RE: I-D ACTION:draft-ietf-ipsec-isakmp-gss-auth-03.txt
Lisa Wilkinson <lisa@baltimore.ie> Mon, 11 October 1999 11:07 UTC
Received: from lists.tislabs.com (portal.gw.tislabs.com [192.94.214.101]) by mail.imc.org (8.9.3/8.9.3) with ESMTP id EAA27279; Mon, 11 Oct 1999 04:07:48 -0700 (PDT)
Received: by lists.tislabs.com (8.9.1/8.9.1) id FAA11950 Mon, 11 Oct 1999 05:44:01 -0400 (EDT)
Message-ID: <01BF13D5.F25DF970.lisa@baltimore.ie>
From: Lisa Wilkinson <lisa@baltimore.ie>
Reply-To: "lisa@baltimore.ie" <lisa@baltimore.ie>
To: "'Waters, Stephen'" <Stephen.Waters@cabletron.com>, "ipsec@lists.tislabs.com" <ipsec@lists.tislabs.com>
Subject: RE: I-D ACTION:draft-ietf-ipsec-isakmp-gss-auth-03.txt
Date: Mon, 11 Oct 1999 10:00:53 +0100
Organization: Baltimore Technologies
X-Mailer: Microsoft Internet E-mail/MAPI - 8.0.0.4211
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: owner-ipsec@lists.tislabs.com
Precedence: bulk
Stephen, I would have a couple of questions with this approach: - as the client is not solely responsible for its private key, how is no non repudiation dealt with - what means of "secure" transmission and storage of private keys does it propose - in case of a compromise of the secure store of private keys, as with Kerberos, would all private keys need to revoked, regenerated and re-issued. Does this not lead to administrative and scalability problems? Lisa -----Original Message----- From: Waters, Stephen [SMTP:Stephen.Waters@cabletron.com] Sent: Friday, October 08, 1999 3:30 PM To: ipsec@lists.tislabs.com Subject: RE: I-D ACTION:draft-ietf-ipsec-isakmp-gss-auth-03.txt Derrell, I've taken a quick wonder through the GSS documents now. And I have a questions: A few weeks/months back, we were debating on the list how public-key could be used with IKE without the need for PKI (CA/CRL/RA). One of the suggestions that came out (that I was fond of :) ), was you provide clients with just their own private key, and the public key of the server. The server has its own public/private key, and access to a secure database containing the clients private keys. This was given the name 'private public-key'. The IKE exchange is standard signature authentication, with off-line cracking protection. >From what I can tell from GSS and your draft, it is basically the same model, except that we are talking about adding a new 'thing' everywhere called GSS-API software. Cheers, Steve.
- I-D ACTION:draft-ietf-ipsec-isakmp-gss-auth-03.txt Internet-Drafts
- RE: I-D ACTION:draft-ietf-ipsec-isakmp-gss-auth-0… Waters, Stephen
- RE: I-D ACTION:draft-ietf-ipsec-isakmp-gss-auth-0… Lisa Wilkinson
- RE: I-D ACTION:draft-ietf-ipsec-isakmp-gss-auth-0… Markku Savela
- RE: I-D ACTION:draft-ietf-ipsec-isakmp-gss-auth-0… Pyda Srisuresh