RE: WG Review: Recharter of IP Security Maintenance and Extensions (ipsecme)
<Pasi.Eronen@nokia.com> Thu, 18 February 2010 18:59 UTC
Return-Path: <Pasi.Eronen@nokia.com>
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D47693A7EE6 for <ietf@core3.amsl.com>; Thu, 18 Feb 2010 10:59:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.384
X-Spam-Level:
X-Spam-Status: No, score=-6.384 tagged_above=-999 required=5 tests=[AWL=0.215, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yuXcmQQJJEi5 for <ietf@core3.amsl.com>; Thu, 18 Feb 2010 10:59:27 -0800 (PST)
Received: from mgw-mx06.nokia.com (smtp.nokia.com [192.100.122.233]) by core3.amsl.com (Postfix) with ESMTP id 15DAA28C127 for <ietf@ietf.org>; Thu, 18 Feb 2010 10:59:26 -0800 (PST)
Received: from esebh105.NOE.Nokia.com (esebh105.ntc.nokia.com [172.21.138.211]) by mgw-mx06.nokia.com (Switch-3.3.3/Switch-3.3.3) with ESMTP id o1IJ0W4Z009692; Thu, 18 Feb 2010 21:01:07 +0200
Received: from esebh102.NOE.Nokia.com ([172.21.138.183]) by esebh105.NOE.Nokia.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 18 Feb 2010 21:01:04 +0200
Received: from smtp.mgd.nokia.com ([65.54.30.6]) by esebh102.NOE.Nokia.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Thu, 18 Feb 2010 21:01:04 +0200
Received: from NOK-EUMSG-01.mgdnok.nokia.com ([65.54.30.86]) by nok-am1mhub-02.mgdnok.nokia.com ([65.54.30.6]) with mapi; Thu, 18 Feb 2010 20:01:03 +0100
From: Pasi.Eronen@nokia.com
To: jari.arkko@piuha.net, ietf@ietf.org
Date: Thu, 18 Feb 2010 20:01:02 +0100
Subject: RE: WG Review: Recharter of IP Security Maintenance and Extensions (ipsecme)
Thread-Topic: WG Review: Recharter of IP Security Maintenance and Extensions (ipsecme)
Thread-Index: AcqvAMOizT23ECZbQjmYdMbF2EDkvQBynLqg
Message-ID: <808FD6E27AD4884E94820BC333B2DB7758416A0004@NOK-EUMSG-01.mgdnok.nokia.com>
References: <20100209190003.025AE3A75BF@core3.amsl.com> <4B7A8A8E.3030704@piuha.net>
In-Reply-To: <4B7A8A8E.3030704@piuha.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginalArrivalTime: 18 Feb 2010 19:01:04.0380 (UTC) FILETIME=[B83553C0:01CAB0CC]
X-Nokia-AV: Clean
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Feb 2010 18:59:29 -0000
Hi Jari, You're right that implementing a "weak shared secret" EAP method (both the EAP peer and EAP server roles) on both IPsec nodes, combined with the "EAP mutual authentication" work item (also in the new charter) could be used in this situation, and would result in roughly the same functionality (perhaps with slightly more roundtrips/other overhead -- but that's probably not a critical factor here). The WG discussed this at length (both in Hiroshima and on the list afterwards), and the general feeling was that having a simple IKEv2-only solution would still be desirable, and could be more likely to get implemented/deployed in situations that currently don't use EAP. Perhaps the currently proposed text is slightly misleading about this; it could be read to say that EAP would not work. As we discussed on the IESG telechat earlier today, that paragraph would benefit from slightly more clearer explanation, e.g: OLD: However, user-configured shared secrets are still useful for many other IPsec scenarios, such as authentication between two servers or routers. These scenarios are usually symmetric: both peers know the shared secret, no back-end authentication servers are involved, and either peer can initiate an IKEv2 SA. These features make using EAP (with its strict client-server separation) undesirable. NEW: However, user-configured shared secrets are still useful for many other IPsec scenarios, such as authentication between two servers or routers. These scenarios are usually symmetric: both peers know the shared secret, no back-end authentication servers are involved, and either peer can initiate an IKEv2 SA. While it would be possible to use EAP in such situations (by having both peers implement both the EAP peer and the EAP server roles of an EAP method intended for "weak" shared secrets) with the mutual EAP-based authentication work item (above), a simpler solution may be desirable in many situations. Comments? Best regards, Pasi > -----Original Message----- > From: ietf-bounces@ietf.org [mailto:ietf-bounces@ietf.org] On Behalf Of > ext Jari Arkko > Sent: 16 February, 2010 14:08 > To: IETF Discussion > Subject: Re: WG Review: Recharter of IP Security Maintenance and > Extensions (ipsecme) > > This new charter looks great otherwise, but I did have a reaction on > this: > > > - IKEv2 supports mutual authentication with a shared secret, but this > > mechanism is intended for "strong" shared secrets. User-chosen > > passwords are typically of low entropy and subject to off-line > > dictionary attacks when used with this mechanism. Thus, RFC 4306 > > recommends using EAP with public-key based authentication of the > > responder instead. This approach would be typically used in > enterprise > > remote access VPN scenarios where the VPN gateway does not usually > > even have the actual passwords for all users, but instead typically > > communicates with a back-end RADIUS server. > > > > However, user-configured shared secrets are still useful for many > > other IPsec scenarios, such as authentication between two servers or > > routers. These scenarios are usually symmetric: both peers know the > > shared secret, no back-end authentication servers are involved, and > > either peer can initiate an IKEv2 SA. These features make using EAP > > (with its strict client-server separation) undesirable. > > > > The WG will develop a standards-track extension to IKEv2 to allow > > mutual authentication based on "weak" (low-entropy) shared > > secrets. The goal is to avoid off-line dictionary attacks without > > requiring the use of certificates or EAP. There are many > > already-developed algorithms that can be used, and the WG would need > > to pick one that both is believed to be secure and is believed to > have > > acceptable intellectual property features. The WG would also need to > > develop the protocol to use the chosen algorithm in IKEv2 in a secure > > fashion. It is noted up front that this work item poses a higher > > chance of failing to be completed than other WG work items; this is > > balanced by the very high expected value of the extension if it is > > standardized and deployed. > > > > Frankly, I'm not too convinced about the arguments above. First of all, > EAP does not require separate back-end servers. And with IKEv2 itself > already having to decide which side initiates, I do not see a problem > running a password-based EAP method in the same direction. > > Also, it is true that a new native scheme is slightly easier to > implement on top of IKEv2 than EAP + an EAP method. However, if you > look at the issue from a system level, does that mean that you are > forced to implement this new scheme *and* EAP, because you already > need EAP for many other situations? For someone working with a > full-blown, all features supported implementation of IKEv2 this > means *more* code, not less. > > Perhaps there are some better arguments why you must choose a > non-EAP solution. Or maybe the charter should require specific > functionality to not dictate the solution by excluding EAP. Or maybe > existing standards are already sufficient and we just need guidance > on how to apply them in the best way for this problem. > > In any case, I would like to understand better why this work is in the > charter. > > Jari > > _______________________________________________ > Ietf mailing list > Ietf@ietf.org > https://www.ietf.org/mailman/listinfo/ietf
- Re: WG Review: Recharter of IP Security Maintenan… Jari Arkko
- Re: WG Review: Recharter of IP Security Maintenan… Jari Arkko
- Re: WG Review: Recharter of IP Security Maintenan… Alfred Hönes
- RE: WG Review: Recharter of IP Security Maintenan… Pasi.Eronen
- Re: WG Review: Recharter of IP Security Maintenan… Jari Arkko
- Re: WG Review: Recharter of IP Security Maintenan… Dan Harkins
- Re: WG Review: Recharter of IP Security Maintenan… Bernard Aboba