Re: [IPsec] Update to RFC4307 too?

2013-11-01 Thread Michael Richardson
--=-=-= {catching up on old email} Tero Kivinen wrote: > Fix PRF_AES128_CBC to PRF_AES128_XCBC and downgrade it from SHOULD+ to SHOULD. this is the only one which I didn't understand. Michael Richardson -on the road- --=-=-= Content-Type: application/pgp-signature -BEGIN PGP SIG

Re: [IPsec] AD VPN: discussion kick off

2013-11-01 Thread Michael Richardson
requests might accomplish this witho= ut=20 new kernel code. Michael Richardson =2Don the road- --=-=-= Content-Type: application/pgp-signature -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAABAgAGBQJSdA2iAAoJEKD0KQ7Gj3P2TSgIAKstL3ktU0yg18WbKEcLAZgo Jk1+kz3uhC

Re: [IPsec] Call for adoption: draft-kivinen-ipsecme-ikev2-rfc5996bis-01

2013-10-18 Thread Michael Richardson
FC). A draft already exists, thanks Tero [1]. If we do > not hear significant objections, we would like to adopt the document as > a WG document by Monday, Oct. 21. +1. -- Michael Richardson , Sandelman Software Works pgpItZpptoFpN.pgp Descript

[IPsec] virtual interim meetings and "freeconference"

2013-10-17 Thread Michael Richardson
NSE FROM PRIMUS SUPPORT AGENT - >Hello Michael, > >We have got the routing checked and found that we will not be able to >complete this call to conference bridge at +1 712-775-7400 due to that NPA >NXX being locked. This is likely due to high toll costs. -- Michael

Re: [IPsec] Virtual Interim on two AD VPN drafts: Call-in details

2013-10-09 Thread Michael Richardson
Michael Richardson wrote: >> The call-in details are: >> Tele: +1 712-775-7400 >> Code: 809604# mcr> Two LD suppliers (entirely different phones) tell me that I can not reach mcr> this number from my line. I wonder if this exchange has an inflate

Re: [IPsec] Virtual Interim on two AD VPN drafts: Call-in details

2013-10-09 Thread Michael Richardson
Paul Hoffman wrote: > The call-in details are: > Tele: +1 712-775-7400 > Code: 809604# Two LD suppliers (entirely different phones) tell me that I can not reach this number from my line. I'm gonna try Google Talk now. (and I guess it's really in an hour

Re: [IPsec] NUDGE: Reviewing the AD VPN drafts

2013-10-03 Thread Michael Richardson
s to shortcut things like media traffic, then it might be okay. The media setup protocol may be able to deal with the changes to the addresses/port numbers. -- ] Never tell me the odds! | ipv6 mesh networks [ ] Michael Richardson, Sandelman Software Works

Re: [IPsec] NUDGE: Reviewing the AD VPN drafts

2013-10-03 Thread Michael Richardson
't think it matters a hoot if the ADS can do IPsec. It's IKE. IKE is a UDP based protocol, and if you remove the IPsec requirement, it's just another deamon. It is the *HUB* and the *SPOKES* where I think one wants to remove as many moving parts as possible, and in particular, remove a

Re: [IPsec] NUDGE: Reviewing the AD VPN drafts

2013-10-03 Thread Michael Richardson
-ipsecme-ad-vpn-protocol and while conceptually I found it okay, I think that the protocol should be inside IKE. -- Michael Richardson , Sandelman Software Works pgprjsXLRvFmf.pgp Description: PGP signature ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

Re: [IPsec] Fwd: [Technical Errata Reported] RFC4543 (3643)

2013-08-12 Thread Michael Richardson
or IPv4. I see. Sounds reasonable. Too bad the AES_GMAC designers didn't truncate more. -- Michael Richardson , Sandelman Software Works pgpm1zlpkLhCX.pgp Description: PGP signature ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

Re: [IPsec] comments on draft-sathyanarayan-ipsecme-advpn-00

2013-07-30 Thread Michael Richardson
ateway forwards a > particular slice of traffic to the Internet, so the spoke gateway might > as well forward to the Internet all by itself. There should be some > consideration given to NATs (like if the spoke was protecting RFC-1918 > addresses, and the center gateway w

Re: [IPsec] Comments on draft-ietf-ipsecme-ikev2-fragmentation-00

2013-07-29 Thread Michael Richardson
Please note that fragmentation below UDP is unpopular among IPv6. http://www.ietf.org/proceedings/87/slides/slides-87-6man-2.pdf -- Michael Richardson , Sandelman Software Works pgpFULMTrmYtm.pgp Description: PGP signature ___ IPsec mailing

[IPsec] comments on draft-sathyanarayan-ipsecme-advpn-00

2013-07-29 Thread Michael Richardson
Appendix A.2. I'm glad you took the suggestion of having the shortcut be learned incrementally. Re: the situation in A.3. If officeGW realizes that peer1 and peer2 are in fact on the same subnet, etc. is there any way for it to tell them to create a "bypass" between them?

[IPsec] comments on mao-ipsecme-ad-vpn

2013-07-29 Thread Michael Richardson
l initiate to the appropriate other spoke and do full IKEv2, including authentication? I think that I have missed where the ADC spoke is told by the ADC client where it is supposed to redirect to. -- Michael Richardson , Sandelman Software Works

[IPsec] questions about ipsecme-mpsa

2013-07-29 Thread Michael Richardson
;s traffic to CPE_C. Where are the tunnel outer information configured? It seems to me at least some traffic selectors are needed. -- Michael Richardson , Sandelman Software Works pgpGiFd5KGg45.pgp Description: PGP signature ___ IPsec mailing

Re: [IPsec] IPR Disclosure: Certicom Corporation's Statement about IPR related to draft-ietf-ipsecme-dh-checks-04

2013-05-10 Thread Michael Richardson
validate n and thirdly validate e and n are consistent with each other. In order to validate the public exponent e, use of made of the fact that the exponent 2<=e<=2(k I can not speculate as to whether there is prior art, but it seems to match what we have been discussing. -- M

Re: [IPsec] IPsecME virtual interim meeting

2013-04-27 Thread Michael Richardson
gree that the problem likely needs be solved in a standard way. -- ] Never tell me the odds! | ipv6 mesh networks [ ] Michael Richardson, Sandelman Software Works| network architect [ ] m...@sandelman.ca http://www.sand

Re: [IPsec] New WG Last Call for draft-ietf-ipsecme-dh-checks

2013-04-21 Thread Michael Richardson
ul> Based on the amount of new material, I want to have another Paul> (albeit shorter) WG Last Call for this new version of the Paul> draft. Please send comments to the WG by Monday, April The additional material seems clear enough to me. -- ] Never tell me th

Re: [IPsec] NUDGE: WG Last Call for draft-ietf-ipsecme-dh-checks

2013-04-16 Thread Michael Richardson
check that the peer's public value is in range (1 < r < p-1). This option is more appropriate if conformance to [NIST-800-56A] is not required. -- ] Never tell me the odds! | ipv6 mesh networks [ ] Michael Richardson, Sandelman Software Works

Re: [IPsec] NUDGE: WG Last Call for draft-ietf-ipsecme-dh-checks

2013-04-09 Thread Michael Richardson
me implementations which calculate their g^x/g^y, and cache that for many DH operations. Is the the point here is that this is safe if we do these tests. -- ] Never tell me the odds! | ipv6 mesh networks [ ] Michael Richardson, Sandelman Software Works|

Re: [IPsec] NUDGE: WG Last Call for draft-ietf-ipsecme-dh-checks

2013-04-09 Thread Michael Richardson
one, since the receiver is not in a position to know if the DH private value was reused. >> I have not implemented ECDSA, but the instructions seemed well >> formatted, but I don't at this point know what they mean. sfluhrer> Actually, we're talking about ECD

Re: [IPsec] NUDGE: WG Last Call for draft-ietf-ipsecme-dh-checks

2013-04-08 Thread Michael Richardson
ut the instructions seemed well formatted, but I don't at this point know what they mean. -- Michael Richardson , Sandelman Software Works pgp3_DpJpKwlo.pgp Description: PGP signature ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

Re: [IPsec] WG Last Call on draft-ietf-ipsecme-oob-pubkey

2013-04-08 Thread Michael Richardson
f the PKIX certificate is used. This is a a very simple encoding, as most of the ASN.1 part can be included literally, and recognized by block comparison. See [draft-ietf-tls-oob-pubkey] Appendix A for a detailed breakdown. In addition, Appendix A has a few examples. (Yes, add a sec

[IPsec] BFD and IPsec

2013-03-14 Thread Michael Richardson
=3D I don't think that this addreses any work item for IPsecME, but I thought that maybe it might help someone to know about this. -- Michael Richardson -on the road- pgpL90Zjnd8Zz.pgp Description: PGP signature ___ IPsec mailing list IPsec@iet

Re: [IPsec] Which option to pick on draft-kivinen-ipsecme-oob-pubkey-02.txt

2012-11-06 Thread Michael Richardson
t. Send your TK> comments about this too. if it can fit into the charter, and/or our AD will let us, then yes. -- Michael Richardson -on the road- pgp4Y4prhnPQz.pgp Description: PGP signature ___ IPsec mailing list IPsec@ietf.org https://www.i

Re: [IPsec] draft-mcgrew-ipsec-me-esp-ah-reqts

2012-11-06 Thread Michael Richardson
er where it went. This seems like a good point to me. DM> AES-CTR is the one algorithm in that category in the draft so DM> far. I agree with this. -- Michael Richardson -on the road- pgp6uDXc4K65j.pgp Description: PGP signature _

Re: [IPsec] Comments to draft-ietf-ipsecme-ike-tcp-00.txt

2012-11-04 Thread Michael Richardson
as one of the parameters you needed to TK> tune down for web servers if you wanted to support lots of TK> clients. yeah, but the concern listed in the document is that the initial congestion window wouldn't be big enough to quickly send out the large IKE_AUTH payload. Having at l

[IPsec] ipsecme-oob-pubkey

2012-11-04 Thread Michael Richardson
it could obsolete payload 11? Could new implementations decline to implement type 11? I think that this would be marginally acceptable. -- Michael Richardson -on the road- pgpsxKvndv61S.pgp Description: PGP signature ___ IPsec mailing list IPsec

[IPsec] draft-mcgrew-ipsec-me-esp-ah-reqts

2012-11-04 Thread Michael Richardson
o what things to focus on? Or for people GREP'ing the RFC archives as a result of an attack will come up with IPsec as a user/ -- Michael Richardson -on the road- ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

[IPsec] ike-tcp-00

2012-11-04 Thread Michael Richardson
r that did this would seem to be effectively taking twice the resources on the responder. I think that it's important to note really loundly, and maybe repeatedly, that the duration of the TCP connection is not related to the duration of the IKE SA. -- Michael Richardson -on the road-

Re: [IPsec] Comments to draft-ietf-ipsecme-ike-tcp-00.txt

2012-11-04 Thread Michael Richardson
one exchange over TCP now requires 2 round trips of delay, and TK> most likely around 10 packets, compared to the 1 round trip and TK> 2 packets. Yes. I think that the congestion window argument is probably not relevant. I don't think the congestion window will open much e

Re: [IPsec] ikev2 algorithms, Initiator choice preferred over responder ?

2012-10-24 Thread Michael Richardson
is is already mentioned otherwise I think it should be added in clarifications. Regards, Kalyani -- Michael Richardson -on the road- pgpMJkgNrKFsU.pgp Description: PGP signature ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

Re: [IPsec] [dane] IPSEC & DANE (RFC4025)

2012-07-31 Thread Michael Richardson
you mean RFC4322? Or is there another proposal that I've missed? -- Michael Richardson , Sandelman Software Works pgp02LC96anVU.pgp Description: PGP signature ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

Re: [IPsec] [dane] IPSEC & DANE (RFC4025)

2012-07-31 Thread Michael Richardson
ack of control over reverse, and later, due to there being no reverse for systems on the NATwork. Paul> The difference with TLS is that the client has a concept of the Paul> terminal name it connected to, and has its own src-dst transport, Paul> whereas for IPsec we only have one sr

Re: [IPsec] Fragmentation causing IKE to fail

2012-06-10 Thread Michael Richardson
on (or not), we have a problem to deal with at the IPsec level. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[ ] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[

Re: [IPsec] Fragmentation causing IKE to fail

2012-06-07 Thread Michael Richardson
connect Yoav> from behind some very dodgy NAT devices, and some of those do Yoav> drop fragments. Getting this behavior at the ISP is novel. And ESP over TCP on port 4500? -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Mi

Re: [IPsec] IPsec SPD search

2012-06-07 Thread Michael Richardson
. 3) Pluto actually provides an ordering mechanism between policies which is the ordering mechanism for policies as specified in 4301. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottaw

Re: [IPsec] auto-discovery VPN

2012-05-21 Thread Michael Richardson
the (partial) mesh of "rim" links. It's about the "Beltway" roads... perhaps someone can come up with a suitable reference to the Washington, DC politics for the protocol name. -- Michael Richardson , Sandelman Software Works IETF ROLL WG co-chair.http://datatracker

Re: [IPsec] #213 - Multiple interfaces or mobile endpoint

2012-05-21 Thread Michael Richardson
that B is behind B-gateway, and gets VPN service from B-gateway (and concentrator-X). Vishwas> I agree there is a use case for this optimization, but do we want to tackle Vishwas> the use case as part of the base solution or as an extension once the base Vishwas> solution is created

Re: [IPsec] #213 - Multiple interfaces or mobile endpoint

2012-05-15 Thread Michael Richardson
d be *no* IPsec tunnel between A and B, as they are presently co-located. Do we have a requirement that the policy between two spokes (a "bypass") could in fact be "clear"? -- Michael Richardson , Sandelman Software Works IETF ROLL WG co-chair.http://datatracker.ietf.org/wg/roll/charter/ ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

Re: [IPsec] ipsec-registry change for IPSEC Authentication Methods (Value 3) registration policy

2012-03-28 Thread Michael Richardson
hich you get with your maintenance. But, IKEv2 is a major release, for which the customer pays again. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[ ] m...@sandelman.ottawa.on.c

Re: [IPsec] [ipsecme] #214: Should gateways figure things out completely or just punt endpoints to a closer gateway?

2012-03-26 Thread Michael Richardson
f life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[ ] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[ Kyoto Plus: watch the video <http://www.youtube.com/watch?v=kzx1ycLXQSE> t

Re: [IPsec] [ipsecme] #214: Should gateways figure things out completely or just punt endpoints to a closer gateway?

2012-03-26 Thread Michael Richardson
> "Yoav" == Yoav Nir writes: >> You didn't take my comments too far; I think you realized that I was in >> fact saying two things: >> >> 1) when traffic is redirected, MUST it be redirected directly to the >> real endpoint? (There might be issues of in-band double NAT th

Re: [IPsec] [ipsecme] #216: Multiple interfaces or mobile endpoint

2012-03-26 Thread Michael Richardson
> "Vishwas" == Vishwas Manral writes: Vishwas> Branch routers have 3G/ 4G interfaces as backups for the Vishwas> primary interface Vishwas> and sometimes even multiple 3G/ 4G interfaces with no wired Vishwas> interface at Vishwas> all to the backend. Vishwas, it's not a

Re: [IPsec] [ipsecme] #216: Multiple interfaces or mobile endpoint

2012-03-26 Thread Michael Richardson
"A" get destroyed on node "B" when "A" moves, reboots, updates it's NAT address, etc. This is not exclusively about MOBIKE: there are lots of other ways in which the A<-->H1 connection can change which would affect "B". -- ] He who is tired of

Re: [IPsec] [ipsecme] #215: Should traffic flow through the gateway while a shortcut is being established?

2012-03-26 Thread Michael Richardson
optional *optimization*! It may be *required* in order to get a sufficiently high quality path for some services (VoIP), but, from a layer-3 point of view, it's optional. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sande

Re: [IPsec] [ipsecme] #214: Should gateways figure things out completely or just punt endpoints to a closer gateway?

2012-03-26 Thread Michael Richardson
AY it be redirected more than once? -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[ ] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[ Kyoto Plus: w

Re: [IPsec] [ipsecme] #214: Should gateways figure things out completely or just punt endpoints to a closer gateway?

2012-03-26 Thread Michael Richardson
have a protocol along trunk1 and trunk2 that permits the information about where B is to be communicated. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[ ] m...@sandelman.ottawa.on.

Re: [IPsec] [ipsecme] #214: Should gateways figure things out completely or just punt endpoints to a closer gateway?

2012-03-26 Thread Michael Richardson
> "Stephen" == Stephen Hanna writes: Stephen> I think that Michael is asking an important question. There Stephen> are many ways to solve the P2P VPN problem. One way is to Stephen> have satellites with little configuration that connect to Stephen> core gateways with lots of d

Re: [IPsec] [ipsecme] #213: In use case 2.1, direct endpoint-to-endpoint connectivity may not be possible

2012-03-26 Thread Michael Richardson
> "Yoav" == Yoav Nir writes: Yoav> "direct endpoint-to-endpoint connectivity may not be possible Yoav> if both endpoints are NATed" Yoav> Why? There are several protocols (SIP/RTP come to mind) that Yoav> manage endpoint-to-endpoint connectivity even when both are Yoav>

Re: [IPsec] FW: [ipsecme] #211: We should talk more about why this is a hard problem.

2012-03-26 Thread Michael Richardson
t have non-transtive authentication mechanisms, and it would be very annoying to setup each leaf system with a trusted connection to the AAA system for authentication. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson

Re: [IPsec] [ipsecme] #217: Temporary credentials

2012-03-26 Thread Michael Richardson
s and leaf systems would continue to "authenticate" to the gateway using the insecure legacy mechanisms that CTOs seem to prefer. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net archite

Re: [IPsec] P2P VPN draft UNCLASSIFIED

2012-03-19 Thread Michael Richardson
nt in the clear. * Configured tunnel: network prefixes to which traffic must be encrypted, and traffic in the clear is never permitted. A traditionally defined Virtual Private Network (VPN) is a form of configured tunnel. -- ] He who is tired of Weird Al is tired of life!

Re: [IPsec] P2P VPN draft UNCLASSIFIED

2012-03-19 Thread Michael Richardson
uot;. How Yoav> about "dynamic discovery VPN" (DD-VPN)? I offer: On-Demand Dynamic VPN = ODD-VPN. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[ ] m...@sand

Re: [IPsec] Some comments to the draft-ietf-ipsecme-p2p-vpn-problem-00

2012-03-15 Thread Michael Richardson
? -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[ ] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[ Kyoto Plus: watch the video <http://www.you

Re: [IPsec] P2P VPN draft UNCLASSIFIED

2012-03-14 Thread Michael Richardson
c Encryption. It's not Opportunistic. It's configured, it's just on-demand. In Openswan terminology that would mean a "routed" policy with a DNS lookup. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman S

Re: [IPsec] Please comment on Steve's P2P draft

2012-03-12 Thread Michael Richardson
I read the draft yesterday. I wasn't surprised. That in itself was a surprise. It's exactly what I thought the problem is from the beginning. There was no big mystery requirement that I didn't understand. The only thing I found weird was the belief that RFC4301 SPD configuration had to be "h

Re: [IPsec] Avoiding Authentication Header (AH)

2012-01-04 Thread Michael Richardson
k, to say that we should Manav> "avoid" AH wherever possible. This is the status quo already. Why do we need this draft? -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net archit

Re: [IPsec] Avoiding Authentication Header (AH)

2012-01-02 Thread Michael Richardson
ctive in IPsec, I suspect that some people might not know what pieces of code and specification you wrote, and who paid you to write those pieces of code. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ot

Re: [IPsec] Avoiding Authentication Header (AH)

2012-01-02 Thread Michael Richardson
sing). Someone can. Nothing stopping anyone. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[ ] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[

Re: [IPsec] Avoiding Authentication Header (AH)

2012-01-02 Thread Michael Richardson
n when the receiver does not have the key. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[ ] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[

Re: [IPsec] Avoiding Authentication Header (AH) (was Moving Authentication Header (AH) to Historic)

2012-01-01 Thread Michael Richardson
that for 99% of "Use IPsec" statements, ESP-NULL is likely the correct choice. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[ ] m...@sandelman.ottawa.on.ca http://www.san

Re: [IPsec] Large Scale VPN

2011-12-08 Thread Michael Richardson
I find the goals and schedule acceptable. > "Yoav" == Yoav Nir writes: Yoav> In an environment with many IPsec gateways and remote clients Yoav> that share an established trust infrastructure (in a single Yoav> administrative domain or across multiple domains), customers Yoav

Re: [IPsec] I-D Action: draft-harkins-ike-iana-update-00.txt

2011-11-25 Thread Michael Richardson
> "Tero" == Tero Kivinen writes: Tero> As you point out in your draft there are several allocations Tero> without any stable reference, and I would suggest we remove Tero> those. If there is no specification how to implement it, there Tero> is no way anybody can make interoper

Re: [IPsec] P2P VPN - Side Meeting

2011-11-16 Thread Michael Richardson
hooting interaction issues. I still believe that Mike> IPsec at the base is not a good tunneling protocol. CISCO IOS IPsec is a poor tunneling protocol. Many other vendors do a better job. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michae

Re: [IPsec] P2P VPN - Side Meeting

2011-11-15 Thread Michael Richardson
a pretty good solution to the problem, particularily if in the end, you didn't want to actually have any ACLs on the resulting tunnels. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|

Re: [IPsec] New -00 draft: Creating Large Scale Mesh VPNs Problem

2011-11-15 Thread Michael Richardson
addresses Mark> that type of "large-scale, P2P VPN". And please do so in a Mark> standards-based, non-proprietary way, that accommodates Mark> 10,000+ gateways, independent of vendors, and won't take me 10 Mark> years to configure. -- ] He who

Re: [IPsec] New -00 draft: Creating Large Scale Mesh VPNs Problem Statement

2011-11-08 Thread Michael Richardson
walled garden, they are much more tractable. Or, given that it's all inside a tunnel, why not just use IPv6 addresses on the inside of host to host tunnels? -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works,

Re: [IPsec] New -00 draft: Creating Large Scale Mesh VPNs Problem

2011-11-08 Thread Michael Richardson
RFC2332: NBMA Next Hop Resolution Protocol (NHRP) I think that it is a much better thing to use something like this, than invent something new. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON

Re: [IPsec] New -00 draft: Creating Large Scale Mesh VPNs Problem

2011-11-08 Thread Michael Richardson
like: "to get to 192.168.79.0/24, go to spoke79." RFC4025. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[ ] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/

Re: [IPsec] New -00 draft: Creating Large Scale Mesh VPNs Problem

2011-11-07 Thread Michael Richardson
'll invent? Yoav> SOAP? Yoav> As an attribute in a certificate, kind of like SIDR? So, okay, so you want to do new work to replace work that's already been well defined, that uses DNS as the transport. -- ] He who is tired of Weird Al is tired of life! | firew

Re: [IPsec] New -00 draft: Creating Large Scale Mesh VPNs Problem

2011-11-07 Thread Michael Richardson
gw, and sends all 192.168.0.0/16 to hub-gw. - Yoav> spoke79, which protects 192.168.79.0/24, knows about hub-gw, Yoav> and sends all 192.168.0.0/16 to hub-gw Yes. And, how is this policy communicated? -- ] He who is tired of Weird Al is tired of life! | firewalls [

Re: [IPsec] New -00 draft: Creating Large Scale Mesh VPNs Problem

2011-11-07 Thread Michael Richardson
] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[ ] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[ Kyoto Plus: watch the video <ht

Re: [IPsec] New -00 draft: Creating Large Scale Mesh VPNs Problem

2011-11-01 Thread Michael Richardson
>>>>> "Paul" == Paul Hoffman writes: Paul> On Oct 31, 2011, at 8:09 PM, Michael Richardson wrote: >> If the entities are in fact a group who has an internal trust >> anchor: Paul> They have an entity they trust to make introductions.

Re: [IPsec] New -00 draft: Creating Large Scale Mesh VPNs Problem

2011-10-31 Thread Michael Richardson
> "Yoav" == Yoav Nir writes: Jorge> I agree DNSSEC cannot be assumed, its deployments have been Jorge> marginal. >> DNSSEC is *one* *public* trusted third party. It's not the only >> way to use DNS securely, it's just the easiest one to arrange >> between total strangers

Re: [IPsec] New -00 draft: Creating Large Scale Mesh VPNs Problem

2011-10-31 Thread Michael Richardson
> "Jorge" == Jorge Coronel writes: Jorge> +1 Jorge> I agree DNSSEC cannot be assumed, its deployments have been Jorge> marginal. DNSSEC is *one* *public* trusted third party. It's not the only way to use DNS securely, it's just the easiest one to arrange between total strangers

Re: [IPsec] New -00 draft: Creating Large Scale Mesh VPNs Problem Statement

2011-10-24 Thread Michael Richardson
>> I hope that helps! >> >> Chris >> >> -Original Message- Yoav> From: Yoav Nir [mailto:y...@checkpoint.com] >> Sent: Sunday, October 23, 2011 10:37 PM >> To: Ulliott, Chris; Michael Richardson; ipsec@ietf.org

Re: [IPsec] [TICTOC] Review request for IPsec security for packet based synchronization (Yang Cui)

2011-10-19 Thread Michael Richardson
If I was an off-path attacker, and I couldn't drop your packets (but maybe I can see them), and I am not going to try to decrypt your packets, I would simply replay/make-up some packets. If I do this within the IPsec replay window, the receiving machines have to run the auth check, and so due to

Re: [IPsec] New -00 draft: Creating Large Scale Mesh VPNs Problem Statement

2011-10-17 Thread Michael Richardson
> "Yoav" == Yoav Nir writes: Yoav> I definitely think that the authors of this draft (I'm mostly Yoav> just the editor) need a good answer about why RFC 4322 doesn't Yoav> cover the use cases. Mostly, the starting point is different. Yoav> RFC 4322 begins with nodes that hav

Re: [IPsec] New -00 draft: Creating Large Scale Mesh VPNs Problem Statement

2011-10-14 Thread Michael Richardson
> "Yoav" == Yoav Nir writes: Yoav> A little. Also like GET-VPN and AC-VPN and Provider-1 Yoav> (apologies to all the vendors I've missed) Yoav> Those are some of the incompatible solutions by individual Yoav> vendors. And RFC4322. FreeSWAN has a number of local controls whe

Re: [IPsec] iSCSI: IPsec requirements

2011-10-11 Thread Michael Richardson
lement only the much simpler IKEv2. -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[ ] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[ Kyoto Plus: watch the vi

Re: [IPsec] Proposed work item: EAP-only authentication in IKEv2

2009-12-07 Thread Michael Richardson
es :-) Again, I do not know why it has to double the number of round trips. I see one extra round trip caused by the EAP-ID process, and then it's the same number both ways. Perhaps you can draw a time-sequence diagram for this to convince me? - -- ] He who is tired of Weird Al is tired

Re: [IPsec] Proposed work item: EAP-only authentication in IKEv2

2009-12-03 Thread Michael Richardson
Yaron Sheffer wrote: This draft proposes an IKEv2 extension to allow mutual EAP-based authentication in IKEv2, eliminating the need for one of the peers to present a certificate. This applies to a small number of key-generating EAP methods that allow mutual authentication. Proposed starting

Re: [IPsec] Proposed work item: IKEv2 password authentication (SPSK) - NO

2009-12-03 Thread Michael Richardson
Tero Kivinen wrote: SPSK can be used when there is requirement for host to host (or site to site) connection, where either end can initiate traffic and exchanges and where entities still want to use passwords instead of public keys to authenticate. Shared keys could be used there, but in most set

Re: [IPsec] Proposed work item: EAP-only authentication in IKEv2

2009-12-03 Thread Michael Richardson
Dan Harkins wrote: 2. solves the specific problem it is aimed at poorly-- doubling of the number of messages, requiring writing and testing of new state EAP state machines that are, otherwise, unnecessary; and, Does it double, or does it really just "n+1", which is doubling

Re: [IPsec] Proposed work item: Childless IKE SA

2009-12-03 Thread Michael Richardson
Yaron Sheffer wrote: This draft proposes an IKEv2 extension to allow the setup of an IKE SA with no Child SA, a situation which is currently disallowed by the protocol. Proposed starting point: http://tools.ietf.org/id/draft-nir-ipsecme-childless-01.txt. Please reply to the list: I believe

Re: [IPsec] Proposed work item: Failure detection in IKEv2

2009-12-03 Thread Michael Richardson
Yaron Sheffer wrote: This work item proposes an IKEv2 extension to allow an IKE peer to quickly and securely detect that its opposite peer has lost state. This is claimed to be quicker than the current method, which is based on time outs. Proposed starting point: http://tools.ietf.org/id/draft

Re: [IPsec] Proposed work item: IKE/IPsec high availability and load sharing

2009-12-03 Thread Michael Richardson
Yaron Sheffer wrote: This work item will define the problem statement and requirements for a solution that allows interoperable HA/LS device groups. Mixed-vendor clusters are specifically out of scope; but single-vendor clusters should be fully interoperable with other vendors’ devices or clust

Re: [IPsec] Proposed work item: WESP extensibility

2009-12-03 Thread Michael Richardson
Yaron Sheffer wrote: This draft proposes an extensibility framework for WESP, as well as several specific extensions. Proposed starting point: http://tools.ietf.org/id/draft-montenegro-ipsecme-wesp-extensions-00.txt. I am not interested in any further extensions to WESP. In particular,

Re: [IPsec] Proposed work item: Labelled IPsec

2009-12-03 Thread Michael Richardson
Yaron Sheffer wrote: This work item proposes to extend IKEv2 (and IKEv1) so as to allow IPsec to be used in environments that require Mandatory Access Control. It is envisioned that this will be used by modern high-security operating systems, that go beyond the currently supported Multilevel S

[IPsec] comments on esp-null-heuristics-01

2009-11-11 Thread Michael Richardson
ge advice of Kivinen and McDonald, that the least amount of harm possible will be done. - -- ] He who is tired of Weird Al is tired of life! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[ ] m...@sandelman.ottawa.on.ca

Re: [IPsec] [IKEv2] IKE_AUTH without TSi, TSr

2009-05-15 Thread Michael Richardson
y would be good, as there will be people with broken implementations (i.e. "bugs") out there trying to determine what is going on, and they won't always be sitting at a table next to you. -- ] Y'avait une poule de jammé dans l'muffler!| firewalls [ ] Mi

Re: [IPsec] Reopening issue #12

2009-05-12 Thread Michael Richardson
Let me draw a time-sequence diagram to explain things as I understand them (fixed-width font alert) site to site policy policy: 1.0.0.0/8 <-> 2.0.0.0/8 Alice-GW Bob-GW --Trigger--> (1.2.3.4->2.3.4.5) (1)

Re: [IPsec] [IKEv2] IKE_AUTH without TSi, TSr

2009-05-06 Thread Michael Richardson
lude a known-to-be-unacceptable CHILD_SA proposal. -- ] Y'avait une poule de jammé dans l'muffler! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[ ] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |dev

Re: [IPsec] Issue #93: Next header value in tunnel mode for WESP

2009-05-05 Thread Michael Richardson
Yaron Sheffer wrote: Hi Ken, It seems to me this field is more trouble than it's worth. We are assuming that the hardware will be enforcing a very simplistic security policy (don't care if it's Tunnel or Transport, don't care if it's a TCP SYN or not etc.) and that the hardware is unable to perf

Re: [IPsec] Reopening issue #12

2009-05-05 Thread Michael Richardson
Dan McDonald described a worse case scenario. It had the advantage that communication that could continue did continue. It had the disadvantage that the traffic to port 2112 got delayed because we needed the packet contents to get the policy right. This is bad due to the delay. It required spec

Re: [IPsec] [IKEv2] IKE_AUTH without TSi, TSr

2009-05-05 Thread Michael Richardson
Yoav Nir wrote: Hi Raj Matt is correct. There is no way in IKEv2 to do a phase1-only exchange, and then wait for traffic to establish the child SAs. While we do establish an IKE SA if the piggy-backed child SA failed for whatever reason (bad selectors, no proposal chosen), we don't allow

<    1   2   3   4