Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-01-29 Thread Alan DeKok
Reviewing the document, it looks very good overall. I have a few comments and questions about Sections 1 through 4. The later sections will be reviewed in a separate message. Section 2: Defines a number of terms, but not AAA server, which is first referenced in Section 3.1. Similarly for A

Re: Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-Authentication Protocol (ERP) to Proposed Standard

2008-01-24 Thread Bernard Aboba
A number of reviews of this document have been posted to the HOKEY and RADEXT WGs that raise issues that may be relevant to an IETF last call. Links are provided below: Stefan Winter: http://www1.ietf.org/mail-archive/web/hokey/current/msg00987.html Barney Wolff: http://www1.ietf.org/mail-arc

Re: Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-01-30 Thread Lakshminath Dondeti
A couple of comments to be considered as part of the last call comments: 1. Some folks from 3GPP2 (Parag Agashe, Dinesh Dharmaraju and others) reviewed the document and pointed out that IANA stuff needs to be cleaned up further. Charles Clancy pointed out this earlier and we thought we caught

[HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-01 Thread Dan Harkins
Hello, I believe this is a well organized and complete document. On numerous occasions while reviewing it I made a mental question regarding something only to have the question answered in a subsequent paragraph. I do have several comments though: 1. this protocol can be used in the pres

Re: Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-05 Thread Joseph Salowey (jsalowey)
24, 2008 8:13 AM To: IETF-Announce Cc: [EMAIL PROTECTED] Subject: Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard The IESG has received a request from the Handover Keying WG (hokey) to consider the following document: - 'EAP

Re: Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-16 Thread Bernard Aboba
Here is my review: http://www.drizzle.com/~aboba/EAP/erx-review.txt ___ Ietf mailing list Ietf@ietf.org http://www.ietf.org/mailman/listinfo/ietf

Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-01-30 Thread Lakshminath Dondeti
Alan, Thanks much for your comments. Please see inline: On 1/29/2008 8:32 AM, Alan DeKok wrote: Reviewing the document, it looks very good overall. I have a few comments and questions about Sections 1 through 4. The later sections will be reviewed in a separate message. Section 2: Defi

Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-01-31 Thread Yoshihiro Ohba
On Wed, Jan 30, 2008 at 10:53:25PM -0800, Lakshminath Dondeti wrote: >> >>... hence the >>authenticator initiation of the ERP exchange may require the >>authenticator to send both the EAP-Request/Identity and EAP-Initiate/ >>Re-auth-Start messages. > > Yes. >> >> Have existing EAP

Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-01-31 Thread Alan DeKok
Lakshminath Dondeti wrote: >> Have existing EAP peer implementations been validated to work under >> these assumptions? i.e. will they break? Will they see "unexpected" >> EAP messages or content, and reject or discard the response? > > Kedar noted from his implementation experience and it wor

Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-01-31 Thread Lakshminath Dondeti
On 1/31/2008 6:23 AM, Yoshihiro Ohba wrote: On Wed, Jan 30, 2008 at 10:53:25PM -0800, Lakshminath Dondeti wrote: ... hence the authenticator initiation of the ERP exchange may require the authenticator to send both the EAP-Request/Identity and EAP-Initiate/ Re-auth-Start messages. Y

Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-01-31 Thread Lakshminath Dondeti
On 1/31/2008 7:01 AM, Alan DeKok wrote: Lakshminath Dondeti wrote: Have existing EAP peer implementations been validated to work under these assumptions? i.e. will they break? Will they see "unexpected" EAP messages or content, and reject or discard the response? Kedar noted from his implem

Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-01-31 Thread Yoshihiro Ohba
Lakshminath, I remember ERP state machine is discussed in http://www1.ietf.org/mail-archive/web/hokey/current/msg00713.html, but lock-step issue was not discussed in the thread. Please point out a particular HOKEY thread or meeting minutes where lock-step issue was discussed. (I was paying atten

Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-01 Thread Dan Harkins
Hello again, Pardon my repetition but I have come up with a very valid reason why naming keys using HMAC-SHA-256 is a bad idea. If one wants to administratively remove all keys in a particular key hierarchy (which seems like an entirely reasonable request) one must do a linear search of al

Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-02 Thread Lakshminath Dondeti
Hi Dan, Many thanks for your review. Please see inline for some notes. On 2/1/2008 5:16 PM, Dan Harkins wrote: > Hello, > > I believe this is a well organized and complete document. On > numerous occasions while reviewing it I made a mental question > regarding something only to have the qu

Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-03 Thread Lakshminath Dondeti
On 2/3/2008 12:28 AM, Glen Zorn wrote: > Dan Harkins <> scribbled on Saturday, February 02, 2008 8:46 AM: > >> Hello again, >> >> Pardon my repetition but I have come up with a very valid reason >> why naming keys using HMAC-SHA-256 is a bad idea. >> >> If one wants to administratively re

RE: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-03 Thread Dan Harkins
Hi Glen, On Sun, February 3, 2008 12:28 am, Glen Zorn wrote: > Dan Harkins <> scribbled on Saturday, February 02, 2008 8:46 AM: > >> Hello again, >> >> Pardon my repetition but I have come up with a very valid reason >> why naming keys using HMAC-SHA-256 is a bad idea. >> >> If one wants

Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-03 Thread Alan DeKok
Dan Harkins wrote: > Yea, mapping by Username might be better. Oone reason is that you > could develop a rational searching strategy to identify keys if you > indexed with something like "Username". That is a great suggestion and > a useful alternative to what is in the draft now. I would support

RE: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-03 Thread Glen Zorn
Dan Harkins <> scribbled on Saturday, February 02, 2008 8:46 AM: > Hello again, > > Pardon my repetition but I have come up with a very valid reason > why naming keys using HMAC-SHA-256 is a bad idea. > > If one wants to administratively remove all keys in a particular > key hierarchy (wh

RE: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-03 Thread Glen Zorn
Lakshminath Dondeti <> scribbled on Sunday, February 03, 2008 1:30 PM: ... > There was also the issue of not being able to export EAP session IDs > (IIRC) that I referred to in my other message. Hmmm. draft-ietf-eap-keying-22.txt says EAP methods supporting key derivation and mutual authen

Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-03 Thread Lakshminath Dondeti
Hi all, Some of the reviews I have seen start with good things to say about the document pointing about a few things that need to be fixed. Yoshi pointed out one issue that he apparently missed during the WGLC. We have been going back and forth on these topics and not really making progress.

RE: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-04 Thread Dan Harkins
Hi Glen, On Mon, February 4, 2008 1:09 am, Glen Zorn wrote: [snip] > Doesn't sound particularly readable to me; in any case, I don't think > that it really matters (for the purposes you describe, however unlikely > they may be) what the key name looks like. What matters is how easy it > is to

RE: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-05 Thread Dan Harkins
OTECTED] [mailto:[EMAIL PROTECTED] On >> Behalf Of Dan Harkins >> Sent: Friday, February 01, 2008 5:46 PM >> To: Dan Harkins >> Cc: ietf@ietf.org; [EMAIL PROTECTED] >> Subject: Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP >> Extensions for EAP Re-authen

RE: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-05 Thread Joseph Salowey (jsalowey)
n Harkins > Cc: ietf@ietf.org; [EMAIL PROTECTED] > Subject: Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP > Extensions for EAP Re-authentication Protocol (ERP)) to > Proposed Standard > > > Hello again, > > Pardon my repetition but I have come up with a very val

RE: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-05 Thread Joseph Salowey (jsalowey)
gt; in protocols, most likely you will end up hashing it anyway. > > > > Joe > > > >> -Original Message- > >> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] > On Behalf > >> Of Dan Harkins > >> Sent: Friday, February 01, 2008 5:4

Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-06 Thread Lakshminath Dondeti
can be used to resync. That is one case where the peer ID would be useful. A few meetings ago, the WG didn't care about privacy considerations. I guess we can drop the peer ID now. Like I said, I will think some more, and see if there are any other corner cases. Thanks again Joe. r

RE: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-06 Thread Joseph Salowey (jsalowey)
dopt the root key name scheme we discussed a little > while ago, perhaps the peer-ID is not necessary. Either the > ER server pointed to by the NAI in the keyname-NAI (instead > of rIKname-NAI) can identify the keyname or not. If it does > not have keys corresponding to the key referred

Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-08 Thread Lakshminath Dondeti
identity field (R1Kname-NAI) was in a >>> deterministic place within the packet so the authenticator has less >>> work to do to extract it. I don't see why peer name is useful (or >>> R1Kname-TLV). >>> >>> >> Yeah, as I noted earlier,

RE: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard

2008-02-16 Thread Glen Zorn
... > Can you tell me one use for a key name that is an incomprehensible > string of random bits? > > "Delete all keys associated with 0x58d610a8ff4128c9" > > "uhm, ok" > > If not then don't you agree the current key naming scheme is > completely useless? I don't think that it's really

Session ID (Re: [HOKEY] Last Call: draft-ietf-hokey-erx (EAP Extensions for EAP Re-authentication Protocol (ERP)) to Proposed Standard)

2008-02-03 Thread Lakshminath Dondeti
On 2/3/2008 1:23 AM, Glen Zorn wrote: > Lakshminath Dondeti <> scribbled on Sunday, February 03, 2008 1:30 PM: > > ... > >> There was also the issue of not being able to export EAP session IDs >> (IIRC) that I referred to in my other message. > > Hmmm. draft-ietf-eap-keying-22.txt says > >