Re: [I2nsf] [IPsec] draft-abad-i2nsf-sdn-ipsec-flow-protection

"Valery Smyslov" <svanru@gmail.com> Thu, 20 July 2017 07:56 UTC

Return-Path: <svanru@gmail.com>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 56788126B72; Thu, 20 Jul 2017 00:56:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.199
X-Spam-Level:
X-Spam-Status: No, score=-1.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_SORBS_WEB=1.5, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o-x3zbyVklQ8; Thu, 20 Jul 2017 00:56:37 -0700 (PDT)
Received: from mail-lf0-x234.google.com (mail-lf0-x234.google.com [IPv6:2a00:1450:4010:c07::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 393C5126557; Thu, 20 Jul 2017 00:56:36 -0700 (PDT)
Received: by mail-lf0-x234.google.com with SMTP id z78so9151779lff.0; Thu, 20 Jul 2017 00:56:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:thread-index:content-language; bh=4Df3LOZfDX1XjCmAhpiiuoVGwbIs5Nnw2Aa9gBgL94A=; b=a5zIBl6wodYElojSEnHgobjL9ionnlHR0G7U2J8Peykd9hf4bLj6Yb/2WjzI79T8AU PFE4RxcRZ5fIMwQNjO46Z1oez2ceT471xp1i9+QhgfVMOtiaV0aBR6ArgSwGoCdD+BO7 0sZf8KzJ8hcpFb5esdTgtnN9eqbxnWGq0tUcTiDCdenGEJeTV/k9gJV5AM0hoSejzkE6 i5f4qNJ4kzMp7dNNcD4gM/Sa+1k+dUZkwZ/0/7+dVudW41w0nfGYQLf8EK9fbWN88YHU JLzWGd0wvDSW8RbQg8OKfL0xXYI5IYUyRZY7qTX4Hr+MTmYm3bpi9cUQtAuEElJB7dqi RGxg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:references:in-reply-to:subject:date :message-id:mime-version:thread-index:content-language; bh=4Df3LOZfDX1XjCmAhpiiuoVGwbIs5Nnw2Aa9gBgL94A=; b=L1cGkwnC6sxqCFiB3Glk4UdhXAfuFUR3ZVq5nWWWGCZa9Gexi1NxHopoi3SWRFKmsh UEzXQj6GhLANe2X5l8WW8CUQhoOgyH57f1A80zWFkmqPB4ENlZSIfH47f66IdxVoMLxV 2mzfc/en9lxF5GEyrpA22mkU2X0ER6inAvGDNVD4OF4rHbDP9bd17YLow/owH9gxjUIm EZO023Kuo6RFRCKVlsR0qTrganfKU4zm2gaOp+gT5OhsJN8g8HOeQ+IxeN/eIBXb6JiY ZIZymcYm/yS86nccg/ow3Sis3qtmOtOZyDboYRPRoRQFhJHwGFMk2gZHTqJXv8WwIr1+ jTEQ==
X-Gm-Message-State: AIVw111uu+kkUpnMSQjX+XgbhO1znrhaJFdqLW23ohDehNFemtkp+c++ ygy2in5VMXKzLQ==
X-Received: by 10.25.198.211 with SMTP id w202mr938418lff.211.1500537394414; Thu, 20 Jul 2017 00:56:34 -0700 (PDT)
Received: from buildpc ([82.138.51.4]) by smtp.gmail.com with ESMTPSA id d62sm357479lfd.55.2017.07.20.00.56.33 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 20 Jul 2017 00:56:33 -0700 (PDT)
From: Valery Smyslov <svanru@gmail.com>
To: 'Gabriel Lopez' <gabilm@um.es>
Cc: 'Alejandro Pérez Méndez' <alex@um.es>, i2nsf@ietf.org, 'IPsecME WG' <ipsec@ietf.org>, 'Rafa Marin Lopez' <rafa@um.es>
References: <021c01d2ffcf$95f043b0$c1d0cb10$@gmail.com> <f56439b8-09f7-af23-32ed-061dc1f887a8@um.es> <02e601d3005a$c1791170$446b3450$@gmail.com> <1e2efa38-5b95-7685-8fb9-047b656f0e58@um.es> <031201d30085$d4cab0a0$7e6011e0$@gmail.com> <F49572FB-D58D-44F8-9C7F-EF7E817A973B@um.es>
In-Reply-To: <F49572FB-D58D-44F8-9C7F-EF7E817A973B@um.es>
Date: Thu, 20 Jul 2017 10:56:35 +0300
Message-ID: <04b701d3012d$b5f05920$21d10b60$@gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_04B8_01D30146.DB422500"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQKDIHC5dXDQzOp5aMUY5Ta8XNCy6AHIW25WAYFIQaEB358/jwHmfx+UAaSah3SgtnEz4A==
Content-Language: ru
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2nsf/SaH-DHuQNQjGp13Ke-5uBhlY7zo>
Subject: Re: [I2nsf] [IPsec] draft-abad-i2nsf-sdn-ipsec-flow-protection
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*" <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2017 07:56:38 -0000

Hi Gabriel,

 

I think that at this point the discussion is not very productive.

I admit that I’m not very familiar with SDNs, so I have to 

blindly trust you when you state that the SDN Controller

knows everything and is able to control everything,

so it is like God. Probably this is true.

 

I just want to reiterate, that while security architecture

with central key distribution is definitely feasible and

it is feasible to make it secure, my strong opinion is that

it is still a large step backward from End-to-End security

model and it is much more fragile. And I agree with Tero that

“EE simplicity” argument in most cases doesn’t look 

reasonable to buy. Probably you can add justifications

to this argument, e.g. by providing estimates how much

resources you are going to save on EE if you get rid of IKE

(but leave IPsec, TLS and so on). 

 

Regards,

Valery.

 

From: Gabriel Lopez [mailto:gabilm@um.es] 
Sent: Wednesday, July 19, 2017 5:21 PM
To: Valery Smyslov
Cc: Alejandro Pérez Méndez; i2nsf@ietf.org; IPsecME WG; Rafa Marin Lopez
Subject: Re: [I2nsf] [IPsec] draft-abad-i2nsf-sdn-ipsec-flow-protection

 

Hi Valery,

 

El 19 jul 2017, a las 13:54, Valery Smyslov <svanru@gmail.com> escribió:

 

Hi Alejandro,




It is more fragile too. You must perform periodical rekey (update keys)
and this must be done synchronously.

You have to do it by pairs, does not seem that difficult. And, as IKE
does, you create the new ones and, once created, delete the old ones. I
don't see the synchrony problem that important.

In ideal world - yes. In real world - I'm not so sure.
Imagine you have an SA expired and the SDN installs a new SA
on the peers, but one of SDN-peer TLS connection failed because off
the temporary network problem, so you have a new SA partially installed.
What is the peer that didn't receive a new SA supposed to do?
Continue to use an old one despite the fact that it is expired?
Block all traffic? Something else?

In fact, I think the SDN-based approach performs even better than IKE in
this regards.
Imagine what happens if the corresponding IKE rekey process fails for
the very same temporary network problem. In the best case, CHILD SAs are
deleted after a hard expiration, and they will need to be re-created
when triggered by the SPD again. This is roughly identical to the SDN
approach. But, typically, when an IKE rekey fails, the initiator will
likely close the entire IKE_SA thinking the other peer is down, which
would result into having to recreate the IKE_SA (including the DH
exchange), and all the associated CHILD_SAs afterwards.


Exactly, that's what IKE will do. But this is reasonable, because if IKE
messages cannot go between peers, it is most probably that 
IPsec won't go either (especially in case of UDP encapsulation).
With SDN the situation is a bit different. The network problem 
takes place on SDN-EE path, while EE-EE path works well,
but the peers cannot communicate, because SDN fails to provide
the keys in time. Note, that rekey may take place quite often, depending 
on the algorithms involved. 

 

[Gabi] This kind of strong requirements on the controller availability and workload is assumed in the SDN paradigm. Let’s think in a L2 OpenFlow controller for example, where the L2-switch has to forward a copy of the incoming frame before to forward it.







How NAT traversal is to be done in IKE-less case? I understand, that
NATs are also controlled by SDN, but does SDN pre-install NAT mappings?


That's a good question. I would say so, yes.


So, SDN needs to synchronously configure one more entity (NAT)
for IPsec to start working? 

 

[Gabi] If NAT is required the controller should know that, the IPsec configuration required to cross the NAT should be applied by the Security Controller . The configuration of the NAT entity may be configured independently (manually or not, note that there are Yang models for NAT (https://tools.ietf.org/html/draft-sivakumar-yang-nat-07)).









But, would that generate problems if the NAT box is not included in your
SDN (e.g. it belongs to the mall centre or similar)?


In this case you first need to use UDP encapsulation and second need to send
NAT keepalive messages periodically. Usually it is IKE who  sends
these messages (I admit that you can also sends them from the kernel).
IKE also determines if there is a NAT in between and which peer is 
behind the NAT. In case the NAT is out of SDN control, who will do this job?

 

[Gabi] the Controller should know that there is NAT in the scenario.




What is supposed to be done if packet with invalid AH/ESP SPI is received?

 

 





Clearly, the packet itself is dropped, but later IKEv2 extensions (namely
RFC6290, Quick Crash Detection) allows to send IKE notification
to the peer with a security token to help peers quickly recover from the crash.
What is supposed to be done in IKE-less case? Or do you think  that
with SDN such things like non-synchronized IPsec states never happen?

 

[Gabi] If it is an audiatable event by the kernel, the peer can notify the controller about that (some examples of notifications are already included in the yang model)

 

Thanks for the comments, this discussion is really interesting ….

 

Regards, Gabi.


Regards,
Valery. 




These are exactly the sort of situations that need to be figured out.


I believe there are many of them.

Regards,
Valery.

_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf

 

 

-----------------------------------------------------------
Gabriel López Millán
Departamento de Ingeniería de la Información y las Comunicaciones
University of Murcia
Spain
Tel: +34 868888504
Fax: +34 868884151
email: gabilm@um.es