Re: [IPsec] Issue #156: SHOULD generate and accept which types?

2010-01-21 Thread Valery Smyslov
Black David writes: > > If it means all the listed types, the sentence should be changed to > "Implementations SHOULD > > also be capable of generating ID_IPV6_ADDR, ID_DER_ASN1_DN, and > ID_DER_ASN1_GN." > > Which I think amounts to a SHOULD for certificate support. Is there a > good reason to

Re: [IPsec] Issue #156: SHOULD generate and accept which types?

2010-01-21 Thread Valery Smyslov
Paul Hoffman writes: > Section 3.5 lists a bunch of ID types (ID_IPV4_ADDR, ID_FQDN, ID_RFC822_ADDR, ID_IPV6_ADDR, ID_DER_ASN1_DN, ID_DER_ASN1_GN, and ID_KEY_ID), and then says: > > Two implementations will interoperate only if each can generate a type of ID acceptable to the other. To assure maxi

Re: [IPsec] Issue #139: Keying material taken in the order for RoHC

2010-01-21 Thread Valery Smyslov
> > So, I think it is better to rely on RFC4301 here and leave 3rd bullet out. > > That also works for the GCM and CCM examples because their necessary details > are already specified in the GCM and CCM RFCs. GCM and CCM actually take salt > values for nonces (as opposed to the nonces themselves f

Re: [IPsec] Issue #156: SHOULD generate and accept which types?

2010-01-21 Thread Paul Hoffman
At 9:17 PM -0500 1/21/10, wrote: >Paul, > >> What does "Implementations SHOULD be capable of generating and >accepting all of these types" mean? > >It's hair-splitting time ... > >> To assure maximum interoperability, implementations MUST be >configurable to send at least one of >> ID_IPV4_ADDR, I

Re: [IPsec] Issue #156: SHOULD generate and accept which types?

2010-01-21 Thread Black_David
Paul, > What does "Implementations SHOULD be capable of generating and accepting all of these types" mean? It's hair-splitting time ... > To assure maximum interoperability, implementations MUST be configurable to send at least one of > ID_IPV4_ADDR, ID_FQDN, ID_RFC822_ADDR, or ID_KEY_ID, and MU

[IPsec] Issue #156: SHOULD generate and accept which types?

2010-01-21 Thread Paul Hoffman
Section 3.5 lists a bunch of ID types (ID_IPV4_ADDR, ID_FQDN, ID_RFC822_ADDR, ID_IPV6_ADDR, ID_DER_ASN1_DN, ID_DER_ASN1_GN, and ID_KEY_ID), and then says: Two implementations will interoperate only if each can generate a type of ID acceptable to the other. To assure maximum interoperability, imp

Re: [IPsec] Issue #139: Keying material taken in the order for RoHC

2010-01-21 Thread Black_David
> > > This leaves out the third bullet, i.e. "3) if single protocol has both > > > encryption and authentication keys, the encryption key is taken first > > > and the authentication key after the encryption key." > > > > This bullet is probably superfluous and incomplete. > > > > First, RFC4301 alr

Re: [IPsec] Issue #139: Keying material taken in the order for RoHC

2010-01-21 Thread Bill_Lofmark
Unsubscribe - Original Message - From: ipsec-boun...@ietf.org To: Valery Smyslov Cc: IPsecme WG ; Yoav Nir ; Paul Hoffman Sent: Thu Jan 21 15:47:14 2010 Subject: Re: [IPsec] Issue #139: Keying material taken in the order for RoHC Valery Smyslov writes: > > This leaves out the third bu

Re: [IPsec] Issue #139: Keying material taken in the order for RoHC

2010-01-21 Thread Tero Kivinen
Valery Smyslov writes: > > This leaves out the third bullet, i.e. "3) if single protocol has both > > encryption and authentication keys, the encryption key is taken first > > and the authentication key after the encryption key." > > This bullet is probably superfluous and incomplete. > > First,

[IPsec] Issue #155: SHOULD send triggering packet and interoperability

2010-01-21 Thread Paul Hoffman
In the sectioon 2.9 the "SHOULD" requirement was removed for the very specific traffic selector as fist traffic selector. I think that "SHOULD" requirement needs to be kept, as it affects interoperability, as if other end does not include that triggering packet then certain policies cannot interop

Re: [IPsec] Comments to draft-ietf-ipsecme-ikev2bis-07.txt

2010-01-21 Thread Paul Hoffman
At 5:05 PM +0200 1/21/10, Tero Kivinen wrote: All changes made other than the following. >-- > >Section 2.8.2 there was removed paragraph: > > However, there is a twist to the other case where one rekeying > finishes

Re: [IPsec] IKEv2-bis, comments up to 2.16

2010-01-21 Thread Paul Hoffman
At 11:08 AM +0200 1/21/10, Tero Kivinen wrote: >Yaron Sheffer writes: >> > 1.4.1: the last paragraph springs a surprise by defining the behavior >> > of IKE SA deletion while discussing an unlikely "messing up" of Child >> > SAs. IKE SA deletion deserves its own subsection. >> > >> > [[ Response: i

Re: [IPsec] Issue #139: Keying material taken in the order for RoHC

2010-01-21 Thread Valery Smyslov
Tero Kivinen writes: > I think this generic rule was good in the RFC4306, as it makes it > definite how keying material is derived even when there are multiple > extensions present. Removing that in the IKEv2bis does not gain us > anything, but will remove text that is then needed to be copied to

[IPsec] Comments to draft-ietf-ipsecme-ikev2bis-07.txt

2010-01-21 Thread Tero Kivinen
It seems my number of lines in comment emails is going down (it was 1300 lines, then 950 lines, and now only 240 lines) so hopefully we are getting closer to the get ready... -- In section 2.6 there is typo: Also,

[IPsec] Regarding aes-xcbc hashing using multiple ring entries

2010-01-21 Thread sudheer anumolu
Hi I would like to have information on aes-xcbc-mac96 hashing using multiple ring entries. I need to implement MD5, SHA-1 and AES-XCBC-MAC96 hashing algorithms using multiple ring entries of the IPSec block. For md5 and sha-1 the hash results i get, tally with that of results generated when done

Re: [IPsec] Issue #139: Keying material taken in the order for RoHC

2010-01-21 Thread Tero Kivinen
Yoav Nir writes: > I think extensions such as RoHC that change (or extend) the way > keying material is generated, should and do specify how it is done. > Leaving that text there becomes a recommendation for future draft > writers, which I think is superfluous. RoHC has text which explains how t

Re: [IPsec] Issue #152: EAP failure and acknowledgement

2010-01-21 Thread Yaron Sheffer
Also add at the end of the relevant paragraph of 2.16: "If the exchange is terminated with EAP Failure, an AUTHENTICATION_FAILED notification is not sent." Thanks, Yaron > -Original Message- > From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf > Of Tero Kivine

Re: [IPsec] Issue #152: EAP failure and acknowledgement

2010-01-21 Thread Tero Kivinen
Yoav Nir writes: > We do have this: > > The >responder MAY at any time terminate the IKE exchange by sending an >EAP payload containing the Failure message. > > I guess "terminate" means that the initiator does not send any m

Re: [IPsec] IKEv2-bis, comments up to 2.16

2010-01-21 Thread Tero Kivinen
Yaron Sheffer writes: > > 1.4.1: the last paragraph springs a surprise by defining the behavior > > of IKE SA deletion while discussing an unlikely "messing up" of Child > > SAs. IKE SA deletion deserves its own subsection. > > > > [[ Response: it is optional behavior and makes sense. If you want

Re: [IPsec] Issue #139: Keying material taken in the order for RoHC

2010-01-21 Thread Valery Smyslov
Hi Yoav, > I think extensions such as RoHC that change (or extend) the way keying material is generated, should and do specify how it is done. I don't think so. If multiple protocols are involves, the way how (in which order) each of them obtains its key from IKE keying material is in general out

Re: [IPsec] Issue #139: Keying material taken in the order for RoHC

2010-01-21 Thread Yoav Nir
I think extensions such as RoHC that change (or extend) the way keying material is generated, should and do specify how it is done. Leaving that text there becomes a recommendation for future draft writers, which I think is superfluous. I think we should leave the text as it is. On Jan 19, 20