Re: [IPsec] Moving prefixes -- clariciations for draft-sathyanarayan-ipsecme-advpn-03

Yoav Nir <ynir@checkpoint.com> Mon, 03 February 2014 15:29 UTC

Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D580B1A0140 for <ipsec@ietfa.amsl.com>; Mon, 3 Feb 2014 07:29:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.537
X-Spam-Level:
X-Spam-Status: No, score=-5.537 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.535, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IOie3N1u-QGJ for <ipsec@ietfa.amsl.com>; Mon, 3 Feb 2014 07:29:01 -0800 (PST)
Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id 42F691A0158 for <ipsec@ietf.org>; Mon, 3 Feb 2014 07:29:01 -0800 (PST)
Received: from IL-EX10.ad.checkpoint.com ([194.29.34.147]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id s13FSrii008081; Mon, 3 Feb 2014 17:28:53 +0200
X-CheckPoint: {52EFAEEE-A-1B221DC2-1FFFF}
Received: from DAG-EX10.ad.checkpoint.com ([169.254.3.110]) by IL-EX10.ad.checkpoint.com ([169.254.2.228]) with mapi id 14.03.0123.003; Mon, 3 Feb 2014 17:28:53 +0200
From: Yoav Nir <ynir@checkpoint.com>
To: Praveen Sathyanarayan <praveenys@juniper.net>, "Frederic Detienne (fdetienn)" <fdetienn@cisco.com>
Thread-Topic: [IPsec] Moving prefixes -- clariciations for draft-sathyanarayan-ipsecme-advpn-03
Thread-Index: AQHPGFBiQcpc2q5lk0SS6Po9hK8PSZqYtBsAgAri6IA=
Date: Mon, 03 Feb 2014 15:28:52 +0000
Message-ID: <A7DCDB4D-CE88-473C-9584-91F2B571E8FF@checkpoint.com>
References: <88259CEC-4D10-48EC-8A21-0D2F348EEE3F@cisco.com> <CF0BCF53.6AC0F%praveenys@juniper.net>
In-Reply-To: <CF0BCF53.6AC0F%praveenys@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [172.31.21.37]
x-kse-antivirus-interceptor-info: protection disabled
Content-Type: text/plain; charset="us-ascii"
Content-ID: <D0D8A1ECCF534F44AA215B4EE6CD02FB@ad.checkpoint.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "<ipsec@ietf.org> WG" <ipsec@ietf.org>
Subject: Re: [IPsec] Moving prefixes -- clariciations for draft-sathyanarayan-ipsecme-advpn-03
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Feb 2014 15:29:04 -0000

In addition to what Praveen said, I'd like to point out that draft-sathyanarayan defines a two-tier network. On the top tier are security gateways that are (presumably) always-on and know the union protected domain of the VPN.  The second tier are devices that do not know the entire protected domain. The group of first-tier nodes is not necessarily identical to the group "hubs", but that is typical. Also typical is for that group to be relatively small - 2-30 gateways in a network that contains 10s of thousands of nodes.

Second tier devices are typically remote access clients, home routers or small office routers. Their initial configuration is simple - one peer, and credentials for connecting to that peer.

First tier devices should know at all times what the union protected domain is. It's possible that they won't know which peer gateways protects a particular address, but they have to know the difference between "send through the VPN" and "send through the unprotected Internet".

The PROTECTED_DOMAIN attribute described in section 3.9 is always sent from a first-tier gateway to a second tier node, and includes the union protected domain, unless policy requires something different: for example, remote access clients are often required to send all their traffic (even google searches) through a center gateway. The PROTECTED_DOMAIN is a bootstrap mechanism for 2nd tier nodes. It is *not* part of the normal continuous operation of the network, although 2nd tier nodes may use it periodically.

The Shortcut exchange, described in most of section 3 is the one used among all the nodes in the AD-VPN to tell each other where a particular part of the union protected domain is protected.  That *is* part of the normal operation of the protocol. 

When adding or deleting a spoke with a protected domain, two steps are required:
 1. Configure the new spoke with the identity, address, and credentials for a hub gateway
 2. Configure the hub gateway with the identity, credentials and protected domain of the new spoke. 

You cannot omit step #2 in any solution unless you forego authentication. Accepting a protected domain from an unauthenticated node, whether the protected domain is sent in a CFG payload, an HTTP resource, or a routing protocol message is a security vulnerability. Accepting any valid certificate without pre-configuring the expected content (for example, "Subject must contain 'CN=Tokyo Office' and Issuer must be xxxx")  is no authentication at all.

The missing piece here is the propagation of the union protected domain information among all the 1st tier nodes. This is fairly simple in a single enterprise network where such nodes are managed centrally. I can also see how in more heterogenous environments routing protocols could be used. Or the WG can develop some new mechanism (although I don't think that's a good idea). I think this is more useful than requiring 2nd tier [1] devices to participate in routing protocols.

Yoav

[1] I've often heard people use mobile phones as the ultimate example of low-end, but looking at the specs of small-office gateways, many of them are lower-spec than the average phone - under 1GB of memory, around 1GB of flash space, CPUs that are leftovers from last year's mobile phones.