Re: [IPsec] WG Last Call on "The NULL Authentication Method in IKEv2 Protocol" draft-smyslov-ipsecme-ikev2-null-auth

Yaron Sheffer <yaronf.ietf@gmail.com> Mon, 26 January 2015 13:35 UTC

Return-Path: <yaronf.ietf@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7160F1A8A08 for <ipsec@ietfa.amsl.com>; Mon, 26 Jan 2015 05:35:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4d8zKGSNovBm for <ipsec@ietfa.amsl.com>; Mon, 26 Jan 2015 05:35:53 -0800 (PST)
Received: from mail-wi0-x229.google.com (mail-wi0-x229.google.com [IPv6:2a00:1450:400c:c05::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 969D91A8861 for <ipsec@ietf.org>; Mon, 26 Jan 2015 05:35:53 -0800 (PST)
Received: by mail-wi0-f169.google.com with SMTP id h11so3910459wiw.0 for <ipsec@ietf.org>; Mon, 26 Jan 2015 05:35:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=7q6Ja8Ku+mZdN4Eh5C86vgVnGVvziAutH/cyTTP+TK8=; b=HByRWUksEPn23riR7TUHXeVj6lgzbpR+fP4Dtc/9KI5jPVeISLuG1VzOcjmsq5Q9Pe Qg5Rt49TDZ/M/5LV36zAaa+zlnMH3Buct4f2SwmF788kUe1dt7XhzBK28tsEHh+daS01 HT2gAi8xpGp3cqOhRPgEwz3M8I6VAVf3Dt4kOvGe2o8gE+HXQVm6hq1jzo4DOlWKlFWV GNTQDzzFz2jFzo+e0xFTvRaAYO119Hdu6R6TGaAD6gFYwfatlvc3Og+hZJBRyJVm419p 8vVcX0+zumh/c5Ow5r7f6PUtWKEpHsFyPbnZh/Y55JZCLFKWvFAqd0OxUwWa5WpvJvie WlvA==
X-Received: by 10.194.104.196 with SMTP id gg4mr43269659wjb.31.1422279352344; Mon, 26 Jan 2015 05:35:52 -0800 (PST)
Received: from [10.2.0.130] (93-173-247-187.bb.netvision.net.il. [93.173.247.187]) by mx.google.com with ESMTPSA id dp8sm13952656wib.20.2015.01.26.05.35.50 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 26 Jan 2015 05:35:51 -0800 (PST)
Message-ID: <54C642B5.1050909@gmail.com>
Date: Mon, 26 Jan 2015 15:35:49 +0200
From: Yaron Sheffer <yaronf.ietf@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.4.0
MIME-Version: 1.0
To: Valery Smyslov <svanru@gmail.com>, Paul Wouters <paul@nohats.ca>, Paul Koning <paul_koning@dell.com>
References: <5E3BDAA5-B0C8-4004-8FFE-25B91199D7EC@vpnc.org> <D0D61010.3756D%grbartle@cisco.com> <363A367E1CF64C4C98586DC57F1AC987@buildpc> <D0DB345D.37DEF%grbartle@cisco.com> <alpine.LFD.2.10.1501131803240.3286@bofh.nohats.ca> <D0E8103C.38B87%grbartle@cisco.com> <B8D4358C-E4D8-4B28-876E-D99FCC927302@dell.com> <alpine.LFD.2.10.1501231208130.9546@bofh.nohats.ca> <54C54D96.4050203@gmail.com> <2DCAD3DF89C949D2B917F4049BFDB265@buildpc>
In-Reply-To: <2DCAD3DF89C949D2B917F4049BFDB265@buildpc>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/ipsec/HjGA8L2DnHE4_IXjtIcK5Sc1knU>
Cc: ipsec@ietf.org, "Graham Bartlett (grbartle)" <grbartle@cisco.com>
Subject: Re: [IPsec] WG Last Call on "The NULL Authentication Method in IKEv2 Protocol" draft-smyslov-ipsecme-ikev2-null-auth
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Jan 2015 13:35:56 -0000

Hi Valery,

The DoS/puzzles document presents a "plan" for DDoS defense. I believe 
that unauthenticated clients need to be considered as part of this plan. 
I'm OK with the general guidelines in Sec. 3.2, but suggest that the 
DDoS document needs to be beefed up to account for this use case.

Thanks,
	Yaron

On 01/26/2015 01:37 PM, Valery Smyslov wrote:
> Hi Yaron,
>
> there is already Section 3.2, which discusses possible
> impact of NULL Auth on DOS resistance, and
> the ddos/puzzles document is already referenced there.
> Do you think more words need to be added to this section?
>
> Regards,
> Valery.
>
> ----- Original Message ----- From: "Yaron Sheffer" <yaronf.ietf@gmail.com>
> To: "Paul Wouters" <paul@nohats.ca>; "Paul Koning" <paul_koning@dell.com>
> Cc: <ipsec@ietf.org>; "Graham Bartlett (grbartle)" <grbartle@cisco.com>
> Sent: Sunday, January 25, 2015 11:09 PM
> Subject: Re: [IPsec] WG Last Call on "The NULL Authentication Method in
> IKEv2 Protocol" draft-smyslov-ipsecme-ikev2-null-auth
>
>
> I would suggest to mention DDOS in this document briefly, but to move
> the discussion (maybe add an entire section) to our dedicated
> DDOS/puzzles document. For the simple reason that we want to publish the
> NULL Auth document sooner.
>
> Since Valery is co-author on both, I guess he gets to write it :-)
>
> Thanks,
> Yaron
>
> On 01/23/2015 07:21 PM, Paul Wouters wrote:
>> On Fri, 23 Jan 2015, Paul Koning wrote:
>>
>>>> Sorry for the late reply. Hopefully the following is more clear?
>>>>
>>>> When designing systems which will provide connectivity for
>>>> non-authenticated users, the system SHOULD be designed with the
>>>> capacity
>>>> to support not only the maximum intended number of peers, but also
>>>> include
>>>> an additional number of sessions which are created due to malicious or
>>>> erroneous behaviour. This safety margin will allow a system to still
>>>> operate safely under load until it is exceeded.
>>>
>>> I understand the sentiment, but this seems like a recommendation that
>>> can’t be tested and can’t really be implemented either.  The trouble
>>> is that the number of malicious sessions is unbounded (and may be
>>> quite large in a DOS scenario).
>>>
>>> It might be better simply to point out the limitations of the
>>> machinery: because authentication is not provided in this case, the
>>> receiving system has no way to distinguish legitimate peers from
>>> malicious ones.  As a result, a denial of service attack may prevent
>>> the intended number of legitimate peers from communicating.
>>> Additional session (SA?) capacity may help in such cases.
>>>
>>> My point is that this is definitely going to be a case of throwing
>>> some more resources at the problem in the hopes it’s enough, but no
>>> way to predict whether it’s good enough.  Because of that, “SHOULD”
>>> seems inappropriate, and a simple statement of the issue and the
>>> limitations of this new protocol is better.
>>
>> There are two cases of overload. A "legitimate" overload by simply having
>> too many (anonymous) clients, and an overload by malicious clients. It
>> is hard to tell the difference without authentication.
>>
>> We could introduce a new notification payload for IKE_INIT that
>> pre-announces the desire for unauthenticated IKE. A server could then
>> reject/drop those connections when the load of legitimate clients gets
>> too high without needing to create more state. If later in the exchange
>> an attempt for authenticated IKE is made, the connection can be dropped
>> as malicious. I'm not sure if this will turn out to be a needed feature
>> to help with the legitimate client overload problem, so I'm tempted to
>> postpone adding this until we have field reports that it could be
>> useful.
>>
>> Currently what we (libreswan) are implementing is counting both halfopen
>> SAs as well as states associated with unauthenticated IKE SA's. The
>> halfopen SA's include _our_ outgoing IKE_INIT requests, as a spoofed
>> source ip packet could have caused our end to initiate an IKE_INIT.
>>
>> Paul
>>
>> _______________________________________________
>> IPsec mailing list
>> IPsec@ietf.org
>> https://www.ietf.org/mailman/listinfo/ipsec
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec