[IPsec] IPsecME virtual interim meeting

Yaron Sheffer <yaronf.ietf@gmail.com> Sat, 27 April 2013 17:02 UTC

Return-Path: <yaronf.ietf@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A735021F9836 for <ipsec@ietfa.amsl.com>; Sat, 27 Apr 2013 10:02:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R7maUVCINdWj for <ipsec@ietfa.amsl.com>; Sat, 27 Apr 2013 10:02:12 -0700 (PDT)
Received: from mail-wg0-x22d.google.com (mail-wg0-x22d.google.com [IPv6:2a00:1450:400c:c00::22d]) by ietfa.amsl.com (Postfix) with ESMTP id DCAAE21F982D for <ipsec@ietf.org>; Sat, 27 Apr 2013 10:02:11 -0700 (PDT)
Received: by mail-wg0-f45.google.com with SMTP id l18so2792245wgh.12 for <ipsec@ietf.org>; Sat, 27 Apr 2013 10:02:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :content-type:content-transfer-encoding; bh=Ss62dVeZV7z6fqRWOrX3/FGbYqTh5Cq8vA3Nx13znB8=; b=zciRCzjcEGPpW5CJGnEsnHO0QMvgrB7E7ikb9PhThLnGYtLz4XYhNHDr4tEXNtaXPi Y9Hb1w+Mrw/v+h62IXAVfOJCRm7RTrFJ8oMSdwq1AjwoaRuTWdD9zIPhcoqOX/ALB7dq 5UTjrYzrOXlJo+ZYNGgHxWS60TfS2jcC73aAaTtFlkaGEfAQaJUn8ypMTvmX44cxHOOR oVymOxcu3FR1P2NCS4zrAIX4y2+cMjTTMPHPu5lk7QLyezHd3yirsYKha7bXlboDIJcG RXdere0eFp6x8ZlRcyV+ON63rNNx1Iws6yiXfo0XXfUJ8OIT5nHpnJV/z2G0rNoHE7dM qeFA==
X-Received: by 10.180.20.37 with SMTP id k5mr9645148wie.27.1367082131098; Sat, 27 Apr 2013 10:02:11 -0700 (PDT)
Received: from [10.0.0.2] (bzq-79-176-108-129.red.bezeqint.net. [79.176.108.129]) by mx.google.com with ESMTPSA id dj7sm10110938wib.6.2013.04.27.10.02.09 for <ipsec@ietf.org> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Sat, 27 Apr 2013 10:02:10 -0700 (PDT)
Message-ID: <517C0490.9010600@gmail.com>
Date: Sat, 27 Apr 2013 20:02:08 +0300
From: Yaron Sheffer <yaronf.ietf@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130329 Thunderbird/17.0.5
MIME-Version: 1.0
To: IPsecme WG <ipsec@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: [IPsec] IPsecME virtual interim meeting
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 27 Apr 2013 17:02:12 -0000

Dear IPsec folks,

The ipsecme working group is chartered to come up with a solution for 
transporting long IKEv2 messages over networks that do not perform IP 
fragmentation correctly, and as a result drop overly long messages, 
usually IKE_AUTH messages.

Our original plan was to base the solution on IKE-over-TCP, however the 
author of this draft decided to abandon it because he now prefers a 
different solution, similar to the (non-standard) IKEv1 Fragmentation 
payload that was implemented by several vendors (see 
http://msdn.microsoft.com/en-us/library/cc233251.aspx) We do not want 
to end up with a common but non-standard solution in IKEv2, which would 
practically guarantee interoperability issues.

As a further data point, we are aware of IPR issues with Microsoft's 
solution; we have tried to clarify the issue with Microsoft but have not 
been successful yet.

We would like to invite the group to a Virtual Interim Meeting (a.k.a. 
conference call), to discuss this problem.

Potential outcomes of the meeting include:
- The group decides that this is not an important problem.
- This is an important problem and we have 1-2 people committed to 
author a draft along the lines of the non-standard IKEv1 mechanism.
- This is an important problem and the group is happy to adopt 
draft-smyslov-ipsecme-ikev2-fragmentation (which solves the same problem 
in a somewhat different fashion).
- The group still prefers IKE-over-TCP and there are committed authors 
to continue work on that draft.

We propose to meet May 7, at 9:00am PST (16:00 UTC, 12:00 noon EST, 
19:00 Israel) for 1 hour. We will publish a bridge number a week before 
the meeting.

Please let us know if the date/time absolutely doesn't work for you.

We welcome and invite discussion of these issues on the mailing list 
before the meeting.

Thanks,
     Paul and Yaron