Re: [IPsec] Proposed work item: IKEv2 password authentication (SPSK) - NO

Yaron Sheffer <yaronf@checkpoint.com> Tue, 01 December 2009 06:47 UTC

Return-Path: <yaronf@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 80CB63A6857 for <ipsec@core3.amsl.com>; Mon, 30 Nov 2009 22:47:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.545
X-Spam-Level:
X-Spam-Status: No, score=-3.545 tagged_above=-999 required=5 tests=[AWL=0.054, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cghnk96S-edH for <ipsec@core3.amsl.com>; Mon, 30 Nov 2009 22:47:19 -0800 (PST)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by core3.amsl.com (Postfix) with ESMTP id 31EFF3A6834 for <ipsec@ietf.org>; Mon, 30 Nov 2009 22:47:18 -0800 (PST)
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id nB16l9Gq023917; Tue, 1 Dec 2009 08:47:10 +0200 (IST)
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex01.ad.checkpoint.com ([126.0.0.2]) with mapi; Tue, 1 Dec 2009 08:47:16 +0200
From: Yaron Sheffer <yaronf@checkpoint.com>
To: Dan Harkins <dharkins@lounge.org>
Date: Tue, 01 Dec 2009 08:46:59 +0200
Thread-Topic: [IPsec] Proposed work item: IKEv2 password authentication (SPSK) - NO
Thread-Index: AcpyFcNWtnITD+o3R4Omn2hAN3inxQAOOflQ
Message-ID: <7F9A6D26EB51614FBF9F81C0DA4CFEC801BDF88E06DD@il-ex01.ad.checkpoint.com>
References: <7F9A6D26EB51614FBF9F81C0DA4CFEC801BDF88E04F2@il-ex01.ad.checkpoint.com> <a70eac2cf1d8cc1b743fb05aadf791b9.squirrel@www.trepanning.net>
In-Reply-To: <a70eac2cf1d8cc1b743fb05aadf791b9.squirrel@www.trepanning.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] Proposed work item: IKEv2 password authentication (SPSK) - NO
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Dec 2009 06:47:20 -0000

Hi everyone,

[WG co-chair hat off]

I believe this effort is misguided, and would be a waste of the WG time.

EAP was added to IKEv2 to provide "legacy" (a.k.a. password) authentication. In the past it did not do it very well, but this is changing. We should improve the use of EAP in IKEv2, rather than replacing it by a homebrew solution.

Specifically, the following EAP methods can be used today (or in the near future) for mutual password-based auth:

- Dan's own EAP-PWD, http://tools.ietf.org/html/draft-harkins-emu-eap-pwd-12
- My EAP-EKE, http://tools.ietf.org/html/draft-sheffer-emu-eap-eke-03
- The long expired EAP-SRP, http://tools.ietf.org/html/draft-ietf-pppext-eap-srp-03
- A rumored EAP method based on the PAK protocol (http://tools.ietf.org/html/draft-brusilovsky-pak-10)

Embedding one of these methods as the single way to do mutual auth in IKE simply doesn't make sense.

In addition, SPSK (which is equivalent to EAP-PWD) is a novel crypto protocol. It has had by far the least crypto review than the other three protocols. IMHO, this working group should NOT be developing new cryptographic protocols. This is not where our expertise lies.

Lastly, one of the major criticisms with IKEv1 was the number of protocol modes. And here we are, with a proposal to add another mode to IKEv2. Doesn't seem like a good idea to me.

Thanks,
	Yaron


> -----Original Message-----
> From: Dan Harkins [mailto:dharkins@lounge.org]
> Sent: Tuesday, December 01, 2009 1:35
> To: Yaron Sheffer
> Cc: ipsec@ietf.org
> Subject: Re: [IPsec] Proposed work item: IKEv2 password authentication
> (SPSK)
> 
> 
>   Hello,
> 
>   As can be inferred by my previous posting on EAP-only authentication,
> I favor this particular method for mutual authentication.
> 
>   I believe this is a general purpose exchange, useful for more than the
> narrow focus of EAP-only, does not require extraneous encapsulations or
> unnecessary code (ala EAP-only), and is secure regardless of its use
> (unlike EAP-only).
> 
>   I am committed to working on this as a WG work item. I agree to continue
> contributing to the text and (co-)authoring the text. I solicit help, and
> support, from those who are interested in this task.
> 
>   regards,
> 
>   Dan.
> 
> On Sun, November 29, 2009 9:20 am, Yaron Sheffer wrote:
> > This draft proposes a particular method for mutual authentication of
> IKEv2
> > peers using a short, low quality shared secret (a.k.a. "password"). The
> > proposal is to embed this method in the IKE exchange, rather than use
> EAP.
> >
> > Proposed starting point:
> > http://tools.ietf.org/id/draft-harkins-ipsecme-spsk-auth-00.txt.
> >
> > Please reply to the list:
> >
> > - If this proposal is accepted as a WG work item, are you committing to
> > review multiple versions of the draft?
> > - Are you willing to contribute text to the draft?
> > - Would you like to co-author it?
> >
> > Please also reply to the list if:
> >
> > - You believe this is NOT a reasonable activity for the WG to spend time
> > on.
> >
> > If this is the case, please explain your position. Do not explore the
> fine
> > technical details (which will change anyway, once the WG gets hold of
> the
> > draft); instead explain why this is uninteresting for the WG or for the
> > industry at large. Also, please mark the title clearly (e.g. "DES40-
> export
> > in IPsec - NO!").
> > _______________________________________________
> > IPsec mailing list
> > IPsec@ietf.org
> > https://www.ietf.org/mailman/listinfo/ipsec
> >
> 
> 
> 
> Scanned by Check Point Total Security Gateway.