Negotiation of NAT-Traversal in the IKE
RFC 3947
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2022-04-11
|
08 | (System) | Received changes through RFC Editor sync (added Verified Errata tag) |
2017-05-16
|
08 | (System) | Changed document authors from "Victor Volpe" to "Victor Volpe, Tero Kivinen, Ari Huttunen, Brian Swander" |
2017-02-17
|
08 | (System) | Received changes through RFC Editor sync (added Errata tag) |
2015-10-14
|
08 | (System) | Notify list changed from , to (None) |
2013-06-06
|
(System) | Posted related IPR disclosure: SSH Communications Security Corp's Statement about IPR related to RFC 3947 | |
2012-08-22
|
08 | (System) | post-migration administrative database adjustment to the No Objection position for Thomas Narten |
2012-08-22
|
08 | (System) | post-migration administrative database adjustment to the No Objection position for Jon Peterson |
2012-08-22
|
08 | (System) | post-migration administrative database adjustment to the No Objection position for Steven Bellovin |
2005-01-07
|
08 | Amy Vezza | State Changes to RFC Published from RFC Ed Queue by Amy Vezza |
2005-01-07
|
08 | Amy Vezza | [Note]: 'RFC 3947' added by Amy Vezza |
2005-01-05
|
08 | (System) | RFC published |
2004-04-29
|
08 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2004-04-28
|
08 | Amy Vezza | IESG state changed to Approved-announcement sent |
2004-04-28
|
08 | Amy Vezza | IESG has approved the document |
2004-04-28
|
08 | Amy Vezza | Closed "Approve" ballot |
2004-04-27
|
08 | (System) | [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin |
2004-04-27
|
08 | Jon Peterson | [Ballot Position Update] Position for Jon Peterson has been changed to No Objection from Discuss by Jon Peterson |
2004-03-23
|
08 | Russ Housley | State Changes to Approved-announcement to be sent from IESG Evaluation by Russ Housley |
2004-02-20
|
08 | Russ Housley | State Changes to IESG Evaluation from IESG Evaluation::Revised ID Needed by Russ Housley |
2004-02-19
|
08 | Thomas Narten | [Ballot Position Update] Position for Thomas Narten has been changed to No Objection from Discuss by Thomas Narten |
2004-02-18
|
08 | Steven Bellovin | [Ballot Position Update] Position for Steve Bellovin has been changed to No Objection from Discuss by Steve Bellovin |
2004-02-18
|
08 | (System) | New version available: draft-ietf-ipsec-nat-t-ike-08.txt |
2003-11-21
|
08 | Amy Vezza | Removed from agenda for telechat - 2003-11-20 by Amy Vezza |
2003-11-20
|
08 | Amy Vezza | [Ballot Position Update] New position, No Objection, has been recorded for by Amy Vezza |
2003-11-20
|
08 | Amy Vezza | [Ballot Position Update] New position, No Objection, has been recorded for by Amy Vezza |
2003-11-20
|
08 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2003-11-20
|
08 | Thomas Narten | [Ballot comment] > Take the common case of the initiator behind the NAT. The initiator must > quickly change to 4500 once the NAT has … [Ballot comment] > Take the common case of the initiator behind the NAT. The initiator must > quickly change to 4500 once the NAT has been detected to minimize the s/4500/port 4500/ > If there is a NAT box between normal tunnel or transport encapsulations > may not work and in that case UDP-Encapsulation SHOULD be used. hard to parse. |
2003-11-20
|
08 | Thomas Narten | [Ballot discuss] > The NAT-Traversal capability of the remote host is determined by an > exchange of vendor strings; in Phase 1 two first messages, … [Ballot discuss] > The NAT-Traversal capability of the remote host is determined by an > exchange of vendor strings; in Phase 1 two first messages, the vendor id > payload for this specification of NAT-Traversal (MD5 hash of "RFC XXXX" > - ["XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX"]) MUST be sent if supported > (and it MUST be received by both sides) for the NAT-Traversal probe to > continue. We have to do this with vendor IDs? I could understand using vendor IDs if this was for backwards compatability, but the above indicates a new has value gets defined (including the RFC number). Can't we do the negotiation using more standards mechanisms? > Once port change has occurred, if a packet is received on 500, that > packet is old. If the packet is an informational, it MAY be processed if > local policy allows. If the packet is a main mode or aggressive mode > packet, it SHOULD be discarded. Is an informational one that starts the negotiation? If so, it should be a SHOULD/MUST, since the initiater might reboot and lose all state. Bottom line, please assure me that if the initiator reboots, and restarts the IKE exchange, the right thing happens (i.e, the responder doesn't drop the packets as describe above). |
2003-11-20
|
08 | Thomas Narten | [Ballot Position Update] New position, Discuss, has been recorded for by Thomas Narten |
2003-11-20
|
08 | Bill Fenner | [Ballot Position Update] New position, No Objection, has been recorded for by Bill Fenner |
2003-11-20
|
08 | Bert Wijnen | [Ballot Position Update] New position, No Objection, has been recorded for by Bert Wijnen |
2003-11-20
|
08 | Jon Peterson | [Ballot discuss] This document does not contain a reference to RFC3424. It should do so, and it should explicitly address the five concerns raised … [Ballot discuss] This document does not contain a reference to RFC3424. It should do so, and it should explicitly address the five concerns raised in RFC3424 Section 4. For a good example, see Section 14 of RFC3489. I would also recommend reading the NAT taxonomy in RFC3489 Section 5, and identifying which sorts of NATs this mechanism will accommodate, and whether or not different behavior is required for different types of NATs (there is a little of that already, but more would be nice). This document seems to address only the case where one of the IKE endpoints is behind a NAT (and the other is apparently in public address space), since initial reachability is just assumed. Little considerations seems to be given of cases where both are behind a NAT - the most material case for common peer-to-peer applications on the net today, and the most difficult to solve. While I don't expect the authors to take on that problem, the draft should at least identify (in Section 1, I'd imagine) that this is its scope. There's more that could be said here (along the lines of Ted's comment), but I'll leave it at that. |
2003-11-20
|
08 | Jon Peterson | [Ballot Position Update] Position for Jon Peterson has been changed to Discuss from Undefined by Jon Peterson |
2003-11-20
|
08 | Jon Peterson | [Ballot Position Update] New position, Undefined, has been recorded for by Jon Peterson |
2003-11-19
|
08 | Harald Alvestrand | [Ballot comment] Needs a little language wash. Examples: 3.2 "and the one of the other NAT-D payloads must match" "as defined in the … [Ballot comment] Needs a little language wash. Examples: 3.2 "and the one of the other NAT-D payloads must match" "as defined in the [Hutt03]" 7 "There are cases where NAT box decides to remove mappings" The RFC Editor can do that, I think. |
2003-11-19
|
08 | Harald Alvestrand | [Ballot comment] Needs a language wash. Examples: |
2003-11-19
|
08 | Harald Alvestrand | [Ballot Position Update] New position, No Objection, has been recorded for by Harald Alvestrand |
2003-11-19
|
08 | Ted Hardie | [Ballot comment] There are a lot of design assumptions about the number and type of NATs in the path between the two ipsec speakers buried … [Ballot comment] There are a lot of design assumptions about the number and type of NATs in the path between the two ipsec speakers buried in this text. I can see the strong desire people have to work around both the common case and more especially the frustrating "helpful" ipsec-aware NAT. This kind of NAT discovery is full of pitfalls, though, and it ends up being an arms-race. I won't stand in the way of folks wanting to add this to their arsenal, but I fundamentally think this is the wrong approach--and "helpfulness" is only going to kick you again when you have this deployed. (I already have nightmares about "helpful" NATs pretending to be STUN servers out on the network, and this is probably going to add a twist to those...) |
2003-11-19
|
08 | Ted Hardie | [Ballot Position Update] Position for Ted Hardie has been changed to Abstain from Undefined by Ted Hardie |
2003-11-19
|
08 | Ted Hardie | [Ballot Position Update] Position for Ted Hardie has been changed to Undefined from Abstain by Ted Hardie |
2003-11-19
|
08 | Ted Hardie | [Ballot Position Update] New position, Abstain, has been recorded for by Ted Hardie |
2003-11-19
|
08 | Margaret Cullen | [Ballot comment] >> The NAT-Traversal capability of the remote host is determined by an >> exchange of vendor strings; in Phase 1 two first messages, … [Ballot comment] >> The NAT-Traversal capability of the remote host is determined by an >> exchange of vendor strings; in Phase 1 two first messages, the vendor id >> payload for this specification of NAT-Traversal (MD5 hash of "RFC XXXX" >> - ["XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX"]) MUST be sent if supported >> (and it MUST be received by both sides) for the NAT-Traversal probe to >> continue. The above sentence doesn't make sense to me. Perhaps: s/strings; in Phase 1 two first messages,/strings. In the first two Phase 1 messages,/ |
2003-11-19
|
08 | Margaret Cullen | [Ballot Position Update] New position, No Objection, has been recorded for by Margaret Wasserman |
2003-11-19
|
08 | Ned Freed | [Ballot comment] Nits: No copyright boilerplate. Old way of doing IPR notification? |
2003-11-19
|
08 | Ned Freed | [Ballot Position Update] New position, No Objection, has been recorded for by Ned Freed |
2003-11-17
|
08 | Steven Bellovin | [Ballot discuss] 3.1: The exact string to feed to MD5 isn't clear. Are the quote marks included? The hyphen? The blanks on either side of … [Ballot discuss] 3.1: The exact string to feed to MD5 isn't clear. Are the quote marks included? The hyphen? The blanks on either side of the hyphen? The square brackets? Why is this using a vendor ID? Where does XXX... come from? It's not listed in the IANA Considerations section. (Note: this document shows a fascinating item protocol-awareness by the NAT has actually proved harmful!) |
2003-11-17
|
08 | Steven Bellovin | [Ballot Position Update] New position, Discuss, has been recorded for by Steve Bellovin |
2003-11-08
|
08 | Russ Housley | Placed on agenda for telechat - 2003-11-20 by Russ Housley |
2003-11-08
|
08 | Russ Housley | State Changes to IESG Evaluation from Waiting for Writeup by Russ Housley |
2003-11-08
|
08 | Russ Housley | Status date has been changed to 2003-11-08 from 2003-10-08 |
2003-11-08
|
08 | Russ Housley | [Ballot Position Update] New position, Yes, has been recorded for Russ Housley |
2003-11-08
|
08 | Russ Housley | Ballot has been issued by Russ Housley |
2003-11-08
|
08 | Russ Housley | Created "Approve" ballot |
2003-11-04
|
08 | (System) | State has been changed to Waiting for Writeup from In Last Call by system |
2003-10-21
|
08 | Amy Vezza | Last call sent |
2003-10-21
|
08 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2003-10-20
|
08 | Russ Housley | Last Call was requested by Russ Housley |
2003-10-20
|
08 | Russ Housley | State Changes to Last Call Requested from Last Call Requested by Russ Housley |
2003-10-20
|
08 | (System) | Ballot writeup text was added |
2003-10-20
|
08 | (System) | Last call text was added |
2003-10-20
|
08 | (System) | Ballot approval text was added |
2003-10-08
|
08 | Russ Housley | Status date has been changed to 2003-10-08 from 2003-05-30 |
2003-10-08
|
08 | Russ Housley | State Changes to Last Call Requested from AD Evaluation::Revised ID Needed by Russ Housley |
2003-09-29
|
07 | (System) | New version available: draft-ietf-ipsec-nat-t-ike-07.txt |
2003-09-12
|
08 | Russ Housley | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Russ Housley |
2003-06-06
|
08 | Russ Housley | State Changes to AD Evaluation from Publication Requested by Housley, Russ |
2003-05-30
|
08 | Russ Housley | Draft Added by Housley, Russ |
2003-05-29
|
06 | (System) | New version available: draft-ietf-ipsec-nat-t-ike-06.txt |
2003-01-08
|
05 | (System) | New version available: draft-ietf-ipsec-nat-t-ike-05.txt |
2002-11-06
|
04 | (System) | New version available: draft-ietf-ipsec-nat-t-ike-04.txt |
2002-07-26
|
(System) | Posted related IPR disclosure: Microsoft's Patent Claim pertaining to draft-ietf-ipsec-nat-t-ike and draft-ietf-ipsec-udp-encaps | |
2002-06-25
|
03 | (System) | New version available: draft-ietf-ipsec-nat-t-ike-03.txt |
2002-04-11
|
02 | (System) | New version available: draft-ietf-ipsec-nat-t-ike-02.txt |
2001-10-23
|
01 | (System) | New version available: draft-ietf-ipsec-nat-t-ike-01.txt |
2001-06-21
|
00 | (System) | New version available: draft-ietf-ipsec-nat-t-ike-00.txt |