[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: CRACK
On 21 Oct 99, at 9:19, Dan Harkins wrote:
Dan,
some comments/questions regarding the draft.
1. If client doesn't have server's public key, it includes CERTREQ
payload in its first message. RFC2408 allows to return several
certificates (certificates chain). In this case ID payload usually
helps client to quickly decide which certificate of the chain is end
entity (server) certificate and to start path construction from it.
CRACK exchange doesn't contain ID payloads (as far as I understand).
So, does it imply that CRACK disallow server to return several
certificates? Or, otherwise, how client will solve this problem? Why
not include ID payload in case server sends its certificate(s)?
2. CHRE payload may simultaneously contain both "generic
challenge/response blob" and attributes. How its body should be
parsed in this case? In other words, assuming that attributes follow
the "blob", how one can determine the "blob" length? Or have I missed
something?
3. In paragraph 5.4 some it is mentioned that client passes its
identity in IDi payload, however, this payload is not present in the
following diagrams and is not mentioned anywhere else. Where is the
error (if it really is)?
4. About VendorID payload. As far as I understand it is present in
CRACK exchange itself. So responder needs to parse unknown (private)
exchange message to find it (and, thus, to get knowledge of how to
parse that message). It seems not to be the problem for CRACK (and
for any exchange that uses only generic ISAKMP payload headers in its
message payloads) but, in general, it scares a bit. Please, correct
me if I'm wrong.
5. There are 3 identical paragraphs in the draft (starting with
"CRACK_MESSAGE is optionally sent...") and all three contain the same
typo - "MAY by used by" (I guess you mean "MAY be used by").
Regards,
Valera.
> A few weeks ago I was alluding to a draft which would address the
> desire to do token card authentication in IKE (and do it securely).
> The draft is out but is an individual I-D submission due to the fact
> that remote access is going to be the responsibility of IPSRA which
> does not yet formally exist. Please check it out and comment. It's
> called draft-harkins-ipsec-ike-crack-00.txt and can be found with the
> others at http://www.ietf.cnri.reston.va.us/internet-drafts.
>
> Dan.
>
>
>
Follow-Ups:
- Re: CRACK
- From: Dan Harkins <dharkins@network-alchemy.com>
References:
- CRACK
- From: Dan Harkins <dharkins@network-alchemy.com>