Re: [IPsec] Call for adoption: The NULL Authentication Method in IKEv2 Protocol

Paul Wouters <paul@nohats.ca> Mon, 08 September 2014 13:04 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F5321A87D4 for <ipsec@ietfa.amsl.com>; Mon, 8 Sep 2014 06:04:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.753
X-Spam-Level:
X-Spam-Status: No, score=-1.753 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-1.652] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KnwYfUlnxFGL for <ipsec@ietfa.amsl.com>; Mon, 8 Sep 2014 06:04:31 -0700 (PDT)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2034B1A87CE for <ipsec@ietf.org>; Mon, 8 Sep 2014 06:04:30 -0700 (PDT)
Received: from bofh.nohats.ca (bofh.nohats.ca [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 2BD8280416; Mon, 8 Sep 2014 09:04:27 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1410181467; bh=30PofIZ0wA5Vfgpl43lmx5Se5FXRWFklqNIVu0dikfI=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=JdiHMq7RzoZBwBrSjaI0Q4RVCcivp7aQn1a0Yw8nLINrV8UumuE6KVeuV+AsI1Z3c O5/JB63vPae9IPNPhbul+q/T/LqPGW0zp5cC5in/8Wc5l2WCwghEbae1e2DiDGiyQ2 mhBFnXIvhJmsSfcL/r44sMRgby72teCrZ6c3t+UI=
Received: from localhost (paul@localhost) by bofh.nohats.ca (8.14.7/8.14.7/Submit) with ESMTP id s88D4QIq003224; Mon, 8 Sep 2014 09:04:26 -0400
X-Authentication-Warning: bofh.nohats.ca: paul owned process doing -bs
Date: Mon, 08 Sep 2014 09:04:26 -0400
From: Paul Wouters <paul@nohats.ca>
To: Yaron Sheffer <yaronf.ietf@gmail.com>
In-Reply-To: <540CA9B2.3090807@gmail.com>
Message-ID: <alpine.LFD.2.10.1409080902080.31411@bofh.nohats.ca>
References: <540CA9B2.3090807@gmail.com>
User-Agent: Alpine 2.10 (LFD 1266 2009-07-14)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
Archived-At: http://mailarchive.ietf.org/arch/msg/ipsec/Rbq8tre4WLoyIANXEYwP6ZXhNYA
Cc: ipsec <ipsec@ietf.org>
Subject: Re: [IPsec] Call for adoption: The NULL Authentication Method in IKEv2 Protocol
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Sep 2014 13:04:33 -0000

On Sun, 7 Sep 2014, Yaron Sheffer wrote:

> Subject: [IPsec] Call for adoption: The NULL Authentication Method in IKEv2
>     Protocol
> 
> Dear working group,
>
> This is a call for adopting draft-smyslov-ipsecme-ikev2-null-auth as a WG 
> document. Please respond to this mail with a Yes or No and a short rationale, 
> at latest by Friday Sep. 12.

Yes. This feature is very useful for opportunistic scenario's to defend
against pervasive monitoring with no IPsec configuration needed on the
client side. We are implementing this and it is important to
interoperate with other implementations.

Paul