Re: [IPsec] FW: New Version Notification for draft-liu-ipsecme-ikev2-rekey-redundant-sas-00.txt

Paul Wouters <paul.wouters@aiven.io> Wed, 24 November 2021 03:06 UTC

Return-Path: <paul.wouters@aiven.io>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38AC73A08A8 for <ipsec@ietfa.amsl.com>; Tue, 23 Nov 2021 19:06:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=aiven.io
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oH69qeIQsVxf for <ipsec@ietfa.amsl.com>; Tue, 23 Nov 2021 19:06:53 -0800 (PST)
Received: from mail-ed1-x535.google.com (mail-ed1-x535.google.com [IPv6:2a00:1450:4864:20::535]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3233B3A08A1 for <ipsec@ietf.org>; Tue, 23 Nov 2021 19:06:53 -0800 (PST)
Received: by mail-ed1-x535.google.com with SMTP id y13so3551350edd.13 for <ipsec@ietf.org>; Tue, 23 Nov 2021 19:06:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aiven.io; s=google; h=date:from:to:cc:subject:in-reply-to:message-id:references :mime-version; bh=iWJSAvwcDY5AJ0DBrTjMzb96H5iwF4g4tepIi3a3Yro=; b=WXnBwvX86WL6cFxTtwZRmFxKBBz5+l9k8VisM5D07OXpIYjKNVdSlmzQYRZ315vSFz PiHowgKuq/Tj11FD1+XQpjA1e6Jq0mC2YpG2LN4JFL34zXSOn5NqmKX/agHKrjUj91M8 pNlIbVEuythVUuSqXUdbiPp6M3jao3QcLInz4=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:in-reply-to:message-id :references:mime-version; bh=iWJSAvwcDY5AJ0DBrTjMzb96H5iwF4g4tepIi3a3Yro=; b=nsCon779efJL5fdT5hIfSATAeK3IEgNK2suUgVIqBIxqs1v92OesSZu2Lz038qVJyU V5W3xNcTUbNgC/YiVmcdPrzR5TUnsHwoMCAL+hN0yMPhzGRnbUTwLaeibCpcNPSkrdPT Te5xRa5aN+HeUs0IXDqJJhX2vnxv0WtYc+JseinK1JsziB3db8LuPjC1bYKkWU4CN/ph N/HIist4A8NEtiys0pofDb4a8cmv6F3nurqdk0/cnUFsDUlZYY7OtHSm+U+HI08MD85i /bXRx/UmFmdVTV8y/JAjzKxcMv4Ing8p2y6OlaqvNEfElc/9wwu5LGBT04bE0h1sr3A5 jB7g==
X-Gm-Message-State: AOAM530rNlGOGhRc/16SVEaRqlPlhs/NbDzIOEvSQeEhrx+1x9jcKWHx z+exgeFsZbmfepJrRcbmgOUlY1/a/r6ODJqBY8o=
X-Google-Smtp-Source: ABdhPJzT0JbiSwypsl7y8ocoAnN1LecJjtS4jKntTWisONr0icmBEjW/E/R0yatWshk/R4RKHtG+vg==
X-Received: by 2002:aa7:dc15:: with SMTP id b21mr18767027edu.237.1637723209676; Tue, 23 Nov 2021 19:06:49 -0800 (PST)
Received: from bofh.nohats.ca (bofh.nohats.ca. [193.110.157.194]) by smtp.gmail.com with ESMTPSA id sa17sm6336126ejc.123.2021.11.23.19.06.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 23 Nov 2021 19:06:49 -0800 (PST)
Date: Tue, 23 Nov 2021 22:06:45 -0500
From: Paul Wouters <paul.wouters@aiven.io>
To: Harold Liu <harold.liu=40ericsson.com@dmarc.ietf.org>
cc: "ipsec@ietf.org" <ipsec@ietf.org>
In-Reply-To: <AM6PR07MB6056906966D25383E9B61D31EB619@AM6PR07MB6056.eurprd07.prod.outlook.com>
Message-ID: <c0ad1622-c9f7-448e-b3d8-aa17e47acc1@nohats.ca>
References: <163756302647.16358.8631436336190852796@ietfa.amsl.com> <AM6PR07MB6056A9CCECA59F8035D04543EB9F9@AM6PR07MB6056.eurprd07.prod.outlook.com> <fc922cce-fdf2-62c1-8b66-588886479864@nohats.ca> <AM6PR07MB6056906966D25383E9B61D31EB619@AM6PR07MB6056.eurprd07.prod.outlook.com>
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"; charset="US-ASCII"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/18smMm93DdhxIM7RbYKTEoGAbbU>
Subject: Re: [IPsec] FW: New Version Notification for draft-liu-ipsecme-ikev2-rekey-redundant-sas-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Nov 2021 03:06:58 -0000

On Wed, 24 Nov 2021, Harold Liu wrote:

> Is your implementation not using a rekey fuzz of say 1 to 5 % ? In that way, two endpoints are extremely unlikely to rekey at the exact same time.
>
> <Harold>
>       1) We do use randomize the SA life time. Thanks for the feedback.
>       2) Currently the typical lifetime is 300s (shortest).
>       3) In the case of gateway to gateway, there is no client or server.
>       4) In gateway to gateway case, randomizing the SA lifetime is not sufficient as we do not want to rely on a probabilistic model that depends on the life time of the child SA, but rather ensure we do not run into such duplications. At the same time, even though initiator and responder both have randomize lifetime the lifetime is a completely local value (not negotiated), and even the initiator and responder can use different values. So there's still a probability of rekey happening at both ends simultaneously.
>       5) Due to the arrival of 5G the number of radio access increases greatly meanwhile IKE sessions are established between GATEWAY and GATEWAY based on cloud-RAN. At the same time, Cloud-ran causes IKE sessions to be concentrated on the gateway and gateway so as to the scale of Child SAs is huge, usually more than thousands.  So even a few percent of simultaneous rekeying is unacceptable because it will bring too many redundant packets and occupy bandwidth.
> </Harold>

Okay that is fair. Please add it to the Introduction of the draft somehow :)

> <Harold>
>       We are looking for a deterministic mechanism. We are happy to change the one we proposed, but we cannot rely on SA random SA lifetime.
> </Harold>

So since lifetime is not negotiated, both endpoints have a need to
rekey. Even if they agree via some other mechanism that one end
should initiate the rekey, what should happen when that rekey is
not happening? At some point the endpoint not initiating will have
to tear down or start a rekey anyway.

So why not, instead of a random process, exchange the maximum Child SA
lifetime accepted before rekey? If the numbers are identical, prefer the
current exchange initiator.

That way, it is deterministic and both endpoints inform the other end
when (plus or minus some fuzz) a rekey is required.

Paul