Jari Arkko writes:
 > As we point out in section 3.8 the current
 > cellular networks sometimes have dynamic IP
 > address changes, and therefore manually keyed IPsec
 > isn't going to work as such and key management is
 > needed. While there might be multiple options
 > here, interoperability is a concern and hence
 > I feel that we must have a mandated key management
 > scheme. In the cellular host requirements draft, we
 > have chosen to say that IKE is a MUST in those
 > cases where we mandate IPsec. Do you disagree?

   I don't know; it depends on what you're trying
   to accomplish. Is there a reason that you must
   choose one? I agree that dynamic addresses makes
   manual keying problematic, but I'm not sure that
   it follows that you need to pick one keying
   scheme. Even with IKE, there's room for
   interoperability issues (some might say far
   too much room, but I digress). 

 > (In a way you could say that the cellular draft goes
 > *beyond* what the current IETF MUSTs are, given
 > that we mandate a full security solution in all cases,
 > though at the same time we don't mandate the current
 > requirement of AH and ESP in all cases.)

   Well, at its base it's about what needs to be
   implemented, right? 

 > Anyway, this is just *our* proposal on what we think
 > would make sense. But the document is controlled by the
 > WG; please state your proposed security MUSTs for
 > IPv6 hosts, cellular or otherwise. Mike, what would you
 > like to have there, for instance?

   My personal feeling is that the ng working
   group has the consensus about right. We need
   a base level set of mechanisms for protecting
   IP packets. Since this is normally kernel
   level work, having a strong statement here
   is useful. And while I think there's pretty good 
   consensus that IPsec (eg, not IKE) is a
   a stable and mature, there's equally good
   consensus that IKE is not. Given KINK and
   JFK/IKEv2 -- not to mention how widespread
   transport mode keying really gets deployed -- 
   I'm not sure that I'd want to choose any one
   at this point. I personally think that the
   Kerberos based keying is well suited to 
   high fan out  kinds of applications like
   telephony, but I wouldn't claim that it is
   the only way (or The Way) to approach the
   problem of keying.

              Mike
--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to