Re: [IPsec] Identifying encrypted traffic (was: Reauthentication extension for IKEv2)

"Gary Hemminger" <ghemminger@foundrynet.com> Tue, 21 October 2008 17:01 UTC

Return-Path: <ipsec-bounces@ietf.org>
X-Original-To: ipsec-archive@megatron.ietf.org
Delivered-To: ietfarch-ipsec-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 649D928C0FC; Tue, 21 Oct 2008 10:01:26 -0700 (PDT)
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5A7023A6B1A for <ipsec@core3.amsl.com>; Tue, 21 Oct 2008 10:01:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.358
X-Spam-Level:
X-Spam-Status: No, score=-1.358 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ajlzoZ6i4Nrh for <ipsec@core3.amsl.com>; Tue, 21 Oct 2008 10:01:12 -0700 (PDT)
Received: from malawi.foundrynet.com (malawi.foundrynet.com [63.236.63.253]) by core3.amsl.com (Postfix) with ESMTP id 8DC423A6B76 for <ipsec@ietf.org>; Tue, 21 Oct 2008 10:01:02 -0700 (PDT)
Received: from smtp1gap.foundrynet.com (unknown [10.101.103.18]) by malawi.foundrynet.com (Postfix) with ESMTP id 0E617166834 for <ipsec@ietf.org>; Tue, 21 Oct 2008 10:02:17 -0700 (PDT)
Received: from xmail.ds.foundrynet.com (unknown [10.101.218.254]) by smtp1gap.foundrynet.com (Postfix) with ESMTP id B39013E0001; Tue, 21 Oct 2008 10:02:03 -0700 (PDT)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Tue, 21 Oct 2008 10:01:30 -0700
Message-ID: <DEFE874FA19CEF4A98F35424DFE7A53E88F637@xmail.ds.foundrynet.com>
In-Reply-To: <7F9A6D26EB51614FBF9F81C0DA4CFEC8C5A77CC7E8@il-ex01.ad.checkpoint.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: Identifying encrypted traffic (was: [IPsec] Reauthentication extension for IKEv2)
Thread-Index: AckxZQVE2aaPDMvETkeeBeM3SJ1SMgBfEkkhACbyvnAACETf8A==
References: <DEFE874FA19CEF4A98F35424DFE7A53E88F32C@xmail.ds.foundrynet.com><648EF152-A65D-4DC5-B978-825086BB3D09@checkpoint.com> <DEFE874FA19CEF4A98F35424DFE7A53E7363FC@xmail.ds.foundrynet.com> <7F9A6D26EB51614FBF9F81C0DA4CFEC8C5A77CC7E8@il-ex01.ad.checkpoint.com>
From: Gary Hemminger <ghemminger@foundrynet.com>
To: Yaron Sheffer <yaronf@checkpoint.com>, Yoav Nir <ynir@checkpoint.com>
Cc: ipsec@ietf.org
Subject: Re: [IPsec] Identifying encrypted traffic (was: Reauthentication extension for IKEv2)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============2077490842=="
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

The use case you are thinking about is probably pure IPsec VPN, where an
encrypted stream only lives across the WAN.  But what if you are a load
balancer and the IPsec traffic is end to end?  In this case, you may
have a load balancer that needs to terminate the traffic so it can make
the decision which server to handle the request.  All load balancers
today support SSL termination.  Same thing applies to IPsec traffic.  We
cannot make the decision which server to handle the request, nor can we
maintain persistence without decrypting the traffic.  

 

Gary

 

From: Yaron Sheffer [mailto:yaronf@checkpoint.com] 
Sent: Tuesday, October 21, 2008 6:10 AM
To: Gary Hemminger; Yoav Nir
Cc: ipsec@ietf.org
Subject: Identifying encrypted traffic (was: [IPsec] Reauthentication
extension for IKEv2)

 

Hi Gary,

 

I'm puzzled by the scenario you are presenting. I've been considering
the work on ESP-null detection (e.g.
draft-grewal-ipsec-traffic-visibility-01) as useful for middleboxes that
want to look at the IPsec-protected traffic, but do NOT want to
terminate IPsec (i.e. decapsulate the traffic). In general, if you can
terminate IPsec, that means that you have access to the encryption keys
and you can easily differentiate protected and unprotected traffic, Can
you explain the use case that you have in mind?

 

Thanks,

            Yaron

 

________________________________

From: ipsec-bounces@ietf.org [mailto:ipsec-bounces@ietf.org] On Behalf
Of Gary Hemminger
Sent: Monday, October 20, 2008 20:26
To: Yoav Nir
Cc: ipsec@ietf.org
Subject: Re: [IPsec] Reauthentication extension for IKEv2

 

I was talking about how to make the determination that the payload is
encrypted.  Evidently there are two approaches:  one based on a
heuristic, another based on a payload wrapper that flags the payload is
encrypted.  We would need some mechanism to determine the payload is
encryped if we need to terminate the IPSEC traffic and make a
determination of which server to send it to.  Sorry about the confusion.

 

Gary

 

________________________________

From: Yoav Nir [mailto:ynir@checkpoint.com]
Sent: Sat 10/18/2008 2:03 PM
To: Gary Hemminger
Cc: ipsec@ietf.org
Subject: Re: [IPsec] Reauthentication extension for IKEv2

Hi Gary. 

 

I'm not sure what heuristics you are talking about. The problem of
re-authentication is simply this. The owner of the remote access gateway
has a security policy that says that connections can be open for only so
long (say, 2 hours) without authenticating the user again. This is a
favorite requirement by auditors, who believe that this is an important
part of risk management. If somebody steals your laptop (or mobile
phone) or sits down at the Internet Cafe station where you were logged
on, we want to limit the amount of time they are connected to the
internal network. This requirement makes sense if the user has to type
in their password to authenticate. It makes less sense if there are user
certificates that are stored on the computer, or if the client software
has a "save password" feature.

 

Whether it makes sense or not, this is a requirement by auditors and
regulators. If the user does not re-authenticate within the specified
time, the IKE SA and all dependent child SAs are deleted.  This creates
a usability problem, because the SA is deleted without any advance
warning to the user, so the user is likely to get a relatively long time
with no connectivity. This can break TCP connections such as FTP, HTTP,
and IMAP. Outlook tends to make accounts permanently offline when this
happens.

 

RFC 4778 and the improvement that Martin Willi is proposing, are aimed
at solving this usability problem by informing the client software in
advance when the re-authentication needs to be done, and allowing them
to re-authenticate early enough, so that connections are not broken. The
heuristic does not affect the security or the IPsec streams.

 

Yoav

 

On Oct 18, 2008, at 2:35 AM, Gary Hemminger wrote:

 


One comment on the heuristics approach.  As a hardware vendor of L4-7
ADC boxes, I am a little concerned about having to terminate IPSEC
streams based on the heuristics approach, because this is open ended.
What I mean is that the heuristic may be easy to define now, but there
is no certainty that it would remain this way.  My past experience
suggests that eventually the heuristic would become too complex, and a
well defined mechanism for determining which payload is encrypted would
need to be employed anyway.   


While I like the idea of some "other" box having to solve this issue,
which prevents clients from having to be changed, as we are a vendor of
the "other" box, I think we should think about the long term, not the
short term.  Just my opinion, and I am certainly flexible, but the
heuristics approach worries me a bit.


 


Gary


 


[IPsec] Reauthentication extension for IKEv2

________________________________


*	To: Martin Willi <martin at strongswan.org
<mailto:martin@DOMAIN.HIDDEN> > 
*	Subject: [IPsec] Reauthentication extension for IKEv2 
*	From: Tero Kivinen <kivinen at iki.fi
<mailto:kivinen@DOMAIN.HIDDEN> > 
*	Date: Tue, 16 Sep 2008 12:09:14 +0300 
*	Cc: ipsec at ietf.org <mailto:ipsec@DOMAIN.HIDDEN>  
*	Delivered-to: ietfarch-ipsec-web-archive at core3.amsl.com
<mailto:ietfarch-ipsec-web-archive@DOMAIN.HIDDEN>  
*	Delivered-to: ipsec at core3.amsl.com
<mailto:ipsec@DOMAIN.HIDDEN>  
*	In-reply-to: <48CF5D7D.7070701 at strongswan.org
<mailto:48CF5D7D.7070701@DOMAIN.HIDDEN> > 
*	List-archive: <http://www.ietf.org/pipermail/ipsec> 
*	List-help: <mailto:ipsec-request@ietf.org?subject=help> 
*	List-id: Discussion of IPsec protocols <ipsec.ietf.org> 
*	List-post: <mailto:ipsec@ietf.org> 
*	List-subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>,
<mailto:ipsec-request@ietf.org?subject=subscribe> 
*	List-unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>,
<mailto:ipsec-request@ietf.org?subject=unsubscribe> 
*	References: <48CF5D7D.7070701 at strongswan.org
<mailto:48CF5D7D.7070701@DOMAIN.HIDDEN> > 
*	Sender: ipsec-bounces at ietf.org
<mailto:ipsec-bounces@DOMAIN.HIDDEN> 

________________________________

Martin Willi writes:
> What do you think about such an extension? Already considered
something
> similar, or does your reauthentication procedure work hassle-free? I'm
> wondering if we are the only ones facing these problems or if such an
> extension would gain broader acceptance...
 
The first question I have is why are you doing reauthentication at
all?
 
What is the benefits of the reauthentication?
 
What is the benefits of the reauthentication that can be done WITHOUT
user intervention (i.e. no user typing in password or pin code or
fingerprint or similar)?
 
I myself can only really see benefits from reauthentication when it
does require that user is really sitting there on the machine, and
gives something that the machine itself cannot give. In those cases
the user is required to type in something or do something anyways,
thus it does not really matter if the communications is interrupted
for second if user must stop his work for much longer time to type in
his passphrase or pin code.
 
The RFC 4478 simply skips this question and says "With some IPsec
peers, particularly in the remote access scenario, it is desirable to
repeat the mutual authentication periodically. The purpose of this is
to limit the time that security associations (SAs) can be used by a
third party who has gained control of the IPsec peer."
 
In most cases if third party has gained control of the IPsec peer he
will also get control of all authentication information inside the
peer, including private keys and pre shared keys. Only way to make
sure that he does not get access to those is to protect them with
passphrase, or pin code or similar that is only known by the user.
 
This is also said out in the RFC 4478: "However, in the remote access
scenario it is usually up to a human user to supply the
authentication credentials ..."
 
Because of this I do not think there is that much requirement for
reauthentication protocol that is faster than what we already have. 
-- 
kivinen at safenet-inc.com
_______________________________________________
IPsec mailing list
IPsec at ietf.org
https://www.ietf.org/mailman/listinfo/ipsec
 
 
________________________________


*	Follow-Ups: 

	*	Re: [IPsec] Reauthentication extension for IKEv2
<http://www.ietf.org/mail-archive/web/ipsec/current/msg03108.html>  

		*	From: Martin Willi

*	References: 

	*	[IPsec] Reauthentication extension for IKEv2
<http://www.ietf.org/mail-archive/web/ipsec/current/msg03106.html>  

		*	From: Martin Willi

*	Prev by Date: [IPsec] Reauthentication extension for IKEv2
<http://www.ietf.org/mail-archive/web/ipsec/current/msg03106.html>  
*	Next by Date: Re: [IPsec] Reauthentication extension for IKEv2
<http://www.ietf.org/mail-archive/web/ipsec/current/msg03108.html>  
*	Previous by thread: [IPsec] Reauthentication extension for IKEv2
<http://www.ietf.org/mail-archive/web/ipsec/current/msg03106.html>  
*	Next by thread: Re: [IPsec] Reauthentication extension for IKEv2
<http://www.ietf.org/mail-archive/web/ipsec/current/msg03108.html>  
*	Index(es): 

	*	Date
<http://www.ietf.org/mail-archive/web/ipsec/current/maillist.html#03107>

	*	Thread
<http://www.ietf.org/mail-archive/web/ipsec/current/threads.html#03107> 


Note: Messages sent to this list are the opinions of the senders and do
not imply endorsement by the IE


 



Scanned by Check Point Total Security Gateway. 

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

 



Scanned by Check Point Total Security Gateway. 

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec