Re: [I2nsf] [IPsec] draft-abad-i2nsf-sdn-ipsec-flow-protection

"Valery Smyslov" <svanru@gmail.com> Wed, 19 July 2017 11:54 UTC

Return-Path: <svanru@gmail.com>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE047131CCC; Wed, 19 Jul 2017 04:54:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.2
X-Spam-Level:
X-Spam-Status: No, score=-1.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_SORBS_WEB=1.5, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZAM8pVVEfDBv; Wed, 19 Jul 2017 04:54:53 -0700 (PDT)
Received: from mail-lf0-x233.google.com (mail-lf0-x233.google.com [IPv6:2a00:1450:4010:c07::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 42CFD131771; Wed, 19 Jul 2017 04:54:53 -0700 (PDT)
Received: by mail-lf0-x233.google.com with SMTP id f18so1057712lfa.4; Wed, 19 Jul 2017 04:54:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:content-transfer-encoding:thread-index :content-language; bh=yJE9aCfC+K/mVsMbrmK5y02glOaOJ3fJXBK33Z6Fq9s=; b=tL3EhrVtZ4JvOCuVB7csw7qCCsg1sJjImFH8jVh9mNykzwVd2sKKEdKE2eqV1Um5Yc IbfcedkUBS4byFGjayK0dDl5pXZ0New5vHO3U37fjuvwA6dIuSvWjkqvB/N2DpSq12V3 guxcJMsofNsT5VzUAiZB/K7TYBWm82KVtX6riFcgBRWLVHELd7PU67EY8AYq6DUWBm8Y pBR99lyinhFHYgYnvY/caU164ejP10s0OLjKxErJNTH1I0DGdNqzEgs+Q8eCHXPlNFH1 yv7xgNoEMZBWeEB+PFSXDwstyavFSnkflmzX+R5NG25ptVq5Ur/OVoPXBmxE4/QYbn7M Yysg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:references:in-reply-to:subject:date :message-id:mime-version:content-transfer-encoding:thread-index :content-language; bh=yJE9aCfC+K/mVsMbrmK5y02glOaOJ3fJXBK33Z6Fq9s=; b=m05CaMpSZ3lXRMppe3E7021Mc8qJDOMShaTYVrQxnG7l31Dx8x681slYLYAeBBeTtM 1IY90IF3gcPAxshZdV8870SpkXVCDaRW5Iw3Z1SfW+2O0Ky/Zw0AYw8FESFZeWBsswMl sgcDtb7zfvibHpJHQiMnHOXXbXlpBUhvb+3Q2x3PU0ih/dg/QUvhfVid/Hk/zdUpMsnX tBPi8G49OXCgJF4PTdx+5Ez3I/ClKtPvf7Gk/RcdPhZ9vT90Tb0zPpU2efzwSlM68psP kDfowIg9Qu1ZwaiTSabXI2y7Hf402Xvy0qYq3NjUgm7XEGbVgB6XmVEds+ewa3QqRoXq 2sVA==
X-Gm-Message-State: AIVw111Txr5UE0b+JWpjOQRvbEnPHPHH8sIY1q1RpxOaB/NjvNmv9gZN W3LQrDhDNkkG0K/y
X-Received: by 10.46.88.3 with SMTP id m3mr2269847ljb.136.1500465291455; Wed, 19 Jul 2017 04:54:51 -0700 (PDT)
Received: from buildpc ([82.138.51.4]) by smtp.gmail.com with ESMTPSA id u8sm1256103ljd.34.2017.07.19.04.54.50 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 19 Jul 2017 04:54:50 -0700 (PDT)
From: Valery Smyslov <svanru@gmail.com>
To: 'Alejandro Pérez Méndez' <alex@um.es>, i2nsf@ietf.org
Cc: 'IPsecME WG' <ipsec@ietf.org>, 'Rafa Marin-Lopez' <rafa@um.es>
References: <021c01d2ffcf$95f043b0$c1d0cb10$@gmail.com> <f56439b8-09f7-af23-32ed-061dc1f887a8@um.es> <02e601d3005a$c1791170$446b3450$@gmail.com> <1e2efa38-5b95-7685-8fb9-047b656f0e58@um.es>
In-Reply-To: <1e2efa38-5b95-7685-8fb9-047b656f0e58@um.es>
Date: Wed, 19 Jul 2017 14:54:51 +0300
Message-ID: <031201d30085$d4cab0a0$7e6011e0$@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQKDIHC5dXDQzOp5aMUY5Ta8XNCy6AHIW25WAYFIQaEB358/j6DReJFw
Content-Language: ru
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2nsf/Y-9zjesdMyibvSb21r3rzVIonKQ>
Subject: Re: [I2nsf] [IPsec] draft-abad-i2nsf-sdn-ipsec-flow-protection
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*" <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jul 2017 11:54:55 -0000

Hi Alejandro,

> >>   > It is more fragile too. You must perform periodical rekey (update keys)
> >>   > and this must be done synchronously.
> >> You have to do it by pairs, does not seem that difficult. And, as IKE
> >> does, you create the new ones and, once created, delete the old ones. I
> >> don't see the synchrony problem that important.
> > In ideal world - yes. In real world - I'm not so sure.
> > Imagine you have an SA expired and the SDN installs a new SA
> > on the peers, but one of SDN-peer TLS connection failed because off
> > the temporary network problem, so you have a new SA partially installed.
> > What is the peer that didn't receive a new SA supposed to do?
> > Continue to use an old one despite the fact that it is expired?
> > Block all traffic? Something else?
> In fact, I think the SDN-based approach performs even better than IKE in
> this regards.
> Imagine what happens if the corresponding IKE rekey process fails for
> the very same temporary network problem. In the best case, CHILD SAs are
> deleted after a hard expiration, and they will need to be re-created
> when triggered by the SPD again. This is roughly identical to the SDN
> approach. But, typically, when an IKE rekey fails, the initiator will
> likely close the entire IKE_SA thinking the other peer is down, which
> would result into having to recreate the IKE_SA (including the DH
> exchange), and all the associated CHILD_SAs afterwards.

Exactly, that's what IKE will do. But this is reasonable, because if IKE
messages cannot go between peers, it is most probably that 
IPsec won't go either (especially in case of UDP encapsulation).
With SDN the situation is a bit different. The network problem 
takes place on SDN-EE path, while EE-EE path works well,
but the peers cannot communicate, because SDN fails to provide
the keys in time. Note, that rekey may take place quite often, depending 
on the algorithms involved. 

> > How NAT traversal is to be done in IKE-less case? I understand, that
> > NATs are also controlled by SDN, but does SDN pre-install NAT mappings?
> 
> That's a good question. I would say so, yes.

So, SDN needs to synchronously configure one more entity (NAT)
for IPsec to start working? 

> But, would that generate problems if the NAT box is not included in your
> SDN (e.g. it belongs to the mall centre or similar)?

In this case you first need to use UDP encapsulation and second need to send
NAT keepalive messages periodically. Usually it is IKE who  sends
these messages (I admit that you can also sends them from the kernel).
IKE also determines if there is a NAT in between and which peer is 
behind the NAT. In case the NAT is out of SDN control, who will do this job?

What is supposed to be done if packet with invalid AH/ESP SPI is received?
Clearly, the packet itself is dropped, but later IKEv2 extensions (namely
RFC6290, Quick Crash Detection) allows to send IKE notification
to the peer with a security token to help peers quickly recover from the crash.
What is supposed to be done in IKE-less case? Or do you think  that
with SDN such things like non-synchronized IPsec states never happen?

Regards,
Valery. 

> These are exactly the sort of situations that need to be figured out.

I believe there are many of them.

Regards,
Valery.