[IPsec] Fwd: New Version Notification for draft-reddy-ipsecme-ikev2-pqc-auth-00.txt

2024-05-16 Thread tirumal reddy
Hi all,

The new draft,
https://www.ietf.org/archive/id/draft-reddy-ipsecme-ikev2-pqc-auth-00.html
outlines how post-quantum digital signatures, specifically ML-DSA and
SLH-DSA, can be employed as authentication methods within the IKEv2
protocol.

Comments and suggestions are welcome.

Cheers,
-Tiru

-- Forwarded message -
From: 
Date: Thu, 16 May 2024 at 11:22
Subject: New Version Notification for
draft-reddy-ipsecme-ikev2-pqc-auth-00.txt
To: Tirumaleswar Reddy.K , Scott Fluhrer <
sfluh...@cisco.com>, Valery Smyslov 


A new version of Internet-Draft draft-reddy-ipsecme-ikev2-pqc-auth-00.txt
has
been successfully submitted by Tirumaleswar Reddy and posted to the
IETF repository.

Name: draft-reddy-ipsecme-ikev2-pqc-auth
Revision: 00
Title:Signature Authentication in the Internet Key Exchange Version 2
(IKEv2) using PQC
Date: 2024-05-16
Group:Individual Submission
Pages:9
URL:
https://www.ietf.org/archive/id/draft-reddy-ipsecme-ikev2-pqc-auth-00.txt
Status:
https://datatracker.ietf.org/doc/draft-reddy-ipsecme-ikev2-pqc-auth/
HTML:
https://www.ietf.org/archive/id/draft-reddy-ipsecme-ikev2-pqc-auth-00.html
HTMLized:
https://datatracker.ietf.org/doc/html/draft-reddy-ipsecme-ikev2-pqc-auth


Abstract:

   Signature-based authentication methods are utilized in IKEv2
   [RFC7296].  The current version of the Internet Key Exchange Version
   2 (IKEv2) protocol supports traditional digital signatures.

   This document outlines how post-quantum digital signatures,
   specifically Module-Lattice-Based Digital Signatures (ML-DSA) and
   Stateless Hash-Based Digital Signatures (SLH-DSA), can be employed as
   authentication methods within the IKEv2 protocol.  It introduces ML-
   DSA and SLH-DSA capability to IKEv2 without necessitating any
   alterations to existing IKE operations.



The IETF Secretariat
___
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org


Re: [IPsec] Shepherd review of the draft-ietf-ipsecme-add-ike

2023-01-31 Thread tirumal reddy
On Tue, 31 Jan 2023 at 13:49, Valery Smyslov  wrote:

> Hi Tero,
>
> thank you for the review. Please see inline.
>
> > Here are some my review comments while reading
> > draft-ietf-ipsecme-add-ike:
> >
> > --
> > The text in section 3.1 should say that if length is 0, then no
> > Service Priority, Num Addresses etc fields are present.
> >
> > I.e., add text in first bullet under Length saying that if length is
> > zero, then later fields are not present.
>
> Makes sense.
>
> > --
> >
> > Also the text in Num Addresses indicate that it would be valid to send
> > CFG_REQUEST with proposed Service Priority, but having Num Addresses
> > set to zero?
> >
> > Is this intended? I.e., is the client allowed to request data, but not
> > propose IP address? If so, perhaps add sentence to Num Addresses
> > explaining that it can be 0 for CFG_REQUEST when no specific address
> > is request, but other parameters are requested.
>
> Hm... I think my co-authors can comment on this.
>
> > --
> >
> > In IP Address(es) explictly mention that it is field contain 4 octet
> > IPv4 addresses, or 16 octet IPv6 address without any delimeters etc.
> > This can be derived from the calculation of the length field, but I
> > think it should be mentioned here, even when it is obvious.
>
> OK.
>
> > --
> >
> > In section 3.2 it is not clear what the length of the Hash Algorithm
> > Identifiers fields is. It contains list of hash algorithms or one hash
> > algorithm if this is response, but it is not clear what is response.
>
> What was meant is that a list of hashes is sent by a client (in
> CFG_REQUEST) and
> a single hash is sent by a server (in CFG_REPLY).
>
> > We have CFG_REQUEST, CFG_REPLY, CFG_SET, and CFG_ACK. Most likely
> > CFG_REPLY and CFG_ACK are sent in IKE exchange response. On the other
> > hand CFG_SET is usually used to set the parameters, thus the
> > Certificate Digest would be required there.
>
> True, but IKEv2 doesn't currently use CFG_SET/CFG_ACK and
> it explicitly allows implementations to ignore them.
>
> > I would assume that there is only one Hash Algorithm Identifier for
> > CFG_REPLY and CFG_SET, and then the Certificate Digest field is
> > present. For CFG_REQUEST the Hash Algorithm Identifier is a list of
> > two octet hash algorithm identifiers and the Certificate field is
> > omitted. For the CFG_ACK only first 4 octets are included and Length
> > is set to zero.
> >
> > I think it would be better to split the Figure 2 to three different
> > figures:
> >
> >
> > 1   2   3
> > 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
> >+-+-+---+
> >|R| Attribute Type  |Length |
> >+-+-+---+---+
> >|RESERVED   |  ADN Length   |
> >+---+---+
> >~  Authentication Domain Name   ~
> >+---+
> >~  Hash Algorithm Identifier (2 octets) ~
> >+---+
> >~ Certificate Digest~
> >+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >
> >   Figure 2: ENCDNS_DIGEST_INFO Attribute Format for CFG_REPLY and CFG_SET
> >
> >
> >
> > 1   2   3
> > 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
> >+-+-+---+
> >|R| Attribute Type  |Length |
> >+-+-+---+---+
> >|RESERVED   |  ADN Length   |
> >+---+---+
> >~  Authentication Domain Name   ~
> >+---+
> >~  List of Hash Algorithm Identifiers   ~
> >+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >
> >  Figure 3: ENCDNS_DIGEST_INFO Attribute Format for CFG_REQUEST
> >
> > 1   2   3
> > 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
> >+-+-+---+
> >|R| Attribute Type  |Length |
> >+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> >
> >  Figure 4: ENCDNS_DIGEST_INFO Attribute Format for CFG_ACK.
> >
> > and then explain the Hash Algorithm Identifier and List of Hash
> 

Re: [IPsec] IPR Poll RE: Shepherd write-up information for draft-ietf-ipsecme-add-ike

2023-01-30 Thread tirumal reddy
I am not aware of any IPR that applies to this draft.

Cheers,
-Tiru


On Mon, 30 Jan 2023 at 12:00,  wrote:

> Hi all,
>
> As a input to the writeup, we are replying to the IPR poll on-list.
>
> I don't have any IPR nor I'm aware of any related to this draft.
>
> My co-authors replies will follow soon.
>
> Cheers,
> Med
>
> > -Message d'origine-
> > De : Tero Kivinen 
> > Envoyé : dimanche 29 janvier 2023 18:01
> > À : draft-ietf-ipsecme-add-...@ietf.org
> > Objet : Shepherd write-up information
> >
>
>
> _
>
> Ce message et ses pieces jointes peuvent contenir des informations
> confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez
> recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages
> electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou
> falsifie. Merci.
>
> This message and its attachments may contain confidential or privileged
> information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and
> delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been
> modified, changed or falsified.
> Thank you.
>
>
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] WGLC of draft-ietf-ipsecme-add-ike

2022-08-11 Thread tirumal reddy
Thanks Tommy for the detailed review. Proposed changes look good to me.

Cheers,
-Tiru

On Wed, 10 Aug 2022 at 22:03, Tommy Pauly 
wrote:

> I’ve done a review pass of this document. In general, I think it is
> technically good.
>
> I did find several places where I think additional clarity or editorial
> improvements could be made. To address these, I’ve proposed the following
> pull request:
> https://github.com/boucadair/draft-ietf-ipsecme-add-ike/pull/5
>
> Some of the revenant items I am trying to address are:
> - Make it more clear early on that the attributes are generically
> communicating encrypted DNS resolvers, and don’t define specific details
> for DoH/DoT/DoQ (that comes from the SVCB-DNS draft)
> - Be more explicit about how ENCDNS_IP* are two specific types, ENCDNS_IP4
> and ENCDNS_IP6
> - Introduce and explain ENCDNS_DIGEST_INFO earlier on. Currently, it is
> defined with no explanation until a later section.
> - Clarify the behavior of the initiator for including ENCDNS_IP*
> attributes. Specifically, I believe this is intended to be: either include
> exactly one empty ENCDNS_IP* attribute of a given type to request “any”
> encrypted DNS resolver on that address family; OR, include one or more of
> that type with hints about the addresses and APNs being requested. This was
> implied by the text previously, but not clear.
>
> If these items are addressed, I’m happy to see this progress.
>
> Thanks,
> Tommy
>
> On Aug 9, 2022, at 1:47 PM, Tero Kivinen  wrote:
>
> This is the start of 2 week WGLC on the document, ending 2022-08-17.
> Please submit your comments to the list, also send a note if you have
> reviewed the document, so we can see how many people are interested in
> getting this out.
> --
> kivi...@iki.fi
>
> ___
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
>
> ___
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike

2021-11-10 Thread tirumal reddy
I support adoption of the draft.


-Tiru


On Mon, 8 Nov 2021 at 19:58,  wrote:

> Hi Tero, all,
>
> I support adoption.
>
> FWIW, I'm not aware of any IPR related to this I-D.
>
> Cheers,
> Med
>
> > -Message d'origine-
> > De : IPsec  De la part de Tero Kivinen
> > Envoyé : lundi 8 novembre 2021 15:17
> > À : ipsec@ietf.org
> > Objet : [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike
> >
> > This is the start of 2 week WG adoption call for this document, ending
> > 2021-11-22. Please send your reply about whether you support adopting
> this
> > document as WG document or not.
> > --
> > kivi...@iki.fi
> >
> > ___
> > IPsec mailing list
> > IPsec@ietf.org
> > https://www.ietf.org/mailman/listinfo/ipsec
>
>
> _
>
> Ce message et ses pieces jointes peuvent contenir des informations
> confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez
> recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages
> electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou
> falsifie. Merci.
>
> This message and its attachments may contain confidential or privileged
> information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and
> delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been
> modified, changed or falsified.
> Thank you.
>
>
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec