datatracker.ietf.org
Sign in
Version 5.13.0, 2015-03-25
Report a bug

More Raw Public Keys for IKEv2
draft-kivinen-ipsecme-oob-pubkey-08

Document type: Active Internet-Draft (individual)
Document stream: No stream defined
Last updated: 2015-03-06
Intended RFC status: Unknown
Other versions: plain text, xml, pdf, html

Stream State:No stream defined
Document shepherd: No shepherd assigned

IESG State: I-D Exists
Responsible AD: (None)
Send notices to: No addresses provided

IP Security Maintenance and Extensions (ipsecme)              T. Kivinen
Internet-Draft                                             INSIDE Secure
Intended status: Standards Track                              P. Wouters
Expires: September 12, 2015                                      Red Hat
                                                           H. Tschofenig
                                                              March 2015

                     More Raw Public Keys for IKEv2
                draft-kivinen-ipsecme-oob-pubkey-08.txt

Abstract

   The Internet Key Exchange Version 2 (IKEv2) protocol currently only
   supports raw RSA keys.  In some environments it is useful to make use
   of other types of public keys, such as those based on Elliptic Curve
   Cryptography.  This documents adds support for other types of raw
   public keys to IKEv2.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on September 12, 2015.

Copyright Notice

   Copyright (c) 2015 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (http://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Simplified BSD License text
   as described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Simplified BSD License.

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  2

Kivinen, Wouters & Tschofenig     std                           [Page 1]
Internet-Draft      More Raw Public Keys for IKEv2            March 2015

   2.  Terminology  . . . . . . . . . . . . . . . . . . . . . . . . .  2
   3.  Certificate Encoding Payload . . . . . . . . . . . . . . . . .  2
   4.  Security Considerations  . . . . . . . . . . . . . . . . . . .  3
   5.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . .  4
   6.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . .  4
   7.  References . . . . . . . . . . . . . . . . . . . . . . . . . .  4
     7.1.  Normative References . . . . . . . . . . . . . . . . . . .  4
     7.2.  Informative References . . . . . . . . . . . . . . . . . .  4
   Appendix A. Examples . . . . . . . . . . . . . . . . . . . . . . .  5
     Appendix A.1.  ECDSA Example . . . . . . . . . . . . . . . . . .  5
     Appendix A.2.  RSA Example . . . . . . . . . . . . . . . . . . .  6
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .  8

1.  Introduction

   Secure DNS allows public keys to be associated with domain names for
   usage with security protocols like Internet Key Exchange Version 2
   (IKEv2) [RFC7296] and Transport Layer Security (TLS) but it relies on
   extensions in those protocols to be specified.

   In [RFC5996] IKEv2 had support for PKCS #1 encoded RSA keys, i.e., a
   DER- encoded RSAPublicKey structure (see [RSA] and [RFC3447]). Other
   raw public keys types are, however, not supported.  In [RFC7296] this
   feature was removed, and this document adds support for raw public
   keys back to IKEv2 in more generic way.

   The TLS Out-of-Band Public Key Validation specification ([RFC7250])
   adds generic support for raw public keys to TLS by re-using the
   SubjectPublicKeyInfo format from the X.509 Public Key Infrastructure
   Certificate profile [RFC5280].

   This document is similar than the TLS Out-of-Band Public Key
   Validation specification, and applies the concept to IKEv2 to support
   all public key formats defined by PKIX. This approach also allows
   future public key extensions to be supported without the need to
   introduce further enhancements to IKEv2.

   To support new types of public keys in IKEv2 the following changes
   are needed:

   o  A new Certificate Encoding format needs to be defined for carrying
      the SubjectPublicKeyInfo structure.  [cert-encoding] specifies

[include full document text]