Re: [IPsec] WG Last Call on "The NULL Authentication Method in IKEv2 Protocol" draft-smyslov-ipsecme-ikev2-null-auth

Yaron Sheffer <yaronf.ietf@gmail.com> Mon, 26 January 2015 08:55 UTC

Return-Path: <yaronf.ietf@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6A661A8773 for <ipsec@ietfa.amsl.com>; Mon, 26 Jan 2015 00:55:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.951
X-Spam-Level:
X-Spam-Status: No, score=-0.951 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DATE_IN_PAST_12_24=1.049, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CM7bWfJvCRqm for <ipsec@ietfa.amsl.com>; Mon, 26 Jan 2015 00:55:52 -0800 (PST)
Received: from mail-we0-x22a.google.com (mail-we0-x22a.google.com [IPv6:2a00:1450:400c:c03::22a]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 22B061A6FF9 for <ipsec@ietf.org>; Mon, 26 Jan 2015 00:55:52 -0800 (PST)
Received: by mail-we0-f170.google.com with SMTP id w55so2324665wes.1 for <ipsec@ietf.org>; Mon, 26 Jan 2015 00:55:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=3vzO0ltZc5a6dMv56qxpzX9la0278vkd6sPYsb75Jm4=; b=mHgZTMkWmkdxjWnz8j4ef0PFFmgcJ7W7LcpyC+e713zs8CUyG1ubixhFTnNRk3rkcO QcenIFBYYpB4gjDYCNs8VDHexXnpa7aumemPmJKXdAyyQpAelkWIci3w2AsEK0hvvvDW yRu4tXQakZo9v2x4ZTO69PzhxVbi/GQT5wePwGqMd/kF9BlHPXhAe5RS8EOZ8DoVi6RA QDCV0RDiDYfvc8leQzSjodIJiYtqZ/yh+yoliX4g+qRrzHE3f8fwvkf2sCcb5pGkT/Bn FwKm2gZrwt9tTsKCVYqcdbS7A+Hsm2K1OH0/mQ97VdawB0Jnqlr0bHxQxqmO1/hB6VWT 6UHw==
X-Received: by 10.180.74.142 with SMTP id t14mr24260740wiv.9.1422262550866; Mon, 26 Jan 2015 00:55:50 -0800 (PST)
Received: from [10.2.0.130] (93-173-247-187.bb.netvision.net.il. [93.173.247.187]) by mx.google.com with ESMTPSA id bo3sm13367734wjb.44.2015.01.26.00.55.47 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 26 Jan 2015 00:55:50 -0800 (PST)
Message-ID: <54C54D96.4050203@gmail.com>
Date: Sun, 25 Jan 2015 22:09:58 +0200
From: Yaron Sheffer <yaronf.ietf@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.4.0
MIME-Version: 1.0
To: Paul Wouters <paul@nohats.ca>, Paul Koning <paul_koning@dell.com>
References: <5E3BDAA5-B0C8-4004-8FFE-25B91199D7EC@vpnc.org> <D0D61010.3756D%grbartle@cisco.com> <363A367E1CF64C4C98586DC57F1AC987@buildpc> <D0DB345D.37DEF%grbartle@cisco.com> <alpine.LFD.2.10.1501131803240.3286@bofh.nohats.ca> <D0E8103C.38B87%grbartle@cisco.com> <B8D4358C-E4D8-4B28-876E-D99FCC927302@dell.com> <alpine.LFD.2.10.1501231208130.9546@bofh.nohats.ca>
In-Reply-To: <alpine.LFD.2.10.1501231208130.9546@bofh.nohats.ca>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/ipsec/JYSnFA20sreE6-GCxnebNhJ9l3Y>
Cc: "ipsec@ietf.org WG" <ipsec@ietf.org>, "Graham Bartlett (grbartle)" <grbartle@cisco.com>
Subject: Re: [IPsec] WG Last Call on "The NULL Authentication Method in IKEv2 Protocol" draft-smyslov-ipsecme-ikev2-null-auth
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Jan 2015 08:55:53 -0000

I would suggest to mention DDOS in this document briefly, but to move 
the discussion (maybe add an entire section) to our dedicated 
DDOS/puzzles document. For the simple reason that we want to publish the 
NULL Auth document sooner.

Since Valery is co-author on both, I guess he gets to write it :-)

Thanks,
	Yaron

On 01/23/2015 07:21 PM, Paul Wouters wrote:
> On Fri, 23 Jan 2015, Paul Koning wrote:
>
>>> Sorry for the late reply. Hopefully the following is more clear?
>>>
>>> When designing systems which will provide connectivity for
>>> non-authenticated users, the system SHOULD be designed with the capacity
>>> to support not only the maximum intended number of peers, but also
>>> include
>>> an additional number of sessions which are created due to malicious or
>>> erroneous behaviour. This safety margin will allow a system to still
>>> operate safely under load until it is exceeded.
>>
>> I understand the sentiment, but this seems like a recommendation that
>> can’t be tested and can’t really be implemented either.  The trouble
>> is that the number of malicious sessions is unbounded (and may be
>> quite large in a DOS scenario).
>>
>> It might be better simply to point out the limitations of the
>> machinery: because authentication is not provided in this case, the
>> receiving system has no way to distinguish legitimate peers from
>> malicious ones.  As a result, a denial of service attack may prevent
>> the intended number of legitimate peers from communicating.
>> Additional session (SA?) capacity may help in such cases.
>>
>> My point is that this is definitely going to be a case of throwing
>> some more resources at the problem in the hopes it’s enough, but no
>> way to predict whether it’s good enough.  Because of that, “SHOULD”
>> seems inappropriate, and a simple statement of the issue and the
>> limitations of this new protocol is better.
>
> There are two cases of overload. A "legitimate" overload by simply having
> too many (anonymous) clients, and an overload by malicious clients. It
> is hard to tell the difference without authentication.
>
> We could introduce a new notification payload for IKE_INIT that
> pre-announces the desire for unauthenticated IKE. A server could then
> reject/drop those connections when the load of legitimate clients gets
> too high without needing to create more state. If later in the exchange
> an attempt for authenticated IKE is made, the connection can be dropped
> as malicious. I'm not sure if this will turn out to be a needed feature
> to help with the legitimate client overload problem, so I'm tempted to
> postpone adding this until we have field reports that it could be
> useful.
>
> Currently what we (libreswan) are implementing is counting both halfopen
> SAs as well as states associated with unauthenticated IKE SA's. The
> halfopen SA's include _our_ outgoing IKE_INIT requests, as a spoofed
> source ip packet could have caused our end to initiate an IKE_INIT.
>
> Paul
>
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec