Re: [IPsec] Proposed work item: IKEv2 password authentication (SPSK) - NO

"Dan Harkins" <dharkins@lounge.org> Tue, 01 December 2009 08:19 UTC

Return-Path: <dharkins@lounge.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 59FA728C1AF for <ipsec@core3.amsl.com>; Tue, 1 Dec 2009 00:19:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.265
X-Spam-Level:
X-Spam-Status: No, score=-6.265 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iopwngIdHu6i for <ipsec@core3.amsl.com>; Tue, 1 Dec 2009 00:19:35 -0800 (PST)
Received: from colo.trepanning.net (colo.trepanning.net [69.55.226.174]) by core3.amsl.com (Postfix) with ESMTP id 184D13A6908 for <ipsec@ietf.org>; Tue, 1 Dec 2009 00:19:35 -0800 (PST)
Received: from www.trepanning.net (localhost [127.0.0.1]) by colo.trepanning.net (Postfix) with ESMTP id 7E9B71022407E; Tue, 1 Dec 2009 00:19:27 -0800 (PST)
Received: from 69.12.173.8 (SquirrelMail authenticated user dharkins@lounge.org) by www.trepanning.net with HTTP; Tue, 1 Dec 2009 00:19:27 -0800 (PST)
Message-ID: <402d5ea50fcadec3d66a41f63fd1b9df.squirrel@www.trepanning.net>
In-Reply-To: <7F9A6D26EB51614FBF9F81C0DA4CFEC801BDF88E06DD@il-ex01.ad.checkpoint.co m>
References: <7F9A6D26EB51614FBF9F81C0DA4CFEC801BDF88E04F2@il-ex01.ad.checkpoint.com> <a70eac2cf1d8cc1b743fb05aadf791b9.squirrel@www.trepanning.net> <7F9A6D26EB51614FBF9F81C0DA4CFEC801BDF88E06DD@il-ex01.ad.checkpoint.com>
Date: Tue, 01 Dec 2009 00:19:27 -0800
From: Dan Harkins <dharkins@lounge.org>
To: Yaron Sheffer <yaronf@checkpoint.com>
User-Agent: SquirrelMail/1.4.14 [SVN]
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, Dan Harkins <dharkins@lounge.org>
Subject: Re: [IPsec] Proposed work item: IKEv2 password authentication (SPSK) - NO
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Dec 2009 08:19:36 -0000

  Yaron,

  It is important for you to state what problem you're trying to solve.
That problem is, simply, password-only authentication. To bring up the
motivation for adding EAP to IKEv2 is quite irrelevant since EAP in IKEv2
today involves server-side authentication using a certificate.

  You want to do password authentication in IKE. Period. Full stop. And to
do that you want to add a pointless encapsulation. And you want to do it
with twice as many messages. And you want to require each side to implement
both the client- and server-side state machines for this "solution" to
be useful in the use cases defined in IKEv2.

  It seems to me that you need to justify why such EXTRA work is necessary
when a simpler way of solving your problem is available. Don't just say
"it doesn't make sense", justify why you are proposing more, extraneous
work.

  Furthermore, I would be very interested in why you feel that a WG in
the Security Area of the IETF is not the place to define cryptographic
protocols and that it would be more appropriate for a WG in the Security
Area to just use a protocol from the Network Area with protocols defined
as individual submissions.

  Dan.

On Mon, November 30, 2009 10:46 pm, Yaron Sheffer wrote:
> Hi everyone,
>
> [WG co-chair hat off]
>
> I believe this effort is misguided, and would be a waste of the WG time.
>
> EAP was added to IKEv2 to provide "legacy" (a.k.a. password)
> authentication. In the past it did not do it very well, but this is
> changing. We should improve the use of EAP in IKEv2, rather than replacing
> it by a homebrew solution.
>
> Specifically, the following EAP methods can be used today (or in the near
> future) for mutual password-based auth:
>
> - Dan's own EAP-PWD,
> http://tools.ietf.org/html/draft-harkins-emu-eap-pwd-12
> - My EAP-EKE, http://tools.ietf.org/html/draft-sheffer-emu-eap-eke-03
> - The long expired EAP-SRP,
> http://tools.ietf.org/html/draft-ietf-pppext-eap-srp-03
> - A rumored EAP method based on the PAK protocol
> (http://tools.ietf.org/html/draft-brusilovsky-pak-10)
>
> Embedding one of these methods as the single way to do mutual auth in IKE
> simply doesn't make sense.
>
> In addition, SPSK (which is equivalent to EAP-PWD) is a novel crypto
> protocol. It has had by far the least crypto review than the other three
> protocols. IMHO, this working group should NOT be developing new
> cryptographic protocols. This is not where our expertise lies.
>
> Lastly, one of the major criticisms with IKEv1 was the number of protocol
> modes. And here we are, with a proposal to add another mode to IKEv2.
> Doesn't seem like a good idea to me.
>
> Thanks,
> 	Yaron
>
>
>> -----Original Message-----
>> From: Dan Harkins [mailto:dharkins@lounge.org]
>> Sent: Tuesday, December 01, 2009 1:35
>> To: Yaron Sheffer
>> Cc: ipsec@ietf.org
>> Subject: Re: [IPsec] Proposed work item: IKEv2 password authentication
>> (SPSK)
>>
>>
>>   Hello,
>>
>>   As can be inferred by my previous posting on EAP-only authentication,
>> I favor this particular method for mutual authentication.
>>
>>   I believe this is a general purpose exchange, useful for more than the
>> narrow focus of EAP-only, does not require extraneous encapsulations or
>> unnecessary code (ala EAP-only), and is secure regardless of its use
>> (unlike EAP-only).
>>
>>   I am committed to working on this as a WG work item. I agree to
>> continue
>> contributing to the text and (co-)authoring the text. I solicit help,
>> and
>> support, from those who are interested in this task.
>>
>>   regards,
>>
>>   Dan.
>>
>> On Sun, November 29, 2009 9:20 am, Yaron Sheffer wrote:
>> > This draft proposes a particular method for mutual authentication of
>> IKEv2
>> > peers using a short, low quality shared secret (a.k.a. "password").
>> The
>> > proposal is to embed this method in the IKE exchange, rather than use
>> EAP.
>> >
>> > Proposed starting point:
>> > http://tools.ietf.org/id/draft-harkins-ipsecme-spsk-auth-00.txt.
>> >
>> > Please reply to the list:
>> >
>> > - If this proposal is accepted as a WG work item, are you committing
>> to
>> > review multiple versions of the draft?
>> > - Are you willing to contribute text to the draft?
>> > - Would you like to co-author it?
>> >
>> > Please also reply to the list if:
>> >
>> > - You believe this is NOT a reasonable activity for the WG to spend
>> time
>> > on.
>> >
>> > If this is the case, please explain your position. Do not explore the
>> fine
>> > technical details (which will change anyway, once the WG gets hold of
>> the
>> > draft); instead explain why this is uninteresting for the WG or for
>> the
>> > industry at large. Also, please mark the title clearly (e.g. "DES40-
>> export
>> > in IPsec - NO!").
>> > _______________________________________________
>> > IPsec mailing list
>> > IPsec@ietf.org
>> > https://www.ietf.org/mailman/listinfo/ipsec
>> >
>>
>>
>>
>> Scanned by Check Point Total Security Gateway.
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
>