ipsec October 2009 archive
Main Archive Page > Month Archives  > ipsec archives
ipsec: Re: [IPsec] Fw: Preshared key authentication in IKEv2

Re: [IPsec] Fw: Preshared key authentication in IKEv2

From: Paul Hoffman <paul.hoffman_at_nospam>
Date: Fri Oct 30 2009 - 17:04:55 GMT
To: "Valery Smyslov" <svanru@gmail.com>, <ipsec@ietf.org>


At 9:58 AM +0300 10/30/09, Valery Smyslov wrote:
>Hi all,
>
>I'd like to reiterate my early message, which I haven't got answer to.
>My concerns are:
>
>1. How padding pre-sahred key with string "Key Pad for IKEv2"
> could help to avoid storing pre-shared key in IKE implementation
> if prf is not known untill IKE_SA_INIT exchange is finished?

The PRF (or set of PRFs) is known by the receiving party. If the two parties always only use one PRF, it is known. The padding is not a universal solution for the reasons you give, but it works in the common case of peers who know each other's crypto choices.

>2. It is a bit unclear whether EAP generated key should also
> be padded before use in IKE, or used directly.

I'm pretty sure the key is used in its PRF form, not in its "as is" form, but I would want to hear from one or two implementers on that.

--Paul Hoffman, Director
--VPN Consortium



IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec