Hi Alper,

It seems that your argument goes to 3GPP only not this new work item,
then I would suggest that you propose your solution to 3GPP HNB.

Back to your questions, the scenarios is that some user need this IKE/IPsec
or other don't need IPsec for the first, and also could be upgraded to
need IKE/IPsec,

I also found you didn't classify different access authenticaiton protocol.

this is not a granularity issue, how could your proposal to support
this scenario and migration scenarios simultaneously?

thanks

-Hui

2009/12/10 Alper Yegin <alper.ye...@yegin.org>:
> Hi Hui,
>
>> I am not convinced why vendor need implement two security mechanism to
>> one product,
>> just because the second one need some market to use it.
>
> Unfortunately, protocol classification is more granular than that.
> You don't identify one protocol as "security protocol" and make it serve all
> security related purposes: access authentication, IPsec SA establishment,
> transport-layer security, application-layer security, mobility signaling
> security, etc. etc. Obviously, you need several distinct protocols for these
> things.
>
> So, saying we have IKEv2, and we'll twist and turn it into some other
> protocol for some other purpose may make sense when you are looking at
> things from within the box (that implements IKEv2), but it does not make
> sense when you are looking from outside the box (like from IETF
> perspective).
>
> Your proposal is for turning IKEv2 into an EAP transport for generic network
> access authentication. It requires taking some stuff out, twisting some
> stuff, and adding stuff. It's technically doable, but "IETF" needs to be
> convinced why it needs to reinvent PANA by taking IKEv2 as the baseline.
>
> Alper
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>>
>> -Hui
>>
>> 2009/12/10 Alper Yegin <alper.ye...@yegin.org>:
>> > Hi Hui,
>> >
>> > You named 3GPP as a consumer of this, acknowledged that 3GPP is not
>> behind
>> > all of the requirements, but you didn't respond to my question about
>> which
>> > one of the requirements are coming from 3GPP.
>> >
>> >
>> > I object to this work, because it intends to create yet another
>> network
>> > access authentication protocol out of IKEv2. As you know, PANA is
>> designed
>> > for that purpose. IETF community needs to understand why PANA does
>> not fit
>> > the need, and why we need to turn IKEv2 into a general-purpose
>> network
>> > access authentication protocol. (IKE needs to get in line with the
>> other
>> > similar proposals, such as hacking up DHCP into access authentication
>> > protocol, and even HTTP. I guess everyone has his/her favorite
>> protocol to
>> > hack.)
>> >
>> > Similar questions arise for the other motivations. "Liveness
>> checking", and
>> > "NAT detection".... Turning IKEv2 into a dedicated protocol for these
>> > purposes is likely to grow IKE in many unintended directions.
>> >
>> > Alper
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >> -----Original Message-----
>> >> From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On
>> Behalf
>> >> Of Hui Deng
>> >> Sent: Wednesday, December 09, 2009 5:42 PM
>> >> To: Yaron Sheffer
>> >> Cc: ipsec@ietf.org
>> >> Subject: Re: [IPsec] Proposed work item: Childless IKE SA
>> >>
>> >> would like to co-author, thanks
>> >>
>> >> -Hui
>> >>
>> >> 2009/11/30 Yaron Sheffer <yar...@checkpoint.com>:
>> >> > This draft proposes an IKEv2 extension to allow the setup of an
>> IKE
>> >> SA with no Child SA, a situation which is currently disallowed by
>> the
>> >> protocol.
>> >> >
>> >> > Proposed starting point: http://tools.ietf.org/id/draft-nir-
>> ipsecme-
>> >> childless-01.txt.
>> >> >
>> >> > Please reply to the list:
>> >> >
>> >> > - If this proposal is accepted as a WG work item, are you
>> committing
>> >> to review multiple versions of the draft?
>> >> > - Are you willing to contribute text to the draft?
>> >> > - Would you like to co-author it?
>> >> >
>> >> > Please also reply to the list if:
>> >> >
>> >> > - You believe this is NOT a reasonable activity for the WG to
>> spend
>> >> time on.
>> >> >
>> >> > If this is the case, please explain your position. Do not explore
>> the
>> >> fine technical details (which will change anyway, once the WG gets
>> hold
>> >> of the draft); instead explain why this is uninteresting for the WG
>> or
>> >> for the industry at large. Also, please mark the title clearly (e.g.
>> >> "DES40-export in IPsec - NO!").
>> >> > _______________________________________________
>> >> > IPsec mailing list
>> >> > IPsec@ietf.org
>> >> > https://www.ietf.org/mailman/listinfo/ipsec
>> >> >
>> >> _______________________________________________
>> >> IPsec mailing list
>> >> IPsec@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/ipsec
>> >
>> > _______________________________________________
>> > IPsec mailing list
>> > IPsec@ietf.org
>> > https://www.ietf.org/mailman/listinfo/ipsec
>> >
>
>
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to