[IPsec] Fwd: FW: New Version Notification for draft-padmakumar-ikev2-redirect-and-auth-offload-00
Padmakumar AV <paav.cisco@gmail.com> Thu, 09 July 2009 14:53 UTC
Return-Path: <paav.cisco@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AAB4328C19E for <ipsec@core3.amsl.com>; Thu, 9 Jul 2009 07:53:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.995
X-Spam-Level:
X-Spam-Status: No, score=-1.995 tagged_above=-999 required=5 tests=[AWL=0.603, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5ISJMb17otqY for <ipsec@core3.amsl.com>; Thu, 9 Jul 2009 07:53:33 -0700 (PDT)
Received: from mail-bw0-f225.google.com (mail-bw0-f225.google.com [209.85.218.225]) by core3.amsl.com (Postfix) with ESMTP id 3DA103A67FD for <ipsec@ietf.org>; Thu, 9 Jul 2009 07:53:33 -0700 (PDT)
Received: by bwz25 with SMTP id 25so226692bwz.37 for <ipsec@ietf.org>; Thu, 09 Jul 2009 07:53:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:content-type; bh=M52vSLOqaGQduBML8D4NUck/4jPku8fe6YD/tC+Zrvc=; b=Yg3gntsG4aswaCMSkbKAgUIR0qxsreuAXGPujFrlZFK/Txvtfd9k4Iuf2GZeAAxQyQ E0tQUdrZz/xFh1i/dyPSSeay6ZlScWi0hTddKcyZz9htjQ8NMu2FxFWRrzFy0hX3UBLV rzVGisbJ9eskwkTEvQoEo2tstj8nbeEApfl0Y=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; b=B3gCYD+hQxgSWeQWTMgqdwDD+OO2s2d98vj/rGVxqR3z0YWoVZWdcCTOoOZT8eAeK8 MqsRPdOQBMtiVKKKofLw1sRTo8XlDPlGWBE9sbVzqqkYghBQB6dazCam4xO3iJri54vt 2Qgiqov6ZVdiG7ZQdz3/0HiSr4RoHsUuhFGds=
MIME-Version: 1.0
Received: by 10.223.114.68 with SMTP id d4mr380296faq.86.1247151237991; Thu, 09 Jul 2009 07:53:57 -0700 (PDT)
In-Reply-To: <85A9BBD7AEEA8F4ABE056A20AB06B94B9A7322@XMB-BGL-419.cisco.com>
References: <85A9BBD7AEEA8F4ABE056A20AB06B94B9A7322@XMB-BGL-419.cisco.com>
Date: Thu, 09 Jul 2009 20:23:57 +0530
Message-ID: <40e68ca20907090753y43cfb8fes552c685f6434c866@mail.gmail.com>
From: Padmakumar AV <paav.cisco@gmail.com>
To: ipsec@ietf.org
Content-Type: multipart/alternative; boundary="001636c5b184858f9b046e470696"
Subject: [IPsec] Fwd: FW: New Version Notification for draft-padmakumar-ikev2-redirect-and-auth-offload-00
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jul 2009 14:53:34 -0000
Hi All, I submitted a new draft draft-padmakumar-ikev2-redirect-and-auth-offload-00 ( http://www.ietf.org/internet-drafts/draft-padmakumar-ikev2-redirect-and-auth-offload-00.txt ). This draft discuss IKEv2 redirect based mechanism to offload Authenication related work to a trusted third party. I'd like to have comments on this. Thanks and Regards, Padmakumar -----Original Message----- From: IETF I-D Submission Tool [mailto:idsubmission@ietf.org] Sent: Thursday, July 09, 2009 7:28 PM To: Padmakumar Av (paav) Cc: Manikchand Bafna (manikrb); Pratima Sethi (psethi) Subject: New Version Notification for draft-padmakumar-ikev2-redirect-and-auth-offload-00 A new version of I-D, draft-padmakumar-ikev2-redirect-and-auth-offload-00.txt has been successfuly submitted by A Padmakumar and posted to the IETF repository. Filename: draft-padmakumar-ikev2-redirect-and-auth-offload Revision: 00 Title: IKEv2 Redirect and Authentication Offload Creation_date: 2009-07-09 WG ID: Independent Submission Number_of_pages: 14 Abstract: IKEv2 is a component of IPsec used for performing mutual authentication and establishing and maintaining security associations (SAs). Redirect Mechanism for IKEv2 proposes a mechanism for IKEv2 that enables a VPN gateway to redirect the VPN client to another VPN gateway, for example, based on the load condition. Redirect mechanism can also be used to redirect a client to another router (Trust Anchor) to do mutual authentication on behalf of the server. After mutual authentication Trust Anchor can redirect the client back to the server with an Access Token which can be used as a pre-shared key between the server and client for password based IKE_AUTH exchange. This document describes a mechanism to use IKEv2 redirects to offload such verifications to another trusted third party. The IETF Secretariat.
- [IPsec] Fwd: FW: New Version Notification for dra… Padmakumar AV