[Gen-art] Gen-ART LC review of draft-eronen-ipsec-ikev2-multiple-auth-01.txt

"Spencer Dawkins" <spencer@mcsr-labs.org> Wed, 19 July 2006 15:40 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1G3E9h-0001ng-RF; Wed, 19 Jul 2006 11:40:09 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1G3E9g-0001nb-1o for gen-art@ietf.org; Wed, 19 Jul 2006 11:40:08 -0400
Received: from rwcrmhc13.comcast.net ([204.127.192.83]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G3E9d-00043w-Kt for gen-art@ietf.org; Wed, 19 Jul 2006 11:40:08 -0400
Received: from s73602 (futurewei.com?[65.104.224.98]) by comcast.net (rwcrmhc13) with SMTP id <20060719154004m1300cl0bse>; Wed, 19 Jul 2006 15:40:04 +0000
Message-ID: <05bd01c6ab49$760e2a80$4f087c0a@china.huawei.com>
From: Spencer Dawkins <spencer@mcsr-labs.org>
To: General Area Review Team <gen-art@ietf.org>
Date: Wed, 19 Jul 2006 10:39:01 -0500
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"; charset="iso-8859-1"; reply-type="original"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.2869
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2869
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 67c1ea29f88502ef6a32ccec927970f0
Cc: pasi.eronen@nokia.com, Russ Housley <housley@vigilsec.com>, jouni.korhonen@teliasonera.com
Subject: [Gen-art] Gen-ART LC review of draft-eronen-ipsec-ikev2-multiple-auth-01.txt
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/gen-art>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
Errors-To: gen-art-bounces@ietf.org

Hi, Pasi and Jouni,

I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at
<http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html>.

Summary - this draft is ready for publication as an Experimental RFC. I 
noticed a few Nits, noted below, but the draft is comprehensible and 
reasonable, so I have no non-Nit comments.

Please look at these comments along with any other Last Call comments you
may receive.

Thanks,

Spencer Dawkins

Abstract

   IKEv2 supports several mechanisms for authenticating the parties,
   including signatures with public-key certificates, shared secrets,
   and Extensible Authentication Protocol (EAP) methods.  Currently,
   each endpoint uses only one of these mechanisms to authenticate
   itself.  This document specifies an extension to IKEv2 that allows
   the use of multiple authentication exchanges, either using different
   mechanisms or the same mechanism.  This extension allows, for
   instance, performing certificate-based authentication of the client
   host followed by an EAP authentication of the user.  When backend

Spencer/Nit - phrasing a bit rough here. Perhaps "For example, this 
extension allows certificate-based authentication of the client host 
followed by an EAP authentication of the user."

   authentication servers are used, they can belong to different
   administrative domains, such as the network access provider and the
   service provider.

1.  Introduction

   IKEv2 [IKEv2] supports several mechanisms for parties involved in the
   IKE_SA.  These include signatures with public-key certificates,
   shared secrets, and Extensible Authentication Protocol (EAP) methods.

   Currently, each endpoint uses only one of these mechanisms to
   authenticate itself.  However, there are scenarios where making the
   authorization decision in IKEv2 (whether to allow access or not)
   would benefit from using several of these methods.

   For instance, it may be necessary to authenticate both the host
   (machine) requesting access, and the user currently using the host.
   These two authentications would use two separate sets of credentials
   (such as certificates and associated private keys), or even different

Spencer/Nit: s/or even/and might even use/

   authentication mechanisms.

   To take an another example, when an operator is hosting a VPN gateway
   service for a third party, it may be necessary to authenticate the
   client both to the operator (for billing purposes) and the third

Spencer/Nit: s/both to/to both/

   party's AAA server (for authorizing access to the third party's
   internal network).

1.1.  Usage Scenarios

   Figure 1 shows an example architecture of an operator hosted VPN

Spencer/Nit: s/operator hosted/operator-hosted/

   scenario that could benefit from a two phase authentication within
   the IKEv2 exchange.  First the client authenticates towards the
   Network Access Provider (NAP) and gets access to the NAP-hosted VPN
   gateway.  The first phase authentication involves the backend AAA
   server of the NAP.  After the first authentication, the client
   initiates the second authentication round that also involves Third
   Party's backend AAA server.  If both authentications succeed, the
   required IPsec tunnels are set up and the client can access protected
   networks behind the Third Party.

2.1.  Solution Overview

   The AUTH payloads are calculated as specified in [IKEv2] Section 2.15
   and 2.16.  If EAP methods that do not generated shared keys are used,
   it is possible that several AUTH payloads with identical contents are
   sent.  With this kind of EAP methods, the purpose of the AUTH payload

Spencer/Nit: s/methods/method/

   is simply to delimit the authentication exchanges, and ensure that
   the IKE_SA_INIT request/response messages were not modified.

2.3.  Example 2: Mixed EAP and Certificate Authentications

   Another example is shown in Figure 3: Here both the initiator and the
   responder are first authenticated using certificates (or shared
   secrets); this is followed by an EAP authentication exchange.

5.  Security Considerations

   Security considerations for IKEv2 are discussed in [IKEv2].  The
   reader is encouraged to pay special attention to considerations
   relating to the use of EAP methods which do not generate shared keys.

   However, the use of multiple authentication exchanges result in some
   new security considerations as well.

Spencer/Nit: s/some new security considerations/at least one new security 
consideration/?

   In normal IKEv2, the initiator authenticates the responder before
   revealing its identity.  When multiple authentication exchanges are
   used to authenticate the responder, the initiator has to reveal its
   identity before all of the responder authentication exchanges have
   been completed. 



_______________________________________________
Gen-art mailing list
Gen-art@ietf.org
https://www1.ietf.org/mailman/listinfo/gen-art