Skip to main content

Repeated Authentication in Internet Key Exchange (IKEv2) Protocol
draft-nir-ikev2-auth-lt-05

Revision differences

Document history

Date Rev. By Action
2012-08-22
05 (System) post-migration administrative database adjustment to the No Objection position for Brian Carpenter
2006-02-23
05 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2006-02-20
05 Amy Vezza IESG state changed to Approved-announcement sent
2006-02-20
05 Amy Vezza IESG has approved the document
2006-02-20
05 Amy Vezza Closed "Approve" ballot
2006-02-18
05 Russ Housley State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Russ Housley
2006-02-17
05 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2006-02-17
05 Brian Carpenter [Ballot Position Update] Position for Brian Carpenter has been changed to No Objection from Discuss by Brian Carpenter
2006-02-17
05 (System) Removed from agenda for telechat - 2006-02-16
2006-02-16
05 Russ Housley Intended Status has been changed to Experimental from Informational
2006-02-16
05 Brian Carpenter
[Ballot comment]
Section 4 answer's Joel Halpern's last call comment:

"Firstly, this is creating a TLV and associated behavior with significant interoperability problems.  As defined, …
[Ballot comment]
Section 4 answer's Joel Halpern's last call comment:

"Firstly, this is creating a TLV and associated behavior with significant interoperability problems.  As defined, the server decides it would like periodic renewal of the SA.  It sends the noew information in the IKE exchange.  It gets no indication as to whether the receiver understood the information.  Then, if the receiver does not initiate a timely repeat of the authentication (at the preferred refresh time, which is presumably noticeably shorter than the key lifetime or this would not be needed), the server disconnects the session.  This produces distinctly unanticipated results.
Secondly, I had always understood that key lifetimes were the tool for this kind of thing, not extra timers.  The problem seems to be related to the need to reverse the direction. But this technique seems awkward, and as described just above prone to producing undesirable side-effects.
If this is going to be published as is, it needs a stronger and clearer health warning about what happens if the server tries to use this and the client does not understand it."
2006-02-16
05 Brian Carpenter
[Ballot discuss]
I wonder whether this should be Experimental. Although it seems there was no consensus to investigate this approach in IPSEC, the writeup suggests …
[Ballot discuss]
I wonder whether this should be Experimental. Although it seems there was no consensus to investigate this approach in IPSEC, the writeup suggests that experimental code is being written.
2006-02-14
05 Brian Carpenter
[Ballot discuss]
1. I wonder whether this should be Experimental. Although it seems there was no consensus to investigate this approach in IPSEC, the writeup …
[Ballot discuss]
1. I wonder whether this should be Experimental. Although it seems there was no consensus to investigate this approach in IPSEC, the writeup suggests that experimental code is being written

2. I see no response in the -05 text to Joel Halpern's last call review comment:

"Firstly, this is creating a TLV and associated behavior with significant interoperability problems.  As defined, the server decides it would like periodic renewal of the SA.  It sends the noew information in the IKE exchange.  It gets no indication as to whether the receiver understood the information.  Then, if the receiver does not initiate a timely repeat of the authentication (at the preferred refresh time, which is presumably noticeably shorter than the key lifetime or this would not be needed), the server disconnects the session.  This produces distinctly unanticipated results.
Secondly, I had always understood that key lifetimes were the tool for this kind of thing, not extra timers.  The problem seems to be related to the need to reverse the direction. But this technique seems awkward, and as described just above prone to producing undesirable side-effects.
If this is going to be published as is, it needs a stronger and clearer health warning about what happens if the server tries to use this and the client does not understand it."
2006-02-14
05 Brian Carpenter [Ballot Position Update] New position, Discuss, has been recorded for Brian Carpenter by Brian Carpenter
2006-02-08
05 Michelle Cotton
IANA Follow-up Comment:
Feedback from Authors -
The notification should go in the "IKEv2 Notify Message Types" registry.
Specifically, this is not an error message, …
IANA Follow-up Comment:
Feedback from Authors -
The notification should go in the "IKEv2 Notify Message Types" registry.
Specifically, this is not an error message, so it should go in the "RESERVED
TO IANA - Status types" range (16396-40959)
2006-02-06
05 Russ Housley
IANA Expert Review initiated now that Last Call is complete.

= = = = = = = = = =

Date: Mon, 06 Feb 2006 …
IANA Expert Review initiated now that Last Call is complete.

= = = = = = = = = =

Date: Mon, 06 Feb 2006 10:04:46 -0500
To: kivinen@iki.fi
From: Russ Housley
Subject: IANA Expert: draft-nir-ikev2-auth-lt-04.txt
Cc: ynir@checkpoint.com

Tero:

This document just passed IETF Last Call.  Please take a look at the requested IANA registry entries, and let me know if there are any problems.  I have put it on the IESG Telechat agenda for Feb., 16th, but I will withdraw it if you discover any concerns.

Russ
2006-02-06
05 Russ Housley State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Russ Housley
2006-02-06
05 Russ Housley Placed on agenda for telechat - 2006-02-16 by Russ Housley
2006-02-06
05 Russ Housley [Ballot Position Update] New position, Yes, has been recorded for Russ Housley
2006-02-06
05 Russ Housley Ballot has been issued by Russ Housley
2006-02-06
05 Russ Housley Created "Approve" ballot
2006-01-18
05 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2006-01-10
05 (System) New version available: draft-nir-ikev2-auth-lt-05.txt
2006-01-04
05 Michelle Cotton
IANA Last Call Comments:
Upon approval of this document, we understand the IANA will need to assign a notification payload type for the AUTH_LIFETIME notifications …
IANA Last Call Comments:
Upon approval of this document, we understand the IANA will need to assign a notification payload type for the AUTH_LIFETIME notifications from the IKEv2 Notification Payload Types registry.

In looking at http://www.iana.org/assignments/ikev2-parameters, we do not see specifically a "Notification Payload Types Registry". 

Can the authors please clarify as to which registry this payload type needs to go in?
2005-12-21
05 Amy Vezza Last call sent
2005-12-21
05 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2005-12-21
05 Russ Housley State Changes to Last Call Requested from AD Evaluation::AD Followup by Russ Housley
2005-12-21
05 Russ Housley Last Call was requested by Russ Housley
2005-12-21
05 (System) Ballot writeup text was added
2005-12-21
05 (System) Last call text was added
2005-12-21
05 (System) Ballot approval text was added
2005-12-21
05 (System) Sub state has been changed to AD Follow up from New Id Needed
2005-12-21
04 (System) New version available: draft-nir-ikev2-auth-lt-04.txt
2005-12-19
05 Russ Housley State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Russ Housley
2005-12-19
05 Russ Housley Comments provided to the author.  A revisted I-D will be needed to resolve them.
2005-12-19
05 Russ Housley State Changes to AD Evaluation from Publication Requested by Russ Housley
2005-11-14
05 Russ Housley Draft Added by Russ Housley in state Publication Requested
2005-11-10
03 (System) New version available: draft-nir-ikev2-auth-lt-03.txt
2005-05-04
02 (System) New version available: draft-nir-ikev2-auth-lt-02.txt
2004-11-18
01 (System) New version available: draft-nir-ikev2-auth-lt-01.txt
2004-05-12
00 (System) New version available: draft-nir-ikev2-auth-lt-00.txt