[IPsec] Draft minutes of the Maastricht meeting

Yaron Sheffer <yaronf.ietf@gmail.com> Wed, 28 July 2010 20:06 UTC

Return-Path: <yaronf.ietf@gmail.com>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CC5E828C179 for <ipsec@core3.amsl.com>; Wed, 28 Jul 2010 13:06:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.301
X-Spam-Level: **
X-Spam-Status: No, score=2.301 tagged_above=-999 required=5 tests=[BAYES_50=0.001, MANGLED_DIET=2.3]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a9RRwcx2I+RD for <ipsec@core3.amsl.com>; Wed, 28 Jul 2010 13:06:44 -0700 (PDT)
Received: from mail-ew0-f44.google.com (mail-ew0-f44.google.com [209.85.215.44]) by core3.amsl.com (Postfix) with ESMTP id DBC4F3A687B for <ipsec@ietf.org>; Wed, 28 Jul 2010 13:06:43 -0700 (PDT)
Received: by ewy22 with SMTP id 22so2131070ewy.31 for <ipsec@ietf.org>; Wed, 28 Jul 2010 13:07:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from :user-agent:mime-version:to:subject:content-type :content-transfer-encoding; bh=RNRscGEM6Pt6sN3o3ttGc0W5p5m5HNb8vqkZo/tmhg4=; b=m6twrzlhI18PG33aYcFXpDvMLQHxLWoPVPgQ/4gcvanEEbQOr8TTxaAnggB4L+sLB+ AJSCmazg+LxWt7Y+Zw6SdPWc9vX4HLMBSLVrKjAKQiy+CD7/AHN59Zc76N3c24gOVAqX SriaQHzePXhZSxKSNAe6/qcZP4H85SL2UGjsE=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject :content-type:content-transfer-encoding; b=mt2iyXgAvOAG+cKBskpr/kW2ua8lxlT9rthQO3O+I53l7Q0JWxxPdBu3kxqabPFDxA 9jSjMPKASmoAaxTY14ca3snU29igVlLPzdbbz2ZscY0UUSu+qF+pYX5FUSAv5xAthYaz n5mLyHzGCx+KYWNZpN4PxLJPfDJoEu7BYcL1c=
Received: by 10.213.77.75 with SMTP id f11mr6129590ebk.15.1280347626480; Wed, 28 Jul 2010 13:07:06 -0700 (PDT)
Received: from [10.0.0.1] ([109.65.43.240]) by mx.google.com with ESMTPS id a48sm10081446eei.12.2010.07.28.13.07.03 (version=SSLv3 cipher=RC4-MD5); Wed, 28 Jul 2010 13:07:05 -0700 (PDT)
Message-ID: <4C508DE4.1080002@gmail.com>
Date: Wed, 28 Jul 2010 23:07:00 +0300
From: Yaron Sheffer <yaronf.ietf@gmail.com>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1.11) Gecko/20100713 Lightning/1.0b1 Thunderbird/3.0.6
MIME-Version: 1.0
To: IPsecme WG <ipsec@ietf.org>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 8bit
Subject: [IPsec] Draft minutes of the Maastricht meeting
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Jul 2010 20:06:45 -0000

Below the minutes. Clarifications/corrections are welcome.

Thanks to Jim for taking extensive notes during the meeting!

	Yaron

---

IPSECME Meeting Notes

Note taker: Jim Schaad. All remaining errors by Paul and Yaron.

Agenda bash & Status
- IPsec is due to change from MUST to SHOULD in the new IPv6 node 
requirements doc.
- Ongoing discussion on using CGA for authentication, some aspects 
relevant to IPsec.

HA Recap slides
    People should read McGrew's msec counter mode document, now in IETF 
last call. [Pointer sent separately on the list.]

    RFC5297 - Auth encryption mode is another solution (a different 
block encryption mode).

HA Solutions slides

    Steve Kent - cluster member taking over shoves done  and peer 
response as needed.
    Paul - Each SA is synced up independently.
    Steve - Should be indication of knowledge of more SAs to be synced later
    Raj - "More" flag indicates that more SAs are coming
    Paul - Nothing about what happens if "more coming" flag is not set
    Raj - peer can initiate for secondary SAs (?)
    Dave McGrew - How is a replay attack possible? [offline commentary: 
ESP replay is in principle equivalent to replication of packets by the 
network, and thus not an attack; however the draft attempts to preserve 
existing ESP security guarantees.]
    Raj - Lost IKE SA so counters can be reused - must fit in IKE window
    DM - ESP and AH - possible attack here?
    R - After failover happens can safely stop traffic
    DM - expand
    R - Active member sync w/ standby - counter =1700 = now counter is 
1800 - standby starts from 1700 (last sync) looks like replay attack to peer
    Yoav - Sync counters every 1000 must - peer can now resend message 
1001 again after failover since does not know that it exists.
    DM - situation where cluster is not following RFC [each gateway is 
compliant, but the cluster as a whole is not].
    SK - cannot go 100% HA - could toss on floor or accept possibility 
of replay
    Yoav - could send one message to skip forward on all IPsec SAs, then 
peer just jumps forward and can do all SAs at the same time.
    R - different data traffic on SAs  - so possibly different traffic rates
    Paul - just not full IKEv2 - similar to concept of your other side 
might have forgotten something and you need to re-sync - not currently 
specified.

    Tero – there is a real replay attack remaining, rate limiting does 
not help at all - replay counters where set back anyway - peer should 
know better as window is not matching well. This is my counter - peer 
should send my feeling of counters – and then send back larger numbers - 
change in design.
    Yaron - Rate limiting does not solve problem - should solve at the 
transport and message level - not semantics of the payload – one option 
is to have a “failover counter” that's incremented on failover events.
    Dan - What is the protection against bad packets from an attacker – 
can this cause a resync
    R - Must be preceded by a failover event detection
    R - addressing rate limit w/ special Message ID 0

    Tero - Protocol should be split into two parts - IKE SA and IPsec SA 
counter syncs - different ideas of how they should be working.
    Problem IKE SA syncing - assume we missed some message - just need 
to sync counters - need to look at what those messages are really doing 
– need all changes to active SAs. Need text to say what happens for each 
different type of message. Easier to sync the SA counters when they occur.
    Paul - If two parts of cluster are not sync perfectly - the wrong 
picture on the failover server coming up. Risk is high and better to do 
a full re-key when states are wrong.
    Tero - don't need message id 0, just a normal IKE message and continue.
    R - Not possible to send a normal IKE message because of out of window
    T - Want to kill IKE SA if out of window. If two are out of sync - 
fall-back comes up - normal message ids - everything but a couple are 
out of sync - those few can be re-built from scratch.
    Yaron - quantitative question - DPD wants to happen a lot in some 
cases -IKE brittleness [dependence on exact counter sync] will be a 
problem and go out of sync - could be a high percentage of SAs out of 
sync.  If only for real traffic that causes a sync failure - then maybe 
don't need all of this work.
    Paul - ? - cluster member knows what type of syncing is occurring – 
if Tero style SA [few DPDs] then don't need to do this type of work. 
Based on the type of message then this is needed?
    Yaron - Yes -
    Paul - could make this a runtime situation decision.
    Tero - Why would you want to send lots of DPD message? - If no 
reason to be doing this then changes the issue for this document.
    Paul - Not relevant - cluster member has lots of things to look out.
    Tero - Protocol is useful if IKE messages much more frequently than 
sync messages. Otherwise this is not useful.
    Paul - Cluster member should have a feeling [re: traffic rates and 
composition].
    Tero - no just the IKE part is not needed.
    Paul - missed that - in splitting the IKE part can be removed
    Yaron - DPD issue is not a morality question - protocol allows for 
them, they will be aggressively used and thus we need to deal with this 
issue.
    Paul – aggressive DPD seen “in the wild” in existing products
    R - different peers can be sending DPDs as well. - including clients 
- this is a cluster - other messages that occur - could miss a rekey 
early than needed?
    Tero - no that does not help -
    R - arguing why IKEv2 part is needed - enables DPD - childless SA  - 
rekey may occur earlier and then try

    Paul - sense of the room -
    who read it - 10 people
    Splitting request - how many people think this makes sense - more 
people think spiting makes sense. Let's hold on the kill of IKEv2 until 
after the split discussion is finished.

    Tero - Does not solve all security problems - IKE part - sends 
biggest message id sent - forgets everything in the current window - 
sends biggest replay to date.
    R  - protocol does not say ignore all message
    T - doc says forget all message
    R - allows for rekey questions
    Yaron – security should not depend on higher level semantics - need 
to not allow for replay of messages - could make it a multiple (3 or 4) 
message exchange

    T - does not clarify what is going on - Peer thinks an on-going is 
processing and could get the replay prior to an SA response coming back 
(via different and slower routing)
    P - Please send to list - assume split occurs and send multiple sets.
    Yaron - separate security infrastructure
    Brian Weis - Solving replay problem is extremely important - w/ 
nonces will be requirement - how much do we save over the rekey if we go 
to multiple messages? - different between child SAs and IKE
    Yaron - if splitting then the multiple message game is just for the 
IKE SA part
    T - IPsec SA syncing part. - why we need to the maximum.  - goes 
away if message id 0 goes away - currently document says - when failure 
sends out counters - says this is the biggest counter I have seen 
to-date - Peer sends back to and may have a lower counter and thus 
replay back to the peer.
    R - not to have a crash counter because one more state is required 
to have and must be maintained by the peer as well as the cluster.
    T - solving replay is more important than making the optimization in 
the peer.
    P - design team has over optimized - may need to be removed
    T - Text saying counters are incremented [should say, “incremented 
by a large number”]
    P - wording issues
    T - if not large enough number incremented - then peer knows it is 
higher - thus a replay window has been opened.
    P - Section 8 needs to be re-written.  Was surprised by some of the text
in section 8 on first read

    Yaron - questions -=
        In favor of making it a working group draft - some hums
        no one against

Failure Detection Decision Process

    Raj - If we can detect the crash and do retransmissions - most of 
the job is in the gateways - crash detection can be important - offloads 
some work to the client or peer - helps load balancing w/ loose clusters 
– see applicability of this.
    Paul - do you see this valuable for which end of the cluster
    R - see value in both sides of the connection
    T - quick crash recovery is desired - but good implementations can 
do this - don't need protocol support for this - QCD does offer 
something - but SIR offers nothing.  Don't agree same MITM attack level 
in SIR as in normal IKE. Looking at slide 4 - none of these proposals 
addresses the second bullet item. Bob does not know anything about Alice 
anymore.

    Yoav - QCD and SIR have been in draft form for 3 years- The idea of 
“birth certificates” was mentioned ten years ago on the list but never 
materialized as a document. Crashing on clusters is not as big of an 
issue.  Could be an issue for single gateways however.
    R - Different types of clusters - load balance can be an issue as well.

    Yoav - w/ IKEv1 we could solve this in the protocol - setup the 
delete message and stored it on disk.  could then pull up message and 
send the delete messages when things looked weird.
    Would be needed because people are trying to do it.
    Basil- QCD would be better
    Yaron - does this imply it is needed
    Basil - yes I think so - cannot be addressed simply -

    Paul - short round on the list - but crash detection effort will 
probably die w/o much support showing up.


SEED in IPsec [short presentation on the new document].

Labeled IPsec - Jarrett Lu - new document will now be published.

         Paul - Please let us know at the start and the finish of this 
type of work so that we can do some review - but the discussion is not 
on the mailing list.

PAKE - Sean Turner
      Will go forward with PAKE as IETF stream Experimental [possibly 
multiple different solutions].

      Will push as it comes up
      Dan: - willing to start screaming bloody murder now [over the 
decision to drop PAKE from the working group]
      This working group is generically quiet - three different 
reactions to different documents
      EAP only got no comments - and is moving forward
      Liveness [crash detection] - concerted decision to cheer-lead
      PAKE - lack of reaction except from author - caused work item to 
be eliminated
      Three outcomes from basically same response of the working group
      Paul - did cheer-lead for PAKE as well.  will end up with similar 
results - correct on pushing some with too little discussion out the 
door – now considered a mistake.
      Sean - some may be naivety on my part - newness on the IESG.
      Paul - think PAKE is much bigger than the EAP mutual
      Tero - biggest PAKE problem is that most people not able to select 
between the different docs - need to have a single document to choose. 
Force the authors to pick.
      Paul - good response [by the authors] on the list - best response 
except for asking some to die.
      T - see if there is now a common single document that the authors 
can agree on. Think authors are currently the best ones to do the selection
      Paul - will see if this can work
      Yaron - think if one proposal can have more support?
      Paul - Question if have a single PAKE - will you spend more time 
on this document?  3 new people.
      Radia - Do we understand the IPR situation? Suspect that is some 
of the disinterest in this topic.
      Dave - tend to use strong secrets for authentication [in storage 
applications] - understand that may be stronger derived from weaker - 
will look at a single draft.
      Radia - Might be a good idea given the EKE patent might expire 
soon - that this might be the best way.
      Yaron - what if the authors say it is good [as far as IPR]
      Radia - not good enough unless some type of legal protection involved.

      Yoav - failure of the working group system if the WG cannot decide 
between different proposals. WG is no longer bringing value into the 
process.
      Paul - Does not mean anything on the experimental vs standards 
tagging.

      Imachin (?) - PAKE author - Think it might be better for the 
authors to present proposals at the next IETF.
      Paul - tired of wasting time and we have done that in the past and 
it did not seem to move forward.

      Yoav - how do we avoid this situation for the QCD vs SIR vs the 
virtual birth certs ???