< draft-kivinen-ipsecme-oob-pubkey-03.txt   draft-kivinen-ipsecme-oob-pubkey-04.txt >
IP Security Maintenance and Extensions T. Kivinen IP Security Maintenance and Extensions T. Kivinen
(ipsecme) AuthenTec (ipsecme) INSIDE Secure
Internet-Draft P. Wouters Internet-Draft P. Wouters
Updates: RFC 5996 (if approved) Red Hat Updates: RFC 5996 (if approved) Red Hat
Intended status: Standards Track H. Tschofenig Intended status: Standards Track H. Tschofenig
Expires: June 2, 2013 Nokia Siemens Networks Expires: January 31, 2014 Nokia Siemens Networks
November 29, 2012 July 30, 2013
More Raw Public Keys for IKEv2 More Raw Public Keys for IKEv2
draft-kivinen-ipsecme-oob-pubkey-03.txt draft-kivinen-ipsecme-oob-pubkey-04.txt
Abstract Abstract
The Internet Key Exchange Version 2 (IKEv2) protocol currently only The Internet Key Exchange Version 2 (IKEv2) protocol currently only
supports raw RSA keys. In some environments it is useful to make use supports raw RSA keys. In some environments it is useful to make use
of other types of public keys, such as those based on Elliptic Curve of other types of public keys, such as those based on Elliptic Curve
Cryptography. This documents adds support for other types of raw Cryptography. This documents adds support for other types of raw
public keys to IKEv2 and obsoletes the old raw RSA key format. public keys to IKEv2 and obsoletes the old raw RSA key format.
Status of this Memo Status of this Memo
skipping to change at page 1, line 37 skipping to change at page 1, line 37
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on June 2, 2013. This Internet-Draft will expire on January 31, 2014.
Copyright Notice Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Certificate Encoding Payload . . . . . . . . . . . . . . . . . 3 3. Certificate Encoding Payload . . . . . . . . . . . . . . . . . 3
4. Old Raw RSA Key Certificate Type . . . . . . . . . . . . . . . 4 4. Old Raw RSA Key Certificate Type . . . . . . . . . . . . . . . 4
5. Security Considerations . . . . . . . . . . . . . . . . . . . . 5 5. Security Considerations . . . . . . . . . . . . . . . . . . . . 5
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 5 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 5
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 5 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 6
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 6 8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 6
8.1. Normative References . . . . . . . . . . . . . . . . . . . 6 8.1. Normative References . . . . . . . . . . . . . . . . . . . 6
8.2. Informative References . . . . . . . . . . . . . . . . . . 6 8.2. Informative References . . . . . . . . . . . . . . . . . . 6
Appendix A. Examples . . . . . . . . . . . . . . . . . . . . . . . 7 Appendix A. Examples . . . . . . . . . . . . . . . . . . . . . . . 7
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 8 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 8
1. Introduction 1. Introduction
Secure DNS allows public keys to be associated with domain names for Secure DNS allows public keys to be associated with domain names for
usage with security protocols like Internet Key Exchange Version 2 usage with security protocols like Internet Key Exchange Version 2
skipping to change at page 4, line 38 skipping to change at page 4, line 38
Certificate Encoding field. Certificate Encoding field.
When the certificate encoding type 'Raw Public Key' is used then the When the certificate encoding type 'Raw Public Key' is used then the
Certificate Data only contains the SubjectPublicKeyInfo part of the Certificate Data only contains the SubjectPublicKeyInfo part of the
PKIX certificate. PKIX certificate.
In the case of the Certificate Request payload the Certification In the case of the Certificate Request payload the Certification
Authority field MUST be empty if the "Raw Public Key" certificate Authority field MUST be empty if the "Raw Public Key" certificate
encoding is used. encoding is used.
Note, that we do follow public key processing rules of the section
1.2 of the Additional Algorithms and Identifiers for RSA Cryptography
for PKIX ([RFC4055]) even when the SubjectPublicKeyInfo is not part
of the certificate, but sent here. This means RSASSA-PSS and RSASSA-
PSS-params inside the SubjectPublicKeyInfo needs to be followed.
4. Old Raw RSA Key Certificate Type 4. Old Raw RSA Key Certificate Type
After this there would be two ways of sending Raw RSA public keys in After this there would be two ways of sending Raw RSA public keys in
the IKEv2: The original IKEv2 mechanism (Raw RSA Key, encoding value the IKEv2: The original IKEv2 mechanism (Raw RSA Key, encoding value
11), and the new format defined here. The old Raw RSA Key encoding 11), and the new format defined here. The old Raw RSA Key encoding
has not been widely used. The IKEv2 protocol already supports a has not been widely used. The IKEv2 protocol already supports a
method to indicate what certificate encoding formats are supported, method to indicate what certificate encoding formats are supported,
i.e. a peer can send one or multiple Certificate Request payload with i.e. a peer can send one or multiple Certificate Request payload with
the certificate encoding types it supports. From this list the the certificate encoding types it supports. From this list the
recipient can see what formats are supported and select one which is recipient can see what formats are supported and select one which is
skipping to change at page 6, line 27 skipping to change at page 6, line 32
[RFC5996] Kaufman, C., Hoffman, P., Nir, Y., and P. Eronen, [RFC5996] Kaufman, C., Hoffman, P., Nir, Y., and P. Eronen,
"Internet Key Exchange Protocol Version 2 (IKEv2)", "Internet Key Exchange Protocol Version 2 (IKEv2)",
RFC 5996, September 2010. RFC 5996, September 2010.
8.2. Informative References 8.2. Informative References
[I-D.ietf-tls-oob-pubkey] [I-D.ietf-tls-oob-pubkey]
Wouters, P., Tschofenig, H., Gilmore, J., Weiler, S., and Wouters, P., Tschofenig, H., Gilmore, J., Weiler, S., and
T. Kivinen, "Out-of-Band Public Key Validation for T. Kivinen, "Out-of-Band Public Key Validation for
Transport Layer Security (TLS)", Transport Layer Security (TLS)",
draft-ietf-tls-oob-pubkey-06 (work in progress), draft-ietf-tls-oob-pubkey-08 (work in progress),
October 2012. July 2013.
[RFC3447] Jonsson, J. and B. Kaliski, "Public-Key Cryptography [RFC3447] Jonsson, J. and B. Kaliski, "Public-Key Cryptography
Standards (PKCS) #1: RSA Cryptography Specifications Standards (PKCS) #1: RSA Cryptography Specifications
Version 2.1", RFC 3447, February 2003. Version 2.1", RFC 3447, February 2003.
[RFC4025] Richardson, M., "A Method for Storing IPsec Keying [RFC4025] Richardson, M., "A Method for Storing IPsec Keying
Material in DNS", RFC 4025, March 2005. Material in DNS", RFC 4025, March 2005.
[RFC4055] Schaad, J., Kaliski, B., and R. Housley, "Additional
Algorithms and Identifiers for RSA Cryptography for use in
the Internet X.509 Public Key Infrastructure Certificate
and Certificate Revocation List (CRL) Profile", RFC 4055,
June 2005.
[RFC4754] Fu, D. and J. Solinas, "IKE and IKEv2 Authentication Using [RFC4754] Fu, D. and J. Solinas, "IKE and IKEv2 Authentication Using
the Elliptic Curve Digital Signature Algorithm (ECDSA)", the Elliptic Curve Digital Signature Algorithm (ECDSA)",
RFC 4754, January 2007. RFC 4754, January 2007.
[RFC5480] Turner, S., Brown, D., Yiu, K., Housley, R., and T. Polk, [RFC5480] Turner, S., Brown, D., Yiu, K., Housley, R., and T. Polk,
"Elliptic Curve Cryptography Subject Public Key "Elliptic Curve Cryptography Subject Public Key
Information", RFC 5480, March 2009. Information", RFC 5480, March 2009.
[RFC6394] Barnes, R., "Use Cases and Requirements for DNS-Based [RFC6394] Barnes, R., "Use Cases and Requirements for DNS-Based
Authentication of Named Entities (DANE)", RFC 6394, Authentication of Named Entities (DANE)", RFC 6394,
skipping to change at page 8, line 21 skipping to change at page 8, line 30
Where the NN will be the next payload type (i.e. that value depends Where the NN will be the next payload type (i.e. that value depends
on what is the next payload after this certificate payload). on what is the next payload after this certificate payload).
Note to the RFC editor / IANA, replace the XX above with the newly Note to the RFC editor / IANA, replace the XX above with the newly
allocated Raw Public Key number, and remove this note. allocated Raw Public Key number, and remove this note.
Authors' Addresses Authors' Addresses
Tero Kivinen Tero Kivinen
AuthenTec INSIDE Secure
Eerikinkatu 28 Eerikinkatu 28
HELSINKI FI-00180 HELSINKI FI-00180
FI FI
Email: kivinen@iki.fi Email: kivinen@iki.fi
Paul Wouters Paul Wouters
Red Hat Red Hat
Email: pwouters@redhat.com Email: pwouters@redhat.com
 End of changes. 10 change blocks. 
10 lines changed or deleted 22 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/