Re: [IPsec] WG Last Call on "The NULL Authentication Method in IKEv2 Protocol" draft-smyslov-ipsecme-ikev2-null-auth

"Valery Smyslov" <svanru@gmail.com> Mon, 26 January 2015 11:37 UTC

Return-Path: <svanru@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 704AF1A026F for <ipsec@ietfa.amsl.com>; Mon, 26 Jan 2015 03:37:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.23
X-Spam-Level:
X-Spam-Status: No, score=-1.23 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_SORBS_WEB=0.77, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DAGLfzfzqOqF for <ipsec@ietfa.amsl.com>; Mon, 26 Jan 2015 03:37:46 -0800 (PST)
Received: from mail-lb0-x22b.google.com (mail-lb0-x22b.google.com [IPv6:2a00:1450:4010:c04::22b]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DC5F61A8925 for <ipsec@ietf.org>; Mon, 26 Jan 2015 03:37:44 -0800 (PST)
Received: by mail-lb0-f171.google.com with SMTP id u14so7043386lbd.2 for <ipsec@ietf.org>; Mon, 26 Jan 2015 03:37:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:from:to:cc:references:subject:date:mime-version :content-type:content-transfer-encoding; bh=bYekKx4MHMn6EFVh0QD1h1dEyomMNiHAMM1jCNFGaYU=; b=PnJ3EH1nEAlMWzIvmt3wQPr4LkSg39Kq3uv9foOLrAeK1F71qay/JlKDUSEoiMy9xB oRdltbYFP8HyRgQHlrAYGp2LE1x+m8qOYIhaqNNJ/M0ZrvBeMpTX1L5sx7uv3LElXPhm T6wz2RErhpzY/KBWLs1mFZTIMmMAJRSMf+5w29/dcrAp/c1O36Vv4Kvtj+qii6uJPHCZ S20zetNxvq8dp4h4yu9BkWr0Wt1ITxB157nuYn7KKV4RFhW90nJQjgWKNIrdca6C2dfq vEw1DPMMWIuzhyroAjyJJCd74rlNrN7AV+efXVrdDaQRWCwsXzgov6LR1SkK/1PiJMjz plKg==
X-Received: by 10.152.198.200 with SMTP id je8mr20399886lac.93.1422272263333; Mon, 26 Jan 2015 03:37:43 -0800 (PST)
Received: from buildpc ([82.138.51.4]) by mx.google.com with ESMTPSA id zo3sm2754258lbb.10.2015.01.26.03.37.42 (version=TLSv1 cipher=RC4-SHA bits=128/128); Mon, 26 Jan 2015 03:37:42 -0800 (PST)
Message-ID: <2DCAD3DF89C949D2B917F4049BFDB265@buildpc>
From: Valery Smyslov <svanru@gmail.com>
To: Yaron Sheffer <yaronf.ietf@gmail.com>, Paul Wouters <paul@nohats.ca>, Paul Koning <paul_koning@dell.com>
References: <5E3BDAA5-B0C8-4004-8FFE-25B91199D7EC@vpnc.org> <D0D61010.3756D%grbartle@cisco.com> <363A367E1CF64C4C98586DC57F1AC987@buildpc> <D0DB345D.37DEF%grbartle@cisco.com> <alpine.LFD.2.10.1501131803240.3286@bofh.nohats.ca> <D0E8103C.38B87%grbartle@cisco.com> <B8D4358C-E4D8-4B28-876E-D99FCC927302@dell.com> <alpine.LFD.2.10.1501231208130.9546@bofh.nohats.ca> <54C54D96.4050203@gmail.com>
Date: Mon, 26 Jan 2015 14:37:40 +0300
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"; charset="windows-1252"; reply-type="response"
Content-Transfer-Encoding: 8bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.5931
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.6157
Archived-At: <http://mailarchive.ietf.org/arch/msg/ipsec/4dGIU09217klKAK60ZsjxVLhc3Y>
Cc: ipsec@ietf.org, "Graham Bartlett (grbartle)" <grbartle@cisco.com>
Subject: Re: [IPsec] WG Last Call on "The NULL Authentication Method in IKEv2 Protocol" draft-smyslov-ipsecme-ikev2-null-auth
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Jan 2015 11:37:48 -0000

Hi Yaron,

there is already Section 3.2, which discusses possible
impact of NULL Auth on DOS resistance, and
the ddos/puzzles document is already referenced there.
Do you think more words need to be added to this section?

Regards,
Valery.

----- Original Message ----- 
From: "Yaron Sheffer" <yaronf.ietf@gmail.com>
To: "Paul Wouters" <paul@nohats.ca>; "Paul Koning" <paul_koning@dell.com>
Cc: <ipsec@ietf.org>; "Graham Bartlett (grbartle)" <grbartle@cisco.com>
Sent: Sunday, January 25, 2015 11:09 PM
Subject: Re: [IPsec] WG Last Call on "The NULL Authentication Method in 
IKEv2 Protocol" draft-smyslov-ipsecme-ikev2-null-auth


I would suggest to mention DDOS in this document briefly, but to move
the discussion (maybe add an entire section) to our dedicated
DDOS/puzzles document. For the simple reason that we want to publish the
NULL Auth document sooner.

Since Valery is co-author on both, I guess he gets to write it :-)

Thanks,
Yaron

On 01/23/2015 07:21 PM, Paul Wouters wrote:
> On Fri, 23 Jan 2015, Paul Koning wrote:
>
>>> Sorry for the late reply. Hopefully the following is more clear?
>>>
>>> When designing systems which will provide connectivity for
>>> non-authenticated users, the system SHOULD be designed with the capacity
>>> to support not only the maximum intended number of peers, but also
>>> include
>>> an additional number of sessions which are created due to malicious or
>>> erroneous behaviour. This safety margin will allow a system to still
>>> operate safely under load until it is exceeded.
>>
>> I understand the sentiment, but this seems like a recommendation that
>> can’t be tested and can’t really be implemented either.  The trouble
>> is that the number of malicious sessions is unbounded (and may be
>> quite large in a DOS scenario).
>>
>> It might be better simply to point out the limitations of the
>> machinery: because authentication is not provided in this case, the
>> receiving system has no way to distinguish legitimate peers from
>> malicious ones.  As a result, a denial of service attack may prevent
>> the intended number of legitimate peers from communicating.
>> Additional session (SA?) capacity may help in such cases.
>>
>> My point is that this is definitely going to be a case of throwing
>> some more resources at the problem in the hopes it’s enough, but no
>> way to predict whether it’s good enough.  Because of that, “SHOULD”
>> seems inappropriate, and a simple statement of the issue and the
>> limitations of this new protocol is better.
>
> There are two cases of overload. A "legitimate" overload by simply having
> too many (anonymous) clients, and an overload by malicious clients. It
> is hard to tell the difference without authentication.
>
> We could introduce a new notification payload for IKE_INIT that
> pre-announces the desire for unauthenticated IKE. A server could then
> reject/drop those connections when the load of legitimate clients gets
> too high without needing to create more state. If later in the exchange
> an attempt for authenticated IKE is made, the connection can be dropped
> as malicious. I'm not sure if this will turn out to be a needed feature
> to help with the legitimate client overload problem, so I'm tempted to
> postpone adding this until we have field reports that it could be
> useful.
>
> Currently what we (libreswan) are implementing is counting both halfopen
> SAs as well as states associated with unauthenticated IKE SA's. The
> halfopen SA's include _our_ outgoing IKE_INIT requests, as a spoofed
> source ip packet could have caused our end to initiate an IKE_INIT.
>
> Paul
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec