Re: [IPsec] [Fwd: New Version Notification for draft-detienne-ikev2-recovery-00]

Tero Kivinen <kivinen@iki.fi> Sat, 28 June 2008 09:54 UTC

Return-Path: <ipsec-bounces@ietf.org>
X-Original-To: ipsec-archive@megatron.ietf.org
Delivered-To: ietfarch-ipsec-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 076F43A6B93; Sat, 28 Jun 2008 02:54:24 -0700 (PDT)
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C00A33A6B93 for <ipsec@core3.amsl.com>; Sat, 28 Jun 2008 02:54:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NuEpOE567ugM for <ipsec@core3.amsl.com>; Sat, 28 Jun 2008 02:54:21 -0700 (PDT)
Received: from mail.kivinen.iki.fi (fireball.kivinen.iki.fi [IPv6:2001:1bc8:100d::2]) by core3.amsl.com (Postfix) with ESMTP id 791913A6B58 for <ipsec@ietf.org>; Sat, 28 Jun 2008 02:54:21 -0700 (PDT)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.13.8/8.13.8) with ESMTP id m5S9rqU8028289 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 28 Jun 2008 12:53:52 +0300 (EEST)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.13.8/8.12.11) id m5S9rpj8020130; Sat, 28 Jun 2008 12:53:51 +0300 (EEST)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Message-ID: <18534.2607.349604.149248@fireball.kivinen.iki.fi>
Date: Sat, 28 Jun 2008 12:53:51 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: fd@cisco.com
In-Reply-To: <1214317086.6654.139.camel@fdetienn-laptop>
References: <485F394A.1090804@cisco.com> <5326E5DF-0D3E-4ADD-9647-785274E8A2A2@checkpoint.com> <1214222942.6828.205.camel@fdetienn-laptop> <A148F915-7E7B-4532-9152-2978EFFF8046@checkpoint.com> <1214294503.6654.23.camel@fdetienn-laptop> <9ED51A04-61B5-43D2-B93C-D356C0365E16@checkpoint.com> <1214317086.6654.139.camel@fdetienn-laptop>
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 7 min
X-Total-Time: 6 min
Cc: ipsec@ietf.org, Yoav Nir <ynir@checkpoint.com>, Pratima Sethi <psethi@cisco.com>
Subject: Re: [IPsec] [Fwd: New Version Notification for draft-detienne-ikev2-recovery-00]
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: ipsec-bounces@ietf.org
Errors-To: ipsec-bounces@ietf.org

Frederic Detienne writes:
> Reading through, I think we need to expose a little more of our
> rationale.

I have not read the draft (yet), but from your discussion it seems
that the real solution to the problem is to use birth certificates,
not adding more round trips to get more protection (from
http://tools.ietf.org/html/draft-ietf-ipsec-ikev2-rationale-00 section
3.1 changes we considered and rejected):

----------------------------------------------------------------------
   - adding in Bill Sommerfeld's "birth certificate" idea. In this idea
   Bob keeps a number in nonvolatile memory that increments each time
   the node restarts. When Bob restarts, he signs a "birth certificate"
   stating what the value of that counter is. This birth certificate is
   transmitted as a payload in message 4. Alice keeps this value. If Bob
   ever receives an ESP packet that doesn't decrypt properly or with an
   unknown SPI, he responds to that packet with his birth certificate.
   If the recipient has an SA for Bob with an older birth certificate,
   this lets them know Bob has restarted and forgotten state for that
   SA. We decided not to add that to this version of the draft, although
   we think it is a good idea, until it's been written up in a separate
   draft and there has been an opportunity for people to understand it
   and give feedback.
----------------------------------------------------------------------

The counter could of course be also the timestamp, as that is already
available for systems which are using certificates. I.e. instead of
sending non-authenticated invalid IKE SA notify, Bob would send his
birth certificate, so Alice can see whether Bob has rebooted or not,
and as the certificate is signed with Bobs key it means Alice can
trust that information. 
-- 
kivinen@safenet-inc.com
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec