Re: [HOKEY] Fw: [IPsec] New I-D: draft-nir-ipsecme-erx-00

Qin Wu <sunseawq@huawei.com> Wed, 04 May 2011 03:42 UTC

Return-Path: <sunseawq@huawei.com>
X-Original-To: hokey@ietfa.amsl.com
Delivered-To: hokey@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B32AE06C8 for <hokey@ietfa.amsl.com>; Tue, 3 May 2011 20:42:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.973
X-Spam-Level:
X-Spam-Status: No, score=-1.973 tagged_above=-999 required=5 tests=[AWL=0.626, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ggrXib2Y9aRa for <hokey@ietfa.amsl.com>; Tue, 3 May 2011 20:42:14 -0700 (PDT)
Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [119.145.14.64]) by ietfa.amsl.com (Postfix) with ESMTP id 373BCE06AD for <hokey@ietf.org>; Tue, 3 May 2011 20:42:14 -0700 (PDT)
Received: from huawei.com (szxga05-in [172.24.2.49]) by szxga05-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0LKN00JMIJITD8@szxga05-in.huawei.com> for hokey@ietf.org; Wed, 04 May 2011 11:40:05 +0800 (CST)
Received: from huawei.com ([172.24.2.119]) by szxga05-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0LKN00I92JISA6@szxga05-in.huawei.com> for hokey@ietf.org; Wed, 04 May 2011 11:40:04 +0800 (CST)
Received: from w53375 ([10.138.41.70]) by szxml06-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTPA id <0LKN00GNTJIRBA@szxml06-in.huawei.com> for hokey@ietf.org; Wed, 04 May 2011 11:40:04 +0800 (CST)
Date: Wed, 04 May 2011 11:43:33 +0800
From: Qin Wu <sunseawq@huawei.com>
To: Glen Zorn <gwz@net-zen.net>
Message-id: <018001cc0a0d$7134a570$46298a0a@china.huawei.com>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.3664
X-Mailer: Microsoft Outlook Express 6.00.2900.3664
Content-type: text/plain; charset=iso-8859-1
Content-transfer-encoding: 7BIT
X-Priority: 3
X-MSMail-priority: Normal
References: <010401cc09fd$fadec0e0$46298a0a@china.huawei.com> <4DC0C036.40309@net-zen.net>
Cc: Yaron Sheffer <yaronf.ietf@gmail.com>, Yoav Nir <ynir@checkpoint.com>, hokey@ietf.org
Subject: Re: [HOKEY] Fw: [IPsec] New I-D: draft-nir-ipsecme-erx-00
X-BeenThere: hokey@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: HOKEY WG Mailing List <hokey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hokey>, <mailto:hokey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hokey>
List-Post: <mailto:hokey@ietf.org>
List-Help: <mailto:hokey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hokey>, <mailto:hokey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 May 2011 03:42:15 -0000

----- Original Message ----- 
From: "Glen Zorn" <gwz@net-zen.net>
To: "Qin Wu" <sunseawq@huawei.com>
Cc: <hokey@ietf.org>rg>; "Yoav Nir" <ynir@checkpoint.com>om>; "Yaron Sheffer" <yaronf.ietf@gmail.com>
Sent: Wednesday, May 04, 2011 10:55 AM
Subject: Re: [HOKEY] Fw: [IPsec] New I-D: draft-nir-ipsecme-erx-00


> On 5/4/2011 8:52 AM, Qin Wu wrote:
>> FYI.
> 
> Instead of just forwarding selected messages, how about adding the hokey
> list to this conversation?

[Qin]: Okay.

>> ----- Original Message ----- 
>> From: "Qin Wu" <sunseawq@huawei.com>
>> To: "Yoav Nir" <ynir@checkpoint.com>om>; "Yaron Sheffer" <yaronf.ietf@gmail.com>
>> Cc: <ipsec@ietf.org>
>> Sent: Wednesday, May 04, 2011 9:50 AM
>> Subject: Re: [IPsec] New I-D: draft-nir-ipsecme-erx-00
>> 
>> 
>>>>> - I am missing the "authenticated peer identity", which I would assume 
>>>>> should arrive from the AAA server. This should be the basis of RFC4301 
>>>>> policy decisions on the IKE gateway. Does ERP provide this identity?
>>>>
>>>> The EAP-Initiate/Re-auth packet carries a keyName-NAI TLV, but that is sent from the client (or "peer") to the authentication server through the gateway. (section 5.3.2 of the bis document)
>>>> The EAP-Finish/Re-auth packet also carries a keyName-NAI TLV, and that is sent from the authentication server through the gateway to the client.
>>>> But these don't really help, because the username part of NAI is the 64-bit EMSKname, which is not directly related to user name.
>>>> However, these messages come within an Access-Accept packet from the RADIUS server, and those include a proper user name.
>>>
>>> [Qin]: If you are talking about the second identity specified in section 6.4 of RFC5998, I think, unlike EAP, ERP does not provide such identity.
>>> ERP only define two types: one is Re-auth-Start, the other is Re-Auth.
>>>
>>> KeyName-NAI TLV defined in RFC5296 and RFC5296bis more looks like the first idenity described in section 6.4 of RFC5998.
>>> As decribed in section 5.1 of RFC5296,
>>> "
>>>     When an ERP-capable authenticator receives the EAP-Initiate/
>>>      Re-auth message from a peer, it copies the contents of the
>>>                                                       ^^^^^^^^^^^^^^^^^^^^
>>>      keyName-NAI into the User-Name attribute of RADIUS [13]. 
>>>     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>>> "
>>>
>>>>
>>>>> - Does this draft coexist with certificate-less mutual EAP 
>>>>> authentication, as per RFC5998?
>>>>
>>>> I think the handed-over keying material is cryptographic proof enough and that certificates will usually be unnecessary, so I think yes.
>>>
>>> [Qin]: Correct.
>>>
>>>>>
>>>>> Thanks,
>>>>>     Yaron
>>>>
>>>> _______________________________________________
>>>> IPsec mailing list
>>>> IPsec@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/ipsec
>> _______________________________________________
>> HOKEY mailing list
>> HOKEY@ietf.org
>> https://www.ietf.org/mailman/listinfo/hokey
>> 
>> 
>