[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Please review docs on IESG Agenda for September 16, 2004
o draft-ietf-ipsec-ikev2-15.txt
Internet Key Exchange (IKEv2) Protocol (Proposed Standard) - 2 of 6
Note: Back on agenda to see if the new version clears the remaining DISCUSS
positions.
Token: Russ Housley
I checked some of my old comments, to see if they were addressed.
Some were apparently missed. Here's the things that I would
like to see fixed:
The draft should refer to RFC 3748, not RFC 2284.
In Section 3.16, s/NAC/NAK/.
o Type_Data (Variable Length) contains data depending on the Code
and Type. In Requests other than MD5-Challenge, this field
contains a prompt to be displayed to a human user. For NAK, it
contains one octet suggesting the type of authentication the
Initiator would prefer to use. For most other responses, it
contains the authentication code typed by the human user.
This is wrong. RFC 3748 clarified and extended what NAK contents
are. I would just suggest saying this:
"Type-Data
The Type-Data field varies with the Type of Request and the
associated Response. For the documentation of the
EAP methods, see [RFC 3748]."
These points were originally made in:
http://www.vpnc.org/ietf-ipsec/mail-archive/msg00474.html
Then, I would suggest adding the following text to Appendix
A:
"(NN) To support authentication through the Extensible
Authentication Protocol (EAP) [ref]."
Also, change everywhere s/Extended Authentication Protocol/
Extensible Authentication Protocol/
This was recently discussed on the IPsec list:
(no list pointer available yet)
Finally, perhaps the below statement could be clarified:
Note that since IKE passes an indication of initiator identity in
message 3 of the protocol, EAP based prompts for Identity SHOULD NOT
be used.
This is somewhat problematic, because I'm not sure what
this means for an implementation, particularly for the client
side. I would suggest:
Note that since IKE passes an indication of initiator identity
in message 3 of the protocol, the responder SHOULD NOT send
EAP Identity Requests. The initiator SHOULD, however, respond
to such requests if it receives them.
The rationale for this is that it may be that a particular AAA
server insists on sending an identity request, and I wouldn't
like to see clients break because of this. See:
http://mail.frascone.com/pipermail/eap/2004-September/002807.html
Also, there's some functinality in EAP that uses identity requests
so they may be necessary in some cases. See:
http://www.ietf.org/internet-drafts/draft-adrangi-eap-network-discovery-03.txt
--Jari