Hi all.
Yet another batch of issues that we wish to close.
Issue #140 - No SPD entry for transport mode
============================================
Section 2.23.1: If the responder doesn't find SPD entry for transport mode with
the modified traffic selectors, and does a lookup with the original selectors,
if it finds an entry for transport mode, can it use it? (And would that screw
up the initiator processing of the reply? Unfortunately, this question is
relevant for RFC 5555...)
Pasi and Tero had a discussion about this on list. Apparently, the strange
scenario is with a multi-homed host, where IKE went through one interface,
while IPsec went through another, so that IKE was NATted, but IPsec was not.
Tero thinks such a case would never work, while Pasi thinks it is allowed by
RFC 4301 (though probably won't work with most implementations)
I think the scenario is so far-fetched (because discovering NAT in IKE makes
IPsec UDP-encapsulated), that we can afford to ignore it for now. If it comes
up in real life, somebody will get the opportunity to write an extension
document.
Unless people feel strongly otherwise, I suggest we close this issue in a
couple of days without text changes.
Issue #148 - Historical Cookie Discussion
=========================================
In 2.6, first paragraph: the historical discussion going back to the previous
century is very confusing to a newcomer: instead of saying what a cookie is, we
tell a story. I suggest to remove this discussion or move it to the end of the
section.
Can we separate the cookie discussion into its own subsection? For two reasons:
it is an implementation hint, rather than a specification (as opposed to the
normative text on SPIs earlier in 2.6); and it is not very important, given the
prevalence of DDos.
Both me and Pasi said we were not confused by this, and nobody else chimed in.
I agree with Pasi - the path of least resistance is to leave it as is.
Issue #150 - What happens if the peer receives TEMPORARY_FAILURE and ...
========================================================================
2.8.2: we should add a sentence on what happens if the peer receives
TEMPORARY_FAILURE and does not understand it (because it's new to this spec).
Keith explained how this issue came about. In any case, I think this can be
closed with an addition of the following short paragraph:
Support of the TEMPORARY_FAILURE notification is not negotiated, so older
peers may get it. In that case, they will treat it as any other unknown
error notification and fail the exchange. Since the other peer has
already rekeyed the exchange, this does not have any ill effects.
Again, if you object to this, please speak up now.
Issue #151 - Explicit calculation of AUTH
=========================================
2.16: it would be useful if we added the explicit calculation of AUTH. For
example, is the padding string required for EAP as well? There are two cases,
with MSK and with SK_pi+SK_pr.
No discussion for this issue.
I suggest the following paragraph should be added to section 2.15, right after
the explicit AUTH calculation (added here for clarity):
For the initiator:
AUTH = prf( prf(Shared Secret, "Key Pad for IKEv2"),
<InitiatorSignedOctets>)
For the responder:
AUTH = prf( prf(Shared Secret, "Key Pad for IKEv2"),
<ResponderSignedOctets>)
For EAP authentication (see [Section 2.16]), there are two cases. If the
EAP method is key-generating, substitute "MSK" for "Shared Secret" above.
For non-key-generating methods, use SK_pi and SK_pr for the two formulas
above respectively.
Would this satisfy everybody?
Issue #152 - EAP failure and acknowledgement
============================================
2.16: if the responder sends an EAP Failure, is this IKE message acknowledged
by the initiator?
Yaron & Tero discussed this a bit, and the conclusion was to change the text in
2.21 as follows
Before:
Only authentication failures (AUTHENTICATION_FAILED) and malformed
messages (INVALID_SYNTAX) lead to a deletion of the IKE SA without
requiring an explicit INFORMATIONAL exchange carrying a DELETE
payload. Other error conditions MAY require such an exchange if
policy dictates that this is needed.
After:
Only authentication failures (AUTHENTICATION_FAILED and EAP failure) and
Malformed messages (INVALID_SYNTAX) lead to a deletion of the IKE SA
Without requiring an explicit INFORMATIONAL exchange carrying a DELETE
payload. Other error conditions MAY require such an exchange if
policy dictates that this is needed.
And also add at the end of 2.16:
If the exchange is terminated with EAP Failure, an AUTHENTICATION_FAILED
notification is not sent.
Unless anybody objects, we will make these changes in the draft.
Yoav
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec