Re: [IPsec] Handling Redirect Loops

Yoav Nir <ynir@checkpoint.com> Thu, 30 July 2009 04:14 UTC

Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 42BA63A6BDB for <ipsec@core3.amsl.com>; Wed, 29 Jul 2009 21:14:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZHU4pebJRECk for <ipsec@core3.amsl.com>; Wed, 29 Jul 2009 21:14:35 -0700 (PDT)
Received: from dlpdemo.checkpoint.com (dlpdemo.checkpoint.com [194.29.32.54]) by core3.amsl.com (Postfix) with ESMTP id 2A5C128C121 for <ipsec@ietf.org>; Wed, 29 Jul 2009 21:13:59 -0700 (PDT)
Received: by dlpdemo.checkpoint.com (Postfix, from userid 105) id 6E9F829C005; Thu, 30 Jul 2009 07:14:17 +0300 (IDT)
Received: from michael.checkpoint.com (michael.checkpoint.com [194.29.32.68]) by dlpdemo.checkpoint.com (Postfix) with ESMTP id 2DC8F29C002; Thu, 30 Jul 2009 07:14:17 +0300 (IDT)
X-CheckPoint: {4A711C9E-0-14201DC2-1FFFF}
Received: from il-ex01.ad.checkpoint.com (localhost [127.0.0.1]) by michael.checkpoint.com (8.12.10+Sun/8.12.10) with ESMTP id n6U4Dw3d024550; Thu, 30 Jul 2009 07:13:59 +0300 (IDT)
Received: from il-ex01.ad.checkpoint.com ([194.29.32.26]) by il-ex01.ad.checkpoint.com ([194.29.32.26]) with mapi; Thu, 30 Jul 2009 07:13:58 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: 'Vijay Devarapalli' <vijay@wichorus.com>, "ipsec@ietf.org" <ipsec@ietf.org>
Date: Thu, 30 Jul 2009 07:13:57 +0300
Thread-Topic: Handling Redirect Loops
Thread-Index: AcoQnIN2/iNBfSAISU+b1O5XZOe5xQALzvBQ
Message-ID: <006FEB08D9C6444AB014105C9AEB133F855207C896@il-ex01.ad.checkpoint.com>
References: <C6961C26.96B9%vijay@wichorus.com>
In-Reply-To: <C6961C26.96B9%vijay@wichorus.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [IPsec] Handling Redirect Loops
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jul 2009 04:14:36 -0000

Hi Vijay.

"default" is usually associated with a particular implementation or product. I think it would be better to say "suggested value" rather than "default value". Also, I don't see a point in mandating that all products should have an extra knob for setting this value. For example, for an IKEv2 client you usually try to have as little local configuration as possible, so this value may very well be hard coded.

                    The suggested value for MAX_REDIRECTS configuration
   variable is 5.  The suggested value for REDIRECT_LOOP_DETECT_PERIOD
   configuration variable is 300 seconds.  These values MAY be
   configurable on the client.


-----Original Message-----
From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Vijay Devarapalli
Sent: Thursday, July 30, 2009 1:33 AM
To: ipsec@ietf.org
Subject: [IPsec] Handling Redirect Loops

Hello,

During the IESG review of draft-ietf-ipsecme-ikev2-redirect, it was brought
up that the text about handling redirect loops should be in the main body of
the draft instead of the security considerations section. One of the ADs
also wanted some default values to detect a loop. Here is the modified text.
The changes to the original text are minor, basically adding the default
values and using "SHOULD" and "MUST" (RFC 2119 language).

7.  Handling Redirect Loops

   The client could end up getting redirected multiple times in a
   sequence, either because of wrong configuration or a DoS attack.  The
   client could even end up in a loop with two or more gateways
   redirecting the client to each other.  This could deny service to the
   client.  To prevent this, the client SHOULD be configured not to
   accept more than a certain number of redirects (MAX_REDIRECTS) within
   a short time period (REDIRECT_LOOP_DETECT_PERIOD) for a particular
   IKEv2 SA setup.  The default value for MAX_REDIRECTS configuration
   variable is 5.  The default value for REDIRECT_LOOP_DETECT_PERIOD
   configuration variable is 300 seconds.  These values MUST be
   configurable on the client.

Please let me know if any one has comments on this.

Vijay


Email secured by Check Point