Re: [IPsec] I-D Action:draft-ietf-ipsecme-eap-mutual-04.txt

"V Jyothi-B22245" <B22245@freescale.com> Tue, 15 June 2010 03:45 UTC

Return-Path: <B22245@freescale.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2AD283A67E9 for <ipsec@core3.amsl.com>; Mon, 14 Jun 2010 20:45:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tl0m7C-+B26V for <ipsec@core3.amsl.com>; Mon, 14 Jun 2010 20:44:55 -0700 (PDT)
Received: from az33egw02.freescale.net (az33egw02.freescale.net [192.88.158.103]) by core3.amsl.com (Postfix) with ESMTP id B3B083A67B7 for <ipsec@ietf.org>; Mon, 14 Jun 2010 20:44:54 -0700 (PDT)
Received: from de01smr02.am.mot.com (de01smr02.freescale.net [10.208.0.151]) by az33egw02.freescale.net (8.14.3/az33egw02) with ESMTP id o5F3iwnv021622 for <ipsec@ietf.org>; Mon, 14 Jun 2010 20:44:58 -0700 (MST)
Received: from zin33exm29.fsl.freescale.net (zin33exm29.ap.freescale.net [10.232.192.28]) by de01smr02.am.mot.com (8.13.1/8.13.0) with ESMTP id o5F3ulBt010362 for <ipsec@ietf.org>; Mon, 14 Jun 2010 22:56:48 -0500 (CDT)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Tue, 15 Jun 2010 09:14:39 +0530
Message-ID: <402621A7D69DDA458D0E12F070D1E55F84BC65@zin33exm29.fsl.freescale.net>
In-Reply-To: <20100614191503.C33133A6936@core3.amsl.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [IPsec] I-D Action:draft-ietf-ipsecme-eap-mutual-04.txt
Thread-Index: AcsL9fLw2ZbRY0jrSMG6ygTgNkbi5wARjzCg
References: <20100614191503.C33133A6936@core3.amsl.com>
From: V Jyothi-B22245 <B22245@freescale.com>
To: ipsec@ietf.org
Subject: Re: [IPsec] I-D Action:draft-ietf-ipsecme-eap-mutual-04.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Jun 2010 03:45:09 -0000

Hi,

To my knowledge, each EAP method has client and server implementation.

Suppose if there are two gateways: gw1 and gw2, gw1 has EAP client
implementation and gw2 has EAP server implementation.
Irrespective of IKEv2 acting as initiator or responder, can gw1 act as
only EAP client and gw2 act as only EAP server.
With this posted draft, is it possible to achieve this functionality.

Thanks
Jyothi

-----Original Message-----
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf
Of Internet-Drafts@ietf.org
Sent: Tuesday, June 15, 2010 12:45 AM
To: i-d-announce@ietf.org
Cc: ipsec@ietf.org
Subject: [IPsec] I-D Action:draft-ietf-ipsecme-eap-mutual-04.txt

A New Internet-Draft is available from the on-line Internet-Drafts
directories.
This draft is a work item of the IP Security Maintenance and Extensions
Working Group of the IETF.


	Title           : An Extension for EAP-Only Authentication in
IKEv2
	Author(s)       : P. Eronen, et al.
	Filename        : draft-ietf-ipsecme-eap-mutual-04.txt
	Pages           : 15
	Date            : 2010-06-14

IKEv2 specifies that EAP authentication must be used together with
public key signature based responder authentication.  This is necessary
with old EAP methods that provide only unilateral authentication using,
e.g., one-time passwords or token cards.

This document specifies how EAP methods that provide mutual
authentication and key agreement can be used to provide extensible
responder authentication for IKEv2 based on methods other than public
key signatures.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-eap-mutual-04.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.