Password Authenticated Connection Establishment with the Internet Key Exchange Protocol version 2 (IKEv2)
RFC 6631
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
10 | (System) | Notify list changed from dennis.kuegler@bsi.bund.de, yaronf.ietf@gmail.com, draft-kuegler-ipsecme-pace-ikev2@ietf.org, paul.hoffman@vpnc.org to paul.hoffman@vpnc.org |
2012-06-18
|
10 | (System) | RFC published |
2012-04-19
|
10 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2012-04-19
|
10 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
2012-04-18
|
10 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2012-04-18
|
10 | Yaron Sheffer | New version available: draft-kuegler-ipsecme-pace-ikev2-10.txt |
2012-04-18
|
09 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2012-03-27
|
09 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2012-03-27
|
09 | Cindy Morgan | State changed to RFC Ed Queue from Approved-announcement sent |
2012-03-26
|
09 | (System) | IANA Action state changed to In Progress |
2012-03-26
|
09 | Cindy Morgan | State changed to Approved-announcement sent from Approved-announcement to be sent::Point Raised - writeup needed |
2012-03-26
|
09 | Cindy Morgan | IESG has approved the document |
2012-03-26
|
09 | Cindy Morgan | Closed "Approve" ballot |
2012-03-26
|
09 | Cindy Morgan | Ballot approval text was generated |
2012-03-26
|
09 | Cindy Morgan | Ballot approval text was generated |
2012-03-26
|
09 | Cindy Morgan | Ballot writeup was changed |
2012-03-25
|
09 | Yaron Sheffer | New version available: draft-kuegler-ipsecme-pace-ikev2-09.txt |
2012-03-15
|
08 | Cindy Morgan | State changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation |
2012-03-15
|
08 | Stephen Farrell | [Ballot comment] - I found the overall description of PACE hard to follow, it'd be better if you gave the MODP method for mapping s … [Ballot comment] - I found the overall description of PACE hard to follow, it'd be better if you gave the MODP method for mapping s in the overview so that someone who just knows standard D-H can see why this is a ZKPP. - "free of patents" is not possible, and not really appropriate as a claim in an RFC - section 5.1 could badly do with some examples if that's possible. I'd expect interop problems in any case, but more without that. Those might be shared with the other scheme drafts. - [I-D.kivinen-ipsecme-secure-password-framework] is now an RFC - s2, point 1: don't just say that a value encrypted with the password (ENONCE) is sent to the responder, since that'd in general be vulnerable to off-line dictionary attacks. Maybe say that ENONCE is ok to send because it is specially constructed so as not to expose anything about the password. - "MUST be presisted to stable memory" might be too onerous, I'd say a SHOULD would be better there in case someone has to use an existing DB of shared secrets. - The LongTermSecret scheme seems to be independent of PACE so I wondered why its here and not in a document of its own. - 4.1 seems to call for a table of mappings from authenticated ciphers to the unauthenticated equivalents, otherwise interop is not likely. I think you need to provide those mappings (or at least some) and ideally ask IANA to create a registry for others (it'd be needed if this got onto the standards track later). |
2012-03-15
|
08 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell |
2012-03-15
|
08 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2012-03-15
|
08 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo |
2012-03-14
|
08 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded for Ronald Bonica |
2012-03-13
|
08 | Wesley Eddy | [Ballot Position Update] New position, No Objection, has been recorded for Wesley Eddy |
2012-03-13
|
08 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded for Robert Sparks |
2012-03-13
|
08 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley |
2012-03-11
|
08 | Suresh Krishnan | Request for Telechat review by GENART Completed. Reviewer: Suresh Krishnan. |
2012-03-09
|
08 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant |
2012-03-09
|
08 | Jean Mahoney | Request for Telechat review by GENART is assigned to Suresh Krishnan |
2012-03-09
|
08 | Jean Mahoney | Request for Telechat review by GENART is assigned to Suresh Krishnan |
2012-03-08
|
08 | Peter Saint-Andre | [Ballot comment] Section 5.1 states: The input password string SHOULD be processed according to the rules of the [RFC4013] profile of … [Ballot comment] Section 5.1 states: The input password string SHOULD be processed according to the rules of the [RFC4013] profile of [RFC3454]. Why or when would an implementation violate the SHOULD? That is, why is this not a MUST? Also, please be aware there there is work underway to obsolete RFC 3454 and RFC 4013, primarily because stringprep is limited to Unicode 3.2; see draft-melnikov-precis-saslprepbis. This is just a heads-up, and I'm not necessarily suggesting that you change the text to something like "use RFC 4013 or equivalent". However, when your experiment is done and you put this on the standards track, you'll probably be asked to update the internationalization to use saslprepbis (if the PRECIS WG finishes before your experiment does!). |
2012-03-08
|
08 | Peter Saint-Andre | [Ballot Position Update] New position, No Objection, has been recorded for Peter Saint-Andre |
2012-03-05
|
08 | Sean Turner | State changed to IESG Evaluation from Waiting for AD Go-Ahead |
2012-03-05
|
08 | Sean Turner | Ballot has been issued |
2012-03-05
|
08 | Sean Turner | [Ballot Position Update] New position, Yes, has been recorded for Sean Turner |
2012-03-05
|
08 | Sean Turner | Ballot writeup was changed |
2012-03-05
|
08 | Sean Turner | Created "Approve" ballot |
2012-02-14
|
08 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call. |
2012-01-23
|
08 | Amanda Baber | IANA understands that, upon approval of this document, there are two actions that IANA must complete. First, in the IKEv2 Secure Password Methods subregistry of … IANA understands that, upon approval of this document, there are two actions that IANA must complete. First, in the IKEv2 Secure Password Methods subregistry of the Internet Key Exchange Version 2 (IKEv2) Parameters registry located at: http://www.iana.org/assignments/ikev2-parameters a new method will be added as follows: Value: [ tbd ] Description: Password Authenticated Connection Establishment Reference: [ RFC-to-be ] IANA notes that this method has not yet been added. Second, in the "IKEv2 Notify Message Types - Status Types" subregistry of the Internet Key Exchange Version 2 (IKEv2) Parameters registry located at: http://www.iana.org/assignments/ikev2-parameters two new status types will be added as follows: Value: [ tbd ] Notify Message Type - Status Type: PSK_PERSIST Reference: [ RFC-to-be ] Value: [ tbd ] Notify Message Type - Status Type: PSK_CONFIRM Reference: [ RFC-to-be ] IANA notes that these status types have not yet been added to the registry. |
2012-01-19
|
08 | Jean Mahoney | Request for Last Call review by GENART is assigned to Suresh Krishnan |
2012-01-19
|
08 | Jean Mahoney | Request for Last Call review by GENART is assigned to Suresh Krishnan |
2012-01-19
|
08 | Sean Turner | Placed on agenda for telechat - 2012-03-15 |
2012-01-19
|
08 | Cindy Morgan | PROTO writeup for draft-kuegler-ipsecme-pace-ikev2-08.txt (1.a) I (Paul Hoffman) am the shepherd, and I have reviewed the -08 version of the draft. I believe that it … PROTO writeup for draft-kuegler-ipsecme-pace-ikev2-08.txt (1.a) I (Paul Hoffman) am the shepherd, and I have reviewed the -08 version of the draft. I believe that it is ready for forwarding to the IESG. Note that this is an individual submission, not the product of the IPsecME WG. (1.b) The document was reviewed in the IPsecME WG, although it is not a WG draft. There were multiple requests for reviews, and there were a fair number of comments on various versions of the draft (1.c) I do not believe that more reviews will necessarily help the draft. (1.d) I do not have any special concerns about this draft. There are no IPR statements for this draft. (1.e) There was informal consensus in the IPsecME WG that multiple proposals for a PAKE, including this one, should be standardized. (1.f) I do not believe anyone has threatened an appeal. There are some individuals who expressed extreme discontent with the idea that there would be more than one PAKE published, but the WG could not agree on just one PAKE. (1.g) There were no nits that would prevent the document from being published as an RFC. (1.h) The document's split between normative and informative references is appropriate, and there are no normative downward references. (1.i) The IANA considerations is appropriate. (1.j) There is no formal languages used in the document. Technical Summary This document describes a password-based key exchange for IKEv2 that can be used in the framework described in RFC 6467. The document describes its exchange as "an adaptation of PACE (Password Authenticated Connection Establishment) to the setting of IKEv2". Working Group Summary This document is an individual submission. Document Quality The document has been well-reviewed, with significant changes made since the initial submission. It includes references to academic papers that cover the algorithm described in the document. |
2012-01-17
|
08 | Cindy Morgan | Last call sent |
2012-01-17
|
08 | Cindy Morgan | State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce Reply-To: ietf@ietf.org … State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce Reply-To: ietf@ietf.org Subject: Last Call: (Password Authenticated Connection Establishment with IKEv2) to Experimental RFC The IESG has received a request from an individual submitter to consider the following document: - 'Password Authenticated Connection Establishment with IKEv2' as an Experimental RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2012-02-14. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract IKEv2 does not allow secure peer authentication when using short credential strings, i.e. passwords. Several proposals have been made to integrate password-authentication protocols into IKE. This document provides an adaptation of PACE (Password Authenticated Connection Establishment) to the setting of IKEv2 and demonstrates the advantages of this integration. The file can be obtained via http://datatracker.ietf.org/doc/draft-kuegler-ipsecme-pace-ikev2/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-kuegler-ipsecme-pace-ikev2/ No IPR declarations have been submitted directly on this I-D. |
2012-01-17
|
08 | Cindy Morgan | [Note]: 'Paul Hoffman (paul.hoffman@vpnc.org) is the document shepherd.' added |
2012-01-17
|
08 | Cindy Morgan | State Change Notice email list has been changed to dennis.kuegler@bsi.bund.de, yaronf.ietf@gmail.com, draft-kuegler-ipsecme-pace-ikev2@tools.ietf.org, paul.hoffman@vpnc.org from dennis.kuegler@bsi.bund.de, yaronf.ietf@gmail.com, draft-kuegler-ipsecme-pace-ikev2@tools.ietf.org |
2012-01-17
|
08 | Sean Turner | Last Call was requested |
2012-01-17
|
08 | Sean Turner | State changed to Last Call Requested from Waiting for AD Go-Ahead. |
2012-01-17
|
08 | Sean Turner | Last Call text changed |
2011-09-12
|
08 | (System) | New version available: draft-kuegler-ipsecme-pace-ikev2-08.txt |
2011-08-17
|
07 | (System) | New version available: draft-kuegler-ipsecme-pace-ikev2-07.txt |
2011-04-23
|
08 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call. |
2011-04-14
|
08 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Steve Hanna. |
2011-04-11
|
08 | Amanda Baber | IANA understands that, upon approval of this document, there are six actions that IANA must complete. First, in the IKEv2 Notify Message Types - Status … IANA understands that, upon approval of this document, there are six actions that IANA must complete. First, in the IKEv2 Notify Message Types - Status Types in the Internet Key Exchange Version 2 (IKEv2) Parameters located at: http://www.iana.org/assignments/ikev2-parameters the following notification type will be added: Value NOTIFY MESSAGES - ERROR TYPES Reference ------- -------------------------------- ----------- TBD PACE_SUPPORTED [RFC-to-be] Second, in the IKEv2 Payload Types registry in the Internet Key Exchange Version 2 (IKEv2) Parameters located at: http://www.iana.org/assignments/ikev2-parameters the following payload type will be added: Value Next Payload Type Notation Reference ------ --------------------------- ---------- ----------- TBD Encrypted Nonce ENONCE [RFC-to-be] Third, in the IKEv2 Payload Types registry in the Internet Key Exchange Version 2 (IKEv2) Parameters located at: http://www.iana.org/assignments/ikev2-parameters the following payload type will be added: Value Next Payload Type Notation Reference ------ --------------------------- ---------- ----------- TBD Ephemeral Public Key PKE [RFC-to-be] Fourth, in the IKEv2 Authentication Method registry in the Internet Key Exchange Version 2 (IKEv2) Parameters located at: http://www.iana.org/assignments/ikev2-parameters the following authentication method will be added: Value Authentication Method Reference ------- ----------------------------------------------- ------------ TBD Password Authenticated Connection Establishment [RFC-to-be] Fifth, in the IKEv2 Exchange Types registry in the Internet Key Exchange Version 2 (IKEv2) Parameters located at: http://www.iana.org/assignments/ikev2-parameters the following exchange type will be added: Value Exchange Type Reference ------- ------------------------ ------------- TBD IKE_PACE [RFC-to-be] Sixth, in the IKEv2 Exchange Types registry in the Internet Key Exchange Version 2 (IKEv2) Parameters located at: http://www.iana.org/assignments/ikev2-parameters the following exchange type will be added: Value Exchange Type Reference ------- ------------------------ ------------- TBD IKE_PACE_AUTH [RFC-to-be] IANA understands that these are the only actions that need to be completed upon approval of this document. |
2011-04-06
|
08 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Steve Hanna |
2011-04-06
|
08 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Steve Hanna |
2011-03-30
|
08 | Sean Turner | [NOTE] Yaron Sheffer (yaronf.ietf@gmail.com) is the document shepherd. |
2011-03-30
|
08 | Sean Turner | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Yaron Sheffer, a co-author, is Shepherd for this document. He has reviewed this version and believe it is ready for publication. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document is an individual submission, and not a product of any working group. It was previously presented to the IPsecME working group, and had a limited amount of review. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? The document is within the core focus area of the IPsecME WG. I am not aware of any particular additional community that needs to review it. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. The shepherd believes this is a problem worth solving (or he wouldn't have coauthored it...). The following IPR statement has been submitted: http://datatracker.ietf.org/ipr/1324/ (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? This is an individual submission. In fact, (WG co-chair hat here) we asked the WG several times, and there was not enough interest in solving this problem, in particular because there were several competing proposed solutions. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No "extreme discontent", but this is as expected with an individual submission. There are alternative proposed solutions to the same problem being published concurrently with this one. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See the Internet-Drafts Checklist and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? I have verified ID nits. There are a few minor nits referring to since-published drafts, which we will correct in the next revision. There are no formal criteria to be met. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. References are split. As mentioned, a few references will change (I-D to RFC) in the next revision. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? There are various extensions defined for the IKEv2 protocol (exchange types, notifications etc.), and the IANA considerations are appropriate. No new registries are defined. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? There are no such sections. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. IKEv2 does not allow secure peer authentication when using short credential strings, i.e. passwords (other than with EAP in certain modes). Several proposals have been made to integrate password-authentication protocols into IKE. This document provides an adaptation of PACE (Password Authenticated Connection Establishment) to the setting of IKEv2 and demonstrates the advantages of this integration. PACE is a novel mutual authentication protocol, based on a modified Diffie-Hellman exchange, and has strong and formally proven security properties. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? This document is not a product of any working group. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? We are not aware of implementations of this protocol. |
2011-03-29
|
06 | (System) | New version available: draft-kuegler-ipsecme-pace-ikev2-06.txt |
2011-03-26
|
08 | Cindy Morgan | State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce Reply-To: ietf@ietf.org … State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce Reply-To: ietf@ietf.org Subject: Last Call: (Password Authenticated Connection Establishment with IKEv2) to Experimental RFC The IESG has received a request from an individual submitter to consider the following document: - 'Password Authenticated Connection Establishment with IKEv2' as an Experimental RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2011-04-23. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. The file can be obtained via http://datatracker.ietf.org/doc/draft-kuegler-ipsecme-pace-ikev2/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-kuegler-ipsecme-pace-ikev2/ |
2011-03-26
|
08 | Sean Turner | Last Call was requested |
2011-03-26
|
08 | (System) | Ballot writeup text was added |
2011-03-26
|
08 | (System) | Last call text was added |
2011-03-26
|
08 | (System) | Ballot approval text was added |
2011-03-26
|
08 | Sean Turner | State changed to Last Call Requested from Publication Requested. |
2011-03-26
|
08 | Sean Turner | Last Call text changed |
2011-03-26
|
08 | Sean Turner | Intended Status has been changed to Experimental from Informational |
2011-03-26
|
08 | Sean Turner | Draft added in state Publication Requested |
2011-02-14
|
05 | (System) | New version available: draft-kuegler-ipsecme-pace-ikev2-05.txt |
2010-08-23
|
04 | (System) | New version available: draft-kuegler-ipsecme-pace-ikev2-04.txt |
2010-08-06
|
03 | (System) | New version available: draft-kuegler-ipsecme-pace-ikev2-03.txt |
2010-07-11
|
02 | (System) | New version available: draft-kuegler-ipsecme-pace-ikev2-02.txt |
2010-07-01
|
01 | (System) | New version available: draft-kuegler-ipsecme-pace-ikev2-01.txt |
2010-05-03
|
00 | (System) | New version available: draft-kuegler-ipsecme-pace-ikev2-00.txt |