Re: SOI: identity protection and DOS

Michael Thomas <mat@cisco.com> Tue, 20 November 2001 20:27 UTC

Received: from lists.tislabs.com (portal.gw.tislabs.com [192.94.214.101]) by above.proper.com (8.11.6/8.11.3) with ESMTP id fAKKRG822046; Tue, 20 Nov 2001 12:27:16 -0800 (PST)
Received: by lists.tislabs.com (8.9.1/8.9.1) id OAA13658 Tue, 20 Nov 2001 14:31:08 -0500 (EST)
From: Michael Thomas <mat@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-ID: <15354.45414.23171.182987@thomasm-u1.cisco.com>
Date: Tue, 20 Nov 2001 11:39:18 -0800
To: Radia Perlman - Boston Center for Networking <Radia.Perlman@sun.com>
Cc: ipsec@lists.tislabs.com
Subject: Re: SOI: identity protection and DOS
In-Reply-To: <200111201845.NAA21833@bcn.East.Sun.COM>
References: <200111201845.NAA21833@bcn.East.Sun.COM>
X-Mailer: VM 6.72 under 21.1 (patch 6) "Big Bend" XEmacs Lucid
X-Face: &, heK/V66p?[2!i|tVn, 9lN0TUvEv7:9FzXREj/AuzN4m<D]vnFJ>u!4x[/Z4t{V}~L]+Sk @RFNnJEg~WZ/(8<`5a), -7ukALWa^&?&D2R0CSG3kO5~#6JxLF\d, g">$%B!0w{W)qIhmwhye104zd bUcI'1!
Sender: owner-ipsec@lists.tislabs.com
Precedence: bulk

Radia Perlman - Boston Center for Networking writes:
 > Derek said:
 > >>I happen to agree with Radia's point that you should try to protect
 > >>the initiator's identity before the responder's identity (which
 > >>implies the responder should authenticate to the initiator first).
 > 
 > Actually, Dan and Charlie changed my mind about that. The problem with
 > the responder revealing identity information first is that ANYONE can
 > initiate an IPsec connection to an IP address and find out who is there
 > without ever divulging their identity.

   Ah. In other words, it should imitate real life
   conversations where the responder gets to say 
   "who's there?" rather than the initiator.
 
 > If it's the initiator that reveals identity first then the only threat is
 > from an active attacker impersonating the responder's IP address and lying
 > in wait. (the initiator's ID is hidden from an eavesdropper and revealed
 > only to whatever is sitting at the IP address the initiator connected to).
 > If it's the responder that reveals identity first, then (assuming
 > it's not a strict client/server model where the nodes that need identity
 > protection never respond to IPsec connect initiates and only initiate
 > them) it is trivial to find out who is at an IP address.

   Which means that you're forced into a full round
   trip first to protect the initiator's identity. This
   is precisely why I think that identity
   protection should be an optional tradeoff of 
   SA establishment speed vs. privacy, especially
   since the privacy protection in a large number
   of cases is subject to simple traffic analysis
   guessing.

		Mike