Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-00

2010-10-07 Thread Yoav Nir
for the lifetime of the IKE SA. Perhaps we could store the contents of the previous AUTH payload (or a hash thereof) and sign that. On Oct 6, 2010, at 11:17 PM, Keith Welter wrote: Yoav Nir y...@checkpoint.com wrote on 10/05/2010 07:33:33 AM: Hi Keith. After reading your draft, I wish I had

Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-00

2010-10-07 Thread Yoav Nir
I was not suggesting to use SK_d itself. RFC 5996 says this: {SK_d | SK_ai | SK_ar | SK_ei | SK_er | SK_pi | SK_pr } = prf+ (SKEYSEED, Ni | Nr | SPIi | SPIr ) I suggest replaceing/augmenting it with this: {SK_d | SK_ai | SK_ar | SK_ei | SK_er | SK_pi | SK_pr | SK_ri

Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-00

2010-10-05 Thread Yoav Nir
Hi Keith. After reading your draft, I wish I had done this in RFC 4478. Still, I have some comments. What are the considerations for the responder accepting a re-authentication? Suppose we have an active IKE SA between Alice and Bob. Now Bob gets a new IKE_SA_INIT request with an

Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-00

2010-10-05 Thread Yoav Nir
identities. All the more reason to have set rules on when a new IKE SA can inherit. But this implies that we need something else to ensure continuity of the identity, and mixing the old SK_d into the new authentication certainly makes sense. Thanks, Yaron On 10/05/2010 04:33 PM, Yoav

Re: [IPsec] Issue #189 - Reply is not needed for unprotected message containing QCD

2010-09-30 Thread Yoav Nir
OK. there were zero responses to this. Since this seems obvious to me, I will correct it as Scott suggests, and close the issue with the publication of -01. On Sep 21, 2010, at 2:58 PM, Yoav Nir wrote: Hi all. We're starting discussions of the issues that are open for the failure

Re: [IPsec] Issue #190 - Move QCD token to first AUTH exchange

2010-09-30 Thread Yoav Nir
This was actually reported by both Yaron and Tero. I have no problem moving the QCD token to the first message (in case of EAP), but as Yaron requested, I will not publish the fixed version before the resolution of #191. Two more issues soon. Yoav On Sep 21, 2010, at 3:06 PM, Yoav Nir wrote

[IPsec] Issue #191 - The danger of predictable SPIs

2010-09-30 Thread Yoav Nir
Reported by Yaron Sheffer: 5.1: this method is indeed problemmatic if SPIi/SPIr pairs are repeated with high probability. If SPI pairs only repeat across reboots (somewhat unlikely), then an epoch (time of last reboot) value can be included to mitigate this problem. This is still close enough

[IPsec] Issue #192 - RFC 2119 language in section 9.1

2010-09-30 Thread Yoav Nir
Reported by Yaron Sheffer: 9.1: this is not really a MUST, let's use some non-RFC 2119 wording. Yoav Nir: I disagree. We are giving requirements for implementations that conform to this spec. The requirements vary by the role that the implementation plays: RA client, RA gateway, Site to site

[IPsec] Issue #189 - Reply is not needed for unprotected message containing QCD

2010-09-21 Thread Yoav Nir
Hi all. We're starting discussions of the issues that are open for the failure detection draft. Reported by Scott C Moonen: What is the purpose of sending an empty response to the unprotected N(INVALID[_IKE]_SPI)N(QCD_TOKEN)+ message? I'm not sure it provides any real value and would

[IPsec] Issue #190 - Move QCD token to first AUTH exchange

2010-09-21 Thread Yoav Nir
Reported by Yaron Sheffer: I would have preferred the token to be resistant to stealing (and duplication), in which case it can be sent in the *first* AUTH message. If we ensure that the token maker's SPI is long/random (see below), this might be possible. The relevant part of the document

Re: My comments to the press about RFC 2474

2010-09-09 Thread Yoav Nir
On Sep 8, 2010, at 3:03 AM, Marshall Eubanks wrote: On Sep 7, 2010, at 7:26 PM, Richard Bennett wrote: I think you should have shared the message from our public relations agency that started this incident, Russ. Here's what it said: -- IETF Chair speaks on Paid

Re: [IPsec] Comments draft-kagarigi-ipsecme-ikev2-windowsync-04

2010-09-09 Thread Yoav Nir
On Sep 8, 2010, at 1:50 PM, Tero Kivinen wrote: Raj Singh writes: It's actually worse than that. If message #4 was missed, and 5-8 were received, then messages 5-8 are stored, but not processed. This has to be so, because suppose message 7 deletes the SA that was created in message 4, you

RE: Optimizing for what? Was Re: IETF Attendance by continent

2010-09-06 Thread Yoav Nir
True. But the visa issues seem to be the worst part of any US IETF. Travel, food and finding a hotel are typically much easier in most US venues then European venues. People from Europe, Japan, Australia, and some other countries don't need a visa at all to go to an IETF meeting in the US.

Re: [IPsec] Comments draft-kagarigi-ipsecme-ikev2-windowsync-04

2010-09-05 Thread Yoav Nir
On Sep 4, 2010, at 3:01 PM, Kalyani Garigipati (kagarigi) wrote: 1. If window size is say some five and range expected is 4-8, and if peer has got all four requests with values 5,6,7,8 and 4 is lost, then there would be no message id that can be used to send the notify reset_window. The

Re: [IPsec] Comments on draft-ietf-ipsecme-failure-detection-00

2010-09-05 Thread Yoav Nir
On Sep 5, 2010, at 11:03 AM, Yaron Sheffer wrote: In general, the draft is in good shape. But IMO, we have one major security issue left: the dependence on SPI values which potentially come from a small space, i.e. may be repeated in normal operation, or may be coerced into repeating.

Re: IETF Attendance by continent

2010-09-01 Thread Yoav Nir
On Aug 31, 2010, at 4:56 PM, Iljitsch van Beijnum wrote: Consider that contributors usually start as newcomers, attend several meetings, then write a draft, I don't know about you, but I wrote drafts before my first meeting. Me too. I actually had an RFC published two months before

Re: Optimizing for what? Was Re: IETF Attendance by continent

2010-08-31 Thread Yoav Nir
On Aug 31, 2010, at 10:43 AM, t.petch wrote: If you want to be fair to the individual participants you have to optimize in such a way that attending 6 meetings costs the same for every individual that regularly attends the IETF. Obviously one can only approximate that by putting fairly

Re: [78attendees] WARNING !!! Re: Maastricht to Brussels-Nat-Aero, Sat 07:09

2010-08-29 Thread Yoav Nir
On Aug 29, 2010, at 9:32 AM, Ole Jacobsen wrote: You said: For an IETF meeting, we don't really have either of these. What? IETF 79 is hosted by Tsinghua University, CERNET and CNNIC. The website is still work in progress, but I would be very surprised if they won't iinclude

Re: [78attendees] WARNING !!! Re: Maastricht to Brussels-Nat-Aero, Sat 07:09

2010-08-29 Thread Yoav Nir
On Aug 29, 2010, at 10:31 AM, Glen Zorn wrote: Lonely Planet? Google? Ask someone who has been there? Wait a couple of weeks and see what the host comes up with? Again, that’s not the problem: in about an hour I was able to come up with half a dozen 4*+ hotels as close or closer to the

Re: [78attendees] WARNING !!! Re: Maastricht to Brussels-Nat-Aero, Sat 07:09

2010-08-29 Thread Yoav Nir
On Aug 29, 2010, at 10:31 AM, Glen Zorn wrote: Ole Jacobsen [mailto:o...@cisco.com]mailto:[mailto:o...@cisco.com] writes: On Sun, 29 Aug 2010, Yoav Nir wrote: Hopefully. But only the two hotels listed there have agreements and special rates for IETF attendants. In Maastricht there were

Re: Tourist or business visa from US?

2010-08-29 Thread Yoav Nir
On Aug 29, 2010, at 11:08 PM, Randall Gellens wrote: At 8:51 AM -0700 8/24/10, Dave CROCKER wrote: Let me get this straight. You are going to go to China and you are /not/ going to do ANY site-seeing? If the answer is yes, I think you have deeper problems than the visa... I

Re: [78attendees] WARNING !!! Re: Maastricht to Brussels-Nat-Aero, Sat 07:09

2010-08-28 Thread Yoav Nir
On Aug 29, 2010, at 2:55 AM, Glen Zorn wrote: What you save in transportation at the tail end can be totally destroyed by hotel and dining costs, and the IETF has to pay more for meeting facilities. Speaking of which, I hope to be the first to note that paying $192 for a room in Beijing

Re: IETF Attendance by continent

2010-08-27 Thread Yoav Nir
On Aug 27, 2010, at 12:18 AM, Dave CROCKER wrote: On 8/26/2010 2:08 PM, Cullen Jennings wrote: Thank you for providing this but this data seems to support something closer to 2-1-1 than 1-1-1 ... (and sorry I just joined the thread now - been on vacation ) Cullen, The rest of the

Re: Tourist or business visa from US?

2010-08-25 Thread Yoav Nir
On Aug 26, 2010, at 4:35 AM, JORDI PALET MARTINEZ wrote: Hi Alexa, all, In many countries, applying for a VISA different that the main purpose of the travel to the country is illegal and could mean that you pay fines, get deported, or even go to the jail. In many countries, if you are

Re: IETF Attendance by continent

2010-08-09 Thread Yoav Nir
I'm more in favor the 3-2-1 model. The stats clearly show that the largest group of repeat offenders comes from the US. But either way, I also agree that Europe is the summer is not ideal. in the US there's much less of the vacances phenomenon. So how about: - March in Europe - July in N

Re: Ad Hoc BOFs

2010-08-08 Thread Yoav Nir
On Aug 5, 2010, at 5:07 PM, Michael Richardson wrote: Yoav == Yoav Nir y...@checkpoint.com writes: Yoav In keeping with IETF traditions, I'm putting some XML where my Yoav mouth is. Yoav Here's a -00 draft about this. Yoav http://www.ietf.org/internet-drafts/draft-nir

Re: IETF Attendance by continent

2010-08-07 Thread Yoav Nir
Asia is big. Some parts of Asia (the middle east and the eastern parts of Russia) are closer to Europe than to China, Japan or Korea, at least as far as traveling goes. But I think that only adds up to about 15-20 attendees, so it's still in the noise. I also wonder if the data we have is

Re: Ad Hoc BOFs

2010-08-05 Thread Yoav Nir
On Aug 2, 2010, at 10:20 PM, Yoav Nir wrote: On Aug 2, 2010, at 6:16 PM, Spencer Dawkins wrote: In the case of the 2 BarBOFS I organized at IETF-78, in both cases there were very useful contributions made by people I didn't know and therefore wouldn't have invited. Even if the efforts

Re: [OAUTH-WG] Is User Agent Profile Secure in OAuth 2.0?

2010-08-03 Thread Yoav Nir
On Aug 3, 2010, at 8:32 PM, Brian Eaton wrote: Please provide an example of code that you would put to thirdparty.comhttp://thirdparty.com and that would not break the use cases. Take a look at the facebook APIs, in particular the cross-domain communication schemes:

Re: [OAUTH-WG] Is User Agent Profile Secure in OAuth 2.0?

2010-08-03 Thread Yoav Nir
On Aug 3, 2010, at 11:18 PM, Marius Scurtescu wrote: On Tue, Aug 3, 2010 at 12:44 PM, Yoav Nir y...@checkpoint.com wrote: On Aug 3, 2010, at 8:32 PM, Brian Eaton wrote: Please provide an example of code that you would put to thirdparty.com and that would not break the use cases

RE: Ad Hoc BOFs

2010-08-02 Thread Yoav Nir
Partially agree. Just requiring a draft (that was not submitted within the meeting week) gives you a two-week waiting period. I'm not so sure about the mailing list requirement. One of the best presentations-posing-as-barBoF in IETF 77 was about a traceback experiment in Japan. They did

Re: Ad Hoc BOFs

2010-08-02 Thread Yoav Nir
On Aug 2, 2010, at 5:48 PM, Marshall Eubanks wrote: Dear Joel; On Aug 1, 2010, at 10:08 AM, Joel M. Halpern wrote: In hallway discussion about this, it was suggested to me that part of the problem is that some folks can not figure out how to socialize their ideas. I would say

Re: Ad Hoc BOFs

2010-08-02 Thread Yoav Nir
On Aug 2, 2010, at 6:16 PM, Spencer Dawkins wrote: In the case of the 2 BarBOFS I organized at IETF-78, in both cases there were very useful contributions made by people I didn't know and therefore wouldn't have invited. Even if the efforts fail (and one of them was DOA and will not move

Re: Ad Hoc BOFs

2010-08-01 Thread Yoav Nir
On Jul 31, 2010, at 2:00 PM, Peter Saint-Andre wrote: At 9:32 AM -0800 7/30/10, Melinda Shore wrote: The implication that there needs to be a session, with a room and slides and humans sitting in chairs, kind of suggests that people who want to participate in the IETF have to attend

Re: Ad Hoc BOFs

2010-08-01 Thread Yoav Nir
On Aug 1, 2010, at 9:45 AM, Melinda Shore wrote: Yoav Nir wrote: Who's folks? A lot of people come to an IETF meeting, and are only following one or two of the working groups. That does not mean that they sit in their hotel rooms for the rest of the meeting. Instead, they pick what looks

Re: Ad Hoc BOFs

2010-07-30 Thread Yoav Nir
I think there are really two issues here. First is people who have an idea they want to present, but that idea either doesn't fit the charter of any particular working group (or they don't know about such a working group), or else said working group's schedule is too full with existing work.

Re: Ad Hoc BOFs

2010-07-30 Thread Yoav Nir
On Jul 30, 2010, at 7:32 PM, Melinda Shore wrote: Yoav Nir wrote: First is people who have an idea they want to present, but that idea either doesn't fit the charter of any particular working group (or they don't know about such a working group), or else said working group's schedule

Re: How to get onto the IETF authenticated LAN?

2010-07-28 Thread Yoav Nir
But we have... On Jul 27, 2010, at 5:08 PM, Phillip Hallam-Baker wrote: The endpoints used in these protocols all have the ability to perform public key cryptography at acceptable speeds. Even if they did not, the price of 64Mb of flash memory is negligible these days and that is sufficient

Re: [IPsec] a new IKEv2 labeled security draft is published

2010-07-28 Thread Yoav Nir
On Jul 28, 2010, at 9:30 AM, jarrett...@oracle.com wrote: A new 00 version of IKEv2 extension for security label has just been published: http://tools.ietf.org/html/draft-jml-ipsec-ikev2-security-label-00 Authors welcome comments from IPsec community. Thanks. You will get that, but

[IPsec] Some back-of-the-envelope calculations

2010-07-26 Thread Yoav Nir
In today's session there was an disagreement between Yaron and Tero about how likely it is that messages are missing. Let's assume our cluster has tunnels with 10,000 peers, and that we do Liveness Check (DPD) every 20 seconds (StrongSwan default) Also, let's assume that we synch every 0.1

Re: [IPsec] Comments draft-kagarigi-ipsecme-ikev2-windowsync-04

2010-07-25 Thread Yoav Nir
Thanks for the extensive review, Tero. I haven't had time to read it through yet, but I would like to respond to one point in this (below) On Jul 25, 2010, at 4:30 PM, Tero Kivinen wrote: The big issue is that the draft does not provide solution to case where the IKEv2 SA messages missed

[IPsec] QCD Interop test report

2010-07-19 Thread Yoav Nir
Hi all The Quick Crash Detection protocol is one of the candidates for the failure detection work item in our charter. I have implemented in my company's product with a private Notify type and a VendorID, and up until a few months ago, this has been the only implementation that I know of. As

Re: Nomcom Enhancements: Improving the IETF leadership selection process

2010-07-18 Thread Yoav Nir
Hi Adrian It depends on the definition of politicking. In this, umm, draft, there's this definition: An organized campaign that seeks selection of a particular nominee So you can't promote Dave all by yourself. You'll have to get a bunch of people sending over-the-top opinions (Dave will save

RE: IETF 78: getting to/from/around Maastricht

2010-07-13 Thread Yoav Nir
There this: http://www.maastrichtbrusselexpress.nl/?id=26 But apparently it doesn't run on Sunday. -Original Message- From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of Iljitsch van Beijnum Sent: Tuesday, July 13, 2010 10:03 AM To: IETF-Discussion list Subject: Re:

RE: IETF privacy policy - update

2010-07-08 Thread Yoav Nir
On July 08, 2010 12:42 AM joel jaeggli wrote: On 2010-07-07 12:53, Ole Jacobsen wrote: Sam, I view this more or less as standard boilerplate, something you find in a lot of online places. I think it is reasonable to expect that if you register for a meeting your personal info (e-mail

Re: [IPsec] NUDGE: Starting discussion of failure detection proposals

2010-07-07 Thread Yoav Nir
Sure we are, but I didn't want to start the discussion, because QCD is my proposal. Hopefully we've learned something from the history of XAuth vs Hybrid, and we won't end up with two non-interoperable, proprietary ways of doing this, neither of which makes it to RFC. I think that failure led

[IPsec] Fwd: New Version Notification for draft-ietf-ipsecme-ipsec-ha-09

2010-07-04 Thread Yoav Nir
: July 4, 2010 5:15:22 PM GMT+03:00 To: Yoav Nir y...@checkpoint.commailto:y...@checkpoint.com Subject: New Version Notification for draft-ietf-ipsecme-ipsec-ha-09 A new version of I-D, draft-ietf-ipsecme-ipsec-ha-09.txt has been successfully submitted by Yoav Nir and posted to the IETF

Re: motivations (was: Re: draft-housley-two-maturity-levels-00)

2010-06-27 Thread Yoav Nir
On Jun 26, 2010, at 12:56 AM, Phillip Hallam-Baker wrote: The fact remains that RFC 821 has the STANDARD imprimatur and the better specification that was intended to replace it does not. Yes, but most of the RFC repositories, including http://tools.ietf.org/html/rfc821 show Obsoleted by:

RE: motivations (was: Re: draft-housley-two-maturity-levels-00)

2010-06-25 Thread Yoav Nir
On Thursday, June 24, 2010 22:01 Phillip Hallam-Baker wrote: snip/ We currently have the idiotic position where RFC821 is a full standard and RFC2821 which obsoletes it is not. Why is this idiotic. RFC 821 needed to be obsoleted. It had some features that needed to be removed, and some

Re: [IPsec] I-D Action:draft-ietf-ipsecme-ipsec-ha-07.txt

2010-06-24 Thread Yoav Nir
Hi all No big changes here. Just some nits from the secdir review. Yoav On Jun 24, 2010, at 6:00 PM, internet-dra...@ietf.org wrote: A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the IP Security Maintenance and Extensions

Re: draft-housley-two-maturity-levels-00

2010-06-22 Thread Yoav Nir
I like this proposal, but there should be a (relatively) easy process to advance from Experimental to Proposed, especially if implementation experience shows no need for bits-on-the-wire changes. We should be able to say that for a particular experimental RFC there have been this many

Re: [IPsec] AD review: draft-ietf-ipsecme-ipsec-ha

2010-06-10 Thread Yoav Nir
Hi Sean. I have just submitted version -05 which addresses most (but not all) of your comments. Here's a list of the exceptions (hope I didn't miss any) #2. I've worded the abstract a little differently. Main difference is adding to gaps in existing standards the words and their

Re: [IPsec] AD review: draft-ietf-ipsecme-ipsec-ha

2010-06-10 Thread Yoav Nir
On Jun 10, 2010, at 6:39 PM, Sean Turner wrote: Yoav Nir wrote: #13, #15, a few more (no MUST/SHOULD/MAY language). I have two issues with this. The first, is that this document is a problem statement, and intended to be INFORMATIONAL. No gateway is ever going to be said to implement

Re: [IPsec] AD review: draft-ietf-ipsecme-ipsec-ha

2010-06-10 Thread Yoav Nir
Done in -06 On Jun 10, 2010, at 7:17 PM, Sean Turner wrote: Yoav Nir wrote: On Jun 10, 2010, at 6:39 PM, Sean Turner wrote: Yoav Nir wrote: #13, #15, a few more (no MUST/SHOULD/MAY language). I have two issues with this. The first, is that this document is a problem statement

RE: wanted: your old NAT home router

2010-06-03 Thread Yoav Nir
Hi Lars Great study. Looking forward to seeing more devices there. Two tests I would add to this: 1. TCP segment size negotiation - have a low-MTU link somewhere between the NAT box and the server, and see if the MSS gets adjusted like it should. 2. IKE/IPsec - IKE was supposed to go from

RE: The point is to change it: Was: IPv4 depletion makes CNN

2010-06-02 Thread Yoav Nir
Nice to hear just worked in the context of IPv6. Did your router give you just an IPv6 address, or also an IPv4 address? If both, does the IPv6 address ever get anywhere on the Internet, or is it always NATted? -Original Message- From: ietf-boun...@ietf.org

Re: [IPsec] I-D Action:draft-ietf-ipsecme-ipsec-ha-04.txt

2010-06-01 Thread Yoav Nir
Hi. This draft revision includes comments from Jean-Michel Combes and Yaron. -Original Message- From: i-d-announce-boun...@ietf.org [mailto:i-d-announce-boun...@ietf.org] On Behalf Of internet-dra...@ietf.org Sent: Tuesday, June 01, 2010 10:15 AM To: i-d-annou...@ietf.org Cc:

Re: [IPsec] Working Group LC: draft-ietf-ipsecme-ipsec-ha-03

2010-05-27 Thread Yoav Nir
1. I didn't want to make ha-03 dependent on bis, but since bis is now approved, we may as well do it. 2. OK 3. It should be out of scope, because this is internal to the cluster. We are not going to require a peer to accept having two SAs with the same SPIs with the same peer, so it's up to

Re: [IPsec] Working Group LC: draft-ietf-ipsecme-ipsec-ha-03

2010-05-27 Thread Yoav Nir
Works for me. -Original Message- From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Stephen Kent Sent: Thursday, May 27, 2010 5:18 PM To: Yoav Nir Cc: IPsecme WG Subject: Re: [IPsec] Working Group LC: draft-ietf-ipsecme-ipsec-ha-03 At 11:36 AM +0300 5/27/10, Yoav

Re: [IPsec] IESG DISCUSS re: IKEv2-bis and RFC 4307

2010-05-09 Thread Yoav Nir
I'm fine with the change, and with the reference being either normative or informative. I prefer informative, though. -Original Message- From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Yaron Sheffer Sent: Saturday, May 08, 2010 11:55 PM To: IPsecme WG Subject:

Re: [IPsec] Start of WG Last Call on draft-ietf-ipsecme-eap-mutual (EAP-Only Authentication)

2010-05-03 Thread Yoav Nir
Can't compete with Martin's running code, but I have a few comments. Before that, the draft seems good, and easy to follow. I think developers who have never heard of the IPsec list should have no problem reading and implementing this correctly. Having said that, here's two comments. The

Re: [IPsec] IPsec HA problem statement

2010-05-03 Thread Yoav Nir
Well, this draft is kind of a smorgasbord of issues, so once the issue that bothers you is in there, you're not that interested any more. I would like to post another draft with section 3.7 that I posted on the list on 25-Apr, and unless anyone has another issue that's not addressed, I think

Re: [IPsec] IPsec HA problem statement

2010-05-03 Thread Yoav Nir
Sorry for the dual post. Some mail client problem. ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

Re: [IPsec] New draft posted

2010-04-26 Thread Yoav Nir
This is why we need multiple vendors to look at this draft. On Apr 26, 2010, at 2:29 PM, Tero Kivinen wrote: Yoav Nir writes: I agree. And whatever we may think of the particular solution, it does present a problem that can and should be in the problem statement draft. So how about adding

Re: [IPsec] New draft posted

2010-04-25 Thread Yoav Nir
I agree. And whatever we may think of the particular solution, it does present a problem that can and should be in the problem statement draft. So how about adding teh following sub-section: 3.7. Different IP addresses for IKE and IPsec In many implementations there are separate IP

Re: Pointing to IANA registries

2010-04-22 Thread Yoav Nir
On Apr 22, 2010, at 1:46 AM, Martin Rex wrote: It might be worse than that, actually. When RFC-5746 was recently published, the URL from an extremely useful informative reference apparently got stripped by the RFC Editor: draft -03: [Ray09]Ray, M., Authentication Gap in TLS

Re: [IPsec] I-D ACTION:draft-ietf-ipsecme-ikev2bis-10.txt

2010-04-22 Thread Yoav Nir
Hi. It's true that the standard is more geared to full implementations than those minimal implementations, but in this case there really is no solution. The minimal implementation can delete the IKE SA that was created and start fresh with a single pair. But since the responder is also not

RE: another document categorization suggestion

2010-04-21 Thread Yoav Nir
How about a Real World Deployment wiki page linked from each RFC, where implementers can insert comments like Don't do like vendor xxx - don't always set the nonce to zero. Hopefully vendor xxx fixes it in the next release, and changes the page to read Don't do like vendor xxx did prior to

[IPsec] Issue #179 (was: Terminology issue (minor))

2010-04-21 Thread Yoav Nir
On Mar 22, 2010, at 6:44 PM, sh...@arsc.edu sh...@arsc.edu wrote: This is probably a small thing, but in general the term cluster implies at least some degree of shared state among cluster members. I understand that there's some suggestion of that in saying that a cluster protects the same

RE: spam emails from antonyjeyase...@gmail.com

2010-04-14 Thread Yoav Nir
You have to admit, though, that sending spam in a link to Google docs is impressive. Shows real ingenuity and innovation from the spamming community. -Original Message- From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of Robert Stangarone Sent: Thursday, April 15,

[IPsec] Fwd: New Version Notification for draft-ietf-ipsecme-ipsec-ha-01

2010-04-14 Thread Yoav Nir
Begin forwarded message: From: IETF I-D Submission Tool idsubmiss...@ietf.org Date: April 14, 2010 8:21:14 PM GMT+03:00 To: Yoav Nir y...@checkpoint.com Subject: New Version Notification for draft-ietf-ipsecme-ipsec-ha-01 A new version of I-D, draft-ietf-ipsecme-ipsec-ha-01.txt has

[IPsec] Issue #177

2010-04-13 Thread Yoav Nir
Hi all. As the previous discussion on this topic showed, the WG would like a more thorough taxonomy in section 2 of the HA/LS draft. Here's what I have come up with so far. Please send comments to the list. 2. Terminology Single Gateway is an implementation of IKE and IPsec enforcing a

Re: [IPsec] Issue #177

2010-04-13 Thread Yoav Nir
On Apr 13, 2010, at 1:17 PM, Yaron Sheffer wrote: Looks good. A few comments down below. Yaron On Tue, 2010-04-13 at 11:49 +0300, Yoav Nir wrote: Fault Tolerance is a condition related to high availability, where a system maintains service availability, even when a specified

[IPsec] Another round of IKEv2-bis issues

2010-04-07 Thread Yoav Nir
Hi all Following Sean's review, Paul has opened 7 issues, which we'd like to close. I think issues #182, #183, #185 and #186 can be closed immediately. I think issues #181, #184 and #187 can also be closed, and I have included below my suggestions. Please take a look and respond if you

Re: Ok .. I want my IETF app for my iPad ..

2010-04-05 Thread Yoav Nir
On Apr 5, 2010, at 5:25 AM, Bill Strahm wrote: Anyhow, it has to be an iPad app, rather than iPhone/iPod-touch, because the smaller devices can't display 80-char-66-line ASCII properly. -T Just thinking what would happen if someone were to propose a Windows 7 app for the IETF.

Re: Why the normative form of IETF Standards is ASCII

2010-03-25 Thread Yoav Nir
Maybe it's just me, but I couldn't find any files there. On Mar 25, 2010, at 12:03 AM, Stefan Santesson wrote: Actually, there seems to be one here: http://sourceforge.net/projects/rfc2xml/ Not sure how much of a good work it does. /Stefan On 10-03-24 5:10 PM, Julian Reschke

Re: On Day Passes..

2010-03-25 Thread Yoav Nir
On Mar 25, 2010, at 3:07 AM, Spencer Dawkins wrote: So a month ago, I was wondering about something like one day pass: $300 two day pass: $500 all week pass: $645 or whatever I paid this time We might (in some cases, please see below for details) want to give some people a break

Re: [77all] No Host for IETF 77

2010-03-23 Thread Yoav Nir
The corporate name on my nametag is there only because I filled that field in the registration form. Others haven't and don't have a corporation name. Besides, the corporation name is there not because Check Point has bought the IETF, but so that if I say that everyone should use a firewall,

Re: [77all] No Host for IETF 77

2010-03-23 Thread Yoav Nir
Agree. This was just in response to the IETF is bought message. This disclosure in important for identifying bias, I think. On Mar 23, 2010, at 11:03 AM, todd glassey wrote: On 3/23/2010 10:20 AM, Donald Eastlake wrote: On Tue, Mar 23, 2010 at 12:57 PM, Yoav Nir y...@checkpoint.com wrote

[IPsec] Issue #177. (was: HA/LS terminology)

2010-03-23 Thread Yoav Nir
And thank you for taking the time, Rod. The linktionary has a pretty good definition, though I don't know if it counts as textbook. Same for Wikipedia http://www.linktionary.com/f/fault_tolerance.html http://en.wikipedia.org/wiki/Fault-tolerant_system Anyway, we need to limit the scope of this

Re: [IPsec] Issue #177. (was: HA/LS terminology)

2010-03-23 Thread Yoav Nir
On Mar 23, 2010, at 2:31 PM, Melinda Shore wrote: On Tue, March 23, 2010 1:20 pm, Yoav Nir wrote: - For the cluster with just one member doing IKE and IPsec, I propose hot-standby cluster - For the cluster with several members doing IKE and IPsec, I propose to keep load-sharing cluster I

Re: [IPsec] Issue #177. (was: HA/LS terminology)

2010-03-23 Thread Yoav Nir
On Mar 23, 2010, at 6:05 PM, Dan Harkins wrote: Hi, hot standby implies a box sitting (hot) twiddling its thumbs doing little but waiting for another box to fail (standby). It's the VRRP model. And that's exactly what I want to describe. Well, not twiddling its thumbs. The standby is

Re: [IPsec] Password-Based Auth: Two criteria comments

2010-03-22 Thread Yoav Nir
On Mar 22, 2010, at 11:18 AM, black_da...@emc.com black_da...@emc.com wrote: Summarizing what I said in the meeting: (1) The performance criteria should include performance with large complex secrets (e.g., pre-shared keys), not just the smaller passwords that people can reasonably be

Re: [IPsec] synchronizing crypto state

2010-03-22 Thread Yoav Nir
That would be good, but we don't want to madate not using certain modes of operation when you have a cluster. That would be very counter-productive. OTOH, because of the replay counter, we've already agreed that an outbound child SA cannot be shared among members of a load-sharing cluster. As

Re: Make HTML and PDF more prominent, was: Re: Why the normative

2010-03-20 Thread Yoav Nir
It sometimes bugs me that spelling my name in Latin letters like in this email, does not give English speakers enough information to pronounce my name correctly. In fact, I don't think there's any sequence of Latin letters that will do it. Still, I don't think putting יואב ניר in the author

Re: Make HTML and PDF more prominent, was: Re: Why the normative

2010-03-20 Thread Yoav Nir
Without paper, I don't see the point of pagination. On Mar 20, 2010, at 11:28 AM, Tim Bray wrote: So you would argue that RFCs should normally be used in paper form? This is the only way I can see to avoid requiring internet access. This idea seems sane to me. Given the current policy, the

Re: [IPsec] IETFLC comments for draft-ietf-ipsecme-ikev2bis-08

2010-03-09 Thread Yoav Nir
To me it’s pretty obviously the former, although the latter is also true. From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Keith Welter Sent: Monday, March 08, 2010 6:18 PM To: ipsec@ietf.org Subject: [IPsec] IETFLC comments for

Re: [IPsec] [Cfrg] Beginning discussion on secure password-only authentication for IKEv2

2010-03-04 Thread Yoav Nir
Explaining a joke spoils all the fun, but here goes: It's not like PKI is working out better for user authentication. And password-in-https-form is also vulnerable to online dictionary attacks. Now if they were using TLS-EAP But that, of course, suffers from excessive layering.

Re: [IPsec] Beginning discussion on secure password-only authentication for IKEv2

2010-03-03 Thread Yoav Nir
Yes, you can sort-of negotiate DH groups, but you don't have the New Group Mode that we had in section 5.6 or RFC 2409. So with RFC 4306, you're stuck with only those groups that appear in the IANA registry, rather than your own pet DH groups. On Mar 2, 2010, at 10:49 PM, Yaron Sheffer wrote:

Re: [IPsec] Please review draft-ietf-ipsecme-aes-ctr-ikev2-05.txt

2010-03-03 Thread Yoav Nir
Paragraph 5 of section #2: MUST accept any length that results in proper alignment. It should be noticed that the ESP [RFC4303] Encrypted Payload requires Please change noticed to noted. Other than that, the document looks good enough for implementation. -Original Message- From:

[IPsec] Sorry, 5 more

2010-02-24 Thread Yoav Nir
Hi folks. 5 issues got lost in the system (they were tagged wrong). Hopefully these are really the last 5. Issue #132 - Should NO_ADDITIONAL_SAS cover rekeying IKE SAs? = In section 1.3 at the end there is text talking about the

Re: [IPsec] IKE6 Negitaion when Peer Address ND not yet started.

2010-02-23 Thread Yoav Nir
On Feb 22, 2010, at 5:48 PM, Stephen Kent wrote: At 7:22 PM +0530 2/22/10, Syed Ajim Hussain wrote: Hi Steve According to me IPSEC/IKE should have intelligence by by-pass ND Traffic when SA is not ready state without end-user intervention, and same should be accepted by other

Re: [IPsec] IKE6 Negitaion when Peer Address ND not yet started.

2010-02-21 Thread Yoav Nir
On Feb 19, 2010, at 6:30 AM, Syed Ajim Hussain wrote: Hi Yoav Nir All Group Member Thanks for your quick response. I think, instead of user takes special care by adding extra Rule to allow un-encrypted ND traffic(unicast) , There should be some RFC guidelines, such that IPSEC/IKE

Re: [IPsec] IKE6 Negitaion when Peer Address ND not yet started.

2010-02-18 Thread Yoav Nir
Hi, Syed Ajim. In future please expand acronyms, because while it's safe to assume that anyone reading this list knows what an SA is, not all of us are proficient in IPv6 terminology. Having said that, policies usually have exceptions for protocols, that need to run in the clear. IKE is an

Re: [IPsec] information about choosing hash/crypt for different services

2010-02-18 Thread Yoav Nir
Hi Rahul. I don’t have a link, but common sense says that there are four things to consider when choosing algorithms: - required strength - for example DES is only 56 bits. - compliance - certain industries have regulations specifying which algorithms to use. - performance - of all the

[IPsec] Getting there... 5 more issues

2010-02-15 Thread Yoav Nir
Hi all. Wer'e down to single digits with the open issues on IKEv2bis. Here are 5 more. Issue #168 - Identifier field in the EAP payload 3.16: the text here, ...this field MAY be set to any value implies that the Identifier field can be constant,

[IPsec] yet more ikev2bis issues

2010-02-10 Thread Yoav Nir
Hi all. Again we have some more issues: Issue #147 - Allowing limited retransmission of one-way IKE messages Either in 2.1 or in 1.5 we should say something about allowing limited retransmission of the rare one-way IKE

Re: [IPsec] Fwd: Issue : Regarding EAP identity

2010-02-10 Thread Yoav Nir
Hi. This is an interesting subject, and perhaps could be a good candidate for discussion at Anaheim. However, from the narrow perspective of a VPN vendor, I don't think this issue is very complicated: - In the first IKE_AUTH request the initiator provides *an* identity. This could be

[IPsec] More Issues for IKEv2bis

2010-02-07 Thread Yoav Nir
Hi. Another week, another 5 issues to discuss. Issue #159 - Payload processing order within messages = (3.1) Clarify that the text: Payloads are processed in the order in which they appear in an IKE message by invoking

Re: [IPsec] Fwd: Issue : Regarding EAP identity

2010-02-04 Thread Yoav Nir
do need the user identity. -Original Message- From: Alper Yegin [mailto:alper.ye...@yegin.org] Sent: Thursday, February 04, 2010 3:40 PM To: Yoav Nir; 'Raj Singh'; Yaron Sheffer Cc: 'ipsec' Subject: RE: [IPsec] Fwd: Issue : Regarding EAP identity Hello, Why would the IKEv2 responder

<    7   8   9   10   11   12   13   14   >