[IPsec] EAP AKA on USIM

2012-03-06 Thread Prashant Batra (prbatra)
Hello, Not sure if this is the right place to ask this, but I am not getting any other mailing list. Can someone point me to a software implementation of EAP-AKA algorithm (calculation of IK/CK/RES/MAC) on USIM, when the sim gets a EAP-Challenge request. Thanks,

Re: [IPsec] query related to rekey

2012-01-20 Thread Prashant Batra (prbatra)
-Original Message- From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Nico Williams Sent: Saturday, January 21, 2012 3:10 AM To: Prashant Batra (prbatra) Cc: ipsec@ietf.org Subject: Re: [IPsec] query related to rekey On Fri, Jan 20, 2012 at 3:10 PM, Prashant

Re: [IPsec] query related to rekey

2012-01-20 Thread Prashant Batra (prbatra)
-Original Message- From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Nico Williams Sent: Saturday, January 21, 2012 2:19 AM To: Prashant Batra (prbatra) Cc: ipsec@ietf.org Subject: Re: [IPsec] query related to rekey On Fri, Jan 20, 2012 at 2:18 PM, Prashant Batra

[IPsec] query related to rekey

2012-01-20 Thread Prashant Batra (prbatra)
Hi, Section 2.8 of rfc-5996 states handling for rekeying. The text- >From a technical correctness and interoperability perspective, the responder MAY begin sending on an SA as soon as it sends its response to the CREATE_CHILD_SA request. In some situations, however, this could res

[IPsec] collison during initial exchange - RFC 5996

2011-12-16 Thread Prashant Batra (prbatra)
Hi, I have a question on possible collision that can occur during initial exchange (INIT). If two peers send INIT_REQ at the same time, maybe because of some data which matches the traffic_selector on both the peers, how a peer should decide whether it has to drop the request and wait for

Re: [IPsec] Contradiction in RFC5996

2011-11-25 Thread Prashant Batra (prbatra)
Hi, I think that’s fine. You are correct. I re-read the section. Regards, Prashant -Original Message- From: Prashant Batra (prbatra) Sent: Friday, November 25, 2011 6:09 PM To: 'Valery Smyslov'; ipsec@ietf.org Subject: RE: [IPsec] Contradiction in RFC5996 Still I think n

Re: [IPsec] Contradiction in RFC5996

2011-11-25 Thread Prashant Batra (prbatra)
. Regards, Prashant -Original Message- From: Valery Smyslov [mailto:sva...@gmail.com] Sent: Friday, November 25, 2011 6:42 PM To: Prashant Batra (prbatra); ipsec@ietf.org Subject: Re: [IPsec] Contradiction in RFC5996 The question is: what should SPI field of a CHILD_SA_NOT_FOUND notification

Re: [IPsec] Contradiction in RFC5996

2011-11-25 Thread Prashant Batra (prbatra)
, Prashant -Original Message- From: Valery Smyslov [mailto:sva...@gmail.com] Sent: Friday, November 25, 2011 5:13 PM To: Prashant Batra (prbatra); ipsec@ietf.org Subject: Re: [IPsec] Contradiction in RFC5996 Yes, paragraph 3.10 gives a generic rule, that SPI field in Notify Payload must refer to

Re: [IPsec] Contradiction in RFC5996

2011-11-25 Thread Prashant Batra (prbatra)
No, in my understanding, we should not send SPI value in Notify payload telling CHILD_SA_NOT_FOUND. As the SPI sent by the initiator of rekey has sent wrong SPI, which the responder doesn't have. Thus, first paragraph states correctly. Thanks, Prashant -Original Message- From: ipsec-boun.

[IPsec] IPSec processing in linux kernel acting as a gateway

2011-11-17 Thread Prashant Batra (prbatra)
Hello, One basic question related to IPSec processing on gateway. I have established IPSec tunnels between two gateway (gw1 and gw2). On gw1 I am using Linux kernel IPSec (a normal linux server which will act as gateway). The SPD and SAD database on gw1 is- gw1#ip xfrm policy src 172.16.

Re: [IPsec] eap-md5 based authentication

2011-10-25 Thread Prashant Batra (prbatra)
best suited auth mechanisms for a particular client. Regards, Prashant -Original Message- From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Yoav Nir Sent: Tuesday, October 25, 2011 5:59 PM To: Prashant Batra (prbatra); Glen Zorn Cc: ipsec@ietf.org Subject: Re: [IPsec

Re: [IPsec] eap-md5 based authentication

2011-10-25 Thread Prashant Batra (prbatra)
ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Glen Zorn Sent: Tuesday, October 25, 2011 3:46 PM To: Yoav Nir Cc: ipsec@ietf.org; Prashant Batra (prbatra) Subject: Re: [IPsec] eap-md5 based authentication On 10/25/2011 3:35 PM, Yoav Nir wrote: > Hi Prashant. > >

[IPsec] eap-md5 based authentication

2011-10-24 Thread Prashant Batra (prbatra)
Hello, I am facing some problem in calculating md5-challenge response. What I am doing is simply MD5(Identifier | | ). The challenge response is somehow wrong. Is it correct to say that Challenge value used as input to md5 is the same value what is in the EAP payload (type md5-challenge

Re: [IPsec] Multiple Child-SA in a single exchnage

2011-08-30 Thread Prashant Batra (prbatra)
sec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Tero Kivinen Sent: Tuesday, August 30, 2011 3:27 PM To: Prashant Batra (prbatra) Cc: ipsec@ietf.org Subject: [IPsec] Multiple Child-SA in a single exchnage Prashant Batra (prbatra) writes: > If the user knows that it has to esta

[IPsec] Multiple Child-SA in a single exchnage

2011-08-29 Thread Prashant Batra (prbatra)
Hello, The Ikev2 protocol seems to be very flexible in sending payloads in the messages. We can specify multiple proposals of same protocol or of different protocol (AH/ESP) in SA payload. We can also specify multiple traffic selectors in the TS payload. But all this will result in one IPsec

Re: [IPsec] IKEv2 for load-sharing

2011-08-28 Thread Prashant Batra (prbatra)
seems redundant. If you or the group can appreciate this, I can think and come up with some ideas. Regards, Prashant -Original Message- From: Paul Hoffman [mailto:paul.hoff...@vpnc.org] Sent: Saturday, August 27, 2011 12:16 AM To: Prashant Batra (prbatra) Cc: ipsec@ietf.org Subject: Re: [

[IPsec] IKEv2 for load-sharing

2011-08-26 Thread Prashant Batra (prbatra)
Hello, RFC-4555 (IKEv2 Mobility and Multihoming Protocol (MOBIKE)) defines the extension of IKEv2 to support mobile users to offer seamless services when connected using IPSec and also the support for SCTP multi-homing in override mode. To support a load-share model for SCTP(2 associations

[IPsec] IPSec implementation query.

2011-08-17 Thread Prashant Batra (prbatra)
Hello, IPSec in linux kernel doesn't seem to work with packets sent from RAW socket. I think this is as per the design of RAW socket, that they bypass the transport layer. But as they enter the core IP layer, and there is a policy to protect, they should get protected. But this does not ha

Re: [IPsec] DH keys calculation performance

2011-07-26 Thread Prashant Batra (prbatra)
From: Yaron Sheffer [mailto:yaronf.i...@gmail.com] Sent: Tuesday, July 26, 2011 4:47 PM To: Yoav Nir Cc: Prashant Batra (prbatra); ipsec@ietf.org Subject: Re: [IPsec] DH keys calculation performance You might want to review http://tools.ietf.org/html/rfc5996#section-2.12. Also, session

[IPsec] DH keys calculation performance

2011-07-25 Thread Prashant Batra (prbatra)
Hello, The DH exchange (Calculation of Public/Private key and the Secret) in IKEV2 Initial exchange seems to be very expensive. This is slowing down the overall IKEv2 tunnel establishment. Is there a way to optimize it? Regards, Prashant ___ IPsec mai

Re: [IPsec] Query regarding IKE_SA_AUTH response

2011-04-27 Thread Prashant Batra (prbatra)
the same on receiving AUTHENTICATION FAILED alone. Regards, Prashant From: Scott C Moonen [mailto:smoo...@us.ibm.com] Sent: Wednesday, April 27, 2011 5:54 PM To: Prashant Batra (prbatra) Cc: ipsec@ietf.org; ipsec-boun...@ietf.org Subject: Re: [IPsec] Query regarding IKE_SA_AUTH

[IPsec] Query regarding IKE_SA_AUTH response

2011-04-27 Thread Prashant Batra (prbatra)
Hi, I have 2 doubts regarding IKEv2, 1) If in IKE_AUTH request message initiator sends a ID_R payload(optional) specifying a particular peer identity, and the responder sends some different identity in the ID_R payload, what should be the behavior? Should we send a AUTHENTICATION failure message