[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Summary of revised identity changes
Greetings again. At the request of some folks from the WG, here is a
summary of changes that the revised identity proposal makes.
Hopefully, this list clears up any questions.
a) For certificate authentication, in messages 3 and 4, you no longer
send both an ID and a certificate. Instead, you send only a
certificate and the receiver gets your identity from the certificate.
IKEv1 developers still cannot agree on how to use the identity with
the certificate. For example, some implementers reject messages where
the ID doesn't match any of the names in the certificate, others
accept it, still others don't even read the ID field, and still
others don't read the names from the certificate. The new proposal
eliminates the ambiguity.
b) By telling the kind of ID that is accepted in messages 1 and 2,
you can safely avoid sending certificates if they are not needed.
Either side can say "I can take certificates as a hash-and-URL". If
you can't accept a hash-and-URL (for instance, because you can't
resolve URLs), you can tell the other side that easily.
c) Certificate requests are now hashes of the public key of the trust
anchor, not the DN name. This makes it clearer to each side exactly
which key is the trust anchor, since some trust anchor names are not
unique (such as after a key rollover). There is only one form for the
hashes, and it matches the form that is already used in PKIX.
d) You can accept hash-and-URL of certs instead of the certs
themselves. This helps prevent fragmentation of UDP packets for large
certificates. The receiver can cache the certificates he/she has
received and look them up by their hash, so resolving the URL might
not even be necessary.
I hope this helps!
--Paul Hoffman, Director
--VPN Consortium