Paul, Thanks, but now I'm confused by an answer Tero provided to a slightly different question back in July of 2007 (subject [Ipsec] Comments on draft-hoffman-ikev2bis-01.txt). From Tero's answer I had expected to see something that would disallow using those encoding types if you did not receive the HTTP_CERT_LOOKUP_SUPPORTED. See below.
> Since an implementation MUST be capable of being configured to send and
> accept the first two Hash and URL formats it's seems to follow that an
> implementation also MUST support HTTP certificate lookup (making the
> HTTP_CERT_LOOKUP_SUPPORTED notification extraneous). I believe the
intent
> is for HTTP certificate lookup support to be optional but a clarification
> to that effect would be helpful.
HTTP_CERT_LOOKUP_SUPPORTED is not extraneous, as it tells whether the
other end is CONFIGURED to allow HTTP lookups for the certificates.
> Assuming HTTP certificate lookup support is optional, how should an
> implementation handle receipt of a CERT payload containing either of the
> Hash and URL formats (or any other unsupported encoding)? Presumably the
> implementation should ignore the certificate payload in this case. Is
> that correct?
If you receive certificate payload you cannot process you can ignore
it and try to see if you can still authenticate the other end. If you
happen to have the certificate for the other end for some other reason
(preconfiguration, cached by previous session etc) then you can
authenticate the other end, if you do not have the certificate you
will fail the authentication.
Dave Wierbowski
z/OS Comm Server Developer
Phone:
Tie line: 620-4055
External: 607-429-4055
Paul Hoffman
<paul.hoff...@vpn
c.org> To
Sent by: David Wierbowski/Endicott/i...@ibmus
ipsec-boun...@iet cc
f.org [email protected],
[email protected]
Subject
05/22/2009 11:57 Re: [IPsec]
AM HTTP_CERT_LOOKUP_SUPPORTED question
At 11:52 AM -0400 5/22/09, David Wierbowski wrote:
>Why?
Because there is nothing in the document to indicate that it is invalid.
HTTP_CERT_LOOKUP_SUPPORTED is only mentioned twice in RFC 4306:
Certificate payloads SHOULD be included in an exchange if
certificates are available to the sender unless the peer has
indicated an ability to retrieve this information from elsewhere
using an HTTP_CERT_LOOKUP_SUPPORTED Notify payload.
. . .
HTTP_CERT_LOOKUP_SUPPORTED 16392
This notification MAY be included in any message that can
include a CERTREQ payload and indicates that the sender is
capable of looking up certificates based on an HTTP-based
URL (and hence presumably would prefer to receive
certificate specifications in that format).
Neither of those make it sound like it is required before sending type 12
or 13 certificates.
--Paul Hoffman, Director
--VPN Consortium
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec
<<inline: graycol.gif>>
<<inline: pic51011.gif>>
<<inline: ecblank.gif>>
_______________________________________________ IPsec mailing list [email protected] https://www.ietf.org/mailman/listinfo/ipsec
