Hi Paul,

>     If this payload is sent in IKE_SA_INIT, it would apply to all
>     subsequent
>     CHILD_SAs, potentially restricting flexibility. I wonder whether
>     placing it
>     in CREATE_CHILD_SA or IKE_AUTH would be more appropriate, to allow
>     per-CHILD_SA PFS negotiation.
> 
>     I remember the use case Valery used to mention if the SA is short
>     lived no
>     need for pfs.
> 
>     >
>     >    Initiator                         Responder
>     >    -------------------------------------------------------------------
>     >    HDR, SAi1, KEi, Ni 
>     >              N(EARLY_CHILD_PFS_INFO) -->
>     >
>     >                              <--  HDR, SAr1, KEr, Nr, [CERTREQ],
>     >                                              N(EARLY_CHILD_PFS_INFO)
> 
>     what is in the payload EARLY_CHILD_PFS_INFO is it single value or list?
>     I propse a list.
> 
> 
> You actually raise an important issue. Since some common (eg Windows) OS
> do not support IDr,
> putting the payload in IKE_SA_INIT won't work. There is a fair chance
> that the responder does not
> yet know which configuration to match up with the IKE_SA_INIT, so it
> does not know which of its
> connection configurations will apply.

This should have nothing to do with the connection config.  The notify
has no data associated with it.  It's only about whether the two
**implementations** support handling KE methods in proposals during
IKE_AUTH.  The actual proposals that are compared are still from the
configs selected during IKE_AUTH (based on the available identities).

Regards,
Tobias

_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to