Repeated Authentication in Internet Key Exchange (IKEv2) Protocol
draft-nir-ikev2-auth-lt-05
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
| 2012-08-22 | 05 | (System) | post-migration administrative database adjustment to the No Objection position for Brian Carpenter |
| 2006-02-23 | 05 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
| 2006-02-20 | 05 | Amy Vezza | IESG state changed to Approved-announcement sent |
| 2006-02-20 | 05 | Amy Vezza | IESG has approved the document |
| 2006-02-20 | 05 | Amy Vezza | Closed "Approve" ballot |
| 2006-02-18 | 05 | Russ Housley | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Russ Housley |
| 2006-02-17 | 05 | Amy Vezza | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza |
| 2006-02-17 | 05 | Brian Carpenter | [Ballot Position Update] Position for Brian Carpenter has been changed to No Objection from Discuss by Brian Carpenter |
| 2006-02-17 | 05 | (System) | Removed from agenda for telechat - 2006-02-16 |
| 2006-02-16 | 05 | Russ Housley | Intended Status has been changed to Experimental from Informational |
| 2006-02-16 | 05 | Brian Carpenter | [Ballot comment] Section 4 answer's Joel Halpern's last call comment: "Firstly, this is creating a TLV and associated behavior with significant interoperability problems. As defined, … [Ballot comment] Section 4 answer's Joel Halpern's last call comment: "Firstly, this is creating a TLV and associated behavior with significant interoperability problems. As defined, the server decides it would like periodic renewal of the SA. It sends the noew information in the IKE exchange. It gets no indication as to whether the receiver understood the information. Then, if the receiver does not initiate a timely repeat of the authentication (at the preferred refresh time, which is presumably noticeably shorter than the key lifetime or this would not be needed), the server disconnects the session. This produces distinctly unanticipated results. Secondly, I had always understood that key lifetimes were the tool for this kind of thing, not extra timers. The problem seems to be related to the need to reverse the direction. But this technique seems awkward, and as described just above prone to producing undesirable side-effects. If this is going to be published as is, it needs a stronger and clearer health warning about what happens if the server tries to use this and the client does not understand it." |
| 2006-02-16 | 05 | Brian Carpenter | [Ballot discuss] I wonder whether this should be Experimental. Although it seems there was no consensus to investigate this approach in IPSEC, the writeup suggests … [Ballot discuss] I wonder whether this should be Experimental. Although it seems there was no consensus to investigate this approach in IPSEC, the writeup suggests that experimental code is being written. |
| 2006-02-14 | 05 | Brian Carpenter | [Ballot discuss] 1. I wonder whether this should be Experimental. Although it seems there was no consensus to investigate this approach in IPSEC, the writeup … [Ballot discuss] 1. I wonder whether this should be Experimental. Although it seems there was no consensus to investigate this approach in IPSEC, the writeup suggests that experimental code is being written 2. I see no response in the -05 text to Joel Halpern's last call review comment: "Firstly, this is creating a TLV and associated behavior with significant interoperability problems. As defined, the server decides it would like periodic renewal of the SA. It sends the noew information in the IKE exchange. It gets no indication as to whether the receiver understood the information. Then, if the receiver does not initiate a timely repeat of the authentication (at the preferred refresh time, which is presumably noticeably shorter than the key lifetime or this would not be needed), the server disconnects the session. This produces distinctly unanticipated results. Secondly, I had always understood that key lifetimes were the tool for this kind of thing, not extra timers. The problem seems to be related to the need to reverse the direction. But this technique seems awkward, and as described just above prone to producing undesirable side-effects. If this is going to be published as is, it needs a stronger and clearer health warning about what happens if the server tries to use this and the client does not understand it." |
| 2006-02-14 | 05 | Brian Carpenter | [Ballot Position Update] New position, Discuss, has been recorded for Brian Carpenter by Brian Carpenter |
| 2006-02-08 | 05 | Michelle Cotton | IANA Follow-up Comment: Feedback from Authors - The notification should go in the "IKEv2 Notify Message Types" registry. Specifically, this is not an error message, … IANA Follow-up Comment: Feedback from Authors - The notification should go in the "IKEv2 Notify Message Types" registry. Specifically, this is not an error message, so it should go in the "RESERVED TO IANA - Status types" range (16396-40959) |
| 2006-02-06 | 05 | Russ Housley | IANA Expert Review initiated now that Last Call is complete. = = = = = = = = = = Date: Mon, 06 Feb 2006 … IANA Expert Review initiated now that Last Call is complete. = = = = = = = = = = Date: Mon, 06 Feb 2006 10:04:46 -0500 To: kivinen@iki.fi From: Russ Housley Subject: IANA Expert: draft-nir-ikev2-auth-lt-04.txt Cc: ynir@checkpoint.com Tero: This document just passed IETF Last Call. Please take a look at the requested IANA registry entries, and let me know if there are any problems. I have put it on the IESG Telechat agenda for Feb., 16th, but I will withdraw it if you discover any concerns. Russ |
| 2006-02-06 | 05 | Russ Housley | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Russ Housley |
| 2006-02-06 | 05 | Russ Housley | Placed on agenda for telechat - 2006-02-16 by Russ Housley |
| 2006-02-06 | 05 | Russ Housley | [Ballot Position Update] New position, Yes, has been recorded for Russ Housley |
| 2006-02-06 | 05 | Russ Housley | Ballot has been issued by Russ Housley |
| 2006-02-06 | 05 | Russ Housley | Created "Approve" ballot |
| 2006-01-18 | 05 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
| 2006-01-10 | 05 | (System) | New version available: draft-nir-ikev2-auth-lt-05.txt |
| 2006-01-04 | 05 | Michelle Cotton | IANA Last Call Comments: Upon approval of this document, we understand the IANA will need to assign a notification payload type for the AUTH_LIFETIME notifications … IANA Last Call Comments: Upon approval of this document, we understand the IANA will need to assign a notification payload type for the AUTH_LIFETIME notifications from the IKEv2 Notification Payload Types registry. In looking at http://www.iana.org/assignments/ikev2-parameters, we do not see specifically a "Notification Payload Types Registry". Can the authors please clarify as to which registry this payload type needs to go in? |
| 2005-12-21 | 05 | Amy Vezza | Last call sent |
| 2005-12-21 | 05 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
| 2005-12-21 | 05 | Russ Housley | State Changes to Last Call Requested from AD Evaluation::AD Followup by Russ Housley |
| 2005-12-21 | 05 | Russ Housley | Last Call was requested by Russ Housley |
| 2005-12-21 | 05 | (System) | Ballot writeup text was added |
| 2005-12-21 | 05 | (System) | Last call text was added |
| 2005-12-21 | 05 | (System) | Ballot approval text was added |
| 2005-12-21 | 05 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
| 2005-12-21 | 04 | (System) | New version available: draft-nir-ikev2-auth-lt-04.txt |
| 2005-12-19 | 05 | Russ Housley | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Russ Housley |
| 2005-12-19 | 05 | Russ Housley | Comments provided to the author. A revisted I-D will be needed to resolve them. |
| 2005-12-19 | 05 | Russ Housley | State Changes to AD Evaluation from Publication Requested by Russ Housley |
| 2005-11-14 | 05 | Russ Housley | Draft Added by Russ Housley in state Publication Requested |
| 2005-11-10 | 03 | (System) | New version available: draft-nir-ikev2-auth-lt-03.txt |
| 2005-05-04 | 02 | (System) | New version available: draft-nir-ikev2-auth-lt-02.txt |
| 2004-11-18 | 01 | (System) | New version available: draft-nir-ikev2-auth-lt-01.txt |
| 2004-05-12 | 00 | (System) | New version available: draft-nir-ikev2-auth-lt-00.txt |