Hi Rifaat, I snipped parts where we are in agreement. Hi Valery, See my replies below. Regards, Rifaat […]
Got it. I am assuming that the fragmentation issue with the initiator request is captured in a different document. If that is the case, then I think it is reasonable to leave this text as is. It is described in the IKE fragmentation document (RFC 7383). I’ve added a reference to it in the -07 version.
Thanks for the clarification, as I am not an IKE expert. Having said that, I wonder why you are specifically calling out the NULL use case. Would not the NULL use case be also applicable to weaker authentication methods? Meaning that the attacker in the middle would be able to remove the stronger methods and leave the weaker ones? Yes, it is possible. NULL authentication is just the easiest way for an attacker to do it. I can add the following text in the Security Considerations (right after the NULL authentication discussion): Similarly, if an attacker on the path can break some of the announced authentication methods, then the attacker can encourage peers to use one of these weaker methods by removing all other announcements, and if this succeeds, then impersonate one of the peers. Does this help? Regards, Valery. Regards, Rifaat
|
-- last-call mailing list last-call@xxxxxxxx https://www.ietf.org/mailman/listinfo/last-call