Re: [IPsec] [Fwd: New Version Notification for draft-detienne-ikev2-recovery-00]
Tero Kivinen <kivinen@iki.fi> Sat, 28 June 2008 09:54 UTC
Return-Path: <ipsec-bounces@ietf.org>
X-Original-To: ipsec-archive@megatron.ietf.org
Delivered-To: ietfarch-ipsec-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 076F43A6B93; Sat, 28 Jun 2008 02:54:24 -0700 (PDT)
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C00A33A6B93 for <ipsec@core3.amsl.com>; Sat, 28 Jun 2008 02:54:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NuEpOE567ugM for <ipsec@core3.amsl.com>; Sat, 28 Jun 2008 02:54:21 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.kivinen.iki.fi [IPv6:2001:1bc8:100d::2]) by core3.amsl.com (Postfix) with ESMTP id 791913A6B58 for <ipsec@ietf.org>; Sat, 28 Jun 2008 02:54:21 -0700 (PDT)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.13.8/8.13.8) with ESMTP id m5S9rqU8028289 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 28 Jun 2008 12:53:52 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.13.8/8.12.11) id m5S9rpj8020130; Sat, 28 Jun 2008 12:53:51 +0300 (EEST)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Message-ID: <18534.2607.349604.149248@fireball.kivinen.iki.fi>
Date: Sat, 28 Jun 2008 12:53:51 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: fd@cisco.com
In-Reply-To: <1214317086.6654.139.camel@fdetienn-laptop>
References: <485F394A.1090804@cisco.com> <5326E5DF-0D3E-4ADD-9647-785274E8A2A2@checkpoint.com> <1214222942.6828.205.camel@fdetienn-laptop> <A148F915-7E7B-4532-9152-2978EFFF8046@checkpoint.com> <1214294503.6654.23.camel@fdetienn-laptop> <9ED51A04-61B5-43D2-B93C-D356C0365E16@checkpoint.com> <1214317086.6654.139.camel@fdetienn-laptop>
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 7 min
X-Total-Time: 6 min
Cc: ipsec@ietf.org, Yoav Nir <ynir@checkpoint.com>, Pratima Sethi <psethi@cisco.com>
Subject: Re: [IPsec] [Fwd: New Version Notification for draft-detienne-ikev2-recovery-00]
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org
Frederic Detienne writes: > Reading through, I think we need to expose a little more of our > rationale. I have not read the draft (yet), but from your discussion it seems that the real solution to the problem is to use birth certificates, not adding more round trips to get more protection (from http://tools.ietf.org/html/draft-ietf-ipsec-ikev2-rationale-00 section 3.1 changes we considered and rejected): ---------------------------------------------------------------------- - adding in Bill Sommerfeld's "birth certificate" idea. In this idea Bob keeps a number in nonvolatile memory that increments each time the node restarts. When Bob restarts, he signs a "birth certificate" stating what the value of that counter is. This birth certificate is transmitted as a payload in message 4. Alice keeps this value. If Bob ever receives an ESP packet that doesn't decrypt properly or with an unknown SPI, he responds to that packet with his birth certificate. If the recipient has an SA for Bob with an older birth certificate, this lets them know Bob has restarted and forgotten state for that SA. We decided not to add that to this version of the draft, although we think it is a good idea, until it's been written up in a separate draft and there has been an opportunity for people to understand it and give feedback. ---------------------------------------------------------------------- The counter could of course be also the timestamp, as that is already available for systems which are using certificates. I.e. instead of sending non-authenticated invalid IKE SA notify, Bob would send his birth certificate, so Alice can see whether Bob has rebooted or not, and as the certificate is signed with Bobs key it means Alice can trust that information. -- kivinen@safenet-inc.com _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec
- [IPsec] [Fwd: New Version Notification for draft-… Pratima Sethi
- Re: [IPsec] [Fwd: New Version Notification for dr… Yoav Nir
- Re: [IPsec] [Fwd: New Version Notification for dr… Frederic Detienne
- Re: [IPsec] [Fwd: New Version Notification for dr… Yoav Nir
- Re: [IPsec] [Fwd: New Version Notification for dr… Frederic Detienne
- Re: [IPsec] [Fwd: New Version Notification for dr… Yoav Nir
- [IPsec] IPsec in Dublin? Yoav Nir
- Re: [IPsec] [Fwd: New Version Notification for dr… Frederic Detienne
- [IPsec] IPsec ESP traffic visibility Grewal, Ken
- Re: [IPsec] IPsec in Dublin? Pasi.Eronen
- Re: [IPsec] [Fwd: New Version Notification for dr… Tero Kivinen