Re: [I2nsf] [IPsec] draft-abad-i2nsf-sdn-ipsec-flow-protection

Alejandro Pérez Méndez <alex@um.es> Tue, 18 July 2017 16:11 UTC

Return-Path: <alex@um.es>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DCA901287A0; Tue, 18 Jul 2017 09:11:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.202
X-Spam-Level:
X-Spam-Status: No, score=-4.202 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wRP7WpsF2Z3j; Tue, 18 Jul 2017 09:11:19 -0700 (PDT)
Received: from xenon44.um.es (xenon44.um.es [155.54.212.171]) by ietfa.amsl.com (Postfix) with ESMTP id 4C2231200FC; Tue, 18 Jul 2017 09:11:18 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by xenon44.um.es (Postfix) with ESMTP id 98F81201D1; Tue, 18 Jul 2017 18:11:17 +0200 (CEST)
X-Virus-Scanned: by antispam in UMU at xenon44.um.es
Received: from xenon44.um.es ([127.0.0.1]) by localhost (xenon44.um.es [127.0.0.1]) (amavisd-new, port 10024) with LMTP id iS4nUpHLHYwn; Tue, 18 Jul 2017 18:11:17 +0200 (CEST)
Received: from [192.168.100.23] (unknown [185.154.58.221]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: alex) by xenon44.um.es (Postfix) with ESMTPSA id DB44D20128; Tue, 18 Jul 2017 18:11:16 +0200 (CEST)
To: Valery Smyslov <svanru@gmail.com>, i2nsf@ietf.org
Cc: IPsecME WG <ipsec@ietf.org>, 'Rafa Marin-Lopez' <rafa@um.es>
References: <021c01d2ffcf$95f043b0$c1d0cb10$@gmail.com>
From: Alejandro Pérez Méndez <alex@um.es>
Message-ID: <f56439b8-09f7-af23-32ed-061dc1f887a8@um.es>
Date: Tue, 18 Jul 2017 18:11:15 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
In-Reply-To: <021c01d2ffcf$95f043b0$c1d0cb10$@gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Content-Language: es-ES
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2nsf/s2J56v4P1I0eYNLYgabLpvNIpG8>
Subject: Re: [I2nsf] [IPsec] draft-abad-i2nsf-sdn-ipsec-flow-protection
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*" <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 16:11:21 -0000

Hi Valery, all,

 >
 > In general, central distribution of session keys looks much less secure,
 > than running IKEv2 on them.
That's arguable, yes. But being less secure does not mean being useless. 
Coming to my previous comment, we don't use RSA with 8192 bit keys for 
everything. Although it is more secure, there are scenarios were a 
lighter approach is enough. If running IKE is too much for your devices, 
the IKE-less option might work for you if your security contraints are 
fewer. This SDN-based approach does not need to solve everyone's 
problems for every possible scenario. Neither does Kerberos, IPsec 
itself nor any other security protocol.

 > You loose PFS property,
I don't see why. Actually, keys on the controller are generated by a 
secure RNG so every key you generate is completely unrelated to the 
previous one. That's indeed an advantage, rather than the opposite.

 > you loose
 > the property that no one but the peers know the session keys etc.
Right.

 > It is more fragile too. You must perform periodical rekey (update keys)
 > and this must be done synchronously.
You have to do it by pairs, does not seem that difficult. And, as IKE 
does, you create the new ones and, once created, delete the old ones. I 
don't see the synchrony problem that important.

 > All the rekey problems that were
 > solved by IKE will arise again.
Prior IKE we had a phone call / email / SSH based rekeying. I don't 
think having an automated central entity using a secure control protocol 
such as NETCONF over SSH/TLS is exactly the same.

Regards,
Alejandro

 > Regards,
 > Valery Smyslov.
 >
 > _______________________________________________
 > IPsec mailing list
 > IPsec@ietf.org
 > https://www.ietf.org/mailman/listinfo/ipsec