Skip to main content

IPv6 Configuration in Internet Key Exchange Protocol Version 2 (IKEv2)
draft-ietf-ipsecme-ikev2-ipv6-config-03

Revision differences

Document history

Date Rev. By Action
2012-08-22
03 (System) post-migration administrative database adjustment to the Yes position for Jari Arkko
2012-08-22
03 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2009-11-10
03 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2009-11-09
03 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2009-11-09
03 (System) IANA Action state changed to In Progress from Waiting on Authors
2009-11-09
03 (System) IANA Action state changed to Waiting on Authors from In Progress
2009-11-09
03 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2009-11-09
03 (System) IANA Action state changed to In Progress
2009-11-07
03 Cindy Morgan IESG state changed to Approved-announcement sent
2009-11-07
03 Cindy Morgan IESG has approved the document
2009-11-07
03 Cindy Morgan Closed "Approve" ballot
2009-10-30
03 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2009-10-27
03 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to Yes from Discuss by Jari Arkko
2009-10-26
03 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-10-26
03 (System) New version available: draft-ietf-ipsecme-ikev2-ipv6-config-03.txt
2009-10-22
03 Cindy Morgan State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan
2009-10-22
03 Jari Arkko
[Ballot comment]
> This approach complicates the use of Cryptographically Generates
> Addresses [CGA].

s/Generates/Generated/

> The original 3GPP standards for IPv6 assigned a single …
[Ballot comment]
> This approach complicates the use of Cryptographically Generates
> Addresses [CGA].

s/Generates/Generated/

> The original 3GPP standards for IPv6 assigned a single IPv6 address
> to each mobile phone, resembling current IKEv2 payloads.

Was this really a standard at the time? I do not remember this far
back, but I was under the impression that there were only proposals
on the table, and after discussion with the IETF the eventual standard
came to be what it is today.

> The LINK_ID notification is included in CREATE_CHILD_SA requests to
> indicate that the SA being created is related to the virtual link.
> If this notification is not included, the CREATE_CHILD_SA requests is
> related to the real interface.

How does this relationship show up on the wire? I.e., are the bits
any different if a packet is sent over the virtual link as opposed
to being sent over the real (IPsec) interface? I'm trying to understand
why this distinction matters...

> o Prefix Length (1 octets) - The length of the prefix in bits;
>  usually 64.

Question. Does this specification allow the use of < 64 bit prefixes?
Do current address autoconfiguration mechanisms allow such prefixes
to be used as a basis for assigning addresses? Do you envision the use
of a short prefix as opposed to prefix delegation when the device
needs multiple /64s?
2009-10-22
03 Jari Arkko
[Ballot discuss]
This is an excellent document and I fully support its publication.
I was prepared to ballot yes, but I think the following may …
[Ballot discuss]
This is an excellent document and I fully support its publication.
I was prepared to ballot yes, but I think the following may need
a small correction:

> Duplicate Address Detection is not needed, because this is a point-
> to-point link, where the VPN gateway does not assign any addresses
> from the global unicast prefixes, and link-local interface identifier
> is negotiated separately.

However, some specifications call out the use of DAD. For instance,
RFC 4941 says:

  The node MUST perform duplicate address detection (DAD) on the
  generated temporary address.

perhaps you could make it clearer that DAD is allowed and may be
needed as a part of some other specifications, but running it on
the ptp link is fine.
2009-10-22
03 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko
2009-10-22
03 Jari Arkko
[Ballot comment]
> This approach complicates the use of Cryptographically Generates
> Addresses [CGA].

s/Generates/Generated/

> The original 3GPP standards for IPv6 assigned a single …
[Ballot comment]
> This approach complicates the use of Cryptographically Generates
> Addresses [CGA].

s/Generates/Generated/

> The original 3GPP standards for IPv6 assigned a single IPv6 address
> to each mobile phone, resembling current IKEv2 payloads.

Was this really a standard at the time? I do not remember this far
back, but I was under the impression that there were only proposals
on the table, and after discussion with the IETF the eventual standard
came to be what it is today.

> The LINK_ID notification is included in CREATE_CHILD_SA requests to
> indicate that the SA being created is related to the virtual link.
> If this notification is not included, the CREATE_CHILD_SA requests is
> related to the real interface.

How does this relationship show up on the wire? I.e., are the bits
any different if a packet is sent over the virtual link as opposed
to being sent over the real (IPsec) interface? I'm trying to understand
why this distinction matters...

> Duplicate Address Detection is not needed, because this is a point-
> to-point link, where the VPN gateway does not assign any addresses
> from the global unicast prefixes, and link-local interface identifier
> is negotiated separately.

However, some specifications call out the use of DAD. For instance,
RFC 4941 says:

  The node MUST perform duplicate address detection (DAD) on the
  generated temporary address.

perhaps you could make it clearer that DAD is allowed and may be
needed as a part of some other specifications, but running it on
the ptp link is fine.
2009-10-22
03 Jari Arkko
[Ballot comment]
> This approach complicates the use of Cryptographically Generates
> Addresses [CGA].

s/Generates/Generated/

> The original 3GPP standards for IPv6 assigned a single …
[Ballot comment]
> This approach complicates the use of Cryptographically Generates
> Addresses [CGA].

s/Generates/Generated/

> The original 3GPP standards for IPv6 assigned a single IPv6 address
> to each mobile phone, resembling current IKEv2 payloads.

Was this really a standard at the time? I do not remember this far
back, but I was under the impression that there were only proposals
on the table, and after discussion with the IETF the eventual standard
came to be what it is today.

> The LINK_ID notification is included in CREATE_CHILD_SA requests to
> indicate that the SA being created is related to the virtual link.
> If this notification is not included, the CREATE_CHILD_SA requests is
> related to the real interface.

How does this relationship show up on the wire? I.e., are the bits
any different if a packet is sent over the virtual link as opposed
to being sent over the real (IPsec) interface? I'm trying to understand
why this distinction matters...
2009-10-22
03 Jari Arkko
[Ballot comment]
> This approach complicates the use of Cryptographically Generates
> Addresses [CGA].

s/Generates/Generated/

> The original 3GPP standards for IPv6 assigned a single …
[Ballot comment]
> This approach complicates the use of Cryptographically Generates
> Addresses [CGA].

s/Generates/Generated/

> The original 3GPP standards for IPv6 assigned a single IPv6 address
> to each mobile phone, resembling current IKEv2 payloads.

Was this really a standard at the time? I do not remember this far
back, but I was under the impression that there were only proposals
on the table, and after discussion with the IETF the eventual standard
came to be what it is today.
2009-10-22
03 Jari Arkko [Ballot comment]
> This approach complicates the use of Cryptographically Generates
> Addresses [CGA].

s/Generates/Generated/
2009-10-21
03 Russ Housley
[Ballot comment]
The Gen-ART Review by Avshalom Houri on 2009-09-24 suggested a
  section describing how the requirements in section 3 are being
  addressed …
[Ballot comment]
The Gen-ART Review by Avshalom Houri on 2009-09-24 suggested a
  section describing how the requirements in section 3 are being
  addressed by the solution.
2009-10-21
03 Russ Housley
[Ballot discuss]
The Gen-ART Review by Avshalom Houri on 2009-09-24 raised a concern
  about authentication and re-authentication.  In particular, I think
  that a …
[Ballot discuss]
The Gen-ART Review by Avshalom Houri on 2009-09-24 raised a concern
  about authentication and re-authentication.  In particular, I think
  that a bit more discussion of this paragraph is needed:

  The gateway uses the Link ID to look up relevant local state,
  verifies that the authenticated peer identity associated with
  the link is correct, and continues the handshake as usual.

  Based on the discussion following the posting of the Gen-ART Review,
  I expected an updated Internet-Draft.
2009-10-21
03 (System) State Changes to IESG Evaluation from IESG Evaluation - Defer by system
2009-10-09
03 (System) Removed from agenda for telechat - 2009-10-08
2009-10-08
03 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Dave Cridland.
2009-10-08
03 Jari Arkko State Changes to IESG Evaluation - Defer from IESG Evaluation by Jari Arkko
2009-10-08
03 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2009-10-08
03 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2009-10-07
03 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2009-10-07
03 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded by Alexey Melnikov
2009-10-07
03 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2009-10-07
03 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2009-10-06
03 Russ Housley
[Ballot comment]
The Gen-ART Review by Avshalom Houri on 2009-09-24 suggested a
  section describing how the requirements in section 3 are being
  addressed …
[Ballot comment]
The Gen-ART Review by Avshalom Houri on 2009-09-24 suggested a
  section describing how the requirements in section 3 are being
  addressed by the solution.
2009-10-06
03 Russ Housley
[Ballot discuss]
The Gen-ART Review by Avshalom Houri on 2009-09-24 raised a concern
  about authentication and re-authentication.  In particular, I think
  that a …
[Ballot discuss]
The Gen-ART Review by Avshalom Houri on 2009-09-24 raised a concern
  about authentication and re-authentication.  In particular, I think
  that a bit more discussion of this paragraph is needed:

  The gateway uses the Link ID to look up relevant local state,
  verifies that the authenticated peer identity associated with
  the link is correct, and continues the handshake as usual.
2009-10-06
03 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2009-09-30
03 Tim Polk State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Tim Polk
2009-09-25
03 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2009-09-22
03 Amanda Baber
IANA comments:

Upon approval of this document, IANA will make the following
assignments at
http://www.iana.org/assignments/ikev2-parameters


ACTION 1:

Registry Name: IKEv2 Configuration Payload Attribute Types

Value …
IANA comments:

Upon approval of this document, IANA will make the following
assignments at
http://www.iana.org/assignments/ikev2-parameters


ACTION 1:

Registry Name: IKEv2 Configuration Payload Attribute Types

Value Attribute Type Multi-Valued Length Reference
----------- ------------- ------------ ------------ ---------
TBD1 INTERNAL_IP6_LINK NO 8 or more
[RFC-ipsecme-ikev2-ipv6-config-02]
TBD2 INTERNAL_IP6_PREFIX YES 17 octets
[RFC-ipsecme-ikev2-ipv6-config-02]


ACTION 2:

Registry Name: IKEv2 Notify Message Types - Status Types

Value NOTIFY MESSAGES - STATUS TYPES Reference
------------ -------------------------------- ---------
TBD3 LINK_ID [RFC-ipsecme-ikev2-ipv6-config-02]
2009-09-18
03 Samuel Weiler Request for Last Call review by SECDIR is assigned to Dave Cridland
2009-09-18
03 Samuel Weiler Request for Last Call review by SECDIR is assigned to Dave Cridland
2009-09-11
03 Pasi Eronen [Ballot Position Update] New position, Recuse, has been recorded by Pasi Eronen
2009-09-11
03 Amy Vezza Last call sent
2009-09-11
03 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2009-09-11
03 Tim Polk Placed on agenda for telechat - 2009-10-08 by Tim Polk
2009-09-11
03 Tim Polk Last Call was requested by Tim Polk
2009-09-11
03 Tim Polk State Changes to Last Call Requested from AD Evaluation::AD Followup by Tim Polk
2009-09-11
03 Tim Polk [Ballot Position Update] New position, Yes, has been recorded for Tim Polk
2009-09-11
03 Tim Polk Ballot has been issued by Tim Polk
2009-09-11
03 Tim Polk Created "Approve" ballot
2009-09-11
03 (System) Ballot writeup text was added
2009-09-11
03 (System) Last call text was added
2009-09-11
03 (System) Ballot approval text was added
2009-08-20
03 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-08-20
02 (System) New version available: draft-ietf-ipsecme-ikev2-ipv6-config-02.txt
2009-08-11
03 Tim Polk State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Tim Polk
2009-08-11
03 Tim Polk [Note]: 'Paul Hoffman (paul.hoffman@vpnc.org) is the document shepherd.' added by Tim Polk
2009-07-27
03 Tim Polk State Changes to AD Evaluation from Publication Requested by Tim Polk
2009-07-20
03 Tim Polk Since Pasi is a co-author, I will be the sponsoring AD.
2009-07-20
03 Tim Polk Responsible AD has been changed to Tim Polk from Pasi Eronen
2009-07-19
03 Cindy Morgan
Here is my document shepherd write-up for "IPv6 Configuration in IKEv2" (draft-ietf-ipsecme-ikev2-ipv6-config-01.txt). Please consider it for publication.

--Paul Hoffman

I am the document …
Here is my document shepherd write-up for "IPv6 Configuration in IKEv2" (draft-ietf-ipsecme-ikev2-ipv6-config-01.txt). Please consider it for publication.

--Paul Hoffman

I am the document shepherd for this document, inasmuch as I am the co-chair of the IPsecME WG. I have personally reviewed this version of the document and, in particular, believe this version is ready for forwarding to the IESG for publication as an Experimental RFC.

The document was reviewed in the WG, but only lightly, even though we asked a few times for review. I asked for reviews on the ipv6ops WG and an IPv6 mailing list, but do not think anyone took me up on it. I do not have concern that it needs more review before IETF LC, although I would love it if there was more review during it. I know of no IPR statements on the work.

Because of the little review, the WG consensus for this work can only be called "weak", but there was no one who objected to publication. The authors and WG decided to ask for Experimental status because the protocol here has been thinly implemented (if that), and thinly reviewed.

The draft mostly passes I-D nits (there are lots of instances of non-RFC3849-compliant addresses, but they really are needed to make the examples clear). Yes, the references are sane and no downrefs are needed. The IANA considerations shows two sets of new entries need to be added to already-existing registries, and no new registries are needed.

Technical Summary

This document describes new IKEv2 configuration attributes that let an IPsec security gateway assign IPv6 prefixes to a VPN client clients. This is needed because IKEv2 currently does not handle all features of IPv6 that it should, such as enabling a virtual link.

Working Group Summary

The document has light consensus of the IPsecME WG with no objections to publication as an Experimental RFC.

Document Quality

There was initial interest in this protocol from many participants, but only a few seem to have done an in-depth review. Despite that, the document has no obvious problems and could turn out to be quite useful as there is greater deployment of IPsec in IPv6 environments. This document should be revisited as more implementations of remote access IPv6 IPsec are created and deployed.
2009-07-19
03 Cindy Morgan Draft Added by Cindy Morgan in state Publication Requested
2009-07-19
03 Cindy Morgan [Note]: 'Paul Hoffman (paul.hoffman@vpnc.org) is the document shepherd.' added by Cindy Morgan
2009-06-17
01 (System) New version available: draft-ietf-ipsecme-ikev2-ipv6-config-01.txt
2009-05-22
03 (System) Document has expired
2008-11-18
00 (System) New version available: draft-ietf-ipsecme-ikev2-ipv6-config-00.txt