RE: I-D ACTION:draft-ietf-ipsec-isakmp-gss-auth-03.txt

Lisa Wilkinson <lisa@baltimore.ie> Mon, 11 October 1999 11:07 UTC

Received: from lists.tislabs.com (portal.gw.tislabs.com [192.94.214.101]) by mail.imc.org (8.9.3/8.9.3) with ESMTP id EAA27279; Mon, 11 Oct 1999 04:07:48 -0700 (PDT)
Received: by lists.tislabs.com (8.9.1/8.9.1) id FAA11950 Mon, 11 Oct 1999 05:44:01 -0400 (EDT)
Message-ID: <01BF13D5.F25DF970.lisa@baltimore.ie>
From: Lisa Wilkinson <lisa@baltimore.ie>
Reply-To: "lisa@baltimore.ie" <lisa@baltimore.ie>
To: "'Waters, Stephen'" <Stephen.Waters@cabletron.com>, "ipsec@lists.tislabs.com" <ipsec@lists.tislabs.com>
Subject: RE: I-D ACTION:draft-ietf-ipsec-isakmp-gss-auth-03.txt
Date: Mon, 11 Oct 1999 10:00:53 +0100
Organization: Baltimore Technologies
X-Mailer: Microsoft Internet E-mail/MAPI - 8.0.0.4211
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: owner-ipsec@lists.tislabs.com
Precedence: bulk

Stephen,

I would have a couple of questions with this approach:

- as the client is not solely responsible for its private key, how is no 
non repudiation dealt with
- what means of "secure" transmission and storage of private keys does it 
propose
- in case of a compromise of the secure store of private keys, as with 
Kerberos, would all private keys need to revoked, regenerated and 
re-issued.  Does this not lead to administrative and scalability problems?

Lisa
-----Original Message-----
From:	Waters, Stephen [SMTP:Stephen.Waters@cabletron.com]
Sent:	Friday, October 08, 1999 3:30 PM
To:	ipsec@lists.tislabs.com
Subject:	RE: I-D ACTION:draft-ietf-ipsec-isakmp-gss-auth-03.txt


Derrell,

I've taken a quick wonder through the GSS documents now. And I have a
questions:

A few weeks/months back, we were debating on the list how public-key could
be used with IKE without the need for PKI (CA/CRL/RA).

One of the suggestions that came out (that I was fond of :) ), was you
provide clients with just their own private key, and the public key of the
server.  The server has its own public/private key, and access to a secure
database containing the clients private keys. This was given the name
'private public-key'. The IKE exchange is standard signature 
authentication,
with off-line cracking protection.


>From what I can tell from GSS and your draft, it is basically the same
model, except that we are talking about adding a new 'thing' everywhere
called GSS-API software.

Cheers, Steve.