Hi.

Qin and I have just posted the subject draft.  The title is "An IKEv2 Extension 
for Supporting ERP", although it has nothing to do with enterprise resource 
planning.

This draft brings the ERP extension for EAP, which is developed by the Hokey 
group into the IKEv2 authentication exchange, allowing a client ("peer" or 
"initiator") to authenticate to a VPN gateway ("Authenticator" or "responder") 
in only three round-trips, and without user intervention, provided that this 
client has unexpired keys from a previous run of EAP. It doesn't matter whether 
the previous run was done in the context of another IKE exchange, attachment to 
a 802.1x LAN or over PPP.

We would like this draft to be accepted as a working-group item in IPsecME, 
although serious review in hokey will also be needed.

I'd like to use this one-time cross-posted mail message to explain some of the 
design decisions in this -00 version of the draft.

The EAP-Initiate/Re-auth-Start message is missing from the protocol. Instead, a 
notification payload carries the domain name. This was done because an EAP 
payload in the IKE_SA_INIT response would be weird, whereas unknown 
Notifications are common. We are not sure whether placing the domain name is 
necessary, because in IKE, the client usually connects to a pre-configured 
gateway, rather than attaching to any network available as in 802.1x.

We do not run two EAP protocols in parallel (re-auth and something else) as in 
RFC 5296 and the bis document, because IKEv2 ususally doesn't have identity 
requests (they identity protocol is replaced by the user identity in the IDi 
payload), and running a real EAP protocol would put us in a weird state with 
the backend EAP server. Instead, we send the domain name in the notification 
payload, and the client may either send the EAP-Initiate/Re-auth message or the 
IDi payload (but not both).

Alternatively we could have the client indicate support in the IKE_SA_INIT 
request, and then have a proper EAP-Initiate/Re-auth-Start message in the 
IKE_SA_INIT response. I don't see much advantage in this, so in version -00 we 
did not do this.

We would very much appreciate feedback from both groups.

Qin & Yoav
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to