Hi Paul,
 
On Mon, Jul 7, 2025 at 2:48 PM Antony Antony < <mailto:[email protected]> 
[email protected]> wrote:

If this payload is sent in IKE_SA_INIT, it would apply to all subsequent 
CHILD_SAs, potentially restricting flexibility. I wonder whether placing it 
in CREATE_CHILD_SA or IKE_AUTH would be more appropriate, to allow 
per-CHILD_SA PFS negotiation.

I remember the use case Valery used to mention if the SA is short lived no 
need for pfs.

> 
>    Initiator                         Responder
>    -------------------------------------------------------------------
>    HDR, SAi1, KEi, Ni  
>              N(EARLY_CHILD_PFS_INFO) -->
> 
>                              <--  HDR, SAr1, KEr, Nr, [CERTREQ],
>                                              N(EARLY_CHILD_PFS_INFO)

what is in the payload EARLY_CHILD_PFS_INFO is it single value or list?
I propse a list.
 
You actually raise an important issue. Since some common (eg Windows) OS do not 
support IDr,
putting the payload in IKE_SA_INIT won't work. There is a fair chance that the 
responder does not
yet know which configuration to match up with the IKE_SA_INIT, so it does not 
know which of its
connection configurations will apply.
 
         Antony’s interpretation of my proposal was wrong (my fault) J
         These notifications _only_ negotiate the support for the pfs-info
         extension, they do not negotiate compatible (A)KE methods, and
         they contain no data. The real negotiation of (A)KE methods for Child 
SAs
         take place in IKE_AUTH, when responder does already have 
         all the information about peer’s identity.
 
         The (A)KE methods are negotiated via SA payload in IKE_AUTH,
         as well as other Child SA parameters.
 
         Regards,
         Valery.
 
 
I like this one better than the previous proposals.
 
I am beginning to feel much the other way :)
 
Paul 

_______________________________________________
IPsec mailing list -- [email protected] <mailto:[email protected]> 
To unsubscribe send an email to [email protected] 
<mailto:[email protected]> 
_______________________________________________
IPsec mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to