot;  I think we=
 mean to say &quot;QCD_TOKEN notification&quot; instead of &quot;ticket=
.&quot;<br>
(16) Section 4.5, is it correct to denote the unprotected message as a =
&quot;request&quot; in the flow diagrams?  I think we were careful in R=
FC 5996 to denote standalone messages as informational messages rather =
than informational requests.<br>
(17) Section 7, change &quot;new IKE SA consume&quot; to &quot;new IKE =
SA to consume.&quot;<br>
(18) Section 7, suggest changing &quot;re-establishment should occur&qu=
ot; to either &quot;would occur&quot; or &quot;will occur.&quot;<br>
(19) Section 8.1, suggest changing &quot;inter-domain VPN gateway&quot;=
 to either add &quot;an&quot; before it or pluralize &quot;gateway.&quo=
t;<br>
<br>
<br>
Scott Moonen (smoonen@us.ibm.com)<br>
z/OS Communications Server TCP/IP Development<br>
<a href=3D"http://www.linkedin.com/in/smoonen">http://www.linkedin.com/=
in/smoonen</a><br>
<br>
<img width=3D"16" height=3D"16" src=3D"cid:1__=3D0ABBF285DFF612CB8f9e8a=
93df938@us.ibm.com" border=3D"0" alt=3D"Inactive hide details for Inter=
net-Drafts---01/10/2011 02:48:33 AM---A New Internet-Draft is available=
 from the on-line Interne"><font color=3D"#424282">Internet-Drafts---01=
/10/2011 02:48:33 AM---A New Internet-Draft is available from the on-li=
ne Internet-Drafts directories. This draft is a work</font><br>
<br>
<font size=3D"2" color=3D"#5F5F5F">From:	</font><font size=3D"2">Intern=
et-Drafts@ietf.org</font><br>
<font size=3D"2" color=3D"#5F5F5F">To:	</font><font size=3D"2">i-d-anno=
unce@ietf.org</font><br>
<font size=3D"2" color=3D"#5F5F5F">Cc:	</font><font size=3D"2">ipsec@ie=
tf.org</font><br>
<font size=3D"2" color=3D"#5F5F5F">Date:	</font><font size=3D"2">01/10/=
2011 02:48 AM</font><br>
<font size=3D"2" color=3D"#5F5F5F">Subject:	</font><font size=3D"2">[IP=
sec] I-D Action:draft-ietf-ipsecme-failure-detection-03.txt</font><br>
<font size=3D"2" color=3D"#5F5F5F">Sent by:	</font><font size=3D"2">ips=
ec-bounces@ietf.org</font><br>
<hr width=3D"100%" size=3D"2" align=3D"left" noshade style=3D"color:#80=
91A5; "><br>
<br>
<br>
<tt>A New Internet-Draft is available from the on-line Internet-Drafts =
directories.<br>
This draft is a work item of the IP Security Maintenance and Extensions=
 Working Group of the IETF.<br>
<br>
<br>
		 Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : A Quick Crash Detection M=
ethod for IKE<br>
		 Author(s) &nbsp; &nbsp; &nbsp; : Y. Nir, et al.<br>
		 Filename &nbsp; &nbsp; &nbsp; &nbsp;: draft-ietf-ipsecme-failure-det=
ection-03.txt<br>
		 Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 23<br>
		 Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 2011-01-09<br>
<br>
This document describes an extension to the IKEv2 protocol that<br>
allows for faster detection of SA desynchronization using a saved<br>
token.<br>
<br>
When an IPsec tunnel between two IKEv2 peers is disconnected due to a<b=
r>
restart of one peer, it can take as much as several minutes for the<br>=

other peer to discover that the reboot has occurred, thus delaying<br>
recovery. &nbsp;In this text we propose an extension to the protocol, t=
hat<br>
allows for recovery immediately following the restart.<br>
<br>
A URL for this Internet-Draft is:<br>
</tt><tt><a href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ipse=
cme-failure-detection-03.txt">http://www.ietf.org/internet-drafts/draft=
-ietf-ipsecme-failure-detection-03.txt</a></tt><tt><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
</tt><tt><a href=3D"ftp://ftp.ietf.org/internet-drafts/">ftp://ftp.ietf=
.org/internet-drafts/</a></tt><tt><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
</tt><a href=3D"ftp://anonymous@ftp.ietf.org/internet-drafts/draft-ietf=
-ipsecme-failure-detection-03.txt">ftp://anonymous@ftp.ietf.org/interne=
t-drafts/draft-ietf-ipsecme-failure-detection-03.txt</a><tt>___________=
____________________________________<br>
IPsec mailing list<br>
IPsec@ietf.org<br>
</tt><tt><a href=3D"https://www.ietf.org/mailman/listinfo/ipsec">https:=
//www.ietf.org/mailman/listinfo/ipsec</a></tt><tt><br>
</tt><br>
</body></html>=


--1__=0ABBF285DFF612CB8f9e8a93df938690918c0ABBF285DFF612CB--


--0__=0ABBF285DFF612CB8f9e8a93df938690918c0ABBF285DFF612CB
Content-type: image/gif; 
	name="graycol.gif"
Content-Disposition: inline; filename="graycol.gif"
Content-ID: <1__=0ABBF285DFF612CB8f9e8a93df938@us.ibm.com>
Content-transfer-encoding: base64

R0lGODlhEAAQAKECAMzMzAAAAP///wAAACH5BAEAAAIALAAAAAAQABAAAAIXlI+py+0PopwxUbpu
ZRfKZ2zgSJbmSRYAIf4fT3B0aW1pemVkIGJ5IFVsZWFkIFNtYXJ0U2F2ZXIhAAA7

--0__=0ABBF285DFF612CB8f9e8a93df938690918c0ABBF285DFF612CB--


From smoonen@us.ibm.com  Wed Jan 12 12:51:55 2011
Return-Path: <smoonen@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E458B28C103; Wed, 12 Jan 2011 12:51:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.339
X-Spam-Level: 
X-Spam-Status: No, score=-2.339 tagged_above=-999 required=5 tests=[AWL=-1.704, BAYES_00=-2.599, HTML_MESSAGE=0.001, SARE_GIF_ATTACH=1.42, TVD_FW_GRAPHIC_NAME_MID=0.543]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QEdaJjOTg1TY; Wed, 12 Jan 2011 12:51:54 -0800 (PST)
Received: from e39.co.us.ibm.com (e39.co.us.ibm.com [32.97.110.160]) by core3.amsl.com (Postfix) with ESMTP id 3F55D3A6A9C; Wed, 12 Jan 2011 12:51:54 -0800 (PST)
Received: from d03relay05.boulder.ibm.com (d03relay05.boulder.ibm.com [9.17.195.107]) by e39.co.us.ibm.com (8.14.4/8.13.1) with ESMTP id p0CKgAk7012510; Wed, 12 Jan 2011 13:42:10 -0700
Received: from d03av05.boulder.ibm.com (d03av05.boulder.ibm.com [9.17.195.85]) by d03relay05.boulder.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p0CKsD1F136588; Wed, 12 Jan 2011 13:54:13 -0700
Received: from d03av05.boulder.ibm.com (loopback [127.0.0.1]) by d03av05.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p0CKsDUe005296; Wed, 12 Jan 2011 13:54:13 -0700
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av05.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p0CKsDwr005284; Wed, 12 Jan 2011 13:54:13 -0700
In-Reply-To: <OFD2804B47.27EE4BAD-ON85257815.005D9A8D-85257815.0060F346@us.ibm.com>
References: <20110110074502.22466.22300.idtracker@localhost>	<D2C73D1D-0B5A-4812-B66A-561939693821@checkpoint.com> <OFD2804B47.27EE4BAD-ON85257815.005D9A8D-85257815.0060F346@us.ibm.com>
X-KeepSent: 77545877:B42E95F3-85257816:00726F1F; type=4; name=$KeepSent
To: David Wierbowski <wierbows@us.ibm.com>
X-Mailer: Lotus Notes Release 8.5.1FP5 SHF29 November 12, 2010
Message-ID: <OF77545877.B42E95F3-ON85257816.00726F1F-85257816.0072CFFD@us.ibm.com>
From: Scott C Moonen <smoonen@us.ibm.com>
Date: Wed, 12 Jan 2011 15:54:03 -0500
X-MIMETrack: Serialize by Router on D03NM118/03/M/IBM(Release 8.5.1FP4|July 25, 2010) at 01/12/2011 13:54:12
MIME-Version: 1.0
Content-type: multipart/related;  Boundary="0__=0ABBF285DFE1E98F8f9e8a93df938690918c0ABBF285DFE1E98F"
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, ipsec-bounces@ietf.org, Yoav Nir <ynir@checkpoint.com>
Subject: Re: [IPsec] Issue #202: Token makers generating the same tokens without synchronized DB
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Jan 2011 20:51:56 -0000

--0__=0ABBF285DFE1E98F8f9e8a93df938690918c0ABBF285DFE1E98F
Content-type: multipart/alternative; 
	Boundary="1__=0ABBF285DFE1E98F8f9e8a93df938690918c0ABBF285DFE1E98F"

--1__=0ABBF285DFE1E98F8f9e8a93df938690918c0ABBF285DFE1E98F
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: quoted-printable


I wonder if there's a way to merge sections 9.2 and 9.4.  I think that
using the algorithm in 5.2 as specified in 9.4 is really just an extens=
ion
of this requirement from section 9.2: "A token maker MUST NOT send a QC=
D
token in an unprotected message for an existing IKE SA."

It might be possible to remove a lot of the detail in 9.4 and generaliz=
e
9.2 to hint at there being several ways of solving this problem -- 9.2'=
s
state synchronization and 5.2/9.4's including the remote IP address.


Scott Moonen (smoonen@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://www.linkedin.com/in/smoonen



From:	David Wierbowski/Endicott/IBM@IBMUS
To:	"ipsec@ietf.org" <ipsec@ietf.org>, ipsec-bounces@ietf.org
Cc:	Yoav Nir <ynir@checkpoint.com>
Date:	01/11/2011 12:39 PM
Subject:	Re: [IPsec] Issue #202: Token makers generating the same token=
s
            without synchronized DB
Sent by:	ipsec-bounces@ietf.org



I agree with Tero that it is unsafe to assume how a load balancer decid=
es
to distribute traffic.  Since section 9.4 (previously 10.4) is in the
Security Considerations section it seems reasonable to me that we'd war=
n
that the algorithms in 5.1 and 5.2 should not be used in cases where lo=
ad
balancing cluster members share the same QCD token and do not share IKE=
 SA
state.

I don't think this restriction precludes the use of QCD in the hot-stan=
dby
cluster scenario that Yoav mentioned in his previous append.  By defini=
tion
in a hot-standby cluster only one of the cluster members is active at a=
ny
one time and it is not doing load balancing with its standby members.

In the same append Yoav stated that to achieve scalability with your ho=
t
standby-cluster, you implement load sharing.  If you add load balancing=
 to
your hot standby-cluster then the warning in the previous paragraph
applies.  In otherwords if you want one of your standby members to be a=

load balancing target for the active member in the cluster then you nee=
d to
share the IKE SA state between the active member and the standby member=
.

I'd recommend that the following text from 9.4 be changed:

   To thwart this possible attack, such configurations should use a
   method that considers the taker's IP address, such as the method
   described in Section 5.2.



Dave Wierbowski




From:       Yoav Nir <ynir@checkpoint.com>
To:         "ipsec@ietf.org" <ipsec@ietf.org>
Date:       01/10/2011 03:04 AM
Subject:    [IPsec] Issue #202: Token makers generating the same tokens=

            without synchronized DB
Sent by:    ipsec-bounces@ietf.org



Greetings.

We have just submitted version -03 of the draft.  This closes issues, #=
198,
#199, #200, and #201.

Which leaves us with just one issue: #202


=3D=3D=3D=3D=3D=3D=3D=3D=3D Issue #202: Token makers generating the sam=
e tokens without
synchronized DB
Section 10.4 of the draft has a use-case where a cluster of gateways sh=
are
the same QCD token secret, because they back each other up.

The twist in this case, is that they don't have synchronized databases,=
 so
a fail-over is very much like a reboot - the IKE SA is gone, and QCD is=

effective in getting the other side to restart IKE quickly.

The problem is, that without a failover, it may be possible to get a me=
mber
that does not own the IKE SA to send the QCD token to an attacker. The
attacker can then use this QCD token to tear down the IKE SA.

The method in section 5.2 tries to address this, by considering the IP
address of the token taker in the calculation.

Tero claims that this is a scenario that we should not address, and tha=
t
predicting or prescribing load balancer behavior in inherently dangerou=
s.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Please send your opinions to the list. This one actually addresses the
scope of the document, so it's strange that this comes up as the last
issue, but we still have to decide on this.

Yoav


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
=

--1__=0ABBF285DFE1E98F8f9e8a93df938690918c0ABBF285DFE1E98F
Content-type: text/html; charset=US-ASCII
Content-Disposition: inline
Content-transfer-encoding: quoted-printable

<html><body>
<p>I wonder if there's a way to merge sections 9.2 and 9.4.  I think th=
at using the algorithm in 5.2 as specified in 9.4 is really just an ext=
ension of this requirement from section 9.2: &quot;A token maker MUST N=
OT send a QCD token in an unprotected message for an existing IKE SA.&q=
uot;<br>
<br>
It might be possible to remove a lot of the detail in 9.4 and generaliz=
e 9.2 to hint at there being several ways of solving this problem -- 9.=
2's state synchronization and 5.2/9.4's including the remote IP address=
.<br>
<br>
<br>
Scott Moonen (smoonen@us.ibm.com)<br>
z/OS Communications Server TCP/IP Development<br>
<a href=3D"http://www.linkedin.com/in/smoonen">http://www.linkedin.com/=
in/smoonen</a><br>
<br>
<img width=3D"16" height=3D"16" src=3D"cid:1__=3D0ABBF285DFE1E98F8f9e8a=
93df938@us.ibm.com" border=3D"0" alt=3D"Inactive hide details for David=
 Wierbowski---01/11/2011 12:39:21 PM---I agree with Tero that it is uns=
afe to assume how a load "><font color=3D"#424282">David Wierbowski---0=
1/11/2011 12:39:21 PM---I agree with Tero that it is unsafe to assume h=
ow a load balancer decides to distribute traffic.  Si</font><br>
<br>
<font size=3D"2" color=3D"#5F5F5F">From:	</font><font size=3D"2">David =
Wierbowski/Endicott/IBM@IBMUS</font><br>
<font size=3D"2" color=3D"#5F5F5F">To:	</font><font size=3D"2">&quot;ip=
sec@ietf.org&quot; &lt;ipsec@ietf.org&gt;, ipsec-bounces@ietf.org</font=
><br>
<font size=3D"2" color=3D"#5F5F5F">Cc:	</font><font size=3D"2">Yoav Nir=
 &lt;ynir@checkpoint.com&gt;</font><br>
<font size=3D"2" color=3D"#5F5F5F">Date:	</font><font size=3D"2">01/11/=
2011 12:39 PM</font><br>
<font size=3D"2" color=3D"#5F5F5F">Subject:	</font><font size=3D"2">Re:=
 [IPsec] Issue #202: Token makers generating the same tokens without sy=
nchronized DB</font><br>
<font size=3D"2" color=3D"#5F5F5F">Sent by:	</font><font size=3D"2">ips=
ec-bounces@ietf.org</font><br>
<hr width=3D"100%" size=3D"2" align=3D"left" noshade style=3D"color:#80=
91A5; "><br>
<br>
<br>
<tt>I agree with Tero that it is unsafe to assume how a load balancer d=
ecides<br>
to distribute traffic. &nbsp;Since section 9.4 (previously 10.4) is in =
the<br>
Security Considerations section it seems reasonable to me that we'd war=
n<br>
that the algorithms in 5.1 and 5.2 should not be used in cases where lo=
ad<br>
balancing cluster members share the same QCD token and do not share IKE=
 SA<br>
state.<br>
<br>
I don't think this restriction precludes the use of QCD in the hot-stan=
dby<br>
cluster scenario that Yoav mentioned in his previous append. &nbsp;By d=
efinition<br>
in a hot-standby cluster only one of the cluster members is active at a=
ny<br>
one time and it is not doing load balancing with its standby members.<b=
r>
<br>
In the same append Yoav stated that to achieve scalability with your ho=
t<br>
standby-cluster, you implement load sharing. &nbsp;If you add load bala=
ncing to<br>
your hot standby-cluster then the warning in the previous paragraph<br>=

applies. &nbsp;In otherwords if you want one of your standby members to=
 be a<br>
load balancing target for the active member in the cluster then you nee=
d to<br>
share the IKE SA state between the active member and the standby member=
.<br>
<br>
I'd recommend that the following text from 9.4 be changed:<br>
<br>
 &nbsp; To thwart this possible attack, such configurations should use =
a<br>
 &nbsp; method that considers the taker's IP address, such as the metho=
d<br>
 &nbsp; described in Section 5.2.<br>
<br>
<br>
<br>
Dave Wierbowski<br>
<br>
<br>
<br>
<br>
From: &nbsp; &nbsp; &nbsp; Yoav Nir &lt;ynir@checkpoint.com&gt;<br>
To: &nbsp; &nbsp; &nbsp; &nbsp; &quot;ipsec@ietf.org&quot; &lt;ipsec@ie=
tf.org&gt;<br>
Date: &nbsp; &nbsp; &nbsp; 01/10/2011 03:04 AM<br>
Subject: &nbsp; &nbsp;[IPsec] Issue #202: Token makers generating the s=
ame tokens<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;without synchronized DB<br>
Sent by: &nbsp; &nbsp;ipsec-bounces@ietf.org<br>
<br>
<br>
<br>
Greetings.<br>
<br>
We have just submitted version -03 of the draft. &nbsp;This closes issu=
es, #198,<br>
#199, #200, and #201.<br>
<br>
Which leaves us with just one issue: #202<br>
<br>
<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D Issue #202: Token makers generating the sam=
e tokens without<br>
synchronized DB<br>
Section 10.4 of the draft has a use-case where a cluster of gateways sh=
are<br>
the same QCD token secret, because they back each other up.<br>
<br>
The twist in this case, is that they don't have synchronized databases,=
 so<br>
a fail-over is very much like a reboot - the IKE SA is gone, and QCD is=
<br>
effective in getting the other side to restart IKE quickly.<br>
<br>
The problem is, that without a failover, it may be possible to get a me=
mber<br>
that does not own the IKE SA to send the QCD token to an attacker. The<=
br>
attacker can then use this QCD token to tear down the IKE SA.<br>
<br>
The method in section 5.2 tries to address this, by considering the IP<=
br>
address of the token taker in the calculation.<br>
<br>
Tero claims that this is a scenario that we should not address, and tha=
t<br>
predicting or prescribing load balancer behavior in inherently dangerou=
s.<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<b=
r>
<br>
Please send your opinions to the list. This one actually addresses the<=
br>
scope of the document, so it's strange that this comes up as the last<b=
r>
issue, but we still have to decide on this.<br>
<br>
Yoav<br>
<br>
<br>
_______________________________________________<br>
IPsec mailing list<br>
IPsec@ietf.org<br>
</tt><tt><a href=3D"https://www.ietf.org/mailman/listinfo/ipsec">https:=
//www.ietf.org/mailman/listinfo/ipsec</a></tt><tt><br>
<br>
<br>
_______________________________________________<br>
IPsec mailing list<br>
IPsec@ietf.org<br>
</tt><tt><a href=3D"https://www.ietf.org/mailman/listinfo/ipsec">https:=
//www.ietf.org/mailman/listinfo/ipsec</a></tt><tt><br>
</tt><br>
</body></html>=


--1__=0ABBF285DFE1E98F8f9e8a93df938690918c0ABBF285DFE1E98F--


--0__=0ABBF285DFE1E98F8f9e8a93df938690918c0ABBF285DFE1E98F
Content-type: image/gif; 
	name="graycol.gif"
Content-Disposition: inline; filename="graycol.gif"
Content-ID: <1__=0ABBF285DFE1E98F8f9e8a93df938@us.ibm.com>
Content-transfer-encoding: base64

R0lGODlhEAAQAKECAMzMzAAAAP///wAAACH5BAEAAAIALAAAAAAQABAAAAIXlI+py+0PopwxUbpu
ZRfKZ2zgSJbmSRYAIf4fT3B0aW1pemVkIGJ5IFVsZWFkIFNtYXJ0U2F2ZXIhAAA7

--0__=0ABBF285DFE1E98F8f9e8a93df938690918c0ABBF285DFE1E98F--


From welterk@us.ibm.com  Wed Jan 12 13:18:24 2011
Return-Path: <welterk@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BE9323A6A91 for <ipsec@core3.amsl.com>; Wed, 12 Jan 2011 13:18:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.598
X-Spam-Level: 
X-Spam-Status: No, score=-4.598 tagged_above=-999 required=5 tests=[AWL=-2.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IRxYiaXsx30Q for <ipsec@core3.amsl.com>; Wed, 12 Jan 2011 13:18:23 -0800 (PST)
Received: from e9.ny.us.ibm.com (e9.ny.us.ibm.com [32.97.182.139]) by core3.amsl.com (Postfix) with ESMTP id 740E43A69C5 for <ipsec@ietf.org>; Wed, 12 Jan 2011 13:18:23 -0800 (PST)
Received: from d01dlp02.pok.ibm.com (d01dlp02.pok.ibm.com [9.56.224.85]) by e9.ny.us.ibm.com (8.14.4/8.13.1) with ESMTP id p0CKuQ1p014879 for <ipsec@ietf.org>; Wed, 12 Jan 2011 15:56:40 -0500
Received: from d01relay02.pok.ibm.com (d01relay02.pok.ibm.com [9.56.227.234]) by d01dlp02.pok.ibm.com (Postfix) with ESMTP id 98D044DE8053 for <ipsec@ietf.org>; Wed, 12 Jan 2011 16:17:39 -0500 (EST)
Received: from d03av05.boulder.ibm.com (d03av05.boulder.ibm.com [9.17.195.85]) by d01relay02.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p0CLKgEb477880 for <ipsec@ietf.org>; Wed, 12 Jan 2011 16:20:43 -0500
Received: from d03av05.boulder.ibm.com (loopback [127.0.0.1]) by d03av05.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p0CLKgc8027886 for <ipsec@ietf.org>; Wed, 12 Jan 2011 14:20:42 -0700
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av05.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p0CLKgYI027880 for <ipsec@ietf.org>; Wed, 12 Jan 2011 14:20:42 -0700
In-Reply-To: <OF83382F06.D21E6F23-ON88257816.0070A15A-88257816.0070D005@us.ibm.com>
References: <OF83382F06.D21E6F23-ON88257816.0070A15A-88257816.0070D005@us.ibm.com>
To: ipsec@ietf.org
MIME-Version: 1.0
X-KeepSent: 042D8DC8:64349015-88257816:0073DD1F; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2FP3 SHF32 December 02, 2009
From: Keith Welter <welterk@us.ibm.com>
Message-ID: <OF042D8DC8.64349015-ON88257816.0073DD1F-88257816.00754261@us.ibm.com>
Date: Wed, 12 Jan 2011 13:20:41 -0800
X-MIMETrack: Serialize by Router on D03NM118/03/M/IBM(Release 8.5.1FP4|July 25, 2010) at 01/12/2011 14:20:42, Serialize complete at 01/12/2011 14:20:42
Content-Type: multipart/alternative; boundary="=_alternative 0075412E88257816_="
X-Content-Scanned: Fidelis XPS MAILER
Subject: Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-01
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Jan 2011 21:18:24 -0000

This is a multipart message in MIME format.
--=_alternative 0075412E88257816_=
Content-Type: text/plain; charset="US-ASCII"

In the thread "Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-00", Yoav 
proposed:
"having an IKE_AUTH exchange in the middle of the IKE SA lifetime. Suppose 
the IKE SA has been around for a couple of hours, and has been used for 
creating some child SAs, why not keep it and just pass one or more 
IKE_AUTH exchanges?"

draft-welter-ipsecme-ikev2-reauth-01 specifies this alternative design.

To refresh everyone's memory on the problems that the draft aims to solve, 
I'll include the introductory text from the new version of the draft here:

"IKE SA reauthentication as defined in [IKEv2] is accomplished by creating 
a new IKE SA, creating new Child SAs, and deleting the old IKE SA. 
Assuming that the old IKE SA has n Child SAs, reauthentication as defined 
in [IKEv2] requires at least n+1 message exchanges.  This style of 
reauthentication does not scale well when n is large.  The extension 
described in this document allows reauthentication of an IKE SA using a 
single IKE_AUTH exchange on the IKE SA to be reauthenticated without 
creating a new IKE SA or new Child SAs.  The terms IKEv2, IKEv2 SA, and 
Child SA and the various IKEv2 exchanges are defined in [IKEv2]

Other problems with IKE SA reauthentication as defined in [IKEv2] include:

   o  Simultaneous IKE SA reauthentication may result in redundant SAs.

   o  Child SAs for which an internal address was assigned using the 
Configuration Payload may experience a connection disruption for 
reassignment of an internal address.

   o  While [IKEv2] describes how to handle exchange collisions that may 
occur during IKE SA rekeying, it does not do so for exchange collisions 
that may occur during reauthentication which could inhibit 
interoperability in such cases."

Please share your comments on draft-welter-ipsecme-ikev2-reauth-01.

Thanks,

Keith Welter
IBM z/OS Communications Server Developer
1-415-545-2694 (T/L: 473-2694)


ipsec-bounces@ietf.org wrote on 01/12/2011 12:32:07 PM:

> [image removed] 
> 
> [IPsec] draft-welter-ipsecme-ikev2-reauth-01
> 
> Keith Welter 
> 
> to:
> 
> ipsec
> 
> 01/12/2011 12:36 PM
> 
> Sent by:
> 
> ipsec-bounces@ietf.org
> 
> 
> A new version of I-D, draft-welter-ipsecme-ikev2-reauth-01.txt has 
> been successfully submitted by Keith Welter and posted to the IETF 
repository.
> 
> Filename:                  draft-welter-ipsecme-ikev2-reauth
> Revision:                  01
> Title:                                   Reauthentication Extension for 
IKEv2
> Creation_date:                  2011-01-12
> WG ID:                                   Independent Submission
> Number_of_pages: 6
> 
> Abstract:
> This document describes an extension to the Internet Key Exchange
> version 2 (IKEv2) protocol that allows an IKEv2 Security Association
> (SA) to be reauthenticated without creating a new IKE SA or new Child
> SAs.
>  
> 
> 
> The IETF Secretariat.
> 
> 
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

--=_alternative 0075412E88257816_=
Content-Type: text/html; charset="US-ASCII"


<br><font size=2 face="sans-serif">In the thread &quot;Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-00&quot;,
Yoav proposed:</font>
<br><font size=2 face="sans-serif">&quot;having an IKE_AUTH exchange in
the middle of the IKE SA lifetime. Suppose the IKE SA has been around for
a couple of hours, and has been used for creating some child SAs, why not
keep it and just pass one or more IKE_AUTH exchanges?&quot;</font>
<br>
<br><font size=2 face="sans-serif">draft-welter-ipsecme-ikev2-reauth-01
specifies this alternative design.</font>
<br>
<br><font size=2 face="sans-serif">To refresh everyone's memory on the
problems that the draft aims to solve, I'll include the introductory text
from the new version of the draft here:</font>
<br>
<br><font size=2 face="sans-serif">&quot;IKE SA reauthentication as defined
in [IKEv2] is accomplished by creating a new IKE SA, creating new Child
SAs, and deleting the old IKE SA. &nbsp;Assuming that the old IKE SA has
n Child SAs, reauthentication as defined in [IKEv2] requires at least n+1
message exchanges. &nbsp;This style of reauthentication does not scale
well when n is large. &nbsp;The extension described in this document allows
reauthentication of an IKE SA using a single IKE_AUTH exchange on the IKE
SA to be reauthenticated without creating a new IKE SA or new Child SAs.
&nbsp;The terms IKEv2, IKEv2 SA, and Child SA and the various IKEv2 exchanges
are defined in [IKEv2]</font>
<br>
<br><font size=2 face="sans-serif">Other problems with IKE SA reauthentication
as defined in [IKEv2] include:</font>
<br>
<br><font size=2 face="sans-serif">&nbsp; &nbsp;o &nbsp;Simultaneous IKE
SA reauthentication may result in redundant SAs.</font>
<br>
<br><font size=2 face="sans-serif">&nbsp; &nbsp;o &nbsp;Child SAs for which
an internal address was assigned using the Configuration Payload may experience
a connection disruption for reassignment of an internal address.</font>
<br>
<br><font size=2 face="sans-serif">&nbsp; &nbsp;o &nbsp;While [IKEv2] describes
how to handle exchange collisions that may occur during IKE SA rekeying,
it does not do so for exchange collisions that may occur during reauthentication
which could inhibit interoperability in such cases.&quot;</font>
<br>
<br><font size=2 face="sans-serif">Please share your comments on draft-welter-ipsecme-ikev2-reauth-01.</font>
<br>
<br><font size=2 face="sans-serif">Thanks,</font>
<br><font size=2 face="sans-serif"><br>
Keith Welter<br>
IBM z/OS Communications Server Developer<br>
1-415-545-2694 (T/L: 473-2694)<br>
</font>
<br>
<br><tt><font size=2>ipsec-bounces@ietf.org wrote on 01/12/2011 12:32:07
PM:<br>
<br>
&gt; [image removed] </font></tt>
<br><tt><font size=2>&gt; <br>
&gt; [IPsec] draft-welter-ipsecme-ikev2-reauth-01</font></tt>
<br><tt><font size=2>&gt; <br>
&gt; Keith Welter </font></tt>
<br><tt><font size=2>&gt; <br>
&gt; to:</font></tt>
<br><tt><font size=2>&gt; <br>
&gt; ipsec</font></tt>
<br><tt><font size=2>&gt; <br>
&gt; 01/12/2011 12:36 PM</font></tt>
<br><tt><font size=2>&gt; <br>
&gt; Sent by:</font></tt>
<br><tt><font size=2>&gt; <br>
&gt; ipsec-bounces@ietf.org</font></tt>
<br><tt><font size=2>&gt; <br>
&gt; <br>
&gt; A new version of I-D, draft-welter-ipsecme-ikev2-reauth-01.txt has
<br>
&gt; been successfully submitted by Keith Welter and posted to the IETF
repository.<br>
&gt; <br>
&gt; Filename: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp;draft-welter-ipsecme-ikev2-reauth<br>
&gt; Revision: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp;01<br>
&gt; Title: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Reauthentication
Extension for IKEv2<br>
&gt; Creation_date: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp;2011-01-12<br>
&gt; WG ID: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Independent Submission<br>
&gt; Number_of_pages: 6<br>
&gt; <br>
&gt; Abstract:<br>
&gt; This document describes an extension to the Internet Key Exchange<br>
&gt; version 2 (IKEv2) protocol that allows an IKEv2 Security Association<br>
&gt; (SA) to be reauthenticated without creating a new IKE SA or new Child<br>
&gt; SAs.<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br>
&gt; <br>
&gt; <br>
&gt; The IETF Secretariat.<br>
&gt; <br>
&gt; <br>
&gt; _______________________________________________<br>
&gt; IPsec mailing list<br>
&gt; IPsec@ietf.org<br>
&gt; </font></tt><a href=https://www.ietf.org/mailman/listinfo/ipsec><tt><font size=2>https://www.ietf.org/mailman/listinfo/ipsec</font></tt></a><tt><font size=2><br>
</font></tt>
--=_alternative 0075412E88257816_=--

From smoonen@us.ibm.com  Thu Jan 13 06:46:36 2011
Return-Path: <smoonen@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6B19628B23E; Thu, 13 Jan 2011 06:46:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.913
X-Spam-Level: 
X-Spam-Status: No, score=-1.913 tagged_above=-999 required=5 tests=[AWL=-1.278, BAYES_00=-2.599, HTML_MESSAGE=0.001, SARE_GIF_ATTACH=1.42, TVD_FW_GRAPHIC_NAME_MID=0.543]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WC8Kpxy5LRIZ; Thu, 13 Jan 2011 06:46:34 -0800 (PST)
Received: from e39.co.us.ibm.com (e39.co.us.ibm.com [32.97.110.160]) by core3.amsl.com (Postfix) with ESMTP id A3B4A3A6B32; Thu, 13 Jan 2011 06:46:34 -0800 (PST)
Received: from d03relay05.boulder.ibm.com (d03relay05.boulder.ibm.com [9.17.195.107]) by e39.co.us.ibm.com (8.14.4/8.13.1) with ESMTP id p0DEah7Y002942; Thu, 13 Jan 2011 07:36:43 -0700
Received: from d03av02.boulder.ibm.com (d03av02.boulder.ibm.com [9.17.195.168]) by d03relay05.boulder.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p0DEmlhc141794; Thu, 13 Jan 2011 07:48:47 -0700
Received: from d03av02.boulder.ibm.com (loopback [127.0.0.1]) by d03av02.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p0DEmk2I001308; Thu, 13 Jan 2011 07:48:46 -0700
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av02.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p0DEmktx001278; Thu, 13 Jan 2011 07:48:46 -0700
In-Reply-To: <OF77545877.B42E95F3-ON85257816.00726F1F-85257816.0072CFFD@LocalDomain>
References: <20110110074502.22466.22300.idtracker@localhost>	<D2C73D1D-0B5A-4812-B66A-561939693821@checkpoint.com> <OFD2804B47.27EE4BAD-ON85257815.005D9A8D-85257815.0060F346@us.ibm.com> <OF77545877.B42E95F3-ON85257816.00726F1F-85257816.0072CFFD@LocalDomain>
X-KeepSent: 1218E7F2:9CDE3B0B-85257817:0050A9F7; type=4; name=$KeepSent
To: David Wierbowski <wierbows@us.ibm.com>
X-Mailer: Lotus Notes Release 8.5.1FP5 SHF29 November 12, 2010
Message-ID: <OF1218E7F2.9CDE3B0B-ON85257817.0050A9F7-85257817.00514C2B@us.ibm.com>
From: Scott C Moonen <smoonen@us.ibm.com>
Date: Thu, 13 Jan 2011 09:47:59 -0500
X-MIMETrack: Serialize by Router on D03NM118/03/M/IBM(Release 8.5.1FP4|July 25, 2010) at 01/13/2011 07:48:45
MIME-Version: 1.0
Content-type: multipart/related;  Boundary="0__=0ABBF284DFC32F678f9e8a93df938690918c0ABBF284DFC32F67"
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, ipsec-bounces@ietf.org, Yoav Nir <ynir@checkpoint.com>
Subject: Re: [IPsec] Issue #202: Token makers generating the same tokens without synchronized DB
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Jan 2011 14:46:36 -0000

--0__=0ABBF284DFC32F678f9e8a93df938690918c0ABBF284DFC32F67
Content-type: multipart/alternative; 
	Boundary="1__=0ABBF284DFC32F678f9e8a93df938690918c0ABBF284DFC32F67"

--1__=0ABBF284DFC32F678f9e8a93df938690918c0ABBF284DFC32F67
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: quoted-printable


Combining the two sections could also make it clearer that 5.2/9.4 may =
not
be a "complete" solution for any given environment.  The approach of
5.2/9.4 solves the problem of an independent attacker using a different=

source IP address, but not a proximate/MitM attacker as is currently
addressed in 9.2.


Scott Moonen (smoonen@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://www.linkedin.com/in/smoonen



From:	Scott C Moonen/Raleigh/IBM
To:	David Wierbowski/Endicott/IBM@IBMUS
Cc:	"ipsec@ietf.org" <ipsec@ietf.org>, ipsec-bounces@ietf.org, Yoav
            Nir <ynir@checkpoint.com>
Date:	01/12/2011 03:54 PM
Subject:	Re: [IPsec] Issue #202: Token makers generating the same token=
s
            without synchronized DB


I wonder if there's a way to merge sections 9.2 and 9.4.  I think that
using the algorithm in 5.2 as specified in 9.4 is really just an extens=
ion
of this requirement from section 9.2: "A token maker MUST NOT send a QC=
D
token in an unprotected message for an existing IKE SA."

It might be possible to remove a lot of the detail in 9.4 and generaliz=
e
9.2 to hint at there being several ways of solving this problem -- 9.2'=
s
state synchronization and 5.2/9.4's including the remote IP address.


Scott Moonen (smoonen@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://www.linkedin.com/in/smoonen




From:	David Wierbowski/Endicott/IBM@IBMUS
To:	"ipsec@ietf.org" <ipsec@ietf.org>, ipsec-bounces@ietf.org
Cc:	Yoav Nir <ynir@checkpoint.com>
Date:	01/11/2011 12:39 PM
Subject:	Re: [IPsec] Issue #202: Token makers generating the same token=
s
            without synchronized DB
Sent by:	ipsec-bounces@ietf.org



I agree with Tero that it is unsafe to assume how a load balancer decid=
es
to distribute traffic.  Since section 9.4 (previously 10.4) is in the
Security Considerations section it seems reasonable to me that we'd war=
n
that the algorithms in 5.1 and 5.2 should not be used in cases where lo=
ad
balancing cluster members share the same QCD token and do not share IKE=
 SA
state.

I don't think this restriction precludes the use of QCD in the hot-stan=
dby
cluster scenario that Yoav mentioned in his previous append.  By defini=
tion
in a hot-standby cluster only one of the cluster members is active at a=
ny
one time and it is not doing load balancing with its standby members.

In the same append Yoav stated that to achieve scalability with your ho=
t
standby-cluster, you implement load sharing.  If you add load balancing=
 to
your hot standby-cluster then the warning in the previous paragraph
applies.  In otherwords if you want one of your standby members to be a=

load balancing target for the active member in the cluster then you nee=
d to
share the IKE SA state between the active member and the standby member=
.

I'd recommend that the following text from 9.4 be changed:

   To thwart this possible attack, such configurations should use a
   method that considers the taker's IP address, such as the method
   described in Section 5.2.



Dave Wierbowski




From:       Yoav Nir <ynir@checkpoint.com>
To:         "ipsec@ietf.org" <ipsec@ietf.org>
Date:       01/10/2011 03:04 AM
Subject:    [IPsec] Issue #202: Token makers generating the same tokens=

            without synchronized DB
Sent by:    ipsec-bounces@ietf.org



Greetings.

We have just submitted version -03 of the draft.  This closes issues, #=
198,
#199, #200, and #201.

Which leaves us with just one issue: #202


=3D=3D=3D=3D=3D=3D=3D=3D=3D Issue #202: Token makers generating the sam=
e tokens without
synchronized DB
Section 10.4 of the draft has a use-case where a cluster of gateways sh=
are
the same QCD token secret, because they back each other up.

The twist in this case, is that they don't have synchronized databases,=
 so
a fail-over is very much like a reboot - the IKE SA is gone, and QCD is=

effective in getting the other side to restart IKE quickly.

The problem is, that without a failover, it may be possible to get a me=
mber
that does not own the IKE SA to send the QCD token to an attacker. The
attacker can then use this QCD token to tear down the IKE SA.

The method in section 5.2 tries to address this, by considering the IP
address of the token taker in the calculation.

Tero claims that this is a scenario that we should not address, and tha=
t
predicting or prescribing load balancer behavior in inherently dangerou=
s.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Please send your opinions to the list. This one actually addresses the
scope of the document, so it's strange that this comes up as the last
issue, but we still have to decide on this.

Yoav


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
=

--1__=0ABBF284DFC32F678f9e8a93df938690918c0ABBF284DFC32F67
Content-type: text/html; charset=US-ASCII
Content-Disposition: inline
Content-transfer-encoding: quoted-printable

<html><body>
<p>Combining the two sections could also make it clearer that 5.2/9.4 m=
ay not be a &quot;complete&quot; solution for any given environment.  T=
he approach of 5.2/9.4 solves the problem of an independent attacker us=
ing a different source IP address, but not a proximate/MitM attacker as=
 is currently addressed in 9.2.<br>
<br>
<br>
Scott Moonen (smoonen@us.ibm.com)<br>
z/OS Communications Server TCP/IP Development<br>
<a href=3D"http://www.linkedin.com/in/smoonen">http://www.linkedin.com/=
in/smoonen</a><br>
<br>
<img width=3D"16" height=3D"16" src=3D"cid:1__=3D0ABBF284DFC32F678f9e8a=
93df938@us.ibm.com" border=3D"0" alt=3D"Inactive hide details for Scott=
 C Moonen---01/12/2011 03:54:03 PM---I wonder if there's a way to merge=
 sections 9.2 and 9.4.  I"><font color=3D"#424282">Scott C Moonen---01/=
12/2011 03:54:03 PM---I wonder if there's a way to merge sections 9.2 a=
nd 9.4.  I think that using the algorithm in 5.2 as</font><br>
<br>
<font size=3D"2" color=3D"#5F5F5F">From:	</font><font size=3D"2">Scott =
C Moonen/Raleigh/IBM</font><br>
<font size=3D"2" color=3D"#5F5F5F">To:	</font><font size=3D"2">David Wi=
erbowski/Endicott/IBM@IBMUS</font><br>
<font size=3D"2" color=3D"#5F5F5F">Cc:	</font><font size=3D"2">&quot;ip=
sec@ietf.org&quot; &lt;ipsec@ietf.org&gt;, ipsec-bounces@ietf.org, Yoav=
 Nir &lt;ynir@checkpoint.com&gt;</font><br>
<font size=3D"2" color=3D"#5F5F5F">Date:	</font><font size=3D"2">01/12/=
2011 03:54 PM</font><br>
<font size=3D"2" color=3D"#5F5F5F">Subject:	</font><font size=3D"2">Re:=
 [IPsec] Issue #202: Token makers generating the same tokens without sy=
nchronized DB</font><br>
<hr width=3D"100%" size=3D"2" align=3D"left" noshade style=3D"color:#80=
91A5; "><br>
<br>
I wonder if there's a way to merge sections 9.2 and 9.4.  I think that =
using the algorithm in 5.2 as specified in 9.4 is really just an extens=
ion of this requirement from section 9.2: &quot;A token maker MUST NOT =
send a QCD token in an unprotected message for an existing IKE SA.&quot=
;<br>
<br>
It might be possible to remove a lot of the detail in 9.4 and generaliz=
e 9.2 to hint at there being several ways of solving this problem -- 9.=
2's state synchronization and 5.2/9.4's including the remote IP address=
.<br>
<br>
<br>
Scott Moonen (smoonen@us.ibm.com)<br>
z/OS Communications Server TCP/IP Development<br>
<a href=3D"http://www.linkedin.com/in/smoonen">http://www.linkedin.com/=
in/smoonen</a><br>
<br>
<br>
<img width=3D"16" height=3D"16" src=3D"cid:1__=3D0ABBF284DFC32F678f9e8a=
93df938@us.ibm.com" border=3D"0" alt=3D"Inactive hide details for David=
 Wierbowski---01/11/2011 12:39:21 PM---I agree with Tero that it is uns=
afe to assume how a load "><font color=3D"#424282">David Wierbowski---0=
1/11/2011 12:39:21 PM---I agree with Tero that it is unsafe to assume h=
ow a load balancer decides to distribute traffic.  Si</font><br>
<br>
<font size=3D"2" color=3D"#5F5F5F">From:	</font><font size=3D"2">David =
Wierbowski/Endicott/IBM@IBMUS</font><br>
<font size=3D"2" color=3D"#5F5F5F">To:	</font><font size=3D"2">&quot;ip=
sec@ietf.org&quot; &lt;ipsec@ietf.org&gt;, ipsec-bounces@ietf.org</font=
><br>
<font size=3D"2" color=3D"#5F5F5F">Cc:	</font><font size=3D"2">Yoav Nir=
 &lt;ynir@checkpoint.com&gt;</font><br>
<font size=3D"2" color=3D"#5F5F5F">Date:	</font><font size=3D"2">01/11/=
2011 12:39 PM</font><br>
<font size=3D"2" color=3D"#5F5F5F">Subject:	</font><font size=3D"2">Re:=
 [IPsec] Issue #202: Token makers generating the same tokens without sy=
nchronized DB</font><br>
<font size=3D"2" color=3D"#5F5F5F">Sent by:	</font><font size=3D"2">ips=
ec-bounces@ietf.org</font><br>
<hr width=3D"100%" size=3D"2" align=3D"left" noshade style=3D"color:#80=
91A5; "><br>
<br>
<br>
<tt>I agree with Tero that it is unsafe to assume how a load balancer d=
ecides<br>
to distribute traffic. &nbsp;Since section 9.4 (previously 10.4) is in =
the<br>
Security Considerations section it seems reasonable to me that we'd war=
n<br>
that the algorithms in 5.1 and 5.2 should not be used in cases where lo=
ad<br>
balancing cluster members share the same QCD token and do not share IKE=
 SA<br>
state.<br>
<br>
I don't think this restriction precludes the use of QCD in the hot-stan=
dby<br>
cluster scenario that Yoav mentioned in his previous append. &nbsp;By d=
efinition<br>
in a hot-standby cluster only one of the cluster members is active at a=
ny<br>
one time and it is not doing load balancing with its standby members.<b=
r>
<br>
In the same append Yoav stated that to achieve scalability with your ho=
t<br>
standby-cluster, you implement load sharing. &nbsp;If you add load bala=
ncing to<br>
your hot standby-cluster then the warning in the previous paragraph<br>=

applies. &nbsp;In otherwords if you want one of your standby members to=
 be a<br>
load balancing target for the active member in the cluster then you nee=
d to<br>
share the IKE SA state between the active member and the standby member=
.<br>
<br>
I'd recommend that the following text from 9.4 be changed:<br>
<br>
 &nbsp; To thwart this possible attack, such configurations should use =
a<br>
 &nbsp; method that considers the taker's IP address, such as the metho=
d<br>
 &nbsp; described in Section 5.2.<br>
<br>
<br>
<br>
Dave Wierbowski<br>
<br>
<br>
<br>
<br>
From: &nbsp; &nbsp; &nbsp; Yoav Nir &lt;ynir@checkpoint.com&gt;<br>
To: &nbsp; &nbsp; &nbsp; &nbsp; &quot;ipsec@ietf.org&quot; &lt;ipsec@ie=
tf.org&gt;<br>
Date: &nbsp; &nbsp; &nbsp; 01/10/2011 03:04 AM<br>
Subject: &nbsp; &nbsp;[IPsec] Issue #202: Token makers generating the s=
ame tokens<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;without synchronized DB<br>
Sent by: &nbsp; &nbsp;ipsec-bounces@ietf.org<br>
<br>
<br>
<br>
Greetings.<br>
<br>
We have just submitted version -03 of the draft. &nbsp;This closes issu=
es, #198,<br>
#199, #200, and #201.<br>
<br>
Which leaves us with just one issue: #202<br>
<br>
<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D Issue #202: Token makers generating the sam=
e tokens without<br>
synchronized DB<br>
Section 10.4 of the draft has a use-case where a cluster of gateways sh=
are<br>
the same QCD token secret, because they back each other up.<br>
<br>
The twist in this case, is that they don't have synchronized databases,=
 so<br>
a fail-over is very much like a reboot - the IKE SA is gone, and QCD is=
<br>
effective in getting the other side to restart IKE quickly.<br>
<br>
The problem is, that without a failover, it may be possible to get a me=
mber<br>
that does not own the IKE SA to send the QCD token to an attacker. The<=
br>
attacker can then use this QCD token to tear down the IKE SA.<br>
<br>
The method in section 5.2 tries to address this, by considering the IP<=
br>
address of the token taker in the calculation.<br>
<br>
Tero claims that this is a scenario that we should not address, and tha=
t<br>
predicting or prescribing load balancer behavior in inherently dangerou=
s.<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<b=
r>
<br>
Please send your opinions to the list. This one actually addresses the<=
br>
scope of the document, so it's strange that this comes up as the last<b=
r>
issue, but we still have to decide on this.<br>
<br>
Yoav<br>
<br>
<br>
_______________________________________________<br>
IPsec mailing list<br>
IPsec@ietf.org<br>
</tt><tt><a href=3D"https://www.ietf.org/mailman/listinfo/ipsec">https:=
//www.ietf.org/mailman/listinfo/ipsec</a></tt><tt><br>
<br>
<br>
_______________________________________________<br>
IPsec mailing list<br>
IPsec@ietf.org<br>
</tt><tt><a href=3D"https://www.ietf.org/mailman/listinfo/ipsec">https:=
//www.ietf.org/mailman/listinfo/ipsec</a></tt><tt><br>
</tt><br>
</body></html>=


--1__=0ABBF284DFC32F678f9e8a93df938690918c0ABBF284DFC32F67--


--0__=0ABBF284DFC32F678f9e8a93df938690918c0ABBF284DFC32F67
Content-type: image/gif; 
	name="graycol.gif"
Content-Disposition: inline; filename="graycol.gif"
Content-ID: <1__=0ABBF284DFC32F678f9e8a93df938@us.ibm.com>
Content-transfer-encoding: base64

R0lGODlhEAAQAKECAMzMzAAAAP///wAAACH5BAEAAAIALAAAAAAQABAAAAIXlI+py+0PopwxUbpu
ZRfKZ2zgSJbmSRYAIf4fT3B0aW1pemVkIGJ5IFVsZWFkIFNtYXJ0U2F2ZXIhAAA7

--0__=0ABBF284DFC32F678f9e8a93df938690918c0ABBF284DFC32F67--


From wierbows@us.ibm.com  Thu Jan 13 08:13:46 2011
Return-Path: <wierbows@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B6F533A6A11; Thu, 13 Jan 2011 08:13:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.889
X-Spam-Level: 
X-Spam-Status: No, score=-4.889 tagged_above=-999 required=5 tests=[AWL=0.290,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, SARE_GIF_ATTACH=1.42]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Dz2dN86GSfkH; Thu, 13 Jan 2011 08:13:45 -0800 (PST)
Received: from e6.ny.us.ibm.com (e6.ny.us.ibm.com [32.97.182.146]) by core3.amsl.com (Postfix) with ESMTP id 27F893A6BBB; Thu, 13 Jan 2011 08:13:39 -0800 (PST)
Received: from d01dlp01.pok.ibm.com (d01dlp01.pok.ibm.com [9.56.224.56]) by e6.ny.us.ibm.com (8.14.4/8.13.1) with ESMTP id p0DG1NIL001152; Thu, 13 Jan 2011 11:01:23 -0500
Received: from d01relay01.pok.ibm.com (d01relay01.pok.ibm.com [9.56.227.233]) by d01dlp01.pok.ibm.com (Postfix) with ESMTP id 92502728378; Thu, 13 Jan 2011 11:11:06 -0500 (EST)
Received: from d01av02.pok.ibm.com (d01av02.pok.ibm.com [9.56.224.216]) by d01relay01.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p0DGB6uM358096; Thu, 13 Jan 2011 11:11:06 -0500
Received: from d01av02.pok.ibm.com (loopback [127.0.0.1]) by d01av02.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p0DGB5DF016050; Thu, 13 Jan 2011 14:11:06 -0200
Received: from d01ml084.pok.ibm.com (d01ml084.pok.ibm.com [9.63.10.23]) by d01av02.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p0DGB420015962; Thu, 13 Jan 2011 14:11:04 -0200
In-Reply-To: <OF1218E7F2.9CDE3B0B-ON85257817.0050A9F7-85257817.00514C2B@us.ibm.com>
References: <20110110074502.22466.22300.idtracker@localhost>	<D2C73D1D-0B5A-4812-B66A-561939693821@checkpoint.com> <OFD2804B47.27EE4BAD-ON85257815.005D9A8D-85257815.0060F346@us.ibm.com>	<OF77545877.B42E95F3-ON85257816.00726F1F-85257816.0072CFFD@LocalDomain> <OF1218E7F2.9CDE3B0B-ON85257817.0050A9F7-85257817.00514C2B@us.ibm.com>
X-KeepSent: 62A79669:37415B1B-85257817:0051C8C4; type=4; name=$KeepSent
To: Scott C Moonen <smoonen@us.ibm.com>
X-Mailer: Lotus Notes Release 8.5.1FP1 SHF20 February 10, 2010
Message-ID: <OF62A79669.37415B1B-ON85257817.0051C8C4-85257817.0058E73B@us.ibm.com>
From: David Wierbowski <wierbows@us.ibm.com>
Date: Thu, 13 Jan 2011 11:11:03 -0500
X-MIMETrack: Serialize by Router on D01ML084/01/M/IBM(Release 8.0.2FP6|July 15, 2010) at 01/13/2011 11:11:03
MIME-Version: 1.0
Content-type: multipart/mixed;  Boundary="0__=0ABBF284DFC24E548f9e8a93df938690918c0ABBF284DFC24E54"
Content-Disposition: inline
X-Content-Scanned: Fidelis XPS MAILER
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, ipsec-bounces@ietf.org, Yoav Nir <ynir@checkpoint.com>
Subject: Re: [IPsec] Issue #202: Token makers generating the same tokens without synchronized DB
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Jan 2011 16:13:46 -0000

--0__=0ABBF284DFC24E548f9e8a93df938690918c0ABBF284DFC24E54
Content-type: text/plain; charset=US-ASCII

Scott,

I agree that there is relationship between sections 9.2 and 9.4. The
statement that "all members MUST be able to tell whether a particular IKE
SA is active anywhere in the cluster" which is found in 9.2 is consistent
with my comment that " the algorithms in 5.1 and 5.2 should not be used in
cases where load balancing cluster members share the same QCD token and do
not share IKE SA state."  Although I suppose I should have said same
QCD_SECRET instead of QCD token  to be more accurate.

I could see why you would say that the algorithm in 5.2 as justified in
section 9.4 is being used to meet the requirement that "A token maker MUST
NOT send a QCD token in an unprotected message for an existing IKE SA."
Certainly if we do not include IP address it is possible that a cluster
member could send the QCD token of an existing IKE SA to an attacker using
a different source IP address.  In that case we'd be unknowingly violating
the rule.  By adding the ip address of the taker we prevent this.

I think you are correct that the two sections could be combined, but I'll
defer to Yoav on that.

As an aside I see that I cut and paste the wrong paragraph in my append.  I
had actually intended to cut and paste the last paragraph of 9.4 and I now
see that I cut and paste the next to last paragraph in section 9.4 :>).

Dave Wierbowski




From:       Scott C Moonen/Raleigh/IBM@IBMUS
To:         David Wierbowski/Endicott/IBM@IBMUS
Cc:         "ipsec@ietf.org" <ipsec@ietf.org>, ipsec-bounces@ietf.org, Yoav
            Nir <ynir@checkpoint.com>
Date:       01/13/2011 09:50 AM
Subject:    Re: [IPsec] Issue #202: Token makers generating the same tokens
            without synchronized DB
Sent by:    ipsec-bounces@ietf.org



Combining the two sections could also make it clearer that 5.2/9.4 may not
be a "complete" solution for any given environment. The approach of 5.2/9.4
solves the problem of an independent attacker using a different source IP
address, but not a proximate/MitM attacker as is currently addressed in
9.2.


Scott Moonen (smoonen@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://www.linkedin.com/in/smoonen

(Embedded image moved to file: pic34804.gif)Inactive hide details for Scott
C Moonen---01/12/2011 03:54:03 PM---I wonder if there's a way to merge
sections 9.2 and 9.4.  IScott C Moonen---01/12/2011 03:54:03 PM---I wonder
if there's a way to merge sections 9.2 and 9.4. I think that using the
algorithm in 5.2 as

From: Scott C Moonen/Raleigh/IBM
To: David Wierbowski/Endicott/IBM@IBMUS
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, ipsec-bounces@ietf.org, Yoav Nir
<ynir@checkpoint.com>
Date: 01/12/2011 03:54 PM
Subject: Re: [IPsec] Issue #202: Token makers generating the same tokens
without synchronized DB


I wonder if there's a way to merge sections 9.2 and 9.4. I think that using
the algorithm in 5.2 as specified in 9.4 is really just an extension of
this requirement from section 9.2: "A token maker MUST NOT send a QCD token
in an unprotected message for an existing IKE SA."

It might be possible to remove a lot of the detail in 9.4 and generalize
9.2 to hint at there being several ways of solving this problem -- 9.2's
state synchronization and 5.2/9.4's including the remote IP address.


Scott Moonen (smoonen@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://www.linkedin.com/in/smoonen


(Embedded image moved to file: pic11871.gif)Inactive hide details for David
Wierbowski---01/11/2011 12:39:21 PM---I agree with Tero that it is unsafe
to assume how a load David Wierbowski---01/11/2011 12:39:21 PM---I agree
with Tero that it is unsafe to assume how a load balancer decides to
distribute traffic. Si

From: David Wierbowski/Endicott/IBM@IBMUS
To: "ipsec@ietf.org" <ipsec@ietf.org>, ipsec-bounces@ietf.org
Cc: Yoav Nir <ynir@checkpoint.com>
Date: 01/11/2011 12:39 PM
Subject: Re: [IPsec] Issue #202: Token makers generating the same tokens
without synchronized DB
Sent by: ipsec-bounces@ietf.org



I agree with Tero that it is unsafe to assume how a load balancer decides
to distribute traffic.  Since section 9.4 (previously 10.4) is in the
Security Considerations section it seems reasonable to me that we'd warn
that the algorithms in 5.1 and 5.2 should not be used in cases where load
balancing cluster members share the same QCD token and do not share IKE SA
state.

I don't think this restriction precludes the use of QCD in the hot-standby
cluster scenario that Yoav mentioned in his previous append.  By definition
in a hot-standby cluster only one of the cluster members is active at any
one time and it is not doing load balancing with its standby members.

In the same append Yoav stated that to achieve scalability with your hot
standby-cluster, you implement load sharing.  If you add load balancing to
your hot standby-cluster then the warning in the previous paragraph
applies.  In otherwords if you want one of your standby members to be a
load balancing target for the active member in the cluster then you need to
share the IKE SA state between the active member and the standby member.

I'd recommend that the following text from 9.4 be changed:

  To thwart this possible attack, such configurations should use a
  method that considers the taker's IP address, such as the method
  described in Section 5.2.



Dave Wierbowski




From:       Yoav Nir <ynir@checkpoint.com>
To:         "ipsec@ietf.org" <ipsec@ietf.org>
Date:       01/10/2011 03:04 AM
Subject:    [IPsec] Issue #202: Token makers generating the same tokens
           without synchronized DB
Sent by:    ipsec-bounces@ietf.org



Greetings.

We have just submitted version -03 of the draft.  This closes issues, #198,
#199, #200, and #201.

Which leaves us with just one issue: #202


========= Issue #202: Token makers generating the same tokens without
synchronized DB
Section 10.4 of the draft has a use-case where a cluster of gateways share
the same QCD token secret, because they back each other up.

The twist in this case, is that they don't have synchronized databases, so
a fail-over is very much like a reboot - the IKE SA is gone, and QCD is
effective in getting the other side to restart IKE quickly.

The problem is, that without a failover, it may be possible to get a member
that does not own the IKE SA to send the QCD token to an attacker. The
attacker can then use this QCD token to tear down the IKE SA.

The method in section 5.2 tries to address this, by considering the IP
address of the token taker in the calculation.

Tero claims that this is a scenario that we should not address, and that
predicting or prescribing load balancer behavior in inherently dangerous.
=======================

Please send your opinions to the list. This one actually addresses the
scope of the document, so it's strange that this comes up as the last
issue, but we still have to decide on this.

Yoav


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

--0__=0ABBF284DFC24E548f9e8a93df938690918c0ABBF284DFC24E54
Content-type: image/gif; 
	name="pic34804.gif"
Content-Disposition: attachment; filename="pic34804.gif"
Content-transfer-encoding: base64

R0lGODlhEAAQAKECAMzMzAAAAP///wAAACH5BAEAAAIALAAAAAAQABAAAAIXlI+py+0PopwxUbpu
ZRfKZ2zgSJbmSRYAIf4fT3B0aW1pemVkIGJ5IFVsZWFkIFNtYXJ0U2F2ZXIhAAA7

--0__=0ABBF284DFC24E548f9e8a93df938690918c0ABBF284DFC24E54
Content-type: image/gif; 
	name="pic11871.gif"
Content-Disposition: attachment; filename="pic11871.gif"
Content-transfer-encoding: base64

R0lGODlhEAAQAKECAMzMzAAAAP///wAAACH5BAEAAAIALAAAAAAQABAAAAIXlI+py+0PopwxUbpu
ZRfKZ2zgSJbmSRYAIf4fT3B0aW1pemVkIGJ5IFVsZWFkIFNtYXJ0U2F2ZXIhAAA7

--0__=0ABBF284DFC24E548f9e8a93df938690918c0ABBF284DFC24E54--


From yaronf.ietf@gmail.com  Fri Jan 14 00:45:28 2011
Return-Path: <yaronf.ietf@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AFF433A6C5B for <ipsec@core3.amsl.com>; Fri, 14 Jan 2011 00:45:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.599
X-Spam-Level: 
X-Spam-Status: No, score=-103.599 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 10kePJpvQywE for <ipsec@core3.amsl.com>; Fri, 14 Jan 2011 00:45:27 -0800 (PST)
Received: from mail-wy0-f172.google.com (mail-wy0-f172.google.com [74.125.82.172]) by core3.amsl.com (Postfix) with ESMTP id 00F6D3A6C5A for <ipsec@ietf.org>; Fri, 14 Jan 2011 00:45:26 -0800 (PST)
Received: by wyf23 with SMTP id 23so2699475wyf.31 for <ipsec@ietf.org>; Fri, 14 Jan 2011 00:47:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:message-id:date:from:user-agent:mime-version:to :cc:subject:references:in-reply-to:content-type; bh=X77dv1FjxVZRPQ18qEXy3muxH2Fh8cfjUbiqB2/G8Rs=; b=xgqOuzuyBIhliNw42CYgiAF8/1LTniKn6Ln9aKdWTl1LDaz6wIVwguIzwe9WsAGPoy 4Vik+5Accmxo4j5ZtM2YC66EdXO2td2NbxGLEvTFWMrz55jDais9Fe8O0aUPkcJI2Vcx mEvHxeMjyvCVFVTCpUevdrLEzXuQk7CqO434s=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type; b=s259Y4VuMdt2hW1NHUZvIC5s23w6CjVpEiP5uXnfgxiN84BdN9UpvMwYz8GUvj6Zbz 3HYFvr0EWuKd0QzDGWKjJ8nAEIwak/1GUYU7TOZ23HFJxTrWWZ0OUtrOZqAYrizg9o4U F25cQQRotHWsbHTZEljK+panxsF+tMFY9Q2EU=
Received: by 10.227.144.7 with SMTP id x7mr428340wbu.115.1294994870054; Fri, 14 Jan 2011 00:47:50 -0800 (PST)
Received: from [10.0.0.4] ([109.67.17.212]) by mx.google.com with ESMTPS id 11sm725910wbj.1.2011.01.14.00.47.47 (version=SSLv3 cipher=RC4-MD5); Fri, 14 Jan 2011 00:47:49 -0800 (PST)
Message-ID: <4D300DA7.2010003@gmail.com>
Date: Fri, 14 Jan 2011 10:47:35 +0200
From: Yaron Sheffer <yaronf.ietf@gmail.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: Keith Welter <welterk@us.ibm.com>
References: <OF83382F06.D21E6F23-ON88257816.0070A15A-88257816.0070D005@us.ibm.com> <OF042D8DC8.64349015-ON88257816.0073DD1F-88257816.00754261@us.ibm.com>
In-Reply-To: <OF042D8DC8.64349015-ON88257816.0073DD1F-88257816.00754261@us.ibm.com>
Content-Type: multipart/alternative; boundary="------------080800070707010300080102"
Cc: ipsec@ietf.org
Subject: Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-01
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Jan 2011 08:45:28 -0000

This is a multi-part message in MIME format.
--------------080800070707010300080102
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Hi Keith,

I think this version makes a lot of sense. A few comments:

    * I don't like the asymmetrical nature of the notification, which
      implies that only the original initiator can initiate the second
      IKE_AUTH. There may be cases when the responder would like to
      reauthenticate (e.g. mutual EAP with passwords). So I suggest to
      have both peers send the notification if they support this extension.
    * Please say explicitly whether/how this extension interacts with
      RFC 6023: can the reauthenticated IKE SA be childless?
    * The introduction mentions three problems. Please add text
      somewhere on how they are solved by this proposal.
    * Typo in Sec. 4: "MUST be the same as the as the SPIs".

Thanks,
     Yaron

On 12/01/2011 23:20, Keith Welter wrote:
>
> In the thread "Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-00", Yoav 
> proposed:
> "having an IKE_AUTH exchange in the middle of the IKE SA lifetime. 
> Suppose the IKE SA has been around for a couple of hours, and has been 
> used for creating some child SAs, why not keep it and just pass one or 
> more IKE_AUTH exchanges?"
>
> draft-welter-ipsecme-ikev2-reauth-01 specifies this alternative design.
>
> To refresh everyone's memory on the problems that the draft aims to 
> solve, I'll include the introductory text from the new version of the 
> draft here:
>
> "IKE SA reauthentication as defined in [IKEv2] is accomplished by 
> creating a new IKE SA, creating new Child SAs, and deleting the old 
> IKE SA.  Assuming that the old IKE SA has n Child SAs, 
> reauthentication as defined in [IKEv2] requires at least n+1 message 
> exchanges.  This style of reauthentication does not scale well when n 
> is large.  The extension described in this document allows 
> reauthentication of an IKE SA using a single IKE_AUTH exchange on the 
> IKE SA to be reauthenticated without creating a new IKE SA or new 
> Child SAs.  The terms IKEv2, IKEv2 SA, and Child SA and the various 
> IKEv2 exchanges are defined in [IKEv2]
>
> Other problems with IKE SA reauthentication as defined in [IKEv2] 
> include:
>
>    o  Simultaneous IKE SA reauthentication may result in redundant SAs.
>
>    o  Child SAs for which an internal address was assigned using the 
> Configuration Payload may experience a connection disruption for 
> reassignment of an internal address.
>
>    o  While [IKEv2] describes how to handle exchange collisions that 
> may occur during IKE SA rekeying, it does not do so for exchange 
> collisions that may occur during reauthentication which could inhibit 
> interoperability in such cases."
>
> Please share your comments on draft-welter-ipsecme-ikev2-reauth-01.
>
> Thanks,
>
> Keith Welter
> IBM z/OS Communications Server Developer
> 1-415-545-2694 (T/L: 473-2694)
>
>
> ipsec-bounces@ietf.org wrote on 01/12/2011 12:32:07 PM:
>
> > [image removed]
> >
> > [IPsec] draft-welter-ipsecme-ikev2-reauth-01
> >
> > Keith Welter
> >
> > to:
> >
> > ipsec
> >
> > 01/12/2011 12:36 PM
> >
> > Sent by:
> >
> > ipsec-bounces@ietf.org
> >
> >
> > A new version of I-D, draft-welter-ipsecme-ikev2-reauth-01.txt has
> > been successfully submitted by Keith Welter and posted to the IETF 
> repository.
> >
> > Filename:                  draft-welter-ipsecme-ikev2-reauth
> > Revision:                  01
> > Title:                                   Reauthentication Extension 
> for IKEv2
> > Creation_date:                  2011-01-12
> > WG ID:                                   Independent Submission
> > Number_of_pages: 6
> >
> > Abstract:
> > This document describes an extension to the Internet Key Exchange
> > version 2 (IKEv2) protocol that allows an IKEv2 Security Association
> > (SA) to be reauthenticated without creating a new IKE SA or new Child
> > SAs.
> >
> >
> >
> > The IETF Secretariat.
> >
> >
> > _______________________________________________
> > IPsec mailing list
> > IPsec@ietf.org
> > https://www.ietf.org/mailman/listinfo/ipsec
>
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec


--------------080800070707010300080102
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#ffffff">
    Hi Keith,<br>
    <br>
    I think this version makes a lot of sense. A few comments:<br>
    <ul>
      <li>I don't like the asymmetrical nature of the notification,
        which implies that only the original initiator can initiate the
        second IKE_AUTH. There may be cases when the responder would
        like to reauthenticate (e.g. mutual EAP with passwords). So I
        suggest to have both peers send the notification if they support
        this extension.</li>
      <li>Please say explicitly whether/how this extension interacts
        with RFC 6023: can the reauthenticated IKE SA be childless?</li>
      <li>The introduction mentions three problems. Please add text
        somewhere on how they are solved by this proposal.</li>
      <li>Typo in Sec. 4: "MUST be the same as the as the SPIs".</li>
    </ul>
    Thanks,<br>
    &nbsp;&nbsp;&nbsp; Yaron<br>
    <br>
    On 12/01/2011 23:20, Keith Welter wrote:
    <blockquote
cite="mid:OF042D8DC8.64349015-ON88257816.0073DD1F-88257816.00754261@us.ibm.com"
      type="cite">
      <br>
      <font face="sans-serif" size="2">In the thread "Re: [IPsec]
        draft-welter-ipsecme-ikev2-reauth-00",
        Yoav proposed:</font>
      <br>
      <font face="sans-serif" size="2">"having an IKE_AUTH exchange in
        the middle of the IKE SA lifetime. Suppose the IKE SA has been
        around for
        a couple of hours, and has been used for creating some child
        SAs, why not
        keep it and just pass one or more IKE_AUTH exchanges?"</font>
      <br>
      <br>
      <font face="sans-serif" size="2">draft-welter-ipsecme-ikev2-reauth-01
specifies
        this alternative design.</font>
      <br>
      <br>
      <font face="sans-serif" size="2">To refresh everyone's memory on
        the
        problems that the draft aims to solve, I'll include the
        introductory text
        from the new version of the draft here:</font>
      <br>
      <br>
      <font face="sans-serif" size="2">"IKE SA reauthentication as
        defined
        in [IKEv2] is accomplished by creating a new IKE SA, creating
        new Child
        SAs, and deleting the old IKE SA. &nbsp;Assuming that the old IKE SA
        has
        n Child SAs, reauthentication as defined in [IKEv2] requires at
        least n+1
        message exchanges. &nbsp;This style of reauthentication does not
        scale
        well when n is large. &nbsp;The extension described in this document
        allows
        reauthentication of an IKE SA using a single IKE_AUTH exchange
        on the IKE
        SA to be reauthenticated without creating a new IKE SA or new
        Child SAs.
        &nbsp;The terms IKEv2, IKEv2 SA, and Child SA and the various IKEv2
        exchanges
        are defined in [IKEv2]</font>
      <br>
      <br>
      <font face="sans-serif" size="2">Other problems with IKE SA
        reauthentication
        as defined in [IKEv2] include:</font>
      <br>
      <br>
      <font face="sans-serif" size="2">&nbsp; &nbsp;o &nbsp;Simultaneous IKE
        SA reauthentication may result in redundant SAs.</font>
      <br>
      <br>
      <font face="sans-serif" size="2">&nbsp; &nbsp;o &nbsp;Child SAs for which
        an internal address was assigned using the Configuration Payload
        may experience
        a connection disruption for reassignment of an internal address.</font>
      <br>
      <br>
      <font face="sans-serif" size="2">&nbsp; &nbsp;o &nbsp;While [IKEv2] describes
        how to handle exchange collisions that may occur during IKE SA
        rekeying,
        it does not do so for exchange collisions that may occur during
        reauthentication
        which could inhibit interoperability in such cases."</font>
      <br>
      <br>
      <font face="sans-serif" size="2">Please share your comments on
        draft-welter-ipsecme-ikev2-reauth-01.</font>
      <br>
      <br>
      <font face="sans-serif" size="2">Thanks,</font>
      <br>
      <font face="sans-serif" size="2"><br>
        Keith Welter<br>
        IBM z/OS Communications Server Developer<br>
        1-415-545-2694 (T/L: 473-2694)<br>
      </font>
      <br>
      <br>
      <tt><font size="2"><a class="moz-txt-link-abbreviated" href="mailto:ipsec-bounces@ietf.org">ipsec-bounces@ietf.org</a> wrote on 01/12/2011
          12:32:07
          PM:<br>
          <br>
          &gt; [image removed] </font></tt>
      <br>
      <tt><font size="2">&gt; <br>
          &gt; [IPsec] draft-welter-ipsecme-ikev2-reauth-01</font></tt>
      <br>
      <tt><font size="2">&gt; <br>
          &gt; Keith Welter </font></tt>
      <br>
      <tt><font size="2">&gt; <br>
          &gt; to:</font></tt>
      <br>
      <tt><font size="2">&gt; <br>
          &gt; ipsec</font></tt>
      <br>
      <tt><font size="2">&gt; <br>
          &gt; 01/12/2011 12:36 PM</font></tt>
      <br>
      <tt><font size="2">&gt; <br>
          &gt; Sent by:</font></tt>
      <br>
      <tt><font size="2">&gt; <br>
          &gt; <a class="moz-txt-link-abbreviated" href="mailto:ipsec-bounces@ietf.org">ipsec-bounces@ietf.org</a></font></tt>
      <br>
      <tt><font size="2">&gt; <br>
          &gt; <br>
          &gt; A new version of I-D,
          draft-welter-ipsecme-ikev2-reauth-01.txt has
          <br>
          &gt; been successfully submitted by Keith Welter and posted to
          the IETF
          repository.<br>
          &gt; <br>
          &gt; Filename: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
          &nbsp;draft-welter-ipsecme-ikev2-reauth<br>
          &gt; Revision: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
          &nbsp;01<br>
          &gt; Title: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
          &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Reauthentication
          Extension for IKEv2<br>
          &gt; Creation_date: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
          &nbsp;2011-01-12<br>
          &gt; WG ID: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
          &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Independent Submission<br>
          &gt; Number_of_pages: 6<br>
          &gt; <br>
          &gt; Abstract:<br>
          &gt; This document describes an extension to the Internet Key
          Exchange<br>
          &gt; version 2 (IKEv2) protocol that allows an IKEv2 Security
          Association<br>
          &gt; (SA) to be reauthenticated without creating a new IKE SA
          or new Child<br>
          &gt; SAs.<br>
          &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
          &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
          &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
          &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br>
          &gt; <br>
          &gt; <br>
          &gt; The IETF Secretariat.<br>
          &gt; <br>
          &gt; <br>
          &gt; _______________________________________________<br>
          &gt; IPsec mailing list<br>
          &gt; <a class="moz-txt-link-abbreviated" href="mailto:IPsec@ietf.org">IPsec@ietf.org</a><br>
          &gt; </font></tt><a moz-do-not-send="true"
        href="https://www.ietf.org/mailman/listinfo/ipsec"><tt><font
            size="2">https://www.ietf.org/mailman/listinfo/ipsec</font></tt></a><tt><font
          size="2"><br>
        </font></tt>
      <pre wrap="">
<fieldset class="mimeAttachmentHeader"></fieldset>
_______________________________________________
IPsec mailing list
<a class="moz-txt-link-abbreviated" href="mailto:IPsec@ietf.org">IPsec@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/ipsec">https://www.ietf.org/mailman/listinfo/ipsec</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------080800070707010300080102--

From welterk@us.ibm.com  Fri Jan 14 11:48:40 2011
Return-Path: <welterk@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2E5D63A6BA7 for <ipsec@core3.amsl.com>; Fri, 14 Jan 2011 11:48:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.598
X-Spam-Level: 
X-Spam-Status: No, score=-5.598 tagged_above=-999 required=5 tests=[AWL=1.000,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MaM1KYWPaH2l for <ipsec@core3.amsl.com>; Fri, 14 Jan 2011 11:48:39 -0800 (PST)
Received: from e34.co.us.ibm.com (e34.co.us.ibm.com [32.97.110.152]) by core3.amsl.com (Postfix) with ESMTP id 2849A3A6A58 for <ipsec@ietf.org>; Fri, 14 Jan 2011 11:48:39 -0800 (PST)
Received: from d03relay01.boulder.ibm.com (d03relay01.boulder.ibm.com [9.17.195.226]) by e34.co.us.ibm.com (8.14.4/8.13.1) with ESMTP id p0EJe16Z032648 for <ipsec@ietf.org>; Fri, 14 Jan 2011 12:40:01 -0700
Received: from d03av06.boulder.ibm.com (d03av06.boulder.ibm.com [9.17.195.245]) by d03relay01.boulder.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p0EJowRu180652 for <ipsec@ietf.org>; Fri, 14 Jan 2011 12:50:58 -0700
Received: from d03av06.boulder.ibm.com (loopback [127.0.0.1]) by d03av06.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p0EJtQrf031992 for <ipsec@ietf.org>; Fri, 14 Jan 2011 12:55:26 -0700
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av06.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p0EJtQvx031985; Fri, 14 Jan 2011 12:55:26 -0700
In-Reply-To: <4D300DA7.2010003@gmail.com>
References: <OF83382F06.D21E6F23-ON88257816.0070A15A-88257816.0070D005@us.ibm.com> <OF042D8DC8.64349015-ON88257816.0073DD1F-88257816.00754261@us.ibm.com> <4D300DA7.2010003@gmail.com>
To: ipsec@ietf.org
MIME-Version: 1.0
X-KeepSent: 5AE96352:AB708A0E-88257818:006C6C27; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2FP3 SHF32 December 02, 2009
From: Keith Welter <welterk@us.ibm.com>
Message-ID: <OF5AE96352.AB708A0E-ON88257818.006C6C27-88257818.006D097E@us.ibm.com>
Date: Fri, 14 Jan 2011 11:50:57 -0800
X-MIMETrack: Serialize by Router on D03NM118/03/M/IBM(Release 8.5.1FP4|July 25, 2010) at 01/14/2011 12:50:57, Serialize complete at 01/14/2011 12:50:57
Content-Type: multipart/alternative; boundary="=_alternative 006D080C88257818_="
Subject: Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-01
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Jan 2011 19:48:40 -0000

This is a multipart message in MIME format.
--=_alternative 006D080C88257818_=
Content-Type: text/plain; charset="US-ASCII"

Version 02 is in the mail.

> Hi Keith,
> 
> I think this version makes a lot of sense. 
Thanks.

> A few comments:
> I don't like the asymmetrical nature of the notification, which 
> implies that only the original initiator can initiate the second 
> IKE_AUTH. There may be cases when the responder would like to 
> reauthenticate (e.g. mutual EAP with passwords). So I suggest to 
> have both peers send the notification if they support this extension.
Fixed in version 02.

> Please say explicitly whether/how this extension interacts with RFC 
> 6023: can the reauthenticated IKE SA be childless?
My intent was to permit reauthentication of a childless SA.  That is now 
explicitly stated in version 02.

> The introduction mentions three problems. Please add text somewhere 
> on how they are solved by this proposal.
I beefed-up the introduction to state how these problems are solved in 
version 02.

> Typo in Sec. 4: "MUST be the same as the as the SPIs".
Fixed in 02.

> Thanks,
>     Yaron

--=_alternative 006D080C88257818_=
Content-Type: text/html; charset="US-ASCII"


<br><tt><font size=2>Version 02 is in the mail.</font></tt>
<br>
<br><tt><font size=2>&gt; Hi Keith,<br>
&gt; <br>
&gt; I think this version makes a lot of sense. </font></tt>
<br><tt><font size=2>Thanks.</font></tt>
<br>
<br><tt><font size=2>&gt; A few comments:</font></tt>
<br><tt><font size=2>&gt; I don't like the asymmetrical nature of the notification,
which <br>
&gt; implies that only the original initiator can initiate the second <br>
&gt; IKE_AUTH. There may be cases when the responder would like to <br>
&gt; reauthenticate (e.g. mutual EAP with passwords). So I suggest to <br>
&gt; have both peers send the notification if they support this extension.</font></tt>
<br><tt><font size=2>Fixed in version 02.</font></tt>
<br>
<br><tt><font size=2>&gt; Please say explicitly whether/how this extension
interacts with RFC <br>
&gt; 6023: can the reauthenticated IKE SA be childless?</font></tt>
<br><tt><font size=2>My intent was to permit reauthentication of a childless
SA. &nbsp;That is now explicitly stated in version 02.</font></tt>
<br>
<br><tt><font size=2>&gt; The introduction mentions three problems. Please
add text somewhere <br>
&gt; on how they are solved by this proposal.</font></tt>
<br><tt><font size=2>I beefed-up the introduction to state how these problems
are solved in version 02.</font></tt>
<br>
<br><tt><font size=2>&gt; Typo in Sec. 4: &quot;MUST be the same as the
as the SPIs&quot;.</font></tt>
<br><tt><font size=2>Fixed in 02.</font></tt>
<br>
<br><tt><font size=2>&gt; Thanks,<br>
&gt; &nbsp; &nbsp; Yaron<br>
</font></tt>
--=_alternative 006D080C88257818_=--

From welterk@us.ibm.com  Fri Jan 14 11:51:51 2011
Return-Path: <welterk@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CB3813A6BC6 for <ipsec@core3.amsl.com>; Fri, 14 Jan 2011 11:51:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.931
X-Spam-Level: 
X-Spam-Status: No, score=-5.931 tagged_above=-999 required=5 tests=[AWL=0.667,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y+mpG7JUVA9n for <ipsec@core3.amsl.com>; Fri, 14 Jan 2011 11:51:49 -0800 (PST)
Received: from e33.co.us.ibm.com (e33.co.us.ibm.com [32.97.110.151]) by core3.amsl.com (Postfix) with ESMTP id 766163A6BCC for <ipsec@ietf.org>; Fri, 14 Jan 2011 11:51:49 -0800 (PST)
Received: from d03relay02.boulder.ibm.com (d03relay02.boulder.ibm.com [9.17.195.227]) by e33.co.us.ibm.com (8.14.4/8.13.1) with ESMTP id p0EJm6pA015834 for <ipsec@ietf.org>; Fri, 14 Jan 2011 12:48:06 -0700
Received: from d03av04.boulder.ibm.com (d03av04.boulder.ibm.com [9.17.195.170]) by d03relay02.boulder.ibm.com (8.13.8/8.13.8/NCO v9.1) with ESMTP id p0EJs8L3233394 for <ipsec@ietf.org>; Fri, 14 Jan 2011 12:54:09 -0700
Received: from d03av04.boulder.ibm.com (loopback [127.0.0.1]) by d03av04.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p0EJs8AC018449 for <ipsec@ietf.org>; Fri, 14 Jan 2011 12:54:08 -0700
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av04.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p0EJs8Bl018413 for <ipsec@ietf.org>; Fri, 14 Jan 2011 12:54:08 -0700
To: ipsec@ietf.org
MIME-Version: 1.0
X-KeepSent: 3BE5DE68:D7665C2D-88257818:006D11C6; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2FP3 SHF32 December 02, 2009
From: Keith Welter <welterk@us.ibm.com>
Message-ID: <OF3BE5DE68.D7665C2D-ON88257818.006D11C6-88257818.006D53A2@us.ibm.com>
Date: Fri, 14 Jan 2011 11:54:07 -0800
X-MIMETrack: Serialize by Router on D03NM118/03/M/IBM(Release 8.5.1FP4|July 25, 2010) at 01/14/2011 12:54:07, Serialize complete at 01/14/2011 12:54:07
Content-Type: multipart/alternative; boundary="=_alternative 006D527188257818_="
Subject: [IPsec]  draft-welter-ipsecme-ikev2-reauth-02
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Jan 2011 19:51:51 -0000

This is a multipart message in MIME format.
--=_alternative 006D527188257818_=
Content-Type: text/plain; charset="US-ASCII"

I submitted draft-welter-ipsecme-ikev2-reauth-02 to address the comments 
from Yaron.  Thanks Yaron!

Keith Welter
IBM z/OS Communications Server Developer
1-415-545-2694 (T/L: 473-2694)

> A new version of I-D, draft-welter-ipsecme-ikev2-reauth-02.txt has 
> been successfully submitted by Keith Welter and posted to the IETF 
repository.
> 
> Filename:    draft-welter-ipsecme-ikev2-reauth
> Revision:    02
> Title:       Reauthentication Extension for IKEv2
> Creation_date:    2011-01-14
> WG ID:       Independent Submission
> Number_of_pages: 6
> 
> Abstract:
> This document describes an extension to the Internet Key Exchange
> version 2 (IKEv2) protocol that allows an IKEv2 Security Association
> (SA) to be reauthenticated without creating a new IKE SA or new Child
> SAs.
>  
> 
> 
> The IETF Secretariat.
> 
> 

--=_alternative 006D527188257818_=
Content-Type: text/html; charset="US-ASCII"


<br><font size=2 face="sans-serif">I submitted draft-welter-ipsecme-ikev2-reauth-02
to address the comments from Yaron. &nbsp;Thanks Yaron!</font>
<br><font size=2 face="sans-serif"><br>
Keith Welter<br>
IBM z/OS Communications Server Developer<br>
1-415-545-2694 (T/L: 473-2694)<br>
</font>
<br><tt><font size=2>&gt; A new version of I-D, draft-welter-ipsecme-ikev2-reauth-02.txt
has <br>
&gt; been successfully submitted by Keith Welter and posted to the IETF
repository.<br>
&gt; <br>
&gt; Filename: &nbsp; &nbsp;draft-welter-ipsecme-ikev2-reauth<br>
&gt; Revision: &nbsp; &nbsp;02<br>
&gt; Title: &nbsp; &nbsp; &nbsp; Reauthentication Extension for IKEv2<br>
&gt; Creation_date: &nbsp; &nbsp;2011-01-14<br>
&gt; WG ID: &nbsp; &nbsp; &nbsp; Independent Submission<br>
&gt; Number_of_pages: 6<br>
&gt; <br>
&gt; Abstract:<br>
&gt; This document describes an extension to the Internet Key Exchange<br>
&gt; version 2 (IKEv2) protocol that allows an IKEv2 Security Association<br>
&gt; (SA) to be reauthenticated without creating a new IKE SA or new Child<br>
&gt; SAs.<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br>
&gt; <br>
&gt; <br>
&gt; The IETF Secretariat.<br>
&gt; <br>
&gt; <br>
</font></tt>
--=_alternative 006D527188257818_=--

From welterk@us.ibm.com  Fri Jan 14 16:07:41 2011
Return-Path: <welterk@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3E55E3A6CB8 for <ipsec@core3.amsl.com>; Fri, 14 Jan 2011 16:07:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.098
X-Spam-Level: 
X-Spam-Status: No, score=-4.098 tagged_above=-999 required=5 tests=[AWL=-1.500, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iBRNoVDtp75Z for <ipsec@core3.amsl.com>; Fri, 14 Jan 2011 16:07:40 -0800 (PST)
Received: from e39.co.us.ibm.com (e39.co.us.ibm.com [32.97.110.160]) by core3.amsl.com (Postfix) with ESMTP id 46E103A6CB5 for <ipsec@ietf.org>; Fri, 14 Jan 2011 16:07:40 -0800 (PST)
Received: from d03relay04.boulder.ibm.com (d03relay04.boulder.ibm.com [9.17.195.106]) by e39.co.us.ibm.com (8.14.4/8.13.1) with ESMTP id p0ENvpqX001232 for <ipsec@ietf.org>; Fri, 14 Jan 2011 16:57:51 -0700
Received: from d03av03.boulder.ibm.com (d03av03.boulder.ibm.com [9.17.195.169]) by d03relay04.boulder.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p0F09vrB121474 for <ipsec@ietf.org>; Fri, 14 Jan 2011 17:09:57 -0700
Received: from d03av03.boulder.ibm.com (loopback [127.0.0.1]) by d03av03.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p0F09uPK022405 for <ipsec@ietf.org>; Fri, 14 Jan 2011 17:09:56 -0700
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av03.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p0F09u5R022402 for <ipsec@ietf.org>; Fri, 14 Jan 2011 17:09:56 -0700
In-Reply-To: <OF3BE5DE68.D7665C2D-ON88257818.006D11C6-88257818.006D53A2@us.ibm.com>
References: <OF3BE5DE68.D7665C2D-ON88257818.006D11C6-88257818.006D53A2@us.ibm.com>
To: ipsec@ietf.org
MIME-Version: 1.0
X-KeepSent: BD92F556:D1F97386-88257818:0083CC58; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2FP3 SHF32 December 02, 2009
From: Keith Welter <welterk@us.ibm.com>
Message-ID: <OFBD92F556.D1F97386-ON88257818.0083CC58-88257819.0000E936@us.ibm.com>
Date: Fri, 14 Jan 2011 16:09:55 -0800
X-MIMETrack: Serialize by Router on D03NM118/03/M/IBM(Release 8.5.1FP4|July 25, 2010) at 01/14/2011 17:09:56, Serialize complete at 01/14/2011 17:09:56
Content-Type: multipart/alternative; boundary="=_alternative 0000E7B388257819_="
Subject: Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-02
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 15 Jan 2011 00:07:41 -0000

This is a multipart message in MIME format.
--=_alternative 0000E7B388257819_=
Content-Type: text/plain; charset="US-ASCII"

I noticed a minor problem in section 5:
  "When not using extensible authentication, the peers are authenticated
  by having each sign (or MAC using a padded shared secret as the key,
  as described later in this section) a block of data.

But the padding is not described later in the section. 

I will reword the section as follows:
"5. Authentication Data for Reauthenticating the IKE SA

When not using extensible authentication, the peers are authenticated by 
having each sign (or MAC using a padded shared secret as the key) a block 
of data as described in [IKEv2] Section 2.15 except for the following 
differences: 

   o For the modified IKE_AUTH request, the octets to be signed start with 
the first octet of the previous Authentication payload sent by the 
initiator and end with the last octet of that payload. 

   o For the modified IKE_AUTH response, the octets to be signed start 
with the first octet of the previous Authentication payload sent by the 
responder and end with the last octet of that payload."


Keith Welter
IBM z/OS Communications Server Developer
1-415-545-2694 (T/L: 473-2694)

--=_alternative 0000E7B388257819_=
Content-Type: text/html; charset="US-ASCII"


<br><tt><font size=2>I noticed a minor problem in section 5:</font></tt>
<br><tt><font size=2>&nbsp; &quot;</font></tt><tt><font size=3>When not
using extensible authentication, the peers are authenticated<br>
 &nbsp;by having each sign (or MAC using a padded shared secret as the
key,<br>
 &nbsp;as described later in this section) a block of data.</font></tt>
<br>
<br><tt><font size=3>But the padding is not described later in the section.
&nbsp;</font></tt>
<br>
<br><tt><font size=3>I will reword the section as follows:</font></tt>
<br><tt><font size=3>&quot;5. Authentication Data for Reauthenticating
the IKE SA</font></tt>
<br>
<br><tt><font size=3>When not using extensible authentication, the peers
are authenticated by having each sign (or MAC using a padded shared secret
as the key) a block of data as described in [IKEv2] Section 2.15 except
for the following differences: &nbsp;</font></tt>
<br>
<br><tt><font size=3>&nbsp; &nbsp;o For the modified IKE_AUTH request,
the octets to be signed start with the first octet of the previous Authentication
payload sent by the initiator and end with the last octet of that payload.
&nbsp;</font></tt>
<br>
<br><tt><font size=3>&nbsp; &nbsp;o For the modified IKE_AUTH response,
the octets to be signed start with the first octet of the previous Authentication
payload sent by the responder and end with the last octet of that payload.&quot;</font></tt>
<br>
<br><tt><font size=2><br>
Keith Welter<br>
IBM z/OS Communications Server Developer<br>
1-415-545-2694 (T/L: 473-2694)<br>
</font></tt>
--=_alternative 0000E7B388257819_=--

From gpoothia@microsoft.com  Sun Jan 16 12:58:43 2011
Return-Path: <gpoothia@microsoft.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7EFDD28C0E1 for <ipsec@core3.amsl.com>; Sun, 16 Jan 2011 12:58:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fUo5uiWyqoDm for <ipsec@core3.amsl.com>; Sun, 16 Jan 2011 12:58:40 -0800 (PST)
Received: from smtp.microsoft.com (mailb.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 0A2C128C0DB for <ipsec@ietf.org>; Sun, 16 Jan 2011 12:58:40 -0800 (PST)
Received: from TK5EX14HUBC104.redmond.corp.microsoft.com (157.54.80.25) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Sun, 16 Jan 2011 13:01:05 -0800
Received: from TK5EX14MBXC118.redmond.corp.microsoft.com ([169.254.9.92]) by TK5EX14HUBC104.redmond.corp.microsoft.com ([157.54.80.25]) with mapi id 14.01.0255.003; Sun, 16 Jan 2011 13:01:05 -0800
From: Gaurav Poothia <gpoothia@microsoft.com>
To: "ipsec@ietf.org" <ipsec@ietf.org>
Thread-Topic: IKEv2 Diffie Hellman retry logic
Thread-Index: Acu1wHs6+T0VnhYRQj61a5elI0clUg==
Date: Sun, 16 Jan 2011 21:01:02 +0000
Message-ID: <B69601AD18064F4BBA2D61CA82AEAFA928230CDF@TK5EX14MBXC118.redmond.corp.microsoft.com>
Accept-Language: en-CA, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.71]
Content-Type: multipart/alternative; boundary="_000_B69601AD18064F4BBA2D61CA82AEAFA928230CDFTK5EX14MBXC118r_"
MIME-Version: 1.0
Cc: Stephen Bensley <sbens@microsoft.com>, Brian Swander <briansw@microsoft.com>, Gabriel Montenegro <gmonte@microsoft.com>
Subject: [IPsec] IKEv2 Diffie Hellman retry logic
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 Jan 2011 20:58:43 -0000

--_000_B69601AD18064F4BBA2D61CA82AEAFA928230CDFTK5EX14MBXC118r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Scenario: When the IKEv2 initiator guesses an incorrect DH group and the re=
sponder sends back the DH group hint in INVALID_KE_PAYLOAD notification.

Couple of questions around this:

On what basis does the responder reject the DH group:

1.       Because the best match initiator SA payload proposal (against resp=
onder policy) has a different DH group from KE payload

2.       Because the responder after looking  all the SA payload initiator =
proposals with DH group from KE payload finds none of the initiator proposa=
ls acceptable

3.       Because the responder altogether ignores the initiator proposals (=
SA payload) and only checks to see that the DH group in KE payload doesn't =
figure in its own policy at all

To paraphrase:
Case 1 looks like it will have IKEv1 parity in terms of using the best poli=
cy match and restarting negotiation if the initial KE guess doesn't match u=
p to that.
Case 2 will do worse than IKEv1 by not forcing the best policy match but by=
 proceeding with an inferior and acceptable match will save an extra round =
trip.
Case 3 is actually non deterministic because the hint is not guaranteed to =
work (since other transforms have not been evaluated while choosing hint)

Once rejected on what basis does the responder choose the DH group to put i=
n the INVALID_KE_PAYLOAD hint  (corresponding to above rejection criteria):

*         For cases 1 & 2: It is the DH group in the initiator SA proposal =
that facilitates the best policy match (against responder policy).

*         For case 3 it the DH group in responder's most preferred proposal=
.

Thanks

--_000_B69601AD18064F4BBA2D61CA82AEAFA928230CDFTK5EX14MBXC118r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:630672768;
	mso-list-type:hybrid;
	mso-list-template-ids:-500505748 67698689 67698691 67698693 67698689 67698=
691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l1
	{mso-list-id:1767648691;
	mso-list-type:hybrid;
	mso-list-template-ids:-1401364096 67698689 67698691 67698693 67698689 6769=
8691 67698693 67698689 67698691 67698693;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l2
	{mso-list-id:1815486840;
	mso-list-type:hybrid;
	mso-list-template-ids:-1236522356 67698703 67698691 67698693 67698689 6769=
8691 67698693 67698689 67698691 67698693;}
@list l2:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Scenario: When the IKEv2 initiator guesses an incorr=
ect DH group and the responder sends back the DH group hint in INVALID_KE_P=
AYLOAD notification.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Couple of questions around this:<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b>On what basis does the responder reject the DH gr=
oup:<o:p></o:p></b></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l2 level=
1 lfo2"><![if !supportLists]><span style=3D"mso-list:Ignore">1.<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;
</span></span><![endif]>Because the best match initiator SA payload proposa=
l (against responder policy) has a different DH group from KE payload<o:p><=
/o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l2 level=
1 lfo2"><![if !supportLists]><span style=3D"mso-list:Ignore">2.<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;
</span></span><![endif]>Because the responder after looking &nbsp;all the S=
A payload initiator proposals with DH group from KE payload finds none of t=
he initiator proposals acceptable<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l2 level=
1 lfo2"><![if !supportLists]><span style=3D"mso-list:Ignore">3.<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;
</span></span><![endif]>Because the responder altogether ignores the initia=
tor proposals (SA payload) and only checks to see that the DH group in KE p=
ayload doesn&#8217;t figure in its own policy at all<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">To paraphrase:<o:p></o:p></p>
<p class=3D"MsoNormal">Case 1 looks like it will have IKEv1 parity in terms=
 of using the best policy match and restarting negotiation if the initial K=
E guess doesn&#8217;t match up to that.<o:p></o:p></p>
<p class=3D"MsoNormal">Case 2 will do worse than IKEv1 by not forcing the b=
est policy match but by proceeding with an inferior and acceptable match wi=
ll save an extra round trip.<o:p></o:p></p>
<p class=3D"MsoNormal">Case 3 is actually non deterministic because the hin=
t is not guaranteed to work (since other transforms have not been evaluated=
 while choosing hint)<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b>Once rejected on what basis does the responder ch=
oose the DH group to put in the INVALID_KE_PAYLOAD hint
</b>&nbsp;(corresponding to above rejection criteria):<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo3"><![if !supportLists]><span style=3D"font-family:Symbol"><span style=
=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Roma=
n&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>For cases 1 &amp; 2: It is the DH group in t=
he initiator SA proposal that facilitates the best policy match (against re=
sponder policy).<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo3"><![if !supportLists]><span style=3D"font-family:Symbol"><span style=
=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Roma=
n&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>For case 3 it the DH group in responder&#821=
7;s most preferred proposal.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Thanks<o:p></o:p></p>
</div>
</body>
</html>

--_000_B69601AD18064F4BBA2D61CA82AEAFA928230CDFTK5EX14MBXC118r_--

From ynir@checkpoint.com  Sun Jan 16 23:51:05 2011
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9BB093A6EA0 for <ipsec@core3.amsl.com>; Sun, 16 Jan 2011 23:51:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.008
X-Spam-Level: 
X-Spam-Status: No, score=-10.008 tagged_above=-999 required=5 tests=[AWL=0.590, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rKtS-HbKXGyf for <ipsec@core3.amsl.com>; Sun, 16 Jan 2011 23:51:00 -0800 (PST)
Received: from michael.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by core3.amsl.com (Postfix) with ESMTP id 6AFA93A6E9C for <ipsec@ietf.org>; Sun, 16 Jan 2011 23:50:59 -0800 (PST)
X-CheckPoint: {4D33F57C-1-1B221DC2-2FFFF}
Received: from il-ex01.ad.checkpoint.com (il-ex01.checkpoint.com [194.29.34.26]) by michael.checkpoint.com (8.13.8/8.13.8) with ESMTP id p0H7rVg4025885;  Mon, 17 Jan 2011 09:53:31 +0200
Received: from il-ex03.ad.checkpoint.com (194.29.34.71) by il-ex01.ad.checkpoint.com (194.29.34.26) with Microsoft SMTP Server (TLS) id 8.2.255.0; Mon, 17 Jan 2011 09:53:31 +0200
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex03.ad.checkpoint.com ([194.29.34.71]) with mapi; Mon, 17 Jan 2011 09:53:31 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: "'Gaurav Poothia'" <gpoothia@microsoft.com>, "ipsec@ietf.org" <ipsec@ietf.org>
Date: Mon, 17 Jan 2011 09:53:31 +0200
Thread-Topic: IKEv2 Diffie Hellman retry logic
Thread-Index: Acu1wHs6+T0VnhYRQj61a5elI0clUgAWpm/Q
Message-ID: <006FEB08D9C6444AB014105C9AEB133F012E84990CEE@il-ex01.ad.checkpoint.com>
References: <B69601AD18064F4BBA2D61CA82AEAFA928230CDF@TK5EX14MBXC118.redmond.corp.microsoft.com>
In-Reply-To: <B69601AD18064F4BBA2D61CA82AEAFA928230CDF@TK5EX14MBXC118.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_006FEB08D9C6444AB014105C9AEB133F012E84990CEEilex01adche_"
MIME-Version: 1.0
Cc: Stephen Bensley <sbens@microsoft.com>, Brian Swander <briansw@microsoft.com>, Gabriel Montenegro <gmonte@microsoft.com>
Subject: Re: [IPsec] IKEv2 Diffie Hellman retry logic
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jan 2011 07:51:05 -0000

--_000_006FEB08D9C6444AB014105C9AEB133F012E84990CEEilex01adche_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

 1.  Yes
 2.  No. In that case, the correct response in NO PROPOSAL CHOSEN.
 3.  That is not correct processing. First the responder should match the S=
A payload to its own policy. If a match it found, the responder can compare=
 the DH group in the matched proposal to the one in the KE payload


The hint in the INVALID_KE_PAYLOAD notification is the group in the common =
proposal.

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of G=
aurav Poothia
Sent: 16 January 2011 23:01
To: ipsec@ietf.org
Cc: Stephen Bensley; Brian Swander; Gabriel Montenegro
Subject: [IPsec] IKEv2 Diffie Hellman retry logic

Scenario: When the IKEv2 initiator guesses an incorrect DH group and the re=
sponder sends back the DH group hint in INVALID_KE_PAYLOAD notification.

Couple of questions around this:

On what basis does the responder reject the DH group:

1.       Because the best match initiator SA payload proposal (against resp=
onder policy) has a different DH group from KE payload

2.       Because the responder after looking  all the SA payload initiator =
proposals with DH group from KE payload finds none of the initiator proposa=
ls acceptable

3.       Because the responder altogether ignores the initiator proposals (=
SA payload) and only checks to see that the DH group in KE payload doesn't =
figure in its own policy at all

To paraphrase:
Case 1 looks like it will have IKEv1 parity in terms of using the best poli=
cy match and restarting negotiation if the initial KE guess doesn't match u=
p to that.
Case 2 will do worse than IKEv1 by not forcing the best policy match but by=
 proceeding with an inferior and acceptable match will save an extra round =
trip.
Case 3 is actually non deterministic because the hint is not guaranteed to =
work (since other transforms have not been evaluated while choosing hint)

Once rejected on what basis does the responder choose the DH group to put i=
n the INVALID_KE_PAYLOAD hint  (corresponding to above rejection criteria):

*         For cases 1 & 2: It is the DH group in the initiator SA proposal =
that facilitates the best policy match (against responder policy).

*         For case 3 it the DH group in responder's most preferred proposal=
.

Thanks


Scanned by Check Point Total Security Gateway.


--_000_006FEB08D9C6444AB014105C9AEB133F012E84990CEEilex01adche_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D=20
"urn:schemas-microsoft-com:vml" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word" xmlns:m =3D=20
"http://schemas.microsoft.com/office/2004/12/omml"><HEAD>
<META content=3D"text/html; charset=3Dus-ascii" http-equiv=3DContent-Type>
<META name=3DGENERATOR content=3D"MSHTML 8.00.7600.16700">
<STYLE>@font-face {
	font-family: Wingdings;
}
@font-face {
	font-family: Cambria Math;
}
@font-face {
	font-family: Calibri;
}
@page WordSection1 {size: 8.5in 11.0in; margin: 1.0in 1.0in 1.0in 1.0in; }
P.MsoNormal {
	MARGIN: 0in 0in 0pt; FONT-FAMILY: "Calibri","sans-serif"; FONT-SIZE: 11pt
}
LI.MsoNormal {
	MARGIN: 0in 0in 0pt; FONT-FAMILY: "Calibri","sans-serif"; FONT-SIZE: 11pt
}
DIV.MsoNormal {
	MARGIN: 0in 0in 0pt; FONT-FAMILY: "Calibri","sans-serif"; FONT-SIZE: 11pt
}
A:link {
	COLOR: blue; TEXT-DECORATION: underline; mso-style-priority: 99
}
SPAN.MsoHyperlink {
	COLOR: blue; TEXT-DECORATION: underline; mso-style-priority: 99
}
A:visited {
	COLOR: purple; TEXT-DECORATION: underline; mso-style-priority: 99
}
SPAN.MsoHyperlinkFollowed {
	COLOR: purple; TEXT-DECORATION: underline; mso-style-priority: 99
}
P.MsoListParagraph {
	MARGIN: 0in 0in 0pt 0.5in; FONT-FAMILY: "Calibri","sans-serif"; FONT-SIZE:=
 11pt; mso-style-priority: 34
}
LI.MsoListParagraph {
	MARGIN: 0in 0in 0pt 0.5in; FONT-FAMILY: "Calibri","sans-serif"; FONT-SIZE:=
 11pt; mso-style-priority: 34
}
DIV.MsoListParagraph {
	MARGIN: 0in 0in 0pt 0.5in; FONT-FAMILY: "Calibri","sans-serif"; FONT-SIZE:=
 11pt; mso-style-priority: 34
}
SPAN.EmailStyle17 {
	FONT-FAMILY: "Calibri","sans-serif"; COLOR: windowtext; mso-style-type: pe=
rsonal-compose
}
.MsoChpDefault {
	mso-style-type: export-only
}
DIV.WordSection1 {
	page: WordSection1
}
OL {
	MARGIN-BOTTOM: 0in
}
UL {
	MARGIN-BOTTOM: 0in
}
</STYLE>
<!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></HEAD>
<BODY lang=3DEN-US link=3Dblue vLink=3Dpurple>
<OL>
  <LI><SPAN class=3D806344907-17012011><FONT color=3D#0000ff size=3D2=20
  face=3DTahoma>Yes</FONT></SPAN></LI>
  <LI><SPAN class=3D806344907-17012011><FONT color=3D#0000ff size=3D2 face=
=3DTahoma>No.=20
  In that case, the correct response in NO PROPOSAL CHOSEN.</FONT></SPAN></=
LI>
  <LI><SPAN class=3D806344907-17012011><FONT color=3D#0000ff size=3D2 face=
=3DTahoma>That=20
  is not correct processing. First the responder should match the SA payloa=
d to=20
  its own policy. If a match it found, the responder can compare the DH gro=
up in=20
  the matched proposal to the one in the KE payload</FONT></SPAN></LI></OL>
<DIV><SPAN class=3D806344907-17012011><FONT color=3D#0000ff size=3D2=20
face=3DTahoma></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D806344907-17012011><FONT color=3D#0000ff size=3D2 face=
=3DTahoma>The=20
hint in the INVALID_KE_PAYLOAD notification is the group in the common=20
proposal.</FONT></SPAN></DIV><BR>
<DIV dir=3Dltr lang=3Den-us class=3DOutlookMessageHeader align=3Dleft>
<HR tabIndex=3D-1>
<FONT size=3D2 face=3DTahoma><B>From:</B> ipsec-bounces@ietf.org=20
[mailto:ipsec-bounces@ietf.org] <B>On Behalf Of </B>Gaurav=20
Poothia<BR><B>Sent:</B> 16 January 2011 23:01<BR><B>To:</B>=20
ipsec@ietf.org<BR><B>Cc:</B> Stephen Bensley; Brian Swander; Gabriel=20
Montenegro<BR><B>Subject:</B> [IPsec] IKEv2 Diffie Hellman retry=20
logic<BR></FONT><BR></DIV>
<DIV></DIV>
<DIV class=3DWordSection1>
<P class=3DMsoNormal>Scenario: When the IKEv2 initiator guesses an incorrec=
t DH=20
group and the responder sends back the DH group hint in INVALID_KE_PAYLOAD=
=20
notification.<o:p></o:p></P>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P>
<P class=3DMsoNormal>Couple of questions around this:<o:p></o:p></P>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P>
<P class=3DMsoNormal><B>On what basis does the responder reject the DH=20
group:<o:p></o:p></B></P>
<P style=3D"TEXT-INDENT: -0.25in; mso-list: l2 level1 lfo2"=20
class=3DMsoListParagraph><![if !supportLists]><SPAN=20
style=3D"mso-list: Ignore">1.<SPAN=20
style=3D"FONT: 7pt 'Times New Roman'">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
=20
</SPAN></SPAN><![endif]>Because the best match initiator SA payload proposa=
l=20
(against responder policy) has a different DH group from KE=20
payload<o:p></o:p></P>
<P style=3D"TEXT-INDENT: -0.25in; mso-list: l2 level1 lfo2"=20
class=3DMsoListParagraph><![if !supportLists]><SPAN=20
style=3D"mso-list: Ignore">2.<SPAN=20
style=3D"FONT: 7pt 'Times New Roman'">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
=20
</SPAN></SPAN><![endif]>Because the responder after looking &nbsp;all the S=
A=20
payload initiator proposals with DH group from KE payload finds none of the=
=20
initiator proposals acceptable<o:p></o:p></P>
<P style=3D"TEXT-INDENT: -0.25in; mso-list: l2 level1 lfo2"=20
class=3DMsoListParagraph><![if !supportLists]><SPAN=20
style=3D"mso-list: Ignore">3.<SPAN=20
style=3D"FONT: 7pt 'Times New Roman'">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
=20
</SPAN></SPAN><![endif]>Because the responder altogether ignores the initia=
tor=20
proposals (SA payload) and only checks to see that the DH group in KE paylo=
ad=20
doesn&#8217;t figure in its own policy at all<o:p></o:p></P>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P>
<P class=3DMsoNormal>To paraphrase:<o:p></o:p></P>
<P class=3DMsoNormal>Case 1 looks like it will have IKEv1 parity in terms o=
f using=20
the best policy match and restarting negotiation if the initial KE guess do=
esn&#8217;t=20
match up to that.<o:p></o:p></P>
<P class=3DMsoNormal>Case 2 will do worse than IKEv1 by not forcing the bes=
t=20
policy match but by proceeding with an inferior and acceptable match will s=
ave=20
an extra round trip.<o:p></o:p></P>
<P class=3DMsoNormal>Case 3 is actually non deterministic because the hint =
is not=20
guaranteed to work (since other transforms have not been evaluated while=20
choosing hint)<o:p></o:p></P>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P>
<P class=3DMsoNormal><B>Once rejected on what basis does the responder choo=
se the=20
DH group to put in the INVALID_KE_PAYLOAD hint </B>&nbsp;(corresponding to =
above=20
rejection criteria):<o:p></o:p></P>
<P style=3D"TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo3"=20
class=3DMsoListParagraph><![if !supportLists]><SPAN=20
style=3D"FONT-FAMILY: Symbol"><SPAN style=3D"mso-list: Ignore">&middot;<SPA=
N=20
style=3D"FONT: 7pt 'Times New Roman'">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;=20
</SPAN></SPAN></SPAN><![endif]>For cases 1 &amp; 2: It is the DH group in t=
he=20
initiator SA proposal that facilitates the best policy match (against respo=
nder=20
policy).<o:p></o:p></P>
<P style=3D"TEXT-INDENT: -0.25in; mso-list: l0 level1 lfo3"=20
class=3DMsoListParagraph><![if !supportLists]><SPAN=20
style=3D"FONT-FAMILY: Symbol"><SPAN style=3D"mso-list: Ignore">&middot;<SPA=
N=20
style=3D"FONT: 7pt 'Times New Roman'">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;=20
</SPAN></SPAN></SPAN><![endif]>For case 3 it the DH group in responder&#821=
7;s most=20
preferred proposal.<o:p></o:p></P>
<P class=3DMsoNormal><o:p>&nbsp;</o:p></P>
<P class=3DMsoNormal>Thanks<o:p></o:p></P></DIV><BR><BR>Scanned by Check Po=
int=20
Total Security Gateway. <BR><BR></BODY></HTML>

--_000_006FEB08D9C6444AB014105C9AEB133F012E84990CEEilex01adche_--

From gpoothia@microsoft.com  Mon Jan 17 10:39:18 2011
Return-Path: <gpoothia@microsoft.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 542333A6D75 for <ipsec@core3.amsl.com>; Mon, 17 Jan 2011 10:39:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z2Vyq3B8QoTd for <ipsec@core3.amsl.com>; Mon, 17 Jan 2011 10:39:12 -0800 (PST)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 9C7F53A6E82 for <ipsec@ietf.org>; Mon, 17 Jan 2011 10:39:12 -0800 (PST)
Received: from TK5EX14MLTC101.redmond.corp.microsoft.com (157.54.79.178) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Mon, 17 Jan 2011 10:41:40 -0800
Received: from TK5EX14MBXC118.redmond.corp.microsoft.com ([169.254.9.92]) by TK5EX14MLTC101.redmond.corp.microsoft.com ([157.54.79.178]) with mapi id 14.01.0255.003; Mon, 17 Jan 2011 10:41:40 -0800
From: Gaurav Poothia <gpoothia@microsoft.com>
To: Yoav Nir <ynir@checkpoint.com>, "ipsec@ietf.org" <ipsec@ietf.org>
Thread-Topic: IKEv2 Diffie Hellman retry logic
Thread-Index: Acu1wHs6+T0VnhYRQj61a5elI0clUgAWpm/QABZWK0A=
Date: Mon, 17 Jan 2011 18:41:40 +0000
Message-ID: <B69601AD18064F4BBA2D61CA82AEAFA9282322A3@TK5EX14MBXC118.redmond.corp.microsoft.com>
References: <B69601AD18064F4BBA2D61CA82AEAFA928230CDF@TK5EX14MBXC118.redmond.corp.microsoft.com> <006FEB08D9C6444AB014105C9AEB133F012E84990CEE@il-ex01.ad.checkpoint.com>
In-Reply-To: <006FEB08D9C6444AB014105C9AEB133F012E84990CEE@il-ex01.ad.checkpoint.com>
Accept-Language: en-CA, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.71]
Content-Type: multipart/alternative; boundary="_000_B69601AD18064F4BBA2D61CA82AEAFA9282322A3TK5EX14MBXC118r_"
MIME-Version: 1.0
Cc: Stephen Bensley <sbens@microsoft.com>, Brian Swander <briansw@microsoft.com>, Gabriel Montenegro <gmonte@microsoft.com>
Subject: Re: [IPsec] IKEv2 Diffie Hellman retry logic
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jan 2011 18:39:18 -0000

--_000_B69601AD18064F4BBA2D61CA82AEAFA9282322A3TK5EX14MBXC118r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Thanks Yoav.

>> First the responder should match the SA payload to its own policy. If a =
match it found, the responder can compare the DH group in the matched propo=
sal to the one in the KE payload

I agree this option seems to make the most sense.


From: Yoav Nir [mailto:ynir@checkpoint.com]
Sent: Sunday, January 16, 2011 11:54 PM
To: Gaurav Poothia; ipsec@ietf.org
Cc: Stephen Bensley; Brian Swander; Gabriel Montenegro
Subject: RE: IKEv2 Diffie Hellman retry logic


  1.  Yes
  2.  No. In that case, the correct response in NO PROPOSAL CHOSEN.
  3.  That is not correct processing. First the responder should match the =
SA payload to its own policy. If a match it found, the responder can compar=
e the DH group in the matched proposal to the one in the KE payload

The hint in the INVALID_KE_PAYLOAD notification is the group in the common =
proposal.

________________________________
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of G=
aurav Poothia
Sent: 16 January 2011 23:01
To: ipsec@ietf.org
Cc: Stephen Bensley; Brian Swander; Gabriel Montenegro
Subject: [IPsec] IKEv2 Diffie Hellman retry logic
Scenario: When the IKEv2 initiator guesses an incorrect DH group and the re=
sponder sends back the DH group hint in INVALID_KE_PAYLOAD notification.

Couple of questions around this:

On what basis does the responder reject the DH group:

1.       Because the best match initiator SA payload proposal (against resp=
onder policy) has a different DH group from KE payload

2.       Because the responder after looking  all the SA payload initiator =
proposals with DH group from KE payload finds none of the initiator proposa=
ls acceptable

3.       Because the responder altogether ignores the initiator proposals (=
SA payload) and only checks to see that the DH group in KE payload doesn't =
figure in its own policy at all

To paraphrase:
Case 1 looks like it will have IKEv1 parity in terms of using the best poli=
cy match and restarting negotiation if the initial KE guess doesn't match u=
p to that.
Case 2 will do worse than IKEv1 by not forcing the best policy match but by=
 proceeding with an inferior and acceptable match will save an extra round =
trip.
Case 3 is actually non deterministic because the hint is not guaranteed to =
work (since other transforms have not been evaluated while choosing hint)

Once rejected on what basis does the responder choose the DH group to put i=
n the INVALID_KE_PAYLOAD hint  (corresponding to above rejection criteria):

*         For cases 1 & 2: It is the DH group in the initiator SA proposal =
that facilitates the best policy match (against responder policy).

*         For case 3 it the DH group in responder's most preferred proposal=
.

Thanks


Scanned by Check Point Total Security Gateway.

--_000_B69601AD18064F4BBA2D61CA82AEAFA9282322A3TK5EX14MBXC118r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:p=3D"urn:schemas-m=
icrosoft-com:office:powerpoint" xmlns:a=3D"urn:schemas-microsoft-com:office=
:access" xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s=3D"=
uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs=3D"urn:schemas-microsof=
t-com:rowset" xmlns:z=3D"#RowsetSchema" xmlns:b=3D"urn:schemas-microsoft-co=
m:office:publisher" xmlns:ss=3D"urn:schemas-microsoft-com:office:spreadshee=
t" xmlns:c=3D"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns=
:odc=3D"urn:schemas-microsoft-com:office:odc" xmlns:oa=3D"urn:schemas-micro=
soft-com:office:activation" xmlns:html=3D"http://www.w3.org/TR/REC-html40" =
xmlns:q=3D"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc=3D"http://m=
icrosoft.com/officenet/conferencing" xmlns:D=3D"DAV:" xmlns:Repl=3D"http://=
schemas.microsoft.com/repl/" xmlns:mt=3D"http://schemas.microsoft.com/share=
point/soap/meetings/" xmlns:x2=3D"http://schemas.microsoft.com/office/excel=
/2003/xml" xmlns:ppda=3D"http://www.passport.com/NameSpace.xsd" xmlns:ois=
=3D"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir=3D"http://=
schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds=3D"http://www.w3=
.org/2000/09/xmldsig#" xmlns:dsp=3D"http://schemas.microsoft.com/sharepoint=
/dsp" xmlns:udc=3D"http://schemas.microsoft.com/data/udc" xmlns:xsd=3D"http=
://www.w3.org/2001/XMLSchema" xmlns:sub=3D"http://schemas.microsoft.com/sha=
repoint/soap/2002/1/alerts/" xmlns:ec=3D"http://www.w3.org/2001/04/xmlenc#"=
 xmlns:sp=3D"http://schemas.microsoft.com/sharepoint/" xmlns:sps=3D"http://=
schemas.microsoft.com/sharepoint/soap/" xmlns:xsi=3D"http://www.w3.org/2001=
/XMLSchema-instance" xmlns:udcs=3D"http://schemas.microsoft.com/data/udc/so=
ap" xmlns:udcxf=3D"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udc=
p2p=3D"http://schemas.microsoft.com/data/udc/parttopart" xmlns:wf=3D"http:/=
/schemas.microsoft.com/sharepoint/soap/workflow/" xmlns:dsss=3D"http://sche=
mas.microsoft.com/office/2006/digsig-setup" xmlns:dssi=3D"http://schemas.mi=
crosoft.com/office/2006/digsig" xmlns:mdssi=3D"http://schemas.openxmlformat=
s.org/package/2006/digital-signature" xmlns:mver=3D"http://schemas.openxmlf=
ormats.org/markup-compatibility/2006" xmlns:m=3D"http://schemas.microsoft.c=
om/office/2004/12/omml" xmlns:mrels=3D"http://schemas.openxmlformats.org/pa=
ckage/2006/relationships" xmlns:spwp=3D"http://microsoft.com/sharepoint/web=
partpages" xmlns:ex12t=3D"http://schemas.microsoft.com/exchange/services/20=
06/types" xmlns:ex12m=3D"http://schemas.microsoft.com/exchange/services/200=
6/messages" xmlns:pptsl=3D"http://schemas.microsoft.com/sharepoint/soap/Sli=
deLibrary/" xmlns:spsl=3D"http://microsoft.com/webservices/SharePointPortal=
Server/PublishedLinksService" xmlns:Z=3D"urn:schemas-microsoft-com:" xmlns:=
st=3D"&#1;" xmlns=3D"http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:285046703;
	mso-list-template-ids:-1339130788;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#C0504D">Thanks Yoav.<o:p></o:p=
></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#C0504D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#C0504D">&gt;&gt; </span><span =
style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&q=
uot;;color:#C0504D">First the responder should match the SA payload to its =
own policy. If a match it found, the responder can compare the DH
 group in the matched proposal to the one in the KE payload<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ta=
homa&quot;,&quot;sans-serif&quot;;color:#C0504D"><o:p>&nbsp;</o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ta=
homa&quot;,&quot;sans-serif&quot;;color:#C0504D">I agree this option seems =
to make the most sense.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ta=
homa&quot;,&quot;sans-serif&quot;;color:#C0504D"><o:p>&nbsp;</o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Yoav Nir=
 [mailto:ynir@checkpoint.com]
<br>
<b>Sent:</b> Sunday, January 16, 2011 11:54 PM<br>
<b>To:</b> Gaurav Poothia; ipsec@ietf.org<br>
<b>Cc:</b> Stephen Bensley; Brian Swander; Gabriel Montenegro<br>
<b>Subject:</b> RE: IKEv2 Diffie Hellman retry logic<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<ol start=3D"1" type=3D"1">
<li class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-=
alt:auto;mso-list:l0 level1 lfo1">
<span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-s=
erif&quot;;color:blue">Yes</span><span style=3D"font-size:12.0pt;font-famil=
y:&quot;Times New Roman&quot;,&quot;serif&quot;"><o:p></o:p></span></li><li=
 class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt=
:auto;mso-list:l0 level1 lfo1">
<span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-s=
erif&quot;;color:blue">No. In that case, the correct response in NO PROPOSA=
L CHOSEN.</span><span style=3D"font-size:12.0pt;font-family:&quot;Times New=
 Roman&quot;,&quot;serif&quot;"><o:p></o:p></span></li><li class=3D"MsoNorm=
al" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0=
 level1 lfo1">
<span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-s=
erif&quot;;color:blue">That is not correct processing. First the responder =
should match the SA payload to its own policy. If a match it found, the res=
ponder can compare the DH group in the matched proposal
 to the one in the KE payload</span><span style=3D"font-size:12.0pt;font-fa=
mily:&quot;Times New Roman&quot;,&quot;serif&quot;"><o:p></o:p></span></li>=
</ol>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ti=
mes New Roman&quot;,&quot;serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ta=
homa&quot;,&quot;sans-serif&quot;;color:blue">The hint in the INVALID_KE_PA=
YLOAD notification is the group in the common proposal.</span><span style=
=3D"font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&qu=
ot;"><o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ti=
mes New Roman&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p>
<div class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><span=
 style=3D"font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;se=
rif&quot;">
<hr size=3D"2" width=3D"100%" align=3D"center">
</span></div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><b><span style=3D"fon=
t-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:<=
/span></b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&q=
uot;sans-serif&quot;"> ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.or=
g]
<b>On Behalf Of </b>Gaurav Poothia<br>
<b>Sent:</b> 16 January 2011 23:01<br>
<b>To:</b> ipsec@ietf.org<br>
<b>Cc:</b> Stephen Bensley; Brian Swander; Gabriel Montenegro<br>
<b>Subject:</b> [IPsec] IKEv2 Diffie Hellman retry logic</span><span style=
=3D"font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&qu=
ot;"><o:p></o:p></span></p>
<p class=3D"MsoNormal">Scenario: When the IKEv2 initiator guesses an incorr=
ect DH group and the responder sends back the DH group hint in INVALID_KE_P=
AYLOAD notification.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Couple of questions around this:<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b>On what basis does the responder reject the DH gr=
oup:<o:p></o:p></b></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in">1.<span style=3D=
"font-size:7.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;"=
>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span>Because the best match initiator SA payload proposal (against respon=
der policy) has a different DH group from KE payload<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in">2.<span style=3D=
"font-size:7.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;"=
>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span>Because the responder after looking &nbsp;all the SA payload initiat=
or proposals with DH group from KE payload finds none of the initiator prop=
osals acceptable<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in">3.<span style=3D=
"font-size:7.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;"=
>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span>Because the responder altogether ignores the initiator proposals (SA=
 payload) and only checks to see that the DH group in KE payload doesn&#821=
7;t figure in its own policy at all<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">To paraphrase:<o:p></o:p></p>
<p class=3D"MsoNormal">Case 1 looks like it will have IKEv1 parity in terms=
 of using the best policy match and restarting negotiation if the initial K=
E guess doesn&#8217;t match up to that.<o:p></o:p></p>
<p class=3D"MsoNormal">Case 2 will do worse than IKEv1 by not forcing the b=
est policy match but by proceeding with an inferior and acceptable match wi=
ll save an extra round trip.<o:p></o:p></p>
<p class=3D"MsoNormal">Case 3 is actually non deterministic because the hin=
t is not guaranteed to work (since other transforms have not been evaluated=
 while choosing hint)<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b>Once rejected on what basis does the responder ch=
oose the DH group to put in the INVALID_KE_PAYLOAD hint
</b>&nbsp;(corresponding to above rejection criteria):<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in"><span style=3D"f=
ont-family:Symbol">&middot;</span><span style=3D"font-size:7.0pt;font-famil=
y:&quot;Times New Roman&quot;,&quot;serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;
</span>For cases 1 &amp; 2: It is the DH group in the initiator SA proposal=
 that facilitates the best policy match (against responder policy).<o:p></o=
:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in"><span style=3D"f=
ont-family:Symbol">&middot;</span><span style=3D"font-size:7.0pt;font-famil=
y:&quot;Times New Roman&quot;,&quot;serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;
</span>For case 3 it the DH group in responder&#8217;s most preferred propo=
sal.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Thanks<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span style=3D"font-s=
ize:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;"><br>
<br>
Scanned by Check Point Total Security Gateway. <o:p></o:p></span></p>
</div>
</body>
</html>

--_000_B69601AD18064F4BBA2D61CA82AEAFA9282322A3TK5EX14MBXC118r_--

From welterk@us.ibm.com  Tue Jan 18 16:34:19 2011
Return-Path: <welterk@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 36A693A6F68 for <ipsec@core3.amsl.com>; Tue, 18 Jan 2011 16:34:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.798
X-Spam-Level: 
X-Spam-Status: No, score=-5.798 tagged_above=-999 required=5 tests=[AWL=0.800,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BmKsxmkv9mbP for <ipsec@core3.amsl.com>; Tue, 18 Jan 2011 16:34:17 -0800 (PST)
Received: from e36.co.us.ibm.com (e36.co.us.ibm.com [32.97.110.154]) by core3.amsl.com (Postfix) with ESMTP id C39E53A6DB6 for <ipsec@ietf.org>; Tue, 18 Jan 2011 16:34:17 -0800 (PST)
Received: from d03relay03.boulder.ibm.com (d03relay03.boulder.ibm.com [9.17.195.228]) by e36.co.us.ibm.com (8.14.4/8.13.1) with ESMTP id p0J0W1jn001162 for <ipsec@ietf.org>; Tue, 18 Jan 2011 17:32:01 -0700
Received: from d03av01.boulder.ibm.com (d03av01.boulder.ibm.com [9.17.195.167]) by d03relay03.boulder.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p0J0auKo102762 for <ipsec@ietf.org>; Tue, 18 Jan 2011 17:36:56 -0700
Received: from d03av01.boulder.ibm.com (loopback [127.0.0.1]) by d03av01.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p0J0atPW010972 for <ipsec@ietf.org>; Tue, 18 Jan 2011 17:36:55 -0700
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av01.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p0J0atBw010969 for <ipsec@ietf.org>; Tue, 18 Jan 2011 17:36:55 -0700
In-Reply-To: <4D2DEAA9.2050301@vpnc.org>
References: <4D2DEAA9.2050301@vpnc.org>
To: ipsec@ietf.org
MIME-Version: 1.0
X-KeepSent: 9EBD79AB:7C3B16B7-8825781C:007E5BA8; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2FP3 SHF32 December 02, 2009
From: Keith Welter <welterk@us.ibm.com>
Message-ID: <OF9EBD79AB.7C3B16B7-ON8825781C.007E5BA8-8825781D.000360F0@us.ibm.com>
Date: Tue, 18 Jan 2011 16:36:49 -0800
X-MIMETrack: Serialize by Router on D03NM118/03/M/IBM(Release 8.5.1FP4|July 25, 2010) at 01/18/2011 17:36:54, Serialize complete at 01/18/2011 17:36:54
Content-Type: multipart/alternative; boundary="=_alternative 00035F608825781D_="
Subject: Re: [IPsec] WG Last Call on draft-ietf-ipsecme-failure-detection
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jan 2011 00:34:19 -0000

This is a multipart message in MIME format.
--=_alternative 00035F608825781D_=
Content-Type: text/plain; charset="US-ASCII"

1. The last paragraph of section 2 seems to be making an argument against 
supporting QCD.  Would it be possible to add a counterpoint or to reword 
the paragraph?  When I got to the end of the document, I found that 
section A.4 had the counterpoint I was looking for.  Perhaps add a 
reference to section A.4 from the last paragraph of section 2.
2. In section 4.1 (Notification Format) the TOKEN_SECRET_KEY fields size 
is given as "(16-128 octets)".  I suggest replacing this with "(variable)" 
so that the specific size requirement only appears in one place (section 
5): "Tokens MUST be at least 16 octets long, and no more than 128 octets 
long, to facilitate storage and transmission."
3. In section 4.3, the text "SHOULD soon initiate an INFORMATIONAL 
exchange as follows" is vague.  How soon is soon?  How about: "SHOULD 
initiate an INFORMATIONAL exchange immediately after the CREATE_CHILD_SA 
exchange as follows".  Or, omit "immediately" if that is not strictly 
necessary.
4. The final paragraph in section 4.3 mentions "key rollover" and "secret 
QCD keys" but these concepts have not been defined.  It seems like this 
material would fit better in section 5 (Token Generation and Verification) 
where the cryptographic mechanism for QCD token generation is recommended.
5. Similarly, section 4.5 mentions "periodic rollover of the secret used 
for token generation" but token generation has not yet been covered. 
Perhaps a better solution than what I recommended in the prior comment 
would be to move all of  section 5 (i.e. 5 through 5.3) before section 4. 
That way, token generation would be discussed before any mention of token 
secrets, keys or rollover in sections 4.1 through 4.5.
6. The first sentence on page 18 is an orphan.
7. In section 11, "contrinuted" should be "contributed".
8. Section A.1 says, "The disadvantage here, is that in IKEv2 an 
authentication exchange MUST have a piggy-backed Child SA set up."  RFC 
6023 specifies a childless IKE SA initiation so that sentence is not true 
for implementations that support RFC 6023.

Thanks,

Keith Welter
IBM z/OS Communications Server Developer
1-415-545-2694 (T/L: 473-2694)

--=_alternative 00035F608825781D_=
Content-Type: text/html; charset="US-ASCII"


<br><font size=2 face="sans-serif">1. The last paragraph of section 2 seems
to be making an argument against supporting QCD. &nbsp;Would it be possible
to add a counterpoint or to reword the paragraph? &nbsp;When I got to the
end of the document, I found that section A.4 had the counterpoint I was
looking for. &nbsp;Perhaps add a reference to section A.4 from the last
paragraph of section 2.</font>
<br><font size=2 face="sans-serif">2. In section 4.1 (Notification Format)
the TOKEN_SECRET_KEY fields size is given as &quot;(16-128 octets)&quot;.
&nbsp;I suggest replacing this with &quot;(variable)&quot; so that the
specific size requirement only appears in one place (section 5): &quot;Tokens
MUST be at least 16 octets long, and no more than 128 octets long, to facilitate
storage and transmission.&quot;</font>
<br><font size=2 face="sans-serif">3. In section 4.3, the text &quot;SHOULD
soon initiate an INFORMATIONAL exchange as follows&quot; is vague. &nbsp;How
soon is soon? &nbsp;How about: &quot;SHOULD initiate an INFORMATIONAL exchange
immediately after the CREATE_CHILD_SA exchange as follows&quot;. &nbsp;Or,
omit &quot;immediately&quot; if that is not strictly necessary.</font>
<br><font size=2 face="sans-serif">4. The final paragraph in section 4.3
mentions &quot;key rollover&quot; and &quot;secret QCD keys&quot; but these
concepts have not been defined. &nbsp;It seems like this material would
fit better in section 5 (Token Generation and Verification) where the cryptographic
mechanism for QCD token generation is recommended.</font>
<br><font size=2 face="sans-serif">5. Similarly, section 4.5 mentions &quot;periodic
rollover of the secret used for token generation&quot; but token generation
has not yet been covered. &nbsp;Perhaps a better solution than what I recommended
in the prior comment would be to move all of &nbsp;section 5 (i.e. 5 through
5.3) before section 4. &nbsp;That way, token generation would be discussed
before any mention of token secrets, keys or rollover in sections 4.1 through
4.5.</font>
<br><font size=2 face="sans-serif">6. The first sentence on page 18 is
an orphan.</font>
<br><font size=2 face="sans-serif">7. In section 11, &quot;contrinuted&quot;
should be &quot;contributed&quot;.</font>
<br><font size=2 face="sans-serif">8. Section A.1 says, &quot;The disadvantage
here, is that in IKEv2 an authentication exchange MUST have a piggy-backed
Child SA set up.&quot; &nbsp;RFC 6023 specifies a childless IKE SA initiation
so that sentence is not true for implementations that support RFC 6023.</font>
<br>
<br><font size=2 face="sans-serif">Thanks,</font>
<br><font size=2 face="sans-serif"><br>
Keith Welter<br>
IBM z/OS Communications Server Developer<br>
1-415-545-2694 (T/L: 473-2694)<br>
</font>
--=_alternative 00035F608825781D_=--

From welterk@us.ibm.com  Tue Jan 18 16:41:14 2011
Return-Path: <welterk@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0A8613A6DB6 for <ipsec@core3.amsl.com>; Tue, 18 Jan 2011 16:41:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.931
X-Spam-Level: 
X-Spam-Status: No, score=-5.931 tagged_above=-999 required=5 tests=[AWL=0.667,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1ttyIgqw-BIG for <ipsec@core3.amsl.com>; Tue, 18 Jan 2011 16:41:13 -0800 (PST)
Received: from e36.co.us.ibm.com (e36.co.us.ibm.com [32.97.110.154]) by core3.amsl.com (Postfix) with ESMTP id 324AE3A6FDB for <ipsec@ietf.org>; Tue, 18 Jan 2011 16:41:13 -0800 (PST)
Received: from d03relay02.boulder.ibm.com (d03relay02.boulder.ibm.com [9.17.195.227]) by e36.co.us.ibm.com (8.14.4/8.13.1) with ESMTP id p0J0cvne004751 for <ipsec@ietf.org>; Tue, 18 Jan 2011 17:38:57 -0700
Received: from d03av05.boulder.ibm.com (d03av05.boulder.ibm.com [9.17.195.85]) by d03relay02.boulder.ibm.com (8.13.8/8.13.8/NCO v9.1) with ESMTP id p0J0hps2107654 for <ipsec@ietf.org>; Tue, 18 Jan 2011 17:43:51 -0700
Received: from d03av05.boulder.ibm.com (loopback [127.0.0.1]) by d03av05.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p0J0hpiT013473 for <ipsec@ietf.org>; Tue, 18 Jan 2011 17:43:51 -0700
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av05.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p0J0hpxl013469 for <ipsec@ietf.org>; Tue, 18 Jan 2011 17:43:51 -0700
In-Reply-To: <OF9EBD79AB.7C3B16B7-ON8825781C.007E5BA8-8825781D.000360F0@us.ibm.com>
References: <4D2DEAA9.2050301@vpnc.org> <OF9EBD79AB.7C3B16B7-ON8825781C.007E5BA8-8825781D.000360F0@us.ibm.com>
To: ipsec@ietf.org
MIME-Version: 1.0
X-KeepSent: 32D00517:3C18E659-8825781D:0003CCC4; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2FP3 SHF32 December 02, 2009
From: Keith Welter <welterk@us.ibm.com>
Message-ID: <OF32D00517.3C18E659-ON8825781D.0003CCC4-8825781D.0004052A@us.ibm.com>
Date: Tue, 18 Jan 2011 16:43:50 -0800
X-MIMETrack: Serialize by Router on D03NM118/03/M/IBM(Release 8.5.1FP4|July 25, 2010) at 01/18/2011 17:43:50, Serialize complete at 01/18/2011 17:43:50
Content-Type: multipart/alternative; boundary="=_alternative 000403ED8825781D_="
Subject: Re: [IPsec] WG Last Call on draft-ietf-ipsecme-failure-detection
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jan 2011 00:41:14 -0000

This is a multipart message in MIME format.
--=_alternative 000403ED8825781D_=
Content-Type: text/plain; charset="US-ASCII"

> 8. Section A.1 says, "The disadvantage here, is that in IKEv2 an 
> authentication exchange MUST have a piggy-backed Child SA set up." 
> RFC 6023 specifies a childless IKE SA initiation so that sentence is
> not true for implementations that support RFC 6023. 

I just noticed that the category of RFC 6023 is Experimental so this 
comment can probably be ignored.

Thanks, 

Keith Welter
IBM z/OS Communications Server Developer
1-415-545-2694 (T/L: 473-2694)

--=_alternative 000403ED8825781D_=
Content-Type: text/html; charset="US-ASCII"


<br><tt><font size=2>&gt; 8. Section A.1 says, &quot;The disadvantage here,
is that in IKEv2 an <br>
&gt; authentication exchange MUST have a piggy-backed Child SA set up.&quot;
&nbsp;<br>
&gt; RFC 6023 specifies a childless IKE SA initiation so that sentence
is<br>
&gt; not true for implementations that support RFC 6023. <br>
</font></tt>
<br><tt><font size=2>I just noticed that the category of RFC 6023 is Experimental
so this comment can probably be ignored.</font></tt>
<br>
<br><tt><font size=2>Thanks, </font></tt>
<br>
<br><tt><font size=2>Keith Welter</font></tt>
<br><tt><font size=2>IBM z/OS Communications Server Developer</font></tt>
<br><tt><font size=2>1-415-545-2694 (T/L: 473-2694)<br>
</font></tt>
--=_alternative 000403ED8825781D_=--

From welterk@us.ibm.com  Wed Jan 19 09:18:37 2011
Return-Path: <welterk@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D52E728C0E7 for <ipsec@core3.amsl.com>; Wed, 19 Jan 2011 09:18:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.027
X-Spam-Level: 
X-Spam-Status: No, score=-6.027 tagged_above=-999 required=5 tests=[AWL=0.571,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sm0K2pqj9MG2 for <ipsec@core3.amsl.com>; Wed, 19 Jan 2011 09:18:36 -0800 (PST)
Received: from e35.co.us.ibm.com (e35.co.us.ibm.com [32.97.110.153]) by core3.amsl.com (Postfix) with ESMTP id B4D4428C0DB for <ipsec@ietf.org>; Wed, 19 Jan 2011 09:18:36 -0800 (PST)
Received: from d03relay03.boulder.ibm.com (d03relay03.boulder.ibm.com [9.17.195.228]) by e35.co.us.ibm.com (8.14.4/8.13.1) with ESMTP id p0JH7hWD017237 for <ipsec@ietf.org>; Wed, 19 Jan 2011 10:07:43 -0700
Received: from d03av04.boulder.ibm.com (d03av04.boulder.ibm.com [9.17.195.170]) by d03relay03.boulder.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p0JHLEI5101226 for <ipsec@ietf.org>; Wed, 19 Jan 2011 10:21:15 -0700
Received: from d03av04.boulder.ibm.com (loopback [127.0.0.1]) by d03av04.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p0JHLE7p001081 for <ipsec@ietf.org>; Wed, 19 Jan 2011 10:21:14 -0700
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av04.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p0JHLEkV000929 for <ipsec@ietf.org>; Wed, 19 Jan 2011 10:21:14 -0700
In-Reply-To: <OFBD92F556.D1F97386-ON88257818.0083CC58-88257819.0000E936@us.ibm.com>
References: <OF3BE5DE68.D7665C2D-ON88257818.006D11C6-88257818.006D53A2@us.ibm.com> <OFBD92F556.D1F97386-ON88257818.0083CC58-88257819.0000E936@us.ibm.com>
To: ipsec@ietf.org
MIME-Version: 1.0
X-KeepSent: 82718D9C:1862AB2B-8825781D:005F16EC; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2FP3 SHF32 December 02, 2009
From: Keith Welter <welterk@us.ibm.com>
Message-ID: <OF82718D9C.1862AB2B-ON8825781D.005F16EC-8825781D.005F52F0@us.ibm.com>
Date: Wed, 19 Jan 2011 09:21:07 -0800
X-MIMETrack: Serialize by Router on D03NM118/03/M/IBM(Release 8.5.1FP4|July 25, 2010) at 01/19/2011 10:21:14, Serialize complete at 01/19/2011 10:21:14
Content-Type: multipart/alternative; boundary="=_alternative 005F51B18825781D_="
Subject: Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-02
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jan 2011 17:18:37 -0000

This is a multipart message in MIME format.
--=_alternative 005F51B18825781D_=
Content-Type: text/plain; charset="US-ASCII"

I submitted draft-welter-ipsecme-ikev2-reauth-03 with the rewording shown 
below.  I'd like to ask the working group to accept this as a work item 
but I am unfamiliar with the process.  What next?

Thanks,

Keith Welter
IBM z/OS Communications Server Developer
1-415-545-2694 (T/L: 473-2694)

> I noticed a minor problem in section 5: 
>   "When not using extensible authentication, the peers are authenticated
>  by having each sign (or MAC using a padded shared secret as the key,
>  as described later in this section) a block of data. 
> 
> But the padding is not described later in the section. 
> 
> I will reword the section as follows: 
> "5. Authentication Data for Reauthenticating the IKE SA 
> 
> When not using extensible authentication, the peers are 
> authenticated by having each sign (or MAC using a padded shared 
> secret as the key) a block of data as described in [IKEv2] Section 
> 2.15 except for the following differences: 
> 
>    o For the modified IKE_AUTH request, the octets to be signed 
> start with the first octet of the previous Authentication payload 
> sent by the initiator and end with the last octet of that payload. 
> 
>    o For the modified IKE_AUTH response, the octets to be signed 
> start with the first octet of the previous Authentication payload 
> sent by the responder and end with the last octet of that payload." 
> 
> 
> Keith Welter
> IBM z/OS Communications Server Developer
> 1-415-545-2694 (T/L: 
473-2694)_______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

--=_alternative 005F51B18825781D_=
Content-Type: text/html; charset="US-ASCII"


<br><font size=2 face="sans-serif">I submitted draft-welter-ipsecme-ikev2-reauth-03
with the rewording shown below. &nbsp;I'd like to ask the working group
to accept this as a work item but I am unfamiliar with the process. &nbsp;What
next?</font>
<br>
<br><font size=2 face="sans-serif">Thanks,</font>
<br><font size=2 face="sans-serif"><br>
Keith Welter<br>
IBM z/OS Communications Server Developer<br>
1-415-545-2694 (T/L: 473-2694)</font>
<br><font size=2 face="sans-serif"><br>
</font><tt><font size=2>&gt; I noticed a minor problem in section 5: <br>
&gt; &nbsp; &quot;When not using extensible authentication, the peers are
authenticated<br>
&gt; &nbsp;by having each sign (or MAC using a padded shared secret as
the key,<br>
&gt; &nbsp;as described later in this section) a block of data. <br>
&gt; <br>
&gt; But the padding is not described later in the section. &nbsp; <br>
&gt; <br>
&gt; I will reword the section as follows: <br>
&gt; &quot;5. Authentication Data for Reauthenticating the IKE SA <br>
&gt; <br>
&gt; When not using extensible authentication, the peers are <br>
&gt; authenticated by having each sign (or MAC using a padded shared <br>
&gt; secret as the key) a block of data as described in [IKEv2] Section
<br>
&gt; 2.15 except for the following differences: &nbsp; <br>
&gt; <br>
&gt; &nbsp; &nbsp;o For the modified IKE_AUTH request, the octets to be
signed <br>
&gt; start with the first octet of the previous Authentication payload
<br>
&gt; sent by the initiator and end with the last octet of that payload.
&nbsp; <br>
&gt; <br>
&gt; &nbsp; &nbsp;o For the modified IKE_AUTH response, the octets to be
signed <br>
&gt; start with the first octet of the previous Authentication payload
<br>
&gt; sent by the responder and end with the last octet of that payload.&quot;
<br>
&gt; <br>
&gt; <br>
&gt; Keith Welter<br>
&gt; IBM z/OS Communications Server Developer<br>
&gt; 1-415-545-2694 (T/L: 473-2694)_______________________________________________<br>
&gt; IPsec mailing list<br>
&gt; IPsec@ietf.org<br>
&gt; </font></tt><a href=https://www.ietf.org/mailman/listinfo/ipsec><tt><font size=2>https://www.ietf.org/mailman/listinfo/ipsec</font></tt></a><tt><font size=2><br>
</font></tt>
--=_alternative 005F51B18825781D_=--

From ynir@checkpoint.com  Wed Jan 19 11:35:56 2011
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 407203A71B5 for <ipsec@core3.amsl.com>; Wed, 19 Jan 2011 11:35:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.02
X-Spam-Level: 
X-Spam-Status: No, score=-10.02 tagged_above=-999 required=5 tests=[AWL=0.579,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6qDFIOX8G4rj for <ipsec@core3.amsl.com>; Wed, 19 Jan 2011 11:35:52 -0800 (PST)
Received: from michael.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by core3.amsl.com (Postfix) with ESMTP id 9DD623A7192 for <ipsec@ietf.org>; Wed, 19 Jan 2011 11:35:51 -0800 (PST)
X-CheckPoint: {4D373DB5-0-1B221DC2-2FFFF}
Received: from il-ex01.ad.checkpoint.com (il-ex01.checkpoint.com [194.29.34.26]) by michael.checkpoint.com (8.13.8/8.13.8) with ESMTP id p0JJcT8H010969;  Wed, 19 Jan 2011 21:38:29 +0200
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Wed, 19 Jan 2011 21:38:29 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: Keith Welter <welterk@us.ibm.com>
Date: Wed, 19 Jan 2011 21:38:27 +0200
Thread-Topic: [IPsec] draft-welter-ipsecme-ikev2-reauth-02
Thread-Index: Acu4EHIgzdoqBXKyQ9uHcquKWJwP0A==
Message-ID: <4DC78181-C379-42F6-BC0D-C5485E660743@checkpoint.com>
References: <OF3BE5DE68.D7665C2D-ON88257818.006D11C6-88257818.006D53A2@us.ibm.com> <OFBD92F556.D1F97386-ON88257818.0083CC58-88257819.0000E936@us.ibm.com> <OF82718D9C.1862AB2B-ON8825781D.005F16EC-8825781D.005F52F0@us.ibm.com>
In-Reply-To: <OF82718D9C.1862AB2B-ON8825781D.005F16EC-8825781D.005F52F0@us.ibm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-02
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jan 2011 19:35:56 -0000

Hi Keith.

Generally, the process goes something like this:
- You write a draft (done!)
- You present it on the mailing list (done!)
- Usually, you ask for a time slot to present at a face-to-face meeting (no=
t mandatory, but helps). The best is if you present it yourself, but if you=
 don't plan to attend, someone else could present it for you.
- Next the WG chairs ask the group if it wants to accept this. This involve=
s:
  - A rough consensus that this is an idea worth pursuing
  - Enough people committing to read and review
  - Enough people willing to contribute text.
- Determination of the above is at the discretion of the WG chairs. The adv=
antage of presenting at a face-to-face, is that at least the last two quest=
ions can be answered there and then.
- If there is enough willingness to take on the item, the WG chairs ask the=
 ADs to add this to the charter.
- If the ADs determine that this is a good idea, and has a chance of gettin=
g done (a motivated author is one of the requirements), they IESG approves =
the recharter
- The WG chairs appoint one or more authors for the WG draft. It's not auto=
matically you, but usually is, and they might add some more people, especia=
lly if they have different ideas.

A long process that can take anything from a month to 7 years. See "Wait be=
fore WG adoption" in http://www.arkko.com/tools/lifecycle/extremes.html

Yoav

On Jan 19, 2011, at 7:21 PM, Keith Welter wrote:

>=20
> I submitted draft-welter-ipsecme-ikev2-reauth-03 with the rewording shown=
 below.  I'd like to ask the working group to accept this as a work item bu=
t I am unfamiliar with the process.  What next?=20
>=20
> Thanks,=20
>=20
> Keith Welter
> IBM z/OS Communications Server Developer
> 1-415-545-2694 (T/L: 473-2694)=20
>=20
> > I noticed a minor problem in section 5:=20
> >   "When not using extensible authentication, the peers are authenticate=
d
> >  by having each sign (or MAC using a padded shared secret as the key,
> >  as described later in this section) a block of data.=20
> >=20
> > But the padding is not described later in the section.  =20
> >=20
> > I will reword the section as follows:=20
> > "5. Authentication Data for Reauthenticating the IKE SA=20
> >=20
> > When not using extensible authentication, the peers are=20
> > authenticated by having each sign (or MAC using a padded shared=20
> > secret as the key) a block of data as described in [IKEv2] Section=20
> > 2.15 except for the following differences:  =20
> >=20
> >    o For the modified IKE_AUTH request, the octets to be signed=20
> > start with the first octet of the previous Authentication payload=20
> > sent by the initiator and end with the last octet of that payload.  =20
> >=20
> >    o For the modified IKE_AUTH response, the octets to be signed=20
> > start with the first octet of the previous Authentication payload=20
> > sent by the responder and end with the last octet of that payload."=20
> >=20
> >=20
> > Keith Welter
> > IBM z/OS Communications Server Developer
> > 1-415-545-2694 (T/L: 473-2694)_________________________________________=
______
> > IPsec mailing list
> > IPsec@ietf.org
> > https://www.ietf.org/mailman/listinfo/ipsec
> <ATT00001..txt>


From welterk@us.ibm.com  Wed Jan 19 14:08:26 2011
Return-Path: <welterk@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B3D4D28C0EF for <ipsec@core3.amsl.com>; Wed, 19 Jan 2011 14:08:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.098
X-Spam-Level: 
X-Spam-Status: No, score=-6.098 tagged_above=-999 required=5 tests=[AWL=0.500,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xGee-4kw+yH4 for <ipsec@core3.amsl.com>; Wed, 19 Jan 2011 14:08:25 -0800 (PST)
Received: from e38.co.us.ibm.com (e38.co.us.ibm.com [32.97.110.159]) by core3.amsl.com (Postfix) with ESMTP id 5A1E83A6F51 for <ipsec@ietf.org>; Wed, 19 Jan 2011 14:08:25 -0800 (PST)
Received: from d03relay03.boulder.ibm.com (d03relay03.boulder.ibm.com [9.17.195.228]) by e38.co.us.ibm.com (8.14.4/8.13.1) with ESMTP id p0JLupu6016049 for <ipsec@ietf.org>; Wed, 19 Jan 2011 14:56:51 -0700
Received: from d03av03.boulder.ibm.com (d03av03.boulder.ibm.com [9.17.195.169]) by d03relay03.boulder.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p0JMAw2F095594 for <ipsec@ietf.org>; Wed, 19 Jan 2011 15:10:58 -0700
Received: from d03av03.boulder.ibm.com (loopback [127.0.0.1]) by d03av03.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p0JMAv0h029335 for <ipsec@ietf.org>; Wed, 19 Jan 2011 15:10:57 -0700
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av03.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p0JMAvDq029330; Wed, 19 Jan 2011 15:10:57 -0700
In-Reply-To: <4D37577E.8070009@vpnc.org>
References: <OF3BE5DE68.D7665C2D-ON88257818.006D11C6-88257818.006D53A2@us.ibm.com>	<OFBD92F556.D1F97386-ON88257818.0083CC58-88257819.0000E936@us.ibm.com> <OF82718D9C.1862AB2B-ON8825781D.005F16EC-8825781D.005F52F0@us.ibm.com> <4D37577E.8070009@vpnc.org>
To: ipsec@ietf.org
MIME-Version: 1.0
X-KeepSent: 98027C2F:B349FC64-8825781D:007692F2; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2FP3 SHF32 December 02, 2009
From: Keith Welter <welterk@us.ibm.com>
Message-ID: <OF98027C2F.B349FC64-ON8825781D.007692F2-8825781D.0079DA2C@us.ibm.com>
Date: Wed, 19 Jan 2011 14:10:56 -0800
X-MIMETrack: Serialize by Router on D03NM118/03/M/IBM(Release 8.5.1FP4|July 25, 2010) at 01/19/2011 15:10:56, Serialize complete at 01/19/2011 15:10:57, Serialize by Router on D03NM118/03/M/IBM(Release 8.5.1FP4|July 25, 2010) at 01/19/2011 15:10:57
Content-Type: multipart/alternative; boundary="=_alternative 0079D8EF8825781D_="
Cc: Yoav Nir <ynir@checkpoint.com>, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-02
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jan 2011 22:08:26 -0000

This is a multipart message in MIME format.
--=_alternative 0079D8EF8825781D_=
Content-Type: text/plain; charset="US-ASCII"

Paul Hoffman <paul.hoffman@vpnc.org> wrote on 01/19/2011 01:28:30 PM:
> On 1/19/11 9:21 AM, Keith Welter wrote:
> >
> > I submitted draft-welter-ipsecme-ikev2-reauth-03 with the rewording
> > shown below. I'd like to ask the working group to accept this as a 
work
> > item but I am unfamiliar with the process. What next?
> 
> I have Cc'd Yaron on this because he is the co-chair. I have Cc'd Yoav 
> on this because he replied on-list but missed two very salient points in 

> his response (it's not in the charter, and there is almost no energy 
> left in the WG).
> 
> Instead of making this a WG document (which would require a recharter 
> *and* enough people to give responses), I propose that you simply make 
> this an Individual Submission to an AD. For that, you just need to 
> approach the appropriate AD (Sean Turner, in this case) and tell him the 

> history of the draft. You get extra points if you can say "and I already 

> have a proposed document shepherd who is credible"; that could be Yaron 
> or Yoav or me. FWIW, there is no difference between you going through 
> the WG and Individual Submission for the document being on standards 
track.
> 
> You could ask the WG if they want to re-charter; my personal preference 
> would be that you don't. I worry that people will say "yes" and then be 
> as dead as they are now for our current documents.
> 
> Let Yaron and I know what you think of this prospect.
This may be a naive answer, but I'm not opposed to the idea of Individual 
Submission.  I do have some comments/questions:
1. My draft depends on RFC 6023 and cites it as a normative reference. 
Since I'd like to get my draft on the standards track, does that mean that 
RFC 6023 needs to get on the standards track too?
2. There is one point I'd still like technical input on, namely the 
security considerations of signing the previous AUTH payload sent by the 
host in the modified IKE_AUTH exchange (section 5 of the draft).  Yoav 
suggested this approach, it sounded fine to me, I ran it by a couple of my 
colleagues (Scott Moonen and David Wierbowski) who thought it sound fine 
too so I used it in the new draft.  I'd feel better if another subject 
matter expert said, "yes, that is fine."  Bonus points if the SME can 
offer a sentence or two justifying why this mechanism is as secure as the 
authentication operation that takes place during the initial exchanges. It 
would be nice to include that information in the security considerations 
section of my draft.  More specifically, RFC 5996 section 2.15 
"Authentication of the IKE SA" says, "It is critical to the security of 
the exchange that each side sign the other side's nonce."  Is it necessary 
to include nonces in the signed data in the proposed modified IKE_AUTH 
exchange?  I don't think so, but since I don't know why it was necessary 
as part of the signed data in the initial exchanges I don't feel qualified 
to assert that formally.
3. In practice, is an Individual Submission less likely to be widely 
adopted than a document that is sponsored by a working group?  I realize 
that is probably a moot point, given the lack of energy in the WG that 
Paul noted, but I thought I'd ask anyway.

Thanks,

Keith Welter
IBM z/OS Communications Server Developer
1-415-545-2694 (T/L: 473-2694)



--=_alternative 0079D8EF8825781D_=
Content-Type: text/html; charset="US-ASCII"


<br><tt><font size=2>Paul Hoffman &lt;paul.hoffman@vpnc.org&gt; wrote on
01/19/2011 01:28:30 PM:<br>
&gt; On 1/19/11 9:21 AM, Keith Welter wrote:<br>
&gt; &gt;<br>
&gt; &gt; I submitted draft-welter-ipsecme-ikev2-reauth-03 with the rewording<br>
&gt; &gt; shown below. I'd like to ask the working group to accept this
as a work<br>
&gt; &gt; item but I am unfamiliar with the process. What next?<br>
&gt; <br>
&gt; I have Cc'd Yaron on this because he is the co-chair. I have Cc'd
Yoav <br>
&gt; on this because he replied on-list but missed two very salient points
in <br>
&gt; his response (it's not in the charter, and there is almost no energy
<br>
&gt; left in the WG).<br>
&gt; <br>
&gt; Instead of making this a WG document (which would require a recharter
<br>
&gt; *and* enough people to give responses), I propose that you simply
make <br>
&gt; this an Individual Submission to an AD. For that, you just need to
<br>
&gt; approach the appropriate AD (Sean Turner, in this case) and tell him
the <br>
&gt; history of the draft. You get extra points if you can say &quot;and
I already <br>
&gt; have a proposed document shepherd who is credible&quot;; that could
be Yaron <br>
&gt; or Yoav or me. FWIW, there is no difference between you going through
<br>
&gt; the WG and Individual Submission for the document being on standards
track.<br>
&gt; <br>
&gt; You could ask the WG if they want to re-charter; my personal preference
<br>
&gt; would be that you don't. I worry that people will say &quot;yes&quot;
and then be <br>
&gt; as dead as they are now for our current documents.<br>
&gt; <br>
&gt; Let Yaron and I know what you think of this prospect.</font></tt>
<br><tt><font size=2>This may be a naive answer, but I'm not opposed to
the idea of Individual Submission. &nbsp;I do have some comments/questions:</font></tt>
<br><tt><font size=2>1. My draft depends on RFC 6023 and cites it as a
normative reference. &nbsp;Since I'd like to get my draft on the standards
track, does that mean that RFC 6023 needs to get on the standards track
too?</font></tt>
<br><tt><font size=2>2. There is one point I'd still like technical input
on, namely the security considerations of signing the previous AUTH payload
sent by the host in the modified IKE_AUTH exchange (section 5 of the draft).
&nbsp;Yoav suggested this approach, it sounded fine to me, I ran it by
a couple of my colleagues (Scott Moonen and David Wierbowski) who thought
it sound fine too so I used it in the new draft. &nbsp;I'd feel better
if another subject matter expert said, &quot;yes, that is fine.&quot; &nbsp;Bonus
points if the SME can offer a sentence or two justifying why this mechanism
is as secure as the authentication operation that takes place during the
initial exchanges. &nbsp;It would be nice to include that information in
the security considerations section of my draft. &nbsp;More specifically,
RFC 5996 section 2.15 &quot;Authentication of the IKE SA&quot; says, &quot;It
is critical to the security of the exchange that each side sign the other
side's nonce.&quot; &nbsp;Is it necessary to include nonces in the signed
data in the proposed modified IKE_AUTH exchange? &nbsp;I don't think so,
but since I don't know why it was necessary as part of the signed data
in the initial exchanges I don't feel qualified to assert that formally.</font></tt>
<br><tt><font size=2>3. In practice, is an Individual Submission less likely
to be widely adopted than a document that is sponsored by a working group?
&nbsp;I realize that is probably a moot point, given the lack of energy
in the WG that Paul noted, but I thought I'd ask anyway.</font></tt>
<br>
<br><tt><font size=2>Thanks,</font></tt>
<br><font size=2 face="sans-serif"><br>
Keith Welter<br>
IBM z/OS Communications Server Developer<br>
1-415-545-2694 (T/L: 473-2694)<br>
</font>
<br>
<br>
--=_alternative 0079D8EF8825781D_=--

From paul.hoffman@vpnc.org  Wed Jan 19 16:10:24 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 616FA28C0E4 for <ipsec@core3.amsl.com>; Wed, 19 Jan 2011 16:10:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.726
X-Spam-Level: 
X-Spam-Status: No, score=-101.726 tagged_above=-999 required=5 tests=[AWL=0.320, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DwPa3HlrNhe0 for <ipsec@core3.amsl.com>; Wed, 19 Jan 2011 16:10:23 -0800 (PST)
Received: from hoffman.proper.com (Hoffman.Proper.COM [207.182.41.81]) by core3.amsl.com (Postfix) with ESMTP id 9A3B728C0DE for <ipsec@ietf.org>; Wed, 19 Jan 2011 16:10:23 -0800 (PST)
Received: from MacBook-08.local (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p0K0D4Qx022284 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Wed, 19 Jan 2011 17:13:04 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Message-ID: <4D377E0F.9030009@vpnc.org>
Date: Wed, 19 Jan 2011 16:13:03 -0800
From: Paul Hoffman <paul.hoffman@vpnc.org>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: ipsec@ietf.org
References: <OF3BE5DE68.D7665C2D-ON88257818.006D11C6-88257818.006D53A2@us.ibm.com>	<OFBD92F556.D1F97386-ON88257818.0083CC58-88257819.0000E936@us.ibm.com>	<OF82718D9C.1862AB2B-ON8825781D.005F16EC-8825781D.005F52F0@us.ibm.com>	<4D37577E.8070009@vpnc.org> <OF98027C2F.B349FC64-ON8825781D.007692F2-8825781D.0079DA2C@us.ibm.com>
In-Reply-To: <OF98027C2F.B349FC64-ON8825781D.007692F2-8825781D.0079DA2C@us.ibm.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-02
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jan 2011 00:10:24 -0000

On 1/19/11 2:10 PM, Keith Welter wrote:
> This may be a naive answer, but I'm not opposed to the idea of
> Individual Submission. I do have some comments/questions:
> 1. My draft depends on RFC 6023 and cites it as a normative reference.
> Since I'd like to get my draft on the standards track, does that mean
> that RFC 6023 needs to get on the standards track too?

Maybe, but probably not. If you call this out during IETF LC, the IESG 
can decide whether or not it is allowed. My reading of your draft ("do 
6023 but with these changes") does require 6023 to be normative because 
the reader has to understand 6023, but the fact that 6023 is 
experimental should not affect your draft because you are giving your 
own protocol. Others may disagree, though.

> 2. There is one point I'd still like technical input on, namely the
> security considerations of signing the previous AUTH payload sent by the
> host in the modified IKE_AUTH exchange (section 5 of the draft). Yoav
> suggested this approach, it sounded fine to me, I ran it by a couple of
> my colleagues (Scott Moonen and David Wierbowski) who thought it sound
> fine too so I used it in the new draft. I'd feel better if another
> subject matter expert said, "yes, that is fine."

That's what the informal discussion on this list *and* what IETF Last 
Call are for.

> 3. In practice, is an Individual Submission less likely to be widely
> adopted than a document that is sponsored by a working group?

No. Notice that RFCs don't say how they got there.

> I realize
> that is probably a moot point, given the lack of energy in the WG that
> Paul noted, but I thought I'd ask anyway.

Adoption is much more based on customer demand and the problem that is 
solved than the origin of the document.

From kivinen@iki.fi  Thu Jan 20 06:38:36 2011
Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 853A93A7125 for <ipsec@core3.amsl.com>; Thu, 20 Jan 2011 06:38:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.57
X-Spam-Level: 
X-Spam-Status: No, score=-102.57 tagged_above=-999 required=5 tests=[AWL=0.029, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q7FdnMfFd768 for <ipsec@core3.amsl.com>; Thu, 20 Jan 2011 06:38:35 -0800 (PST)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) by core3.amsl.com (Postfix) with ESMTP id 59E583A7122 for <ipsec@ietf.org>; Thu, 20 Jan 2011 06:38:34 -0800 (PST)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.14.3/8.14.3) with ESMTP id p0KEf5Nb009094 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 20 Jan 2011 16:41:05 +0200 (EET)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.14.3/8.12.11) id p0KEf2ve009080; Thu, 20 Jan 2011 16:41:02 +0200 (EET)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <19768.18814.516107.222884@fireball.kivinen.iki.fi>
Date: Thu, 20 Jan 2011 16:41:02 +0200
From: Tero Kivinen <kivinen@iki.fi>
To: Keith Welter <welterk@us.ibm.com>
In-Reply-To: <OF98027C2F.B349FC64-ON8825781D.007692F2-8825781D.0079DA2C@us.ibm.com>
References: <OF3BE5DE68.D7665C2D-ON88257818.006D11C6-88257818.006D53A2@us.ibm.com> <OFBD92F556.D1F97386-ON88257818.0083CC58-88257819.0000E936@us.ibm.com> <OF82718D9C.1862AB2B-ON8825781D.005F16EC-8825781D.005F52F0@us.ibm.com> <4D37577E.8070009@vpnc.org> <OF98027C2F.B349FC64-ON8825781D.007692F2-8825781D.0079DA2C@us.ibm.com>
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 19 min
X-Total-Time: 19 min
Cc: ipsec@ietf.org, Yoav Nir <ynir@checkpoint.com>, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-02
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jan 2011 14:38:36 -0000

I do not have time to check this document now, as I do have some 
working group documents that I need to check before getting to this.  

Keith Welter writes:
> This may be a naive answer, but I'm not opposed to the idea of Individual 
> Submission.  I do have some comments/questions:
> 1. My draft depends on RFC 6023 and cites it as a normative reference. 
> Since I'd like to get my draft on the standards track, does that mean that 
> RFC 6023 needs to get on the standards track too?

I would thing experimental would be better status than standard track
document. As you point out the RFC 6023 is experimental, as is RFC
4478.

I myself would first like to see some real world implementations and
use for those (and this) before making them standard track.

As you can notice I do not belive that either one of those previous
experimental protocols is needed in general in IKEv2, and for example
our QuickSec OEM toolkit does not have support for them (and most
likely will not have support for them, unless some customer really
comes to us and says that they need them and are willing to pay for
them :-)

I do not really think reauthentication offers anything as in most
setups the IKEv2 authentication information is stored in the machine
itself and does not require any user interaction (i.e. shared keys in
the configuration file, or the private key on the disk).

The reauthentication only does mean something in case you are using
EAP or private key authentication based on some kind of removable
token (smart card etc). If the client is able to store authentication
information and replay that when server requires reauthentication then
reauthentication does not provide anything. You could simply just ask
from the other end "is the user still there", and the other end can
say "yes", or "no" without providing any proof.

If you are using external token based system like private keys on
smartcards then reauthentication gives server a proof that user really
did leave the card inserted to the machine. It still does not provide
proof that user is still sitting in front of the machine (as most
smartcards do keep pin codes etc stored as long as you do not remove
the card).

If you use EAP with one time passwords or similars where it actually
do require user to type in new code every time then user have much
harder time to fake the system especially if user cannot get future
one time passwords before their time (otherwise he could just type in
next n passwords the system might be asking).

So the draft should have good rationale explaining in which kind of
situations this is actually useful. I do assume that the security
model is something that the user is not be trusted, and most likely
the user's machine isn't to be trusted either.

At least if you plan to go to standard track you better explain why
this is needed.

As I said I have not read the draft, so it might be you have the text
there, so if so very good... 

> 2. There is one point I'd still like technical input on, namely the 
> security considerations of signing the previous AUTH payload sent by the 
> host in the modified IKE_AUTH exchange (section 5 of the draft).  Yoav 
> suggested this approach, it sounded fine to me, I ran it by a couple of my 
> colleagues (Scott Moonen and David Wierbowski) who thought it sound fine 
> too so I used it in the new draft.  I'd feel better if another subject 
> matter expert said, "yes, that is fine."  Bonus points if the SME can 
> offer a sentence or two justifying why this mechanism is as secure as the 
> authentication operation that takes place during the initial exchanges. It 
> would be nice to include that information in the security considerations 
> section of my draft.  More specifically, RFC 5996 section 2.15 
> "Authentication of the IKE SA" says, "It is critical to the security of 
> the exchange that each side sign the other side's nonce."  Is it necessary 
> to include nonces in the signed data in the proposed modified IKE_AUTH 
> exchange?  I don't think so, but since I don't know why it was necessary 
> as part of the signed data in the initial exchanges I don't feel qualified 
> to assert that formally.

In the initial authentication the signing of the IKE_SA message proofs
that nobody has modified those packets. Note, that it does not sign
the IKE_AUTH message, as it is protected by the Integrity Checksum
Data field. So the signing of the message data is there just to
provide MAC for the first packets which are not MACed normally.

The real authentication happens when node signs the other ends nonce
and his own MACed ID.

Read the SIGMA documentation for more details:

   [SIGMA]    H. Krawczyk, "SIGMA: the `SIGn-and-MAc' Approach to
              Authenticated Diffie-Hellman and its Use in the IKE
              Protocols", Advances in Cryptography - CRYPTO 2003
              Proceedings LNCS 2729, 2003, <http://
              www.informatik.uni-trier.de/~ley/db/conf/crypto/
              crypto2003.html>.

> 3. In practice, is an Individual Submission less likely to be widely 
> adopted than a document that is sponsored by a working group?  I realize 
> that is probably a moot point, given the lack of energy in the WG that 
> Paul noted, but I thought I'd ask anyway.

Protocols get adopted if there is real use for them. Whether it is
standard track, informational, experimental, WG document or individual
submission does not really matter.

Hopefully the standard track documents get bit more widely implemented
than experimental documents, but that is not because of their status,
but because protocols which seem to have real use are more often
pushed to be on standard track. 
-- 
kivinen@iki.fi

From welterk@us.ibm.com  Thu Jan 20 15:53:29 2011
Return-Path: <welterk@us.ibm.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C4ED93A6877 for <ipsec@core3.amsl.com>; Thu, 20 Jan 2011 15:53:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.154
X-Spam-Level: 
X-Spam-Status: No, score=-6.154 tagged_above=-999 required=5 tests=[AWL=0.444,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WTo5ce5UeXlG for <ipsec@core3.amsl.com>; Thu, 20 Jan 2011 15:53:28 -0800 (PST)
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.149]) by core3.amsl.com (Postfix) with ESMTP id C7FB53A687D for <ipsec@ietf.org>; Thu, 20 Jan 2011 15:53:27 -0800 (PST)
Received: from d03relay01.boulder.ibm.com (d03relay01.boulder.ibm.com [9.17.195.226]) by e31.co.us.ibm.com (8.14.4/8.13.1) with ESMTP id p0KNfp5S000785 for <ipsec@ietf.org>; Thu, 20 Jan 2011 16:41:51 -0700
Received: from d03av05.boulder.ibm.com (d03av05.boulder.ibm.com [9.17.195.85]) by d03relay01.boulder.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p0KNu92k176578 for <ipsec@ietf.org>; Thu, 20 Jan 2011 16:56:09 -0700
Received: from d03av05.boulder.ibm.com (loopback [127.0.0.1]) by d03av05.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p0KNu9Ld018736 for <ipsec@ietf.org>; Thu, 20 Jan 2011 16:56:09 -0700
Received: from d03nm118.boulder.ibm.com (d03nm118.boulder.ibm.com [9.17.195.144]) by d03av05.boulder.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p0KNu9hm018733; Thu, 20 Jan 2011 16:56:09 -0700
In-Reply-To: <19768.18814.516107.222884@fireball.kivinen.iki.fi>
References: <OF3BE5DE68.D7665C2D-ON88257818.006D11C6-88257818.006D53A2@us.ibm.com>	<OFBD92F556.D1F97386-ON88257818.0083CC58-88257819.0000E936@us.ibm.com> <OF82718D9C.1862AB2B-ON8825781D.005F16EC-8825781D.005F52F0@us.ibm.com>	<4D37577E.8070009@vpnc.org> <OF98027C2F.B349FC64-ON8825781D.007692F2-8825781D.0079DA2C@us.ibm.com> <19768.18814.516107.222884@fireball.kivinen.iki.fi>
To: Tero Kivinen <kivinen@iki.fi>
MIME-Version: 1.0
X-KeepSent: 27D379EF:8E88D48C-8825781E:00763661; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.0.2FP3 SHF32 December 02, 2009
From: Keith Welter <welterk@us.ibm.com>
Message-ID: <OF27D379EF.8E88D48C-ON8825781E.00763661-8825781E.00837BDA@us.ibm.com>
Date: Thu, 20 Jan 2011 15:56:07 -0800
X-MIMETrack: Serialize by Router on D03NM118/03/M/IBM(Release 8.5.1FP4|July 25, 2010) at 01/20/2011 16:56:08, Serialize complete at 01/20/2011 16:56:08
Content-Type: multipart/alternative; boundary="=_alternative 00837A5D8825781E_="
Cc: ipsec@ietf.org, Yoav Nir <ynir@checkpoint.com>, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-02
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jan 2011 23:53:29 -0000

This is a multipart message in MIME format.
--=_alternative 00837A5D8825781E_=
Content-Type: text/plain; charset="US-ASCII"

Tero Kivinen <kivinen@iki.fi> wrote on 01/20/2011 06:41:02 AM:
> I do not really think reauthentication offers anything as in most
> setups the IKEv2 authentication information is stored in the machine
> itself and does not require any user interaction (i.e. shared keys in
> the configuration file, or the private key on the disk).
> 
> The reauthentication only does mean something in case you are using
> EAP or private key authentication based on some kind of removable
> token (smart card etc). If the client is able to store authentication
> information and replay that when server requires reauthentication then
> reauthentication does not provide anything. You could simply just ask
> from the other end "is the user still there", and the other end can
> say "yes", or "no" without providing any proof.
> 
> If you are using external token based system like private keys on
> smartcards then reauthentication gives server a proof that user really
> did leave the card inserted to the machine. It still does not provide
> proof that user is still sitting in front of the machine (as most
> smartcards do keep pin codes etc stored as long as you do not remove
> the card).
> 
> If you use EAP with one time passwords or similars where it actually
> do require user to type in new code every time then user have much
> harder time to fake the system especially if user cannot get future
> one time passwords before their time (otherwise he could just type in
> next n passwords the system might be asking).
> 
> So the draft should have good rationale explaining in which kind of
> situations this is actually useful. I do assume that the security
> model is something that the user is not be trusted, and most likely
> the user's machine isn't to be trusted either.
> 
> At least if you plan to go to standard track you better explain why
> this is needed.
> 
> As I said I have not read the draft, so it might be you have the text
> there, so if so very good... 
The draft does list some problems with reauthentication as defined in RFC 
5996 but it doesn't say why one might do reauthentication in the first 
place.  RFC 5996 says, "Although rekeying the IKE SA may be important in 
some environments, reauthentication (the verification that the parties 
still have access to the long-term credentials) is often more important." 
One use case that occurs to me is detecting that the peer's certificate 
has been revoked.  If you just rekey the IKE SA forever you would not 
detect that. 

> 
> > 2. There is one point I'd still like technical input on, namely the 
> > security considerations of signing the previous AUTH payload sent by 
the 
> > host in the modified IKE_AUTH exchange (section 5 of the draft).  Yoav 

> > suggested this approach, it sounded fine to me, I ran it by a couple 
of my 
> > colleagues (Scott Moonen and David Wierbowski) who thought it sound 
fine 
> > too so I used it in the new draft.  I'd feel better if another subject 

> > matter expert said, "yes, that is fine."  Bonus points if the SME can 
> > offer a sentence or two justifying why this mechanism is as secure as 
the 
> > authentication operation that takes place during the initial 
exchanges. It 
> > would be nice to include that information in the security 
considerations 
> > section of my draft.  More specifically, RFC 5996 section 2.15 
> > "Authentication of the IKE SA" says, "It is critical to the security 
of 
> > the exchange that each side sign the other side's nonce."  Is it 
necessary 
> > to include nonces in the signed data in the proposed modified IKE_AUTH 

> > exchange?  I don't think so, but since I don't know why it was 
necessary 
> > as part of the signed data in the initial exchanges I don't feel 
qualified 
> > to assert that formally.
> 
> In the initial authentication the signing of the IKE_SA message proofs
> that nobody has modified those packets. Note, that it does not sign
> the IKE_AUTH message, as it is protected by the Integrity Checksum
> Data field. So the signing of the message data is there just to
> provide MAC for the first packets which are not MACed normally.
> 
> The real authentication happens when node signs the other ends nonce
> and his own MACed ID.
> 
> Read the SIGMA documentation for more details:
> 
>    [SIGMA]    H. Krawczyk, "SIGMA: the `SIGn-and-MAc' Approach to
>               Authenticated Diffie-Hellman and its Use in the IKE
>               Protocols", Advances in Cryptography - CRYPTO 2003
>               Proceedings LNCS 2729, 2003, <http://
>               www.informatik.uni-trier.de/~ley/db/conf/crypto/
>               crypto2003.html>.
Thanks, I'll take a look at that.

> 
> > 3. In practice, is an Individual Submission less likely to be widely 
> > adopted than a document that is sponsored by a working group?  I 
realize 
> > that is probably a moot point, given the lack of energy in the WG that 

> > Paul noted, but I thought I'd ask anyway.
> 
> Protocols get adopted if there is real use for them. Whether it is
> standard track, informational, experimental, WG document or individual
> submission does not really matter.
> 
> Hopefully the standard track documents get bit more widely implemented
> than experimental documents, but that is not because of their status,
> but because protocols which seem to have real use are more often
> pushed to be on standard track. 
> -- 
> kivinen@iki.fi

--=_alternative 00837A5D8825781E_=
Content-Type: text/html; charset="US-ASCII"


<br><tt><font size=2>Tero Kivinen &lt;kivinen@iki.fi&gt; wrote on 01/20/2011
06:41:02 AM:<br>
&gt; I do not really think reauthentication offers anything as in most<br>
&gt; setups the IKEv2 authentication information is stored in the machine<br>
&gt; itself and does not require any user interaction (i.e. shared keys
in<br>
&gt; the configuration file, or the private key on the disk).</font></tt>
<br><tt><font size=2>&gt; <br>
&gt; The reauthentication only does mean something in case you are using<br>
&gt; EAP or private key authentication based on some kind of removable<br>
&gt; token (smart card etc). If the client is able to store authentication<br>
&gt; information and replay that when server requires reauthentication
then<br>
&gt; reauthentication does not provide anything. You could simply just
ask<br>
&gt; from the other end &quot;is the user still there&quot;, and the other
end can<br>
&gt; say &quot;yes&quot;, or &quot;no&quot; without providing any proof.<br>
&gt; <br>
&gt; If you are using external token based system like private keys on<br>
&gt; smartcards then reauthentication gives server a proof that user really<br>
&gt; did leave the card inserted to the machine. It still does not provide<br>
&gt; proof that user is still sitting in front of the machine (as most<br>
&gt; smartcards do keep pin codes etc stored as long as you do not remove<br>
&gt; the card).<br>
&gt; <br>
&gt; If you use EAP with one time passwords or similars where it actually<br>
&gt; do require user to type in new code every time then user have much<br>
&gt; harder time to fake the system especially if user cannot get future<br>
&gt; one time passwords before their time (otherwise he could just type
in<br>
&gt; next n passwords the system might be asking).<br>
&gt; <br>
&gt; So the draft should have good rationale explaining in which kind of<br>
&gt; situations this is actually useful. I do assume that the security<br>
&gt; model is something that the user is not be trusted, and most likely<br>
&gt; the user's machine isn't to be trusted either.<br>
&gt; <br>
&gt; At least if you plan to go to standard track you better explain why<br>
&gt; this is needed.<br>
&gt; <br>
&gt; As I said I have not read the draft, so it might be you have the text<br>
&gt; there, so if so very good... </font></tt>
<br><tt><font size=2>The draft does list some problems with reauthentication
as defined in RFC 5996 but it doesn't say why one might do reauthentication
in the first place. &nbsp;RFC 5996 says, &quot;Although rekeying the IKE
SA may be important in some environments, reauthentication (the verification
that the parties still have access to the long-term credentials) is often
more important.&quot; &nbsp;One use case that occurs to me is detecting
that the peer's certificate has been revoked. &nbsp;If you just rekey the
IKE SA forever you would not detect that. &nbsp;</font></tt>
<br>
<br><tt><font size=2>&gt; <br>
&gt; &gt; 2. There is one point I'd still like technical input on, namely
the <br>
&gt; &gt; security considerations of signing the previous AUTH payload
sent by the <br>
&gt; &gt; host in the modified IKE_AUTH exchange (section 5 of the draft).
&nbsp;Yoav <br>
&gt; &gt; suggested this approach, it sounded fine to me, I ran it by a
couple of my <br>
&gt; &gt; colleagues (Scott Moonen and David Wierbowski) who thought it
sound fine <br>
&gt; &gt; too so I used it in the new draft. &nbsp;I'd feel better if another
subject <br>
&gt; &gt; matter expert said, &quot;yes, that is fine.&quot; &nbsp;Bonus
points if the SME can <br>
&gt; &gt; offer a sentence or two justifying why this mechanism is as secure
as the <br>
&gt; &gt; authentication operation that takes place during the initial
exchanges. It <br>
&gt; &gt; would be nice to include that information in the security considerations
<br>
&gt; &gt; section of my draft. &nbsp;More specifically, RFC 5996 section
2.15 <br>
&gt; &gt; &quot;Authentication of the IKE SA&quot; says, &quot;It is critical
to the security of <br>
&gt; &gt; the exchange that each side sign the other side's nonce.&quot;
&nbsp;Is it necessary <br>
&gt; &gt; to include nonces in the signed data in the proposed modified
IKE_AUTH <br>
&gt; &gt; exchange? &nbsp;I don't think so, but since I don't know why
it was necessary <br>
&gt; &gt; as part of the signed data in the initial exchanges I don't feel
qualified <br>
&gt; &gt; to assert that formally.<br>
&gt; <br>
&gt; In the initial authentication the signing of the IKE_SA message proofs<br>
&gt; that nobody has modified those packets. Note, that it does not sign<br>
&gt; the IKE_AUTH message, as it is protected by the Integrity Checksum<br>
&gt; Data field. So the signing of the message data is there just to<br>
&gt; provide MAC for the first packets which are not MACed normally.<br>
&gt; <br>
&gt; The real authentication happens when node signs the other ends nonce<br>
&gt; and his own MACed ID.<br>
&gt; <br>
&gt; Read the SIGMA documentation for more details:<br>
&gt; <br>
&gt; &nbsp; &nbsp;[SIGMA] &nbsp; &nbsp;H. Krawczyk, &quot;SIGMA: the `SIGn-and-MAc'
Approach to<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Authenticated Diffie-Hellman
and its Use in the IKE<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Protocols&quot;,
Advances in Cryptography - CRYPTO 2003<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Proceedings LNCS
2729, 2003, &lt;http://<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; </font></tt><a href="www.informatik.uni-trier.de/~ley/db/conf/crypto/"><tt><font size=2>www.informatik.uni-trier.de/~ley/db/conf/crypto/</font></tt></a><tt><font size=2><br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; crypto2003.html&gt;.</font></tt>
<br><tt><font size=2>Thanks, I'll take a look at that.</font></tt>
<br><tt><font size=2><br>
&gt; <br>
&gt; &gt; 3. In practice, is an Individual Submission less likely to be
widely <br>
&gt; &gt; adopted than a document that is sponsored by a working group?
&nbsp;I realize <br>
&gt; &gt; that is probably a moot point, given the lack of energy in the
WG that <br>
&gt; &gt; Paul noted, but I thought I'd ask anyway.<br>
&gt; <br>
&gt; Protocols get adopted if there is real use for them. Whether it is<br>
&gt; standard track, informational, experimental, WG document or individual<br>
&gt; submission does not really matter.<br>
&gt; <br>
&gt; Hopefully the standard track documents get bit more widely implemented<br>
&gt; than experimental documents, but that is not because of their status,<br>
&gt; but because protocols which seem to have real use are more often<br>
&gt; pushed to be on standard track. <br>
&gt; -- <br>
&gt; kivinen@iki.fi<br>
</font></tt>
--=_alternative 00837A5D8825781E_=--

From paul.hoffman@vpnc.org  Mon Jan 24 07:43:05 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 43D423A6AEA for <ipsec@core3.amsl.com>; Mon, 24 Jan 2011 07:43:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.732
X-Spam-Level: 
X-Spam-Status: No, score=-101.732 tagged_above=-999 required=5 tests=[AWL=0.314, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D+6DHbiybd8q for <ipsec@core3.amsl.com>; Mon, 24 Jan 2011 07:43:04 -0800 (PST)
Received: from hoffman.proper.com (Hoffman.Proper.COM [207.182.41.81]) by core3.amsl.com (Postfix) with ESMTP id 9734B3A6AE2 for <ipsec@ietf.org>; Mon, 24 Jan 2011 07:43:04 -0800 (PST)
Received: from MacBook-08.local (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p0OFjwFY058782 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Mon, 24 Jan 2011 08:45:59 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Message-ID: <4D3D9EB6.9090202@vpnc.org>
Date: Mon, 24 Jan 2011 07:45:58 -0800
From: Paul Hoffman <paul.hoffman@vpnc.org>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: IPsecme WG <ipsec@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: [IPsec] NUDGE: WG Last Call on draft-ietf-ipsecme-failure-detection
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Jan 2011 15:43:05 -0000

There has been very little discussion on this document in the past two 
weeks. Note that the WG LC in the note below ends on this Wednesday, the 
26th.

==================================================================

Greetings again. This starts the two-week WG Last Call on 
draft-ietf-ipsecme-failure-detection, currently the -03 draft. There has 
been very little comment on this document lately, but please not that 
issue #202 (see <http://trac.tools.ietf.org/wg/ipsecme/trac/ticket/202>) 
is still open. Also note that our virtual interim meeting, which is 
meant to focus on this document, happens the day before this WG LC 
closes. If there continues to be little comment on the document or on 
issue #202, that will be a very short meeting.

--Paul Hoffman, Director
--VPN Consortium


From paul.hoffman@vpnc.org  Mon Jan 24 07:43:14 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EB23B3A6AEB for <ipsec@core3.amsl.com>; Mon, 24 Jan 2011 07:43:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.733
X-Spam-Level: 
X-Spam-Status: No, score=-101.733 tagged_above=-999 required=5 tests=[AWL=0.313, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GHnLQ80VDD6r for <ipsec@core3.amsl.com>; Mon, 24 Jan 2011 07:43:13 -0800 (PST)
Received: from hoffman.proper.com (Hoffman.Proper.COM [207.182.41.81]) by core3.amsl.com (Postfix) with ESMTP id 79D173A6AE5 for <ipsec@ietf.org>; Mon, 24 Jan 2011 07:43:13 -0800 (PST)
Received: from MacBook-08.local (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p0OFk7IG058794 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Mon, 24 Jan 2011 08:46:08 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Message-ID: <4D3D9EBF.4000909@vpnc.org>
Date: Mon, 24 Jan 2011 07:46:07 -0800
From: Paul Hoffman <paul.hoffman@vpnc.org>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: IPsecme WG <ipsec@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: [IPsec] NUDGE: IPSECME WG Virtual Interim Meeting, January 25, 2010
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Jan 2011 15:43:15 -0000

This is just a reminder of tomorrow's meeting. Given the lack of traffic 
on the mailing list for the WG LC, I suspect that this will be a *very* 
short meeting.

======================================================================

The IPsecME WG will have a virtual interim WG meeting on Tuesday January
25, 16:00 GMT (21:30 Kolkata, 18:00 Israel, 17:00 CET, 11:00 EST, 8:00
PST), for up to 2 hours. The agenda is to discuss any remaining issues
with draft-ietf-ipsecme-failure-detection. The meeting will be held as a
conference call using a VoIP conference bridge and posted slides (if
needed). Technical details here:
http://trac.tools.ietf.org/wg/ipsecme/trac/wiki/ConferenceCalls.


From paul.hoffman@vpnc.org  Tue Jan 25 08:26:19 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A11413A680D for <ipsec@core3.amsl.com>; Tue, 25 Jan 2011 08:26:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.99
X-Spam-Level: 
X-Spam-Status: No, score=-100.99 tagged_above=-999 required=5 tests=[AWL=-0.433, BAYES_05=-1.11, HELO_MISMATCH_COM=0.553, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KxrVLqJzx0dR for <ipsec@core3.amsl.com>; Tue, 25 Jan 2011 08:26:17 -0800 (PST)
Received: from hoffman.proper.com (Hoffman.Proper.COM [207.182.41.81]) by core3.amsl.com (Postfix) with ESMTP id 730863A680F for <ipsec@ietf.org>; Tue, 25 Jan 2011 08:26:17 -0800 (PST)
Received: from MacBook-08.local (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p0PGTEP3034720 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Tue, 25 Jan 2011 09:29:15 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Message-ID: <4D3EFA5A.5080106@vpnc.org>
Date: Tue, 25 Jan 2011 08:29:14 -0800
From: Paul Hoffman <paul.hoffman@vpnc.org>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: IPsecme WG <ipsec@ietf.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Subject: [IPsec] Proposed minutes of this morning's virtual interim meeting
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Jan 2011 16:26:19 -0000

As expected, it was short. If any of the participants have changes to 
the minutes, let me know in the next two days.

--Paul Hoffman

IPsecME WG
Minutes of the Virtual Interim Meeting
2011-01-25 1600 GMT

Attendees:
	David Wierbowski
	Matt Lepinski
	Paul Hoffman
	Richard Graveman
	Scott Moonen
	Sheila Frankel
	Tero Kivinen
	Yaron Sheffer
	Yoav Nir

Main topic: WG LC for draft-ietf-ipsecme-failure-detection-03
	Yoav: open issue is about specific cluster configuration
		Do we care about this?
		Pratima and Frederic were the ones who brought this scenario
	Paul: Will probably accept suggestion from David Wierbowski and Scott 
Moonen to combine 9.2 and 9.4
	﻿	...unless anything is heard in the next 36 hours by the end of WG LC
	General discussion that combining 9.2 and 9.4 will solve the open issue
		Tero: We need to look in 5 as well, since some of it is there for 9.4
			Paul: That sounds good

Next up for the WG: draft-ietf-ipsecme-ipsecha-protocol-02
	WG LC will start soon
	We might have another virtual interim during WG LC for it

Meeting was adjourned at 1615 PST

From paul.hoffman@vpnc.org  Thu Jan 27 08:39:25 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ABDED28C143 for <ipsec@core3.amsl.com>; Thu, 27 Jan 2011 08:39:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.999
X-Spam-Level: 
X-Spam-Status: No, score=-100.999 tagged_above=-999 required=5 tests=[AWL=-0.442, BAYES_05=-1.11, HELO_MISMATCH_COM=0.553, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ndr3xahHmF1E for <ipsec@core3.amsl.com>; Thu, 27 Jan 2011 08:39:25 -0800 (PST)
Received: from hoffman.proper.com (Hoffman.Proper.COM [207.182.41.81]) by core3.amsl.com (Postfix) with ESMTP id EB4F128C145 for <ipsec@ietf.org>; Thu, 27 Jan 2011 08:39:12 -0800 (PST)
Received: from MacBook-08.local (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p0RGgGip063190 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO) for <ipsec@ietf.org>; Thu, 27 Jan 2011 09:42:16 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Message-ID: <4D41A068.6070108@vpnc.org>
Date: Thu, 27 Jan 2011 08:42:16 -0800
From: Paul Hoffman <paul.hoffman@vpnc.org>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: ipsec@ietf.org
References: <4D2DEAA9.2050301@vpnc.org>
In-Reply-To: <4D2DEAA9.2050301@vpnc.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [IPsec] WG Last Call on draft-ietf-ipsecme-failure-detection
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jan 2011 16:39:25 -0000

This message closed out the WG LC. There remains one open issue, #202. 
Based on Scott Moonen's suggestion, he and David Weirbowski will propose 
wording for combining sections 9.2 and 9.4 into a single discussion that 
will close this issue. They can bring this proposal to the mailing list 
and, assuming there is general agreement, the authors will put out a 
final version with it in it and we can move the document to our Area 
Director.

--Paul Hoffman, Director
--VPN Consortium


From ynir@checkpoint.com  Thu Jan 27 13:44:07 2011
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C36213A69D7 for <ipsec@core3.amsl.com>; Thu, 27 Jan 2011 13:44:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.03
X-Spam-Level: 
X-Spam-Status: No, score=-10.03 tagged_above=-999 required=5 tests=[AWL=0.569,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R7lM07TlEDeP for <ipsec@core3.amsl.com>; Thu, 27 Jan 2011 13:44:07 -0800 (PST)
Received: from michael.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by core3.amsl.com (Postfix) with ESMTP id A390A3A6A59 for <ipsec@ietf.org>; Thu, 27 Jan 2011 13:44:06 -0800 (PST)
X-CheckPoint: {4D41E7DE-10000-1B221DC2-2FFFF}
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by michael.checkpoint.com (8.13.8/8.13.8) with ESMTP id p0RLl965030206;  Thu, 27 Jan 2011 23:47:09 +0200
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Thu, 27 Jan 2011 23:47:08 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: Paul Hoffman <paul.hoffman@vpnc.org>
Date: Thu, 27 Jan 2011 23:47:07 +0200
Thread-Topic: [IPsec] WG Last Call on draft-ietf-ipsecme-failure-detection
Thread-Index: Acu+a77l+tCvN1QiTl+1DR8Y4GE2Rw==
Message-ID: <3FE3102A-CE5A-464E-A2CD-19781643829B@checkpoint.com>
References: <4D2DEAA9.2050301@vpnc.org> <4D41A068.6070108@vpnc.org>
In-Reply-To: <4D41A068.6070108@vpnc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] WG Last Call on draft-ietf-ipsecme-failure-detection
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jan 2011 21:44:07 -0000

I'd like to also point out that Scott and Keith have pointed out some nits =
in the spec (on the 12th and 19th of January respectively), which will also=
 be included in the final version.

Yoav

On Jan 27, 2011, at 6:42 PM, Paul Hoffman wrote:

> This message closed out the WG LC. There remains one open issue, #202.=20
> Based on Scott Moonen's suggestion, he and David Weirbowski will propose=
=20
> wording for combining sections 9.2 and 9.4 into a single discussion that=
=20
> will close this issue. They can bring this proposal to the mailing list=20
> and, assuming there is general agreement, the authors will put out a=20
> final version with it in it and we can move the document to our Area=20
> Director.
>=20
> --Paul Hoffman, Director
> --VPN Consortium


From ynir@checkpoint.com  Sat Jan 29 23:57:31 2011
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0AFF53A6A7A for <ipsec@core3.amsl.com>; Sat, 29 Jan 2011 23:57:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.04
X-Spam-Level: 
X-Spam-Status: No, score=-10.04 tagged_above=-999 required=5 tests=[AWL=0.558,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7WAcnsA7xd0i for <ipsec@core3.amsl.com>; Sat, 29 Jan 2011 23:57:29 -0800 (PST)
Received: from michael.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by core3.amsl.com (Postfix) with ESMTP id 7AB1E3A6A6C for <ipsec@ietf.org>; Sat, 29 Jan 2011 23:57:28 -0800 (PST)
X-CheckPoint: {4D451AA6-1-1B221DC2-2FFFF}
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by michael.checkpoint.com (8.13.8/8.13.8) with ESMTP id p0U80bia006244;  Sun, 30 Jan 2011 10:00:37 +0200
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([194.29.34.26]) with mapi; Sun, 30 Jan 2011 10:00:37 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: Keith Welter <welterk@us.ibm.com>
Date: Sun, 30 Jan 2011 10:00:38 +0200
Thread-Topic: [IPsec] WG Last Call on draft-ietf-ipsecme-failure-detection
Thread-Index: AcvAU8amDxmVxyHySNedV28XFxQDtg==
Message-ID: <45DC1BFE-6273-46F3-83F8-759CC1CAAA85@checkpoint.com>
References: <4D2DEAA9.2050301@vpnc.org> <OF9EBD79AB.7C3B16B7-ON8825781C.007E5BA8-8825781D.000360F0@us.ibm.com>
In-Reply-To: <OF9EBD79AB.7C3B16B7-ON8825781C.007E5BA8-8825781D.000360F0@us.ibm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_45DC1BFE627346F383F8759CC1CAAA85checkpointcom_"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] WG Last Call on draft-ietf-ipsecme-failure-detection
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 30 Jan 2011 07:57:31 -0000

--_000_45DC1BFE627346F383F8759CC1CAAA85checkpointcom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Keith.

Thanks for the comments. My responses inline.

On Jan 19, 2011, at 2:36 AM, Keith Welter wrote:


1. The last paragraph of section 2 seems to be making an argument against s=
upporting QCD.  Would it be possible to add a counterpoint or to reword the=
 paragraph?  When I got to the end of the document, I found that section A.=
4 had the counterpoint I was looking for.  Perhaps add a reference to secti=
on A.4 from the last paragraph of section 2.

OK. How about:

   Some existing IKEv2 implementations already do that (i.e., both
   shorten timeouts or limit number of retries) based on these kind of
   hints and also start liveness checks quickly after the other end goes
   silent.  However, see Appendix A.4 for a discussion of why this may
   not be enough.

2. In section 4.1 (Notification Format) the TOKEN_SECRET_KEY fields size is=
 given as "(16-128 octets)".  I suggest replacing this with "(variable)" so=
 that the specific size requirement only appears in one place (section 5): =
"Tokens MUST be at least 16 octets long, and no more than 128 octets long, =
to facilitate storage and transmission."

OK.

3. In section 4.3, the text "SHOULD soon initiate an INFORMATIONAL exchange=
 as follows" is vague.  How soon is soon?  How about: "SHOULD initiate an I=
NFORMATIONAL exchange immediately after the CREATE_CHILD_SA exchange as fol=
lows".  Or, omit "immediately" if that is not strictly necessary.

OK, and I went with "immediately". If the initiator doesn't do it, QCD does=
 not work.

4. The final paragraph in section 4.3 mentions "key rollover" and "secret Q=
CD keys" but these concepts have not been defined.  It seems like this mate=
rial would fit better in section 5 (Token Generation and Verification) wher=
e the cryptographic mechanism for QCD token generation is recommended.

I disagree with this. Section 4 has all the information about using the not=
ification payload. How about if I add a pointer like this:

   The INFORMATIONAL exchange described in this section can also be used
   if QCD tokens need to be replaced due to a key rollover.  However,
   since token takers are required to verify at least 4 QCD tokens, this
   is only necessary if secret QCD keys are rolled over more than four
   times as often as IKE SAs are rekeyed.  See Section 5.1 for an
   example method that uses secret keys which may require rollover.


5. Similarly, section 4.5 mentions "periodic rollover of the secret used fo=
r token generation" but token generation has not yet been covered.  Perhaps=
 a better solution than what I recommended in the prior comment would be to=
 move all of  section 5 (i.e. 5 through 5.3) before section 4.  That way, t=
oken generation would be discussed before any mention of token secrets, key=
s or rollover in sections 4.1 through 4.5.

See last remark.

6. The first sentence on page 18 is an orphan.

That's just how the xml2rfc utility formats it. When (and if) it gets publi=
shed, the RFC editor takes care of these stylistic issues.

7. In section 11, "contrinuted" should be "contributed".

Will be fixed in -04.

8. Section A.1 says, "The disadvantage here, is that in IKEv2 an authentica=
tion exchange MUST have a piggy-backed Child SA set up."  RFC 6023 specifie=
s a childless IKE SA initiation so that sentence is not true for implementa=
tions that support RFC 6023.

True, but since RFC 6023 is experimental, I would like to leave this senten=
ce. Also, the important part is the next paragraph, which says that sometim=
es setting up a new IKE SA is not possible for the former responder.


Thanks,

Keith Welter
IBM z/OS Communications Server Developer
1-415-545-2694 (T/L: 473-2694)


Scanned by Check Point Total Security Gateway.

<ATT00001..txt>


--_000_45DC1BFE627346F383F8759CC1CAAA85checkpointcom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
 space; -webkit-line-break: after-white-space; ">Hi Keith.&nbsp;<div><br></=
div><div>Thanks for the comments. My responses inline.</div><div><br><div><=
div>On Jan 19, 2011, at 2:36 AM, Keith Welter wrote:</div><br class=3D"Appl=
e-interchange-newline"><blockquote type=3D"cite">
<br><font size=3D"2" face=3D"sans-serif">1. The last paragraph of section 2=
 seems
to be making an argument against supporting QCD. &nbsp;Would it be possible
to add a counterpoint or to reword the paragraph? &nbsp;When I got to the
end of the document, I found that section A.4 had the counterpoint I was
looking for. &nbsp;Perhaps add a reference to section A.4 from the last
paragraph of section 2.</font>
<br></blockquote><div><br></div>OK. How about:</div><div><br><div>&nbsp;&nb=
sp; Some existing IKEv2 implementations already do that (i.e., both</div><d=
iv>&nbsp;&nbsp; shorten timeouts or limit number of retries) based on these=
 kind of</div><div>&nbsp;&nbsp; hints and also start liveness checks quickl=
y after the other end goes</div><div>&nbsp;&nbsp; silent. &nbsp;However, se=
e Appendix A.4 for a discussion of why this may</div><div>&nbsp;&nbsp; not =
be enough.</div><div><br></div><blockquote type=3D"cite"><font size=3D"2" f=
ace=3D"sans-serif">2. In section 4.1 (Notification Format)
the TOKEN_SECRET_KEY fields size is given as "(16-128 octets)".
&nbsp;I suggest replacing this with "(variable)" so that the
specific size requirement only appears in one place (section 5): "Tokens
MUST be at least 16 octets long, and no more than 128 octets long, to facil=
itate
storage and transmission."</font>
<br></blockquote><div><br></div>OK.</div><div><br><blockquote type=3D"cite"=
><font size=3D"2" face=3D"sans-serif">3. In section 4.3, the text "SHOULD
soon initiate an INFORMATIONAL exchange as follows" is vague. &nbsp;How
soon is soon? &nbsp;How about: "SHOULD initiate an INFORMATIONAL exchange
immediately after the CREATE_CHILD_SA exchange as follows". &nbsp;Or,
omit "immediately" if that is not strictly necessary.</font>
<br></blockquote><div><br></div>OK, and I went with "immediately". If the i=
nitiator doesn't do it, QCD does not work.</div><div><br><blockquote type=
=3D"cite"><font size=3D"2" face=3D"sans-serif">4. The final paragraph in se=
ction 4.3
mentions "key rollover" and "secret QCD keys" but these
concepts have not been defined. &nbsp;It seems like this material would
fit better in section 5 (Token Generation and Verification) where the crypt=
ographic
mechanism for QCD token generation is recommended.</font>
<br></blockquote><div><br></div><div>I disagree with this. Section 4 has al=
l the information about using the notification payload. How about if I add =
a pointer like this:</div><div><div><br></div><div>&nbsp;&nbsp; The INFORMA=
TIONAL exchange described in this section can also be used</div><div>&nbsp;=
&nbsp; if QCD tokens need to be replaced due to a key rollover. &nbsp;Howev=
er,</div><div>&nbsp;&nbsp; since token takers are required to verify at lea=
st 4 QCD tokens, this</div><div>&nbsp;&nbsp; is only necessary if secret QC=
D keys are rolled over more than four</div><div>&nbsp;&nbsp; times as often=
 as IKE SAs are rekeyed. &nbsp;See Section 5.1 for an</div><div>&nbsp;&nbsp=
; example method that uses secret keys which may require rollover.</div><di=
v><br></div></div><br><blockquote type=3D"cite"><font size=3D"2" face=3D"sa=
ns-serif">5. Similarly, section 4.5 mentions "periodic
rollover of the secret used for token generation" but token generation
has not yet been covered. &nbsp;Perhaps a better solution than what I recom=
mended
in the prior comment would be to move all of &nbsp;section 5 (i.e. 5 throug=
h
5.3) before section 4. &nbsp;That way, token generation would be discussed
before any mention of token secrets, keys or rollover in sections 4.1 throu=
gh
4.5.</font>
<br></blockquote><div><br></div>See last remark.</div><div><br><blockquote =
type=3D"cite"><font size=3D"2" face=3D"sans-serif">6. The first sentence on=
 page 18 is
an orphan.</font>
<br></blockquote><div><br></div><div>That's just how the xml2rfc utility fo=
rmats it. When (and if) it gets published, the RFC editor takes care of the=
se stylistic issues.</div><br><blockquote type=3D"cite"><font size=3D"2" fa=
ce=3D"sans-serif">7. In section 11, "contrinuted"
should be "contributed".</font>
<br></blockquote><div><br></div>Will be fixed in -04.</div><div><br><blockq=
uote type=3D"cite"><font size=3D"2" face=3D"sans-serif">8. Section A.1 says=
, "The disadvantage
here, is that in IKEv2 an authentication exchange MUST have a piggy-backed
Child SA set up." &nbsp;RFC 6023 specifies a childless IKE SA initiation
so that sentence is not true for implementations that support RFC 6023.</fo=
nt>
<br></blockquote><div><br></div>True, but since RFC 6023 is experimental, I=
 would like to leave this sentence. Also, the important part is the next pa=
ragraph, which says that sometimes setting up a new IKE SA is not possible =
for the former responder.</div><div><br><blockquote type=3D"cite">
<br><font size=3D"2" face=3D"sans-serif">Thanks,</font>
<br><font size=3D"2" face=3D"sans-serif"><br>
Keith Welter<br>
IBM z/OS Communications Server Developer<br>
1-415-545-2694 (T/L: 473-2694)<br>
</font>
<br>

<br>Scanned by Check Point Total Security Gateway.
<br><br><span>&lt;ATT00001..txt&gt;</span></blockquote></div><br></div></bo=
dy></html>=

--_000_45DC1BFE627346F383F8759CC1CAAA85checkpointcom_--

From ynir@checkpoint.com  Sat Jan 29 23:57:34 2011
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8D36A3A6B25 for <ipsec@core3.amsl.com>; Sat, 29 Jan 2011 23:57:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.05
X-Spam-Level: 
X-Spam-Status: No, score=-10.05 tagged_above=-999 required=5 tests=[AWL=0.548,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WDqcp1Ec5Ga0 for <ipsec@core3.amsl.com>; Sat, 29 Jan 2011 23:57:32 -0800 (PST)
Received: from michael.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by core3.amsl.com (Postfix) with ESMTP id 18FF43A6A6C for <ipsec@ietf.org>; Sat, 29 Jan 2011 23:57:30 -0800 (PST)
X-CheckPoint: {4D451AA9-0-1B221DC2-2FFFF}
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by michael.checkpoint.com (8.13.8/8.13.8) with ESMTP id p0U80ff4006262;  Sun, 30 Jan 2011 10:00:41 +0200
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([194.29.34.26]) with mapi; Sun, 30 Jan 2011 10:00:41 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: Scott C Moonen <smoonen@us.ibm.com>
Date: Sun, 30 Jan 2011 10:00:42 +0200
Thread-Topic: [IPsec] I-D Action:draft-ietf-ipsecme-failure-detection-03.txt
Thread-Index: AcvAU8kZTIPicm2yTCWLEIO99oyK4g==
Message-ID: <8F3501F2-B204-40E3-9973-9BA673D8FF86@checkpoint.com>
References: <20110110074502.22466.22300.idtracker@localhost> <OFA8BE8798.B3640724-ON85257816.0065945B-85257816.007201DF@us.ibm.com>
In-Reply-To: <OFA8BE8798.B3640724-ON85257816.0065945B-85257816.007201DF@us.ibm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_8F3501F2B20440E399739BA673D8FF86checkpointcom_"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-failure-detection-03.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 30 Jan 2011 07:57:34 -0000

--_000_8F3501F2B20440E399739BA673D8FF86checkpointcom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Scott.

Thanks for your comments. My replies inline.

On Jan 12, 2011, at 10:45 PM, Scott C Moonen wrote:


Comments on the draft, mostly editorial in nature:

(1) There are still some blockquotes that start with excessive first-line i=
ndents, eg., the three quotes on page 5.

Those are intentional. They quote from the RFC, so I copied them line by li=
ne.

(2) Page 5, should add comma after "system" in "Reboot, depending on the sy=
stem."

Will be fixed in -04.

(3) Page 5, should pluralize "implementation" in "IKEv2 implementation can =
detect."

Will be fixed in -04.

(4) Page 5, should remove "the" in "rules given in the section."

Will be fixed in -04.

(5) Page 6, correct "even has change" to "even has a chance."

Will be fixed in -04.

(6) Page 6, change comma to semicolon in "immediately, in those cases."

Will be fixed in -04.

(7) Page 6, suggest improving sentence beginning "Note, that" to read "Note=
 that the IKEv2 specification specifically gives no guidance for the number=
 of retries or the length of timeouts, as these do not affect interoperabil=
ity."

Will be fixed in -04.

(8) Page 6, suggest changing "messages as hints that will shorten" to read =
"messages to shorten."

Will be fixed in -04.

(9) Global, need commas after "i.e."

Will be fixed in -04.

(10) Page 6, change "that kind of hints" to either "this kind of hint" or "=
these kinds of hints."

Will be fixed in -04.

(11) Page 7, pluralize first word in "Implementation that are not token tak=
ers."

Will be fixed in -04.

(12) Section 4.1, should we specify that the critical bit is set to 0?

I think not, because that is true of any notify payload

(13) Page 8, the last line is an orphan.

Not sure what you mean. It says "In any case, the lack of a QCD_TOKEN notif=
ication MUST NOT be taken" and then continues on the next page.

(14) Section 4.2 says the payload "MUST follow . . . and precede . . ." In =
general I think the IKEv2 specs have tried to say SHOULD for ordering consi=
derations; should we do so here?

Agree that we shouldn't. RFC5996 specifically says that order doesn't matte=
r. If nobody objects, I'll change it to a lower-case "should".

(15) Section 4.3 says "SHOULD send a new ticket." I think we mean to say "Q=
CD_TOKEN notification" instead of "ticket."

No. That sentence is about session resumption (RFC 5723), where they do use=
 "tickets". The second sentence talks about tokens:

   For session resumption, as specified in [RFC5723], the situation is
   similar.  The responder, which is necessarily the peer that has
   crashed, SHOULD send a new ticket within the protected payload of the
   IKE_SESSION_RESUME exchange.  If the Initiator is also a token maker,
   it needs to send a QCD_TOKEN in a separate INFORMATIONAL exchange.

(16) Section 4.5, is it correct to denote the unprotected message as a "req=
uest" in the flow diagrams? I think we were careful in RFC 5996 to denote s=
tandalone messages as informational messages rather than informational requ=
ests.

OK. I'll change it to "message"

(17) Section 7, change "new IKE SA consume" to "new IKE SA to consume."

OK.

(18) Section 7, suggest changing "re-establishment should occur" to either =
"would occur" or "will occur."

Agree, but I will solve it by moving the whole paragraph to the present ten=
se:

   Session resumption, specified in [RFC5723], allows the setting up of
   a new IKE SA to consume less computing resources.  This is
   particularly useful in the case of a remote access gateway that has
   many tunnels.  A failure of such a gateway requires all these many
   remote access clients to establish an IKE SA either with the rebooted
   gateway or with a backup.  This tunnel re-establishment occurs within
   a short period of time, creating a burden on the remote access
   gateway.  Session resumption addresses this problem by having the
   clients store an encrypted derivative of the IKE SA for quick re-
   establishment.


(19) Section 8.1, suggest changing "inter-domain VPN gateway" to either add=
 "an" before it or pluralize "gateway."

Since the other bullet points are pluralized, I'll go with the former.


Scott Moonen (smoonen@us.ibm.com<mailto:smoonen@us.ibm.com>)
z/OS Communications Server TCP/IP Development
http://www.linkedin.com/in/smoonen

<graycol.gif>Internet-Drafts---01/10/2011 02:48:33 AM---A New Internet-Draf=
t is available from the on-line Internet-Drafts directories. This draft is =
a work

From: Internet-Drafts@ietf.org<mailto:Internet-Drafts@ietf.org>
To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org>
Cc: ipsec@ietf.org<mailto:ipsec@ietf.org>
Date: 01/10/2011 02:48 AM
Subject: [IPsec] I-D Action:draft-ietf-ipsecme-failure-detection-03.txt
Sent by: ipsec-bounces@ietf.org<mailto:ipsec-bounces@ietf.org>

________________________________



A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
This draft is a work item of the IP Security Maintenance and Extensions Wor=
king Group of the IETF.


Title           : A Quick Crash Detection Method for IKE
Author(s)       : Y. Nir, et al.
Filename        : draft-ietf-ipsecme-failure-detection-03.txt
Pages           : 23
Date            : 2011-01-09

This document describes an extension to the IKEv2 protocol that
allows for faster detection of SA desynchronization using a saved
token.

When an IPsec tunnel between two IKEv2 peers is disconnected due to a
restart of one peer, it can take as much as several minutes for the
other peer to discover that the reboot has occurred, thus delaying
recovery.  In this text we propose an extension to the protocol, that
allows for recovery immediately following the restart.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-failure-detection-03=
.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.
ftp://anonymous@ftp.ietf.org/internet-drafts/draft-ietf-ipsecme-failure-det=
ection-03.txt_______________________________________________
IPsec mailing list
IPsec@ietf.org<mailto:IPsec@ietf.org>
https://www.ietf.org/mailman/listinfo/ipsec

<ATT00001..txt>


--_000_8F3501F2B20440E399739BA673D8FF86checkpointcom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
 space; -webkit-line-break: after-white-space; ">Hi Scott.<div><br></div><d=
iv>Thanks for your comments. My replies inline.</div><div><br></div><div><d=
iv><div>On Jan 12, 2011, at 10:45 PM, Scott C Moonen wrote:</div><br class=
=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div><p>Comments o=
n the draft, mostly editorial in nature:<br>
<br>
(1) There are still some blockquotes that start with excessive first-line i=
ndents, eg., the three quotes on page 5.<br></p></div></blockquote><div>Tho=
se are intentional. They quote from the RFC, so I copied them line by line.=
</div><blockquote type=3D"cite"><div><p>
(2) Page 5, should add comma after "system" in "Reboot, depending on the sy=
stem."<br></p></div></blockquote>Will be fixed in -04.<br><blockquote type=
=3D"cite"><div><p>
(3) Page 5, should pluralize "implementation" in "IKEv2 implementation can =
detect."<br></p></div></blockquote>Will be fixed in -04.<br><blockquote typ=
e=3D"cite"><div><p>
(4) Page 5, should remove "the" in "rules given in the section."<br></p></d=
iv></blockquote>Will be fixed in -04.<br><blockquote type=3D"cite"><div><p>
(5) Page 6, correct "even has change" to "even has <b>a</b> chan<b>c</b>e."=
<br></p></div></blockquote>Will be fixed in -04.<br><blockquote type=3D"cit=
e"><div><p>
(6) Page 6, change comma to semicolon in "immediately, in those cases."<br>=
</p></div></blockquote>Will be fixed in -04.<br><blockquote type=3D"cite"><=
div><p>
(7) Page 6, suggest improving sentence beginning "Note, that" to read "Note=
 that the IKEv2 specification specifically gives no guidance for the number=
 of retries or the length of timeouts, as these do not affect interoperabil=
ity."<br></p></div></blockquote>Will be fixed in -04.<br><blockquote type=
=3D"cite"><div><p>
(8) Page 6, suggest changing "messages as hints that will shorten" to read =
"messages to shorten."<br></p></div></blockquote>Will be fixed in -04.<br><=
blockquote type=3D"cite"><div><p>
(9) Global, need commas after "i.e."<br></p></div></blockquote>Will be fixe=
d in -04.<br><blockquote type=3D"cite"><div><p>
(10) Page 6, change "that kind of hints" to either "this kind of hint" or "=
these kinds of hints."<br></p></div></blockquote>Will be fixed in -04.<br><=
blockquote type=3D"cite"><div><p>
(11) Page 7, pluralize first word in "Implementation that are not token tak=
ers."<br></p></div></blockquote>Will be fixed in -04.<br><blockquote type=
=3D"cite"><div><p>
(12) Section 4.1, should we specify that the critical bit is set to 0?<br><=
/p></div></blockquote>I think not, because that is true of any notify paylo=
ad<br><blockquote type=3D"cite"><div><p>
(13) Page 8, the last line is an orphan.<br></p></div></blockquote>Not sure=
 what you mean. It says "In any case, the lack of a QCD_TOKEN notification =
MUST NOT be taken" and then continues on the next page.<br><blockquote type=
=3D"cite"><div><p>
(14) Section 4.2 says the payload "MUST follow . . . and precede . . ."  In=
 general I think the IKEv2 specs have tried to say SHOULD for ordering cons=
iderations; should we do so here?<br></p></div></blockquote>Agree that we s=
houldn't. RFC5996 specifically says that order doesn't matter. If nobody ob=
jects, I'll change it to a lower-case "should".<br><blockquote type=3D"cite=
"><div><p>
(15) Section 4.3 says "SHOULD send a new ticket."  I think we mean to say "=
QCD_TOKEN notification" instead of "ticket."<br></p></div></blockquote>No. =
That sentence is about session resumption (RFC 5723), where they do use "ti=
ckets". The second sentence talks about tokens:</div><div><br></div><div><d=
iv>&nbsp;&nbsp; For session resumption, as specified in [RFC5723], the situ=
ation is</div><div>&nbsp;&nbsp; similar. &nbsp;The responder, which is nece=
ssarily the peer that has</div><div>&nbsp;&nbsp; crashed, SHOULD send a new=
 ticket within the protected payload of the</div><div>&nbsp;&nbsp; IKE_SESS=
ION_RESUME exchange. &nbsp;If the Initiator is also a token maker,</div><di=
v>&nbsp;&nbsp; it needs to send a QCD_TOKEN in a separate INFORMATIONAL exc=
hange.</div><blockquote type=3D"cite"><div><p>
(16) Section 4.5, is it correct to denote the unprotected message as a "req=
uest" in the flow diagrams?  I think we were careful in RFC 5996 to denote =
standalone messages as informational messages rather than informational req=
uests.<br></p></div></blockquote>OK. I'll change it to "message"<br><blockq=
uote type=3D"cite"><div><p>
(17) Section 7, change "new IKE SA consume" to "new IKE SA to consume."<br>=
</p></div></blockquote>OK.</div><div><blockquote type=3D"cite"><div><p>
(18) Section 7, suggest changing "re-establishment should occur" to either =
"would occur" or "will occur."<br></p></div></blockquote>Agree, but I will =
solve it by moving the whole paragraph to the present tense:</div><div><div=
><br></div><div>&nbsp;&nbsp; Session resumption, specified in [RFC5723], al=
lows the setting up of</div><div>&nbsp;&nbsp; a new IKE SA to consume less =
computing resources. &nbsp;This is</div><div>&nbsp;&nbsp; particularly usef=
ul in the case of a remote access gateway that has</div><div>&nbsp;&nbsp; m=
any tunnels. &nbsp;A failure of such a gateway requires all these many</div=
><div>&nbsp;&nbsp; remote access clients to establish an IKE SA either with=
 the rebooted</div><div>&nbsp;&nbsp; gateway or with a backup. &nbsp;This t=
unnel re-establishment occurs within</div><div>&nbsp;&nbsp; a short period =
of time, creating a burden on the remote access</div><div>&nbsp;&nbsp; gate=
way. &nbsp;Session resumption addresses this problem by having the</div><di=
v>&nbsp;&nbsp; clients store an encrypted derivative of the IKE SA for quic=
k re-</div><div>&nbsp;&nbsp; establishment.</div><div><br></div><blockquote=
 type=3D"cite"><div><p>
(19) Section 8.1, suggest changing "inter-domain VPN gateway" to either add=
 "an" before it or pluralize "gateway."<br></p></div></blockquote>Since the=
 other bullet points are pluralized, I'll go with the former.<br><blockquot=
e type=3D"cite"><div><p>
<br>
<br>
Scott Moonen (<a href=3D"mailto:smoonen@us.ibm.com">smoonen@us.ibm.com</a>)=
<br>
z/OS Communications Server TCP/IP Development<br>
<a href=3D"http://www.linkedin.com/in/smoonen">http://www.linkedin.com/in/s=
moonen</a><br>
<br>
<span>&lt;graycol.gif&gt;</span><font color=3D"#424282">Internet-Drafts---0=
1/10/2011 02:48:33 AM---A New Internet-Draft is available from the on-line =
Internet-Drafts directories. This draft is a work</font><br>
<br>
<font size=3D"2" color=3D"#5F5F5F">From:	</font><font size=3D"2"><a href=3D=
"mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a></font><br>
<font size=3D"2" color=3D"#5F5F5F">To:	</font><font size=3D"2"><a href=3D"m=
ailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a></font><br>
<font size=3D"2" color=3D"#5F5F5F">Cc:	</font><font size=3D"2"><a href=3D"m=
ailto:ipsec@ietf.org">ipsec@ietf.org</a></font><br>
<font size=3D"2" color=3D"#5F5F5F">Date:	</font><font size=3D"2">01/10/2011=
 02:48 AM</font><br>
<font size=3D"2" color=3D"#5F5F5F">Subject:	</font><font size=3D"2">[IPsec]=
 I-D Action:draft-ietf-ipsecme-failure-detection-03.txt</font><br>
<font size=3D"2" color=3D"#5F5F5F">Sent by:	</font><font size=3D"2"><a href=
=3D"mailto:ipsec-bounces@ietf.org">ipsec-bounces@ietf.org</a></font><br>
</p><hr width=3D"100%" size=3D"2" align=3D"left" noshade=3D"" style=3D"colo=
r:#8091A5; "><br>
<br>
<br>
<tt>A New Internet-Draft is available from the on-line Internet-Drafts dire=
ctories.<br>
This draft is a work item of the IP Security Maintenance and Extensions Wor=
king Group of the IETF.<br>
<br>
<br>
		 Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : A Quick Crash Detection Metho=
d for IKE<br>
		 Author(s) &nbsp; &nbsp; &nbsp; : Y. Nir, et al.<br>
		 Filename &nbsp; &nbsp; &nbsp; &nbsp;: draft-ietf-ipsecme-failure-detecti=
on-03.txt<br>
		 Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 23<br>
		 Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 2011-01-09<br>
<br>
This document describes an extension to the IKEv2 protocol that<br>
allows for faster detection of SA desynchronization using a saved<br>
token.<br>
<br>
When an IPsec tunnel between two IKEv2 peers is disconnected due to a<br>
restart of one peer, it can take as much as several minutes for the<br>
other peer to discover that the reboot has occurred, thus delaying<br>
recovery. &nbsp;In this text we propose an extension to the protocol, that<=
br>
allows for recovery immediately following the restart.<br>
<br>
A URL for this Internet-Draft is:<br>
</tt><tt><a href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-=
failure-detection-03.txt">http://www.ietf.org/internet-drafts/draft-ietf-ip=
secme-failure-detection-03.txt</a></tt><tt><br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
</tt><tt><a href=3D"ftp://ftp.ietf.org/internet-drafts/">ftp://ftp.ietf.org=
/internet-drafts/</a></tt><tt><br>
<br>
Below is the data which will enable a MIME compliant mail reader<br>
implementation to automatically retrieve the ASCII version of the<br>
Internet-Draft.<br>
</tt><a href=3D"ftp://anonymous@ftp.ietf.org/internet-drafts/draft-ietf-ips=
ecme-failure-detection-03.txt">ftp://anonymous@ftp.ietf.org/internet-drafts=
/draft-ietf-ipsecme-failure-detection-03.txt</a><tt>_______________________=
________________________<br>
IPsec mailing list<br>
<a href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a><br>
</tt><tt><a href=3D"https://www.ietf.org/mailman/listinfo/ipsec">https://ww=
w.ietf.org/mailman/listinfo/ipsec</a></tt><tt><br>
</tt><br>
</div>
<span>&lt;ATT00001..txt&gt;</span></blockquote></div><br></div></body></htm=
l>=

--_000_8F3501F2B20440E399739BA673D8FF86checkpointcom_--

From ynir@checkpoint.com  Sun Jan 30 00:11:50 2011
Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 642563A68D8 for <ipsec@core3.amsl.com>; Sun, 30 Jan 2011 00:11:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.06
X-Spam-Level: 
X-Spam-Status: No, score=-10.06 tagged_above=-999 required=5 tests=[AWL=0.538,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l-ylh4ZRo21l for <ipsec@core3.amsl.com>; Sun, 30 Jan 2011 00:11:49 -0800 (PST)
Received: from michael.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by core3.amsl.com (Postfix) with ESMTP id 184F23A68AF for <ipsec@ietf.org>; Sun, 30 Jan 2011 00:11:48 -0800 (PST)
X-CheckPoint: {4D451E03-0-1B221DC2-2FFFF}
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by michael.checkpoint.com (8.13.8/8.13.8) with ESMTP id p0U8EwoP008014;  Sun, 30 Jan 2011 10:14:58 +0200
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([194.29.34.26]) with mapi; Sun, 30 Jan 2011 10:14:58 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: Scott C Moonen <smoonen@us.ibm.com>
Date: Sun, 30 Jan 2011 10:14:59 +0200
Thread-Topic: [IPsec] I-D Action:draft-ietf-ipsecme-failure-detection-03.txt
Thread-Index: AcvAVchOYyfuhHW2QAC5Ma1e2ogeFw==
Message-ID: <318F190E-8207-473B-8E83-292117652DA5@checkpoint.com>
References: <20110110074502.22466.22300.idtracker@localhost> <OFA8BE8798.B3640724-ON85257816.0065945B-85257816.007201DF@us.ibm.com> <8F3501F2-B204-40E3-9973-9BA673D8FF86@checkpoint.com>
In-Reply-To: <8F3501F2-B204-40E3-9973-9BA673D8FF86@checkpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_318F190E8207473B8E83292117652DA5checkpointcom_"
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-failure-detection-03.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 30 Jan 2011 08:11:50 -0000

--_000_318F190E8207473B8E83292117652DA5checkpointcom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


On Jan 30, 2011, at 10:00 AM, Yoav Nir wrote:


(13) Page 8, the last line is an orphan.

Not sure what you mean. It says "In any case, the lack of a QCD_TOKEN notif=
ication MUST NOT be taken" and then continues on the next page.

OK. Now that Yaron has helped me figure out what an "orphan" is, this is au=
tomatic output from the XML2RFC utility. I think the RFC editor takes care =
of this before publication.

Yoav


--_000_318F190E8207473B8E83292117652DA5checkpointcom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
 space; -webkit-line-break: after-white-space; "><br><div><div>On Jan 30, 2=
011, at 10:00 AM, Yoav Nir wrote:</div><br class=3D"Apple-interchange-newli=
ne"><blockquote type=3D"cite"><div style=3D"word-wrap: break-word; -webkit-=
nbsp-mode: space; -webkit-line-break: after-white-space; "><div><div><block=
quote type=3D"cite"><div><p>(13) Page 8, the last line is an orphan.<br></p=
></div></blockquote>Not sure what you mean. It says "In any case, the lack =
of a QCD_TOKEN notification MUST NOT be taken" and then continues on the ne=
xt page.<br></div></div></div></blockquote><br></div><div>OK. Now that Yaro=
n has helped me figure out what an "orphan" is, this is automatic output fr=
om the XML2RFC utility. I think the RFC editor takes care of this before pu=
blication.</div><div><br></div><div>Yoav</div><br></body></html>=

--_000_318F190E8207473B8E83292117652DA5checkpointcom_--
