Re: [IPsec] draft-yamaya-ipsecme-mpsa-00

Praveen Sathyanarayan <praveenys@juniper.net> Mon, 11 March 2013 18:26 UTC

Return-Path: <praveenys@juniper.net>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B9E6521F8D07 for <ipsec@ietfa.amsl.com>; Mon, 11 Mar 2013 11:26:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.467
X-Spam-Level:
X-Spam-Status: No, score=-1.467 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, SARE_RAND_6=2, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VVd68jE3761V for <ipsec@ietfa.amsl.com>; Mon, 11 Mar 2013 11:26:08 -0700 (PDT)
Received: from exprod7og114.obsmtp.com (exprod7og114.obsmtp.com [64.18.2.215]) by ietfa.amsl.com (Postfix) with ESMTP id 46FFE21F8D2D for <ipsec@ietf.org>; Mon, 11 Mar 2013 11:26:07 -0700 (PDT)
Received: from P-EMHUB02-HQ.jnpr.net ([66.129.224.36]) (using TLSv1) by exprod7ob114.postini.com ([64.18.6.12]) with SMTP ID DSNKUT4hvtGMC24dg1ffkWyCHSDJzvHQXoVy@postini.com; Mon, 11 Mar 2013 11:26:07 PDT
Received: from P-CLDFE01-HQ.jnpr.net (172.24.192.59) by P-EMHUB02-HQ.jnpr.net (172.24.192.36) with Microsoft SMTP Server (TLS) id 8.3.213.0; Mon, 11 Mar 2013 11:24:42 -0700
Received: from o365mail.juniper.net (207.17.137.224) by o365mail.juniper.net (172.24.192.59) with Microsoft SMTP Server id 14.1.355.2; Mon, 11 Mar 2013 11:24:41 -0700
Received: from co1outboundpool.messaging.microsoft.com (216.32.180.189) by o365mail.juniper.net (207.17.137.224) with Microsoft SMTP Server (TLS) id 14.1.355.2; Mon, 11 Mar 2013 11:34:03 -0700
Received: from mail56-co1-R.bigfish.com (10.243.78.245) by CO1EHSOBE018.bigfish.com (10.243.66.81) with Microsoft SMTP Server id 14.1.225.23; Mon, 11 Mar 2013 18:24:41 +0000
Received: from mail56-co1 (localhost [127.0.0.1]) by mail56-co1-R.bigfish.com (Postfix) with ESMTP id CD08BB00176 for <ipsec@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Mon, 11 Mar 2013 18:24:40 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:157.56.232.213; KIP:(null); UIP:(null); (null); H:BLUPRD0511HT003.namprd05.prod.outlook.com; R:internal; EFV:INT
X-SpamScore: -24
X-BigFish: PS-24(zzbb2dI98dI9371I4015Idb82hzz1f42h1ee6h1de0h1202h1e76h1d1ah1d2ahzz1033IL8275dh8275bhz2dh2a8h668h839h944he5bhf0ah1220h1288h12a5h12a9h12bdh137ah13b6h1441h1504h1537h153bh162dh1631h1758h18e1h1946h19b5h1ad9h1b0ah1155h)
Received: from mail56-co1 (localhost.localdomain [127.0.0.1]) by mail56-co1 (MessageSwitch) id 1363026278887158_8718; Mon, 11 Mar 2013 18:24:38 +0000 (UTC)
Received: from CO1EHSMHS009.bigfish.com (unknown [10.243.78.248]) by mail56-co1.bigfish.com (Postfix) with ESMTP id D520C3C0084; Mon, 11 Mar 2013 18:24:38 +0000 (UTC)
Received: from BLUPRD0511HT003.namprd05.prod.outlook.com (157.56.232.213) by CO1EHSMHS009.bigfish.com (10.243.66.19) with Microsoft SMTP Server (TLS) id 14.1.225.23; Mon, 11 Mar 2013 18:24:37 +0000
Received: from BLUPRD0511MB413.namprd05.prod.outlook.com ([169.254.6.62]) by BLUPRD0511HT003.namprd05.prod.outlook.com ([10.255.135.166]) with mapi id 14.16.0275.006; Mon, 11 Mar 2013 18:24:29 +0000
From: Praveen Sathyanarayan <praveenys@juniper.net>
To: Paul Wouters <pwouters@redhat.com>, IPsecme WG <ipsec@ietf.org>
Thread-Topic: [IPsec] draft-yamaya-ipsecme-mpsa-00
Thread-Index: AQHOHn12MjA093XUVE+V2LTszVL35ZigacGA
Date: Mon, 11 Mar 2013 18:24:29 +0000
Message-ID: <CD6364D8.17777E%praveenys@juniper.net>
In-Reply-To: <alpine.LFD.2.03.1303111318140.26962@nohats.ca>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.2.4.120824
x-originating-ip: [10.255.135.132]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <F43BABBC443C4642BD02DCC6D318762B@namprd05.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%12219$Dn%REDHAT.COM$RO%2$TLS%5$FQDN%onpremiseedge-1018244.customer.frontbridge.com$TlsDn%o365mail.juniper.net
X-FOPE-CONNECTOR: Id%12219$Dn%IETF.ORG$RO%2$TLS%5$FQDN%onpremiseedge-1018244.customer.frontbridge.com$TlsDn%o365mail.juniper.net
X-FOPE-CONNECTOR: Id%12219$Dn%TOOLS.IETF.ORG$RO%2$TLS%5$FQDN%onpremiseedge-1018244.customer.frontbridge.com$TlsDn%o365mail.juniper.net
Cc: "draft-yamaya-ipsecme-mpsa@tools.ietf.org" <draft-yamaya-ipsecme-mpsa@tools.ietf.org>
Subject: Re: [IPsec] draft-yamaya-ipsecme-mpsa-00
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Mar 2013 18:26:09 -0000

If I understood accurately, author meant to establish mesh BGP sessions,
which would allow discovery of each other information. But IMO, this may
cause scale issue. AD-VPN is mainly to address a large VPN deployments. As
an example, say 2000 end-points are deployed. With this MESH approach,
there are (2000 - 1) BGP sessions established in each and every end-point.
 Generally, end-point gateways are small devices, which may not capable of
establishing so many BGP sessions. IMO, this is not scalable approach.
Also, even though it may not pass traffic to given end-point, it may have
to establish BGP sessions with them.

I do agree with Paul's other security concerns as well. If hacker can
establish a tunnel with gateway and get MP-SA, then all end-points are
compromised. I also agree, this draft should add more details.

Thanks,
Praveen 


On 3/11/13 10:25 AM, "Paul Wouters" <pwouters@redhat.com> wrote:



Regarding draft-yamaya-ipsecme-mpsa-00

The draft claims to be about "auto discovery and configuration
function". However, I don't actually see any of that in the draft. I
have no idea how nodes find out about other nodes they can talk IPsec
to.

What I do see in the draft is a mechanism for a gateway to relay keying
material (nonces!!) for a shared IPsec SA to other nodes
after authenticating such nodes.

That raises a few questions for me:

If we want to accomplish a gateway allowing authenticated parties into a
collection of IPsec nodes, why not negotiate separate SA's? There is no
real reason to use a single shared IPsec SA session key, and it vastly
reduced the security.  One conpromised node would reveal the IPsec SA
keying material, and with that an attacker could decrypt all the traffic
between all the nodes. Plus an attacker could just add a new node to
the system (depending on the discovery/permission model that I don't
fully understand)

Why not distribute some kind of token or PSK between gateway and
endpoints, so that two endpoints can then use that to setup the parent
SA and do a proper setup of any child SAs with a unique keying material
for those nodes? As a bonus, that will keep to a much closer deployment to
the existing method. A compromised node might be able to attach itself
to the group, but it won't allow the direct compromise of any other
node-to-node traffic in the collection. Also this allows each node to
reject any proposals for IP address ranges it is unwilling to relay to
a particular node.

Furthermore, I see no discovery method in the draft that tells a node
which other nodes are available via this shared MPSA. How does a node
know it can do the MPSA to another node? It seems the draft has no
method for asking the gateway about this. Without such a discovery,
administrators will still end up having to hardcode node configuration,
which is exactly what we are trying to avoid.

While the diagrams display there can be gateway-endnode and endnode-endnode
traffic using the MPSA, I see no way how the endnode could know this. As
a node, I have traffic destined for 192.0.2.1. Should I use an MPSA?

I see no correlation between SRC / DST IP addresses and the MPSA. Does this
mean any endnode can connect to any other endnode within the group and just
make up its own ranges? like 0.0.0.0/0 <-> 0.0.0.0/0 ? That seems like a
very
weak trust model. Additionally, what if I want my node to be in more then
one MPSA group ? Can I have two MPSA's ? How would I know a node is
connecting
to me is for "MPSA 1" versus "MPSA 2" ? Is there any IKE association
between
nodes? Or will they just start sending me encrypted ESP for the MPSA? What
if
someone replays some MPSA encrypted traffic appearing from one node, will
my
node suddenly stop talking cleartext to it? That seems a weak
authentication
model.

I find the terminology for "rollover time1" (ROLL1) and "rollover time2"
(ROLL2)  confusing, as it seems to actually be more representative of an
"expiration date" and an "activation date". It seems to also overlap with
"lifetime" (LIFE). Doubly so as the expiration for ROLL1 has to be related
to the start of ROLL2. So we know when to roll, but we still need to
connect
to the gateway to get the keying material? So why not just limit everything
to an expiration time for when the nodes have to contact the gateway again
for the new MPSA keying material?

The gateway is supopsed to rekey, but that can be difficult with clients
behind NAT. Since the gateway informed the clients about the lifetimes,
why not let the clients reconnect?

So in short:

- Distribute authentication information/permission, not encryption material
   (IKE SA's and traffic selectors are needed)
- Devise a mechanism to obtain a list of active nodes or a method
   to ask the gateway if a certain node is avaialble via MPSA or not.
- Reduce the information sent to the minimum required.
- Agree on some kind of scope of IP addresses for the MPSA

As it stands, I don't really see myself implementing this. There are
too many unanswered security concerns, and it does not have enough
discovery features in it for my needs.

Paul

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec