[IPsec] Failure detection proposals
Yaron Sheffer <yaronf.ietf@gmail.com> Wed, 04 August 2010 20:39 UTC
Return-Path: <yaronf.ietf@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 69A1C3A6A1C for <ipsec@core3.amsl.com>; Wed, 4 Aug 2010 13:39:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.374
X-Spam-Level:
X-Spam-Status: No, score=-101.374 tagged_above=-999 required=5 tests=[AWL=1.225, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YICouROTuJfT for <ipsec@core3.amsl.com>; Wed, 4 Aug 2010 13:39:58 -0700 (PDT)
Received: from mail-ey0-f172.google.com (mail-ey0-f172.google.com [209.85.215.172]) by core3.amsl.com (Postfix) with ESMTP id CAF7E3A6A49 for <ipsec@ietf.org>; Wed, 4 Aug 2010 13:39:57 -0700 (PDT)
Received: by eyb7 with SMTP id 7so2414314eyb.31 for <ipsec@ietf.org>; Wed, 04 Aug 2010 13:40:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from :user-agent:mime-version:to:subject:references:in-reply-to :content-type:content-transfer-encoding; bh=P5PM2qsjBnm5yLSWRmx37yWTctVT0xB9Ocvgk9YUKxI=; b=bw8GRudPcVu3Zt75oFW9TOUhrYdhRtoaMCU6c+MXxO9rwv3nX6aPuOBEGGUyPzzcWk jA9yYnOWQV/hBTblUq4p+h5o55tYdg8+D+fS5gC+OWkNmlKAwkVs6FsPlRoeJ4/aeaCc 0vxEifvQlruZy4ivUxD9DrlKQQyq3esYSWyuI=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:content-type:content-transfer-encoding; b=pWKnFT8uf9x5CBacfRjpuftHf4JiuSnPQaG0lqLZMAfH9p26uhX2GNGlQBpiaSsSKA 45hZZ5dIGWTkk87XblfiRlfh7kxV3YEx2I0h2Oio+U2tqL+fMU+zx7w3IEsGpb43nEQF mWM4YDkReFvHrvybpxcNnyIf/00ieqY21Eb4A=
Received: by 10.14.36.87 with SMTP id v63mr3906627eea.0.1280954426737; Wed, 04 Aug 2010 13:40:26 -0700 (PDT)
Received: from [10.0.0.1] ([109.65.43.240]) by mx.google.com with ESMTPS id z55sm13420428eeh.9.2010.08.04.13.40.23 (version=SSLv3 cipher=RC4-MD5); Wed, 04 Aug 2010 13:40:24 -0700 (PDT)
Message-ID: <4C59D035.50108@gmail.com>
Date: Wed, 04 Aug 2010 23:40:21 +0300
From: Yaron Sheffer <yaronf.ietf@gmail.com>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1.11) Gecko/20100713 Lightning/1.0b1 Thunderbird/3.0.6
MIME-Version: 1.0
To: IPsecme WG <ipsec@ietf.org>
References: <p06240822c85a639e75c8@[10.20.30.158]>
In-Reply-To: <p06240822c85a639e75c8@[10.20.30.158]>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: [IPsec] Failure detection proposals
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Aug 2010 20:39:59 -0000
In the Maastricht meeting there was just a tiny bit of interest in the failure detection idea (reminder: the goal is to ensure that one peer discovers that the other IKE peer has restarted, within a short time duration, milliseconds instead of minutes). But we didn't see enough interest to justify having this as a WG item. So, one last time: if you think this is a worthwhile idea, regardless of the proposals on the table, please say so publicly. If you speak up, we will expect you to contribute to the selection of the preferred document. If this is of no interest, fine. But if it is an important problem to solve and we don't take it on, we could end up with competing non-WG proposals. Which would be far from ideal. Thanks, Yaron -----Original Message----- From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf Of Paul Hoffman Sent: Wednesday, July 07, 2010 8:03 PM To: IPsecme WG Subject: [IPsec] NUDGE: Starting discussion of failure detection proposals [[ This topic generated a fair amount of discussion in the past; are folks still interested? ]] Greetings again. The WG has one item on our charter that we have barely discussed, namely failure detection. The charter item says that the work item is: >- A standards-track IKEv2 extension that allows an IKE peer to quickly and securely detect that its opposite peer, while currently reachable, has lost its IKEv2/IPsec state. Changes to how the peers recover from this situation are beyond the scope of this work item, as is improving the detection of an unreachable or dead peer. Ideas from draft-nir-ike-qcd-05 and draft-detienne-ikev2-recovery-03 can be used as starting points. I gave a brief presentation on failure detection at the last IETF meeting in Anaheim. The slides are at <http://www.ietf.org/proceedings/77/slides/ipsecme-4.pdf>, and the following is directly derived from them. The basic problem being covered by the new extension is: - Alice and Bob have SAs up and ESP traffic is flowing, but then Bob crashes - Alice keeps sending ESP to Bob - When Bob finally comes back up, he replies to Alice's ESP with INVALID_SPI notifications - Alice starts sending IKE liveness checks until she is "sure" that the INVALID_SPI responses are not a DoS attack; this could be "several minutes" - Then Alice rekeys Some other problem cases include: - Bob has two gateways in some failover architecture. One gateway goes down, the other gateway detects this and wants to tell Alice to rekey - Bob has a bunch of gateways in some load-balancing or cluster architecture. One gateway is taken down on purpose, and the system wants to tell Alice to rekey - Protocol robustness: Bob's gateway loses the SA without going down Our primary goal is that, as soon as Bob starts sending INVALID_SPI responses to Alice's ESP traffic, Bob and Alice should be able to quickly determine that this is not an attack and therefore they probably want to rekey right away. Note that if Bob and Alice are also using session resumption, they can use that instead of rekeying; however, in the discussion here, we always use "rekey" to mean "rekey or, if appropriate, resume". The proposed extension does not include the actual rekeying, just the context for them to do it now. The WG has seen two proposed solutions, QCD and SIR. The following are brief summaries of the two proposals. In QCD (<http://tools.ietf.org/html/draft-nir-ike-qcd>), Bob gives Alice a secret token in the AUTH exchange, and then puts the token in his INVALID_SPI response as a way to say "this SPI is gone". Bob must remember his tokens across reboots, or derive tokens from a master token that he memorizes across reboots, and Alice must remember the token (or a hash of it) for each SA. In SIR (<http://tools.ietf.org/id/draft-detienne-ikev2-recovery-03.txt>), Alice sends a new Check_SPI query with a stateless cookie, essentially asking "do you really not know about this SPI?"; Bob responds by saying "I'm sure I don't know that SPI". Nothing is stored on either side, so a man-in-the-middle can attack this to cause an unnecessary rekey just as they can normal IKE. The first task for the WG is to decide which of these two quite different approaches to take. After we have done that, we can then hone the chosen proposal. During earlier discussion of the proposals, the following criteria were mentioned as ones that the WG should consider when thinking about the approaches: - Support for different scenarios (load balancers, active clusters, failover) - Security from man-in-the-middle DoS attacks - Resources used - Intellectual property rights So: please start discussing the two proposals with respect to these criteria or other criteria that are important to you. In a few weeks (hopefully well before the Maastricht meeting), I make a call for consensus and see where it leads us. --Paul Hoffman, Director --VPN Consortium
- [IPsec] NUDGE: Starting discussion of failure det… Paul Hoffman
- Re: [IPsec] NUDGE: Starting discussion of failure… Yoav Nir
- Re: [IPsec] NUDGE: Starting discussion of failure… Yaron Sheffer
- Re: [IPsec] NUDGE: Starting discussion of failure… Paul Hoffman
- [IPsec] Failure detection proposals Yaron Sheffer
- Re: [IPsec] Failure detection proposals Scott C Moonen
- Re: [IPsec] Failure detection proposals Yoav Nir
- Re: [IPsec] Failure detection proposals V Jyothi-B22245
- Re: [IPsec] Failure detection proposals Palanivelan A (apvelan)
- Re: [IPsec] Failure detection proposals Dacheng Zhang
- Re: [IPsec] Failure detection proposals David Wierbowski
- [IPsec] Failure detection proposals, stage 2 Yaron Sheffer
- Re: [IPsec] Failure detection proposals, stage 2 Scott C Moonen
- Re: [IPsec] Failure detection proposals, stage 2 Yoav Nir
- Re: [IPsec] Failure detection proposals, stage 2 Scott C Moonen
- Re: [IPsec] Failure detection proposals, stage 2 David Wierbowski
- Re: [IPsec] Failure detection proposals, stage 2 Palanivelan A (apvelan)
- Re: [IPsec] Failure detection proposals, stage 2 Dacheng Zhang
- Re: [IPsec] Failure detection proposals, stage 2 Paul Hoffman