Although I am co-chair of ipsecme, please treat these comments as an
individual's.
In general I think a minimal subset of IKEv2 can be very useful. But I
wonder if this is too minimal:
• Bidirectional operation is one of the main advantages of IKE/IPsec
over TLS, so I think allowing only a client-server model is a major
omission. People will want to implement meshes of these small devices.
In your example, the lawnmower talks to the garage door to let it out...
• Raw public keys have very few advantages over shared keys. In a mesh,
you still need to provision all N (public) keys into each of N devices.
On the other hand, certificates (despite their well known problems)
allow for much simpler provisioning, when you need to provision a closed
group of devices and you generate your own CA. What I'd really want is a
profile of 5280 where you just sign the public key but cut off all the
identity and extensions crap. Unfortunately this is unlikely to ever
materialize.
Some Detailed Comments
• Responding to Create Child SA: does it really matter if you respond
with a "syntax error" (i.e. you don't recognize this exchange at all) or
with "no additional SAs"? The sender will tear down the IKE SA anyway.
• Why not omit AH from the minimal implementation?
• I don't understand why Appendix A is needed. And if it is, I don't
think the Cert Request and Cert payloads should be included, if they're
not supported included in the profile.
• Seems to me you should include PRF_HMAC_SHA2_256.
• A.8: For the AUTH payload you can omit DSS.
• Is ID_RFC822_ADDR relevant for this type of devices?
• B.1: I think the Delete payload is not just "nice to have", because
otherwise you have a major resource leak on the server. Which implies
the device needs to send *three* exchange types.
• B.2: "Using Raw Public Keys is much simpler, and it allows similar
scalability than certificates." As noted above, this is true for
client-server setup but not for a meshed group of peers.
Thanks,
Yaron
_______________________________________________
Lwip mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lwip