Re: [IPsec] FW: New Version Notification for draft-liu-ipsecme-ikev2-rekey-redundant-sas-00.txt

Daniel Migault <mglt.ietf@gmail.com> Thu, 02 December 2021 13:34 UTC

Return-Path: <mglt.ietf@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26E113A10DA for <ipsec@ietfa.amsl.com>; Thu, 2 Dec 2021 05:34:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZXYZdiyO5lmo for <ipsec@ietfa.amsl.com>; Thu, 2 Dec 2021 05:34:01 -0800 (PST)
Received: from mail-vk1-xa2d.google.com (mail-vk1-xa2d.google.com [IPv6:2607:f8b0:4864:20::a2d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9AD3C3A10D9 for <ipsec@ietf.org>; Thu, 2 Dec 2021 05:34:01 -0800 (PST)
Received: by mail-vk1-xa2d.google.com with SMTP id m19so18442117vko.12 for <ipsec@ietf.org>; Thu, 02 Dec 2021 05:34:01 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=mcCpPvj434PG2V8CAtr896WraC9kneuFrMbfdDK3vXU=; b=KaVv14yR7r/IcIoh7OgnGNW++fz9fnk9DepH8soNP0dvLtUVvbXmmhEpW2SHOEWBlW abcewc8kLuxhbOlTK7FK7R6EUFRZMUyMoY3KVzh56oZszO5OAb5dGTfsnGBlPM2jEM34 j2iW7E6+2yUu2kXt2NXxNgtwyHBhMCQhGtxhqUzfkNPB2nbmqn2cABCJ7fDmcfuGNgpQ aQxGWv9S+z2wBqkl6g1I6BUu6mtfUXKJ1zqy9zx0c1ZWR+3/J4phN2tMoL5EOMkNxTmL 3jlZYHsPA0tMuw+R8A6uvImD0GiKhoDsNbaK3KMdaZ9zML21xjFxLN0EGF7Eso9u+5Fv s8aQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=mcCpPvj434PG2V8CAtr896WraC9kneuFrMbfdDK3vXU=; b=Aa2gk0k7Xvnr/U/7up1xOcHkFy4bBat6Bkw1QjifU7AxrF+EZZvLjVjcP9Ald3EQlI qvD9rKhqRU32QrMn6pDOGaCEHNVf9MrgMSBIDzqYxaGcipeZ+1Gl1kFvRji71des2CZK lGRS7n0XQ0szBG6fY+ql3xhNUF97D1FxIQWAZ8+LmncRV21Q7g2hLgmFWcVDUnZqClNc OBvAYOTqUzwqgXHnhMkdXyFQuYedPlvq4Q3dDekE3xbReYJFDuErtXpRLdWYVwI2B2NG jZK7FVBNuIArgQg9JcBl3Ofvbz4v1GXy23FTcJttq2a5cm4JLQNJ0Aeembs3pCfjM/um s+4Q==
X-Gm-Message-State: AOAM530IiNNzIs+B6EDZDCk9VGm5679SNFTk5vMOnYTn3Fu2VE5ynLHB dXjocyBmzsNJS+2L1TswlTuG0hP+TMDZEWQWG6U=
X-Google-Smtp-Source: ABdhPJy687NRZVN1caSkZj8P+WshjydjOHI+Xf2hhY0oa7zCs5io2eYC3R/XcSJJQbsFvmL9QjUJYuO3Lh3El70+Las=
X-Received: by 2002:a05:6122:7c9:: with SMTP id l9mr15410721vkr.7.1638452039843; Thu, 02 Dec 2021 05:33:59 -0800 (PST)
MIME-Version: 1.0
References: <163756302647.16358.8631436336190852796@ietfa.amsl.com> <AM6PR07MB6056A9CCECA59F8035D04543EB9F9@AM6PR07MB6056.eurprd07.prod.outlook.com> <fc922cce-fdf2-62c1-8b66-588886479864@nohats.ca> <AM6PR07MB6056906966D25383E9B61D31EB619@AM6PR07MB6056.eurprd07.prod.outlook.com> <c0ad1622-c9f7-448e-b3d8-aa17e47acc1@nohats.ca> <1a7d01d7e14b$b79aeee0$26d0cca0$@gmail.com> <CADZyTkmmfyG9mqU+BaMSW1Jz9uDWJT7z-eVvCKwA45FAWsu59w@mail.gmail.com> <CAGL5yWbuZV_GNk9_aXfH1zz_S3RubYUh8SDgiYh-fxBMKTPz5A@mail.gmail.com>
In-Reply-To: <CAGL5yWbuZV_GNk9_aXfH1zz_S3RubYUh8SDgiYh-fxBMKTPz5A@mail.gmail.com>
From: Daniel Migault <mglt.ietf@gmail.com>
Date: Thu, 02 Dec 2021 08:33:48 -0500
Message-ID: <CADZyTk=6swBp_KGKPSprfgN1Ffc4rO572phEjPECPp10YbG5sg@mail.gmail.com>
To: Paul Wouters <paul.wouters@aiven.io>
Cc: Valery Smyslov <smyslov.ietf@gmail.com>, Harold Liu <harold.liu@ericsson.com>, IPsecME WG <ipsec@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000d1028e05d229d756"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/PERJOEKK6BjOBdePXNB7Za_fbUk>
Subject: Re: [IPsec] FW: New Version Notification for draft-liu-ipsecme-ikev2-rekey-redundant-sas-00.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Dec 2021 13:34:06 -0000

Hi Paul,

That is correct and this is what we are doing with a 10% over each side
when time base SA life time is used. The number I gave was measured using
byte base SA life time.
We tried the same approach for the byte base SA lifetime but the same
strategy does not work -- unless we consider very high values up to 40% of
the SA life time.

In our case, the traffic is symmetric, that is the same amount of bytes is
carried into both directions, SA life times are randomized +/- 10% and each
gateway checks the SA used for decryption. Such randomization (or
difference between the SAs) is not sufficient as that the counter is
checked approximately every 2 s to determine if a rekey needs to be
performed and any traffic burst cancels differences introduced by the
randomization.
In our current configuration initiator and responder are really
interchangeable, and this mostly results from the fact that they look at
different SAs AND that the traffic is relatively symmetric.
The ability to agree which of the peers is handling the rekey is expected
to prevent such simultaneous rekey as the behavior becomes predictable
between two peers and between different implementations.
There is still a need to introduce some randomness to prevent multiple
rekeys to happen at the same time. Assigning a rekey responsibility
requires one peer to look at both (unidirectional SAs) as opposed to one,
but over the number of SA the necessary resource associated to this
responsibility will remain the same as the one considered.
What we need to make sure is that a rekey occurs even if the peer
designated to rekey does not fulfill its commitment.

If we extend the case to traffic that is asymmetric (with our
implementation) the asymmetry of the traffic competes with the difference
of the SA lifetime which results for a given SA in randomness increasing or
decreasing the probability of simultaneous rekey. So here also, we believe
that being able to specify a behavior will prevent or at least limit the
simultaneous rekey.

Yours,
Daniel

On Tue, Nov 30, 2021 at 2:42 PM Paul Wouters <paul.wouters@aiven.io> wrote:

>
> On Tue, Nov 30, 2021 at 8:21 AM Daniel Migault <mglt.ietf@gmail.com>
> wrote:
>
>>
>> Thank you all for the comments. I believe there is a misunderstanding of
>> the resource issue we are facing, so please find below a more detailed
>> description.
>>
>> The resource in question is neither related to the CPU nor the memory,
>> nor the bandwidth as comments seem to suggest but instead related to the
>> number of table entries that perform the IPsec processing that varies
>> between 720 to 4000 depending on the hardware chip.
>>
>
> Okay.
>
>
> Randomizing the SA lifetime is a probabilistic approach we - and our
> customers - do not want to rely on even if the probability of collision
> decreases with the SA lifetime.
>
> So now I am a bit confused. If you are mostly concerned able table length,
> then 1 double IPsec SA won't hurt you, but 4000 will. So removing a random
> percentage amount of seconds from the initiator would actually
> probabilistic fix your issue. 4000 connections with a lifetime of 3600s,
> that all start at the same time with a 20% fuzz on initiator would cause
> you an extra 5 or 6 SAs. If your code recognises the new SA traffic, and
> there is frequent traffic, these double SAs would go away in seconds. So on
> a unit that can do 4000 SAs, you can now do only 3994 SAs.
>
> Am I making a mistake here ?
>
> Paul
>
>
>
>

-- 
Daniel Migault
Ericsson