Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

The NULL Authentication Method in the Internet Key Exchange Protocol Version 2 (IKEv2) (RFC7619)

IP.com Disclosure Number: IPCOM000242890D
Original Publication Date: 2015-Aug-01
Included in the Prior Art Database: 2015-Aug-27
Document File: 24 page(s) / 25K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

V. Smyslov: AUTHOR [+2]

Abstract

Internet Key Exchange Protocol version 2 (IKEv2), specified in [RFC7296], provides a way for two parties to perform an authenticated key exchange. While the authentication methods used by the peers can be different, there is no method for one or both parties to remain unauthenticated and anonymous. This document extends the authentication methods to support unauthenticated and anonymous IKE sessions.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 11% of the total text.

Internet Engineering Task Force (IETF)                        V. Smyslov Request for Comments: 7619                                    ELVIS-PLUS Updates: 4301                                                 P. Wouters Category: Standards Track                                        Red Hat ISSN: 2070-1721                                              August 2015

                      The NULL Authentication Method         in the Internet Key Exchange Protocol Version 2 (IKEv2)

Abstract

   This document specifies the NULL Authentication method and the    ID_NULL Identification Payload ID Type for Internet Key Exchange    Protocol version 2 (IKEv2).  This allows two IKE peers to establish    single-side authenticated or mutual unauthenticated IKE sessions for    those use cases where a peer is unwilling or unable to authenticate    or identify itself.  This ensures IKEv2 can be used for Opportunistic    Security (also known as Opportunistic Encryption) to defend against    Pervasive Monitoring attacks without the need to sacrifice anonymity.

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force    (IETF).  It represents the consensus of the IETF community.  It has    received public review and has been approved for publication by the    Internet Engineering Steering Group (IESG).  Further information on    Internet Standards is available in Section 2 of RFC 5741.

   Information about the current status of this document, any errata,    and how to provide feedback on it may be obtained at    http://www.rfc-editor.org/info/rfc7619.

Smyslov & Wouters            Standards Track                    [Page 1]
 RFC 7619                   NULL Auth in IKEv2                August 2015

 Copyright Notice

   Copyright (c) 2015 IETF Trust and the persons identified as the    document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal    Provisions Relating to IETF Documents    (http://trustee.ietf.org/license-info) in effect on the date of    publication of this document.  Please review these documents    carefully, as they describe your rights and restrictions with respect    to this document.  Code Components extracted from this document must    include Simplified BSD License text as described in Section 4.e of    the Trust Legal Provisions and are provided without warranty as    described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3

     1.1.  Conventions Used in This Document . ....