Re: [IPsec] I-D Action: draft-ietf-ipsecme-g-ikev2-08.txt
Daniel Migault <mglt.ietf@gmail.com> Mon, 17 April 2023 12:55 UTC
Return-Path: <mglt.ietf@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62FB7C1516E9 for <ipsec@ietfa.amsl.com>; Mon, 17 Apr 2023 05:55:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.093
X-Spam-Level:
X-Spam-Status: No, score=-2.093 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xVVUpsbuum7B for <ipsec@ietfa.amsl.com>; Mon, 17 Apr 2023 05:55:17 -0700 (PDT)
Received: from mail-pl1-x62b.google.com (mail-pl1-x62b.google.com [IPv6:2607:f8b0:4864:20::62b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 764F6C15155F for <ipsec@ietf.org>; Mon, 17 Apr 2023 05:55:17 -0700 (PDT)
Received: by mail-pl1-x62b.google.com with SMTP id w1so2694944plg.6 for <ipsec@ietf.org>; Mon, 17 Apr 2023 05:55:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1681736117; x=1684328117; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=00n3DTdtSlQjAzwAspmbFgTuSgfGenzPq4AxlQmDD0w=; b=dbS1BC3TpE42Un+cnzzERtGulH8VQ/YqEO1FQ8/4R3RuaMQchtyshLoyh5bSmSxRMj EOIic38rTG+ew9FRRQkNmISSiy1q98w0BPSe2fWZt1wgw7QngQYem/5H0/wisHAj8Z+R L504a24r2F8B1pr6vCaThdFOWC1ub+Q5zxU5HiqDgXsN+jqGvFj50nEXZiOGCcLMOgNl BKKM+j18w63Fkx4bk8IXrPyMM0IS1RqmBpHnWNNWXSqsybMV3tgBKDBFVV68llLtc2En 6JYYEPa4xayI8c3dVDm0LkVu96+Ikxq19QDdZ2GUcifcRhFSa9A42dYKjhlQ52zs5aBJ Wfug==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1681736117; x=1684328117; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=00n3DTdtSlQjAzwAspmbFgTuSgfGenzPq4AxlQmDD0w=; b=etPfSkzu1dcC7uBne0/FsciA14Y4UAIRPnpqOz3T61M4+oXLWJsZD89RKOOHdVBSp0 FaQhqmNBH0Yd8kpFOr4DJLTo5nRHVwe7PAcalODI8+1EkMESxFfpLYYQ/TtEJpM4bbee ySYH9WH9GdcdfhsZx7E7E4Yn7Q+OXGcQbmHnKmYJX+sIEIDwq8zj0Do6LTOdZAtVP/Pa GIq5TBwe0lQ4DEmZ22gEetwtaplzZun2hMHyTW5BL/nSsdHE/fbfxhT0io8Di3Df3yqj kkZ48y4eBPxtQoiCbwGiU5zsV7701F4cNlAXe4YShhiDp5Nh/TH6KFlHCLj0FJUQWyus SLng==
X-Gm-Message-State: AAQBX9c0RsIskowQWENArE171lqGVpn8K7f3cqJj0SZVTCjTfzVdH03l 2nZhuFHP4hVqqj3Nrkvu04Vj+1pWZZkYaklKPsTGFmof
X-Google-Smtp-Source: AKy350b4GEdQGgqh+dkYRSBrfqAdTqemjPXjpfEfkK97g5h1CLScNgyuY1vbNPvNwpyIYLyNQ7lKcZeaF1RDJuNI2Sw=
X-Received: by 2002:a17:902:8bc8:b0:1a6:9e74:71c0 with SMTP id r8-20020a1709028bc800b001a69e7471c0mr3247975plo.7.1681736116419; Mon, 17 Apr 2023 05:55:16 -0700 (PDT)
MIME-Version: 1.0
References: <167836900620.59072.16500629937016724049@ietfa.amsl.com> <194e01d9528d$48fe44f0$dafaced0$@gmail.com> <CADZyTkkXsSG5k7QSzswK3QkZbJ03n7GHj7ysWxm0uRhvrBapJA@mail.gmail.com> <02a001d96d58$a4e45f80$eead1e80$@gmail.com> <CADZyTk=mB392UdmFn74ZbdxNvsFjeTDHFgMNbnzkTztqhDUWHg@mail.gmail.com> <058601d97109$d09636d0$71c2a470$@gmail.com>
In-Reply-To: <058601d97109$d09636d0$71c2a470$@gmail.com>
From: Daniel Migault <mglt.ietf@gmail.com>
Date: Mon, 17 Apr 2023 08:55:05 -0400
Message-ID: <CADZyTk=1cfhSWRH4fT+JhpjK4GVzjjmmRTS5qPX_5=M965yS1Q@mail.gmail.com>
To: Valery Smyslov <smyslov.ietf@gmail.com>
Cc: ipsec@ietf.org
Content-Type: multipart/alternative; boundary="000000000000d347cc05f987b352"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/knLofMFChif9KvdQ9Mi6DrJAUuo>
Subject: Re: [IPsec] I-D Action: draft-ietf-ipsecme-g-ikev2-08.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Apr 2023 12:55:19 -0000
On Mon, Apr 17, 2023 at 4:51 AM Valery Smyslov <smyslov.ietf@gmail.com> wrote: > HI Daniel, > > > > thanks for the follow-up, please see inline (some text is snipped, where > we are in agreement). > > > > *From:* Daniel Migault [mailto:mglt.ietf@gmail.com] > *Sent:* Friday, April 14, 2023 11:39 PM > *To:* Valery Smyslov > *Cc:* ipsec@ietf.org > *Subject:* Re: [IPsec] I-D Action: draft-ietf-ipsecme-g-ikev2-08.txt > > > > Hi Valery, > > > > Thanks for the follow-up please find inline my response to your comment. > Thank you for the clarifications and all my comments have been responded > to. > > > > Yours, > Daniel > > > > > > [snipped] > > > 1. Introduction and Overview > > A group key management protocol provides IPsec keys and policy to a > set of IPsec devices which are authorized to communicate using a > Group Security Association (GSA) defined in [RFC3740]. > <mglt> > This is a nit but I believe that saying striaght forward > """ > This document presents an extension to > IKEv2 [RFC7296] called G-IKEv2, that allows to perform a group key > management. > > """ > > may be clearer. > > </mglt> > > > > This is exactly what is written a few lines below in the same > para :-) > > Absolutely, as far as I remember, what I meant is that mentioning this > sentence in the beginning tells upfront what the draft is about. Starting > with the notion of groups management is I think not the reason we have the > draft. Again that was just a nit. > > > > OK, I moved this sentence to the beginning of the section. > > > thanks. > Large and small groups may use different sets of these protocols. > When a large group of devices are communicating, the GCKS is likely > to use the GSA_REKEY message for efficiency. This is shown in > Figure 1. (Note: For clarity, IKE_SA_INIT is omitted from the > figure.) > > +--------+ > +------------->| GCKS |<-------------+ > | +--------+ | > | | ^ | > | | | | > | | GSA_AUTH | > | | or | > | | GSA_REGISTRATION | > | | | | > GSA_AUTH | | GSA_AUTH > or GSA_REKEY | or > GSA_REGISTRATION | | GSA_REGISTRATION > | | | | > | +------------+-----------------+ | > | | | | | | > v v v v v v > +-------+ +--------+ +-------+ > | GM | ... | GM | ... | GM | > +-------+ +--------+ +-------+ > ^ ^ ^ > | | | > +-------ESP-------+-------ESP------+ > > Figure 1: G-IKEv2 used in large groups > > <mglt> > It might be helpful to indicate (inidvidual) IKE channel while the ESP SA > is shared between all GMs. > > > > I think that individual IKE SAs are already shown (GSA_AUTH or > GSA_REGISTRATION). Am I missing your point? > > Or do you want to change them to “IKE SA”? > > > > I do not remember what I had exactly in mind, but I think it might be to > indicate just IKE versus ESP to make it clear GSA messages are IKE > messages. > > > > I’m a bit unsure how to better do it. I’ve added labels > indicating IKE SAs, probably this suffice? > > Formally we should also label multicast communications, but I’m > not sure how to do it. > > Make them in double lines (==========)? > unless there is something obvious to do, we can leave this as it is. > [snip] > > - Data Security SA (DATA): A multicast SA between each multicast > > source speaker and the group's receivers. There may be as many > > data SAs as there are multicast sources allowed by the group's > > policy. > > > > which I like more. Should we use this instead? > > Then the definition of Rekey SA must also be changed. > > > > I find it may be confusing to have policies in the definition of an SA, so > the second seems clearer to me, but I am not pushing too much. Pick > whatever you believe is better. > > > > I changed definitions of Data-Security SA and Rekey SA to better > match RFC 3740 (which is clearer in my opinion). > > But still, the draft uses “policy” as synonym for “SA” very > extensively (alas). I find this confusing too, but this text was there > from ancient times... > > > > > seems fine if we know it is in the SA side (not SP), we can understand what policies mean at the other places. I think that it is reasonable to not change everywhere. ;-) > [snip] > > > > 2. G-IKEv2 Protocol > > 2.1. G-IKEv2 Integration into IKEv2 Protocol > > G-IKEv2 is an extension to IKEv2 and uses its security mechanisms > (peer authentication, confidentiality, message integrity) to ensure > that only authenticated devices have access to the group policy and > keys. G-IKEv2 further provides group authorization, and secure > policy and key download from the GCKS to GMs. > > <mglt> > Reading the last sentence, I am interpretingh it as a consequence of > provindin a GSA. If that is the case, I see this a a much simpler way to > describve what it does. group authorization might be perceived as something > like OAUTH, policies as something more complex. Typically ACE has defined > some quite complex messaging for managing group communications, so stiking > to IPsec might limit such confusion. > </mglt> > > > > Authorization here is an access control for GM entering the > group. How about: > > > > G-IKEv2 is an extension to IKEv2 and uses its security mechanisms > (peer authentication, > > confidentiality, message integrity) to ensure that only > authenticated and authorized > > devices have access to the group policy and keys. > > G-IKEv2 provides secure policy and keys download from the GCKS to > GMs. > > > > Or can you provide a better text? > > I think that what I would propose could be: > > G-IKEv2 is an extension to IKEv2 that provides group authorization, > secure > > policy and key download from the GCKS to GMs. > > > > OK, will use this, thank you. > > > G-IKEv2 is compatible with most IKEv2 extensions defined so far and > it is believed that future IKEv2 extensions will also be possible to > use with G-IKEv2. However some IKEv2 extensions require special > handling if used with G-IKEv2. See Section 6 for more details. > > It is assumed that readers are familiar with the IKEv2 protocol, so > this document skips many details that are described in [RFC7296]. > > 2.1.1. G-IKEv2 Transport and Port > > As IKEv2 extension G-IKEv2 SHOULD use the IKEv2 ports (500, 4500). > G-IKEv2 MAY also use TCP transport for registration (unicast) IKE SA, > as defined in [RFC9329]. G-IKEv2 MAY also use UDP port 848, the same > as GDOI [RFC6407], because they serve a similar function. The > version number in the IKE header distinguishes the G-IKEv2 protocol > from GDOI protocol [RFC6407]. > > Section 2.23 of [RFC7296] describes how IKEv2 deals with NATs. > Despite the fact, that with G-IKEv2 the registration SA doesn't > create any unicast IPsec SAs and thus there is no unicast ESP traffic > between the GM and the GCKS to encapsulate in UDP if NAT is present, > the actions described in this section concerned with the IKE SA MUST > be honored. > <mglt> > Actually the only question I am wondering if whether ther is a child SA or > not. > </mglt> > > > > Data-Security SAs are Child SAs. > > > > that was not clear to me when I made the comment. As mentioned earlier, I > believe that I missed that GSA contains multiple SA"s". > > > > So, do you think any clarification is needed? > No, I think previous comments addressed that concern. > > [snip] > > > > so the identities are hidden from > eavesdroppers and all fields in all the messages are authenticated. > The GCKS SHOULD authorize group members to be allowed into the group > as part of the GSA_AUTH exchange. > <mglt> > The "SHOULD" sounds strange to me as I have the impression that completing > the exchange implicilt provides the authorization. > </mglt> > > > > Hm, as far as I understand, the intended meaning is that the > GCKS must authorize the GM unless > > the group is completely public (no restriction on membership). > Can you propose a better text if this is not clear? > > > > I would have proposed: > > The GCKS authorizes group members to be allowed into the group as part of > the GSA_AUTH exchange. > > > > OK. > > to join a group it will download the data security keys (TEKs) > and/or group key encrypting key (KEK) as part of the GSA_AUTH > response message. > <mglt> > I am finding "download" confusing here as I see teh GS_AUTH response > providing the TEK and KEK. > </mglt> > > That is correct. s/download/provide ? > > I prefer - but please just change it if you find it useful otherwise, just > leave it as it is. > > > > I changed to: > > > > Once the GCKS accepts a GM to join a > > group it will provide the GM with the data security keys (TEKs) > and/or group key > > encrypting key (KEK) as part of the GSA_AUTH response message. > > > seems fine to me. > > > Smyslov & Weis Expires 10 September 2023 [Page 9] > > Internet-Draft G-IKEv2 March 2023 > > > 2.3.1. GSA_AUTH exchange > > After the group member and GCKS negotiate cryptographic algorithms, > exchange nonces, and compute shared keys as defined in IKEv2 > [RFC7296], the GSA_AUTH exchange MUST complete before any other > exchanges defined in this document can be done. GSA_AUTH is used to > authenticate the previous exchanges, exchange identities and > certificates. G-IKEv2 also uses this exchange for group member > registration and authorization. > > The GSA_AUTH exchange is identical to the IKE_AUTH exchange with the > difference that its goal is to establish multicast Data-Security SAs > and optionally provide GM with the keys for Rekey SA. The set of > payloads in the GSA_AUTH exchange is slightly different, because > policy is not negotiated between the group member and the GCKS, but > instead downloaded from the GCKS to the group member. > <mglt> > I think we shoudl avoid identicial as there are some difference. Perhaps > something around: > he GSA_AUTH exchange is a specific exchange with a given exchange type > whose purpose is very similar to IKE_AUTH. > > > > May I propose simply: > > > > The GSA_AUTH exchange is similar to the IKE_AUTH exchange with the > > difference that its goal is to establish multicast Data-Security > SAs > > and optionally provide GM with the keys for Rekey SA. > > > There are in my opinion 2 goals, including authenticating the GM which > seems to be missing in the text. > > > > In my reading this goal is hidden inside “similar to the > IKE_AUTH”. > > > > sounds good to me. > > > I am reading downloaded as defined or dictated by the GCKS. I think that > is good to mention the GIKE_SA is not "agreed". > > > > What is your proposal here? > > > > I see more "download" as "provided". > > > > Changed to: > > > > The set of payloads > > in the GSA_AUTH exchange is slightly different, because policy is > not > > negotiated between the group member and the GCKS, but instead > > provided by the GCKS for the GM. > > > > Is it better? > I think so. > </mglt> > > > > > > > Note also, > that GSA_AUTH has its own exchange type, which is different from the > IKE_AUTH exchange type. > <mglt> > The text above seems to have been introduces since we mentions GSA_AUTH > and IKE_AUTH are "identiical" but not. It opposes what is before and what > follows, so I we should probably remove that paragraph. > </mglt> > > > > If you believe this is obvious, I’ll remove this text. > > > > I think we should keep it now that we stated the exchanges are not > identical. Let's wait if someone complains. > > > > > > OK. > > > [snip] > > > In addition to the IKEv2 error handling, the GCKS can reject the > registration request when the IDg is invalid or authorization fails, > etc. In these cases, see Section 4.7, the GSA_AUTH response will not > include the GSA and KD, but will include a Notify payload indicating > errors. If a GM included an SAg payload, and the GCKS chooses to > evaluate it, and the GCKS detects that the group member cannot > support the security policy defined for the group, then the GCKS > SHOULD return a NO_PROPOSAL_CHOSEN. Other types of error > notifications can be INVALID_GROUP_ID, AUTHORIZATION_FAILED or > REGISTRATION_FAILED. > > <mglt> > SENDER introduces some roles a GM can play, and I beleive we need to > explicitly mention if there is an error associated to that role or not. > </mgt> > > > > I don’t think there is any specific errors for senders. Am I > missing your point? > > I think I was thinking a GM may only be allowed to listen and not to send, > in which case, the GCSK may notify this to the GM. > > > > An AUTHORIZATION_FAILED or REGISTRATION_FAILED may be used in > this case (but they are not specific to senders). > > > ok > > > Initiator (GM) Responder (GCKS) > -------------------- ------------------ > <-- HDR, SK{IDr, [CERT,] AUTH, N} > > Figure 5: GSA_AUTH Error Response > > > If the group member finds the policy sent by the GCKS is > unacceptable, the member SHOULD initiate GSA_REGISTRATION exchange > sending IDg and the Notify NO_PROPOSAL_CHOSEN (see Section 2.3.2)). > > 2.3.2. GSA_REGISTRATION Exchange > > When a secure channel is already established between a GM and the > GCKS, the GM registration for a group can reuse the established > secure channel. In this scenario the GM will use the > GSA_REGISTRATION exchange. Payloads in the exchange are generated > and processed as defined in Section 2.3.1. > > <mglt> > My impression is that GSA_REGISTRATION is not needed as it does not > provides additional functionalities than GSA_AUTH. I am wondering if that > exchange MUST be supported by implementations or if it could be optional - > especially for minimal implementations. > </mglt> > > > > GSA_REGISTRATION may be used if the GM wishes to join several > groups hosted by a single GCKS. > > It is also used to re-register GM to the group in case of > missing GSA_REKEY message (provided IKE SA is up) and to perform some > housekeeping > > (e.g to allow GM to explicitly unregister itself from the > group). I don’t think it is optional to support. > > > [snip] > > Actually I was thinking that one method could be mandatory, while the > other remains optional to ease implementation. The current specification > mandates the two methods. I was basically suggesting that IoT devices may > only implement the one that does not require to maintain an IKE_SA over > time. > > > > > > I see your point. Probably we should hear from others... > > > probably a bis draft ;-) > [snip] > > HDR is defined in Section 4.1. > <mglt> > probably "discussed" is more appropriated than "defined". > </mglt> > > > > Why? Isn’t it defined there? > > I think I meant "described" at that time and the spell checker transformed > it to "discussed" which does not make sense. That said, I cannot > remember why I made the comment. > > > > :-) > > > > [snip] > > The AUTH payload MUST be included to authenticate the GSA_REKEY > message if the authentication method is based on public key > signatures and MUST NOT be included if authentication is implicit. > <mglt> > It is unclear to me what "authentication is implicit" means. I suppose it > means "we assumes the origin is the KSCS" but we cannot real check that. > </mglt> > > > > Sort of. If no AUTH payload is included, then the receiver only > knows that > > the message was sent by someone who knows the current group key, > i.e. some group member. > > There is no real authentication of the GCKS, the receiver just > trusts that the sender of the > > message is GCKS. Can only be used in small groups of mutually > trusted members. > > > In the latter case, the fact that a GM can decrypt the GSA_REKEY > message and verify its ICV proves that the sender of this message > knows the current KEK, thus authenticating the sender as a member of > the group. Note, that implicit authentication doesn't provide source > origin authentication. For this reason using implicit authentication > for GSA_REKEY is NOT RECOMMENDED unless source origin authentication > is not required (for example, in a small group of highly trusted > GMs). The value of the Auth Method field in the AUTH payload in the > GSA_REKEY message MUST NOT be NULL Authentication. > <mglt> DISCUSSION > I am wondering if I am correct in saying that any GM can perform a > GSA_REKEYunless AUTH is provided. If so, I am wondering if one should even > consider that implicit authentication is permitted. > </mglt> > > > > Yes. See above. > > > > What about whether it is permitted – the GCKS includes > Authentication Method attribute into the GSA payload. > > So, it is the GCKS who decides whether this is permitted or not. > Of course, once it indicated that > > authentication is implicit, any GM may impersonate it. > > > > [snip] > > > > It seems strange to me ;-) > > > > Any suggestions? > > > I suspect that we have this unauthenticated mode for some reason... so just keep it. > [snip] > > > I am also wondering if replaying a rekey message would not open the path > to IV/counters being replayed. > > > > No, since it contains the same encrypted data. No new encryption > operation is performed. > > > > That is the reason I was thinking of the clear text. I am not saying that > is not clear, but I think mentioning bitwise of the encrypted message may > even be clearer. > > > > Hmm, doesn’t the text “The retransmitted messages MUST be > bitwise identical” implies that we are talking about encrypted messages? > > I can change the text to: > > > > To mitigate such lost messages, during a rekey event the > > GCKS may transmit several copies of an encrypted GSA_REKEY > message with the new > > policy. The retransmitted messages MUST be bitwise identical... > > > > Is it better? > > > I think /retransmitted/ (encrypted) retransmitted/ in any of the sentences would address my concern. > [snip] > > Replay protection is achieved by a group member rejecting a GSA_REKEY > message which has a Message ID smaller than the current Message ID > that the GM is expecting. The GM expects the Message ID in the first > GSA_REKEY message it receives to be equal or greater than the Message > ID it receives in the GSA_INITIAL_MESSAGE_ID attribute. Note, that > if no this attribute was received for the Rekey SA, the GM MUST > <mglt> > I suspect a nit "if no this" shoudl probably means "if this" > </mglt> > > > > Why? The intended meaning is that if no GSA_INITIAL_MESSAGE_ID > is sent, then 0 is assumed as initial Message-ID. > > > > Probably “If no such attribute” is more clear... > > maybe: if the GSA_INITIAL_MESSAGE_ID attribute is not received > > > > OK. > > > > [snip] > > > > Thank you, and still waiting for the second part :-) > > The changes made so far are available at > https://github.com/smyslov/G-IKEv2 > > > Let's hope I can make it this week! > > > Regards, > > Valery. > > > > On Thu, Mar 9, 2023 at 8:44 AM Valery Smyslov <smyslov.ietf@gmail.com> > wrote: > > Hi, > > the new version of G-IKEv2 draft is published. It mostly addresses > comments made by Michael. > Still waiting for more reviews... > > Regards, > Valery (for the authors). > > > -----Original Message----- > > From: IPsec [mailto:ipsec-bounces@ietf.org] On Behalf Of > internet-drafts@ietf.org > > Sent: Thursday, March 09, 2023 4:37 PM > > To: i-d-announce@ietf.org > > Cc: ipsec@ietf.org > > Subject: [IPsec] I-D Action: draft-ietf-ipsecme-g-ikev2-08.txt > > > > > > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > > This Internet-Draft is a work item of the IP Security Maintenance and > Extensions WG of the IETF. > > > > Title : Group Key Management using IKEv2 > > Authors : Valery Smyslov > > Brian Weis > > Filename : draft-ietf-ipsecme-g-ikev2-08.txt > > Pages : 70 > > Date : 2023-03-09 > > > > Abstract: > > This document presents an extension to the Internet Key Exchange > > version 2 (IKEv2) protocol for the purpose of a group key management. > > The protocol is in conformance with the Multicast Security (MSEC) key > > management architecture, which contains two components: member > > registration and group rekeying. Both components require a Group > > Controller/Key Server to download IPsec group security associations > > to authorized members of a group. The group members then exchange IP > > multicast or other group traffic as IPsec packets. This document > > obsoletes RFC 6407. This documents also updates RFC 7296 by renaming > > one of transform types defined there. > > > > > > The IETF datatracker status page for this Internet-Draft is: > > https://datatracker.ietf.org/doc/draft-ietf-ipsecme-g-ikev2/ > > > > There is also an htmlized version available at: > > https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-g-ikev2-08 > > > > A diff from the previous version is available at: > > https://author-tools.ietf.org/iddiff?url2=draft-ietf-ipsecme-g-ikev2-08 > > > > > > Internet-Drafts are also available by rsync at rsync.ietf.org: > :internet-drafts > > > > > > _______________________________________________ > > IPsec mailing list > > IPsec@ietf.org > > https://www.ietf.org/mailman/listinfo/ipsec > > _______________________________________________ > IPsec mailing list > IPsec@ietf.org > https://www.ietf.org/mailman/listinfo/ipsec > > > > > -- > > Daniel Migault > > Ericsson > > > > > -- > > Daniel Migault > > Ericsson > -- Daniel Migault Ericsson
- [IPsec] I-D Action: draft-ietf-ipsecme-g-ikev2-08… internet-drafts
- Re: [IPsec] I-D Action: draft-ietf-ipsecme-g-ikev… Valery Smyslov
- Re: [IPsec] I-D Action: draft-ietf-ipsecme-g-ikev… Daniel Migault
- Re: [IPsec] I-D Action: draft-ietf-ipsecme-g-ikev… Valery Smyslov
- Re: [IPsec] I-D Action: draft-ietf-ipsecme-g-ikev… Daniel Migault
- Re: [IPsec] I-D Action: draft-ietf-ipsecme-g-ikev… Valery Smyslov
- Re: [IPsec] I-D Action: draft-ietf-ipsecme-g-ikev… Daniel Migault