Re: [IPsec] Can IPSec (RFC 5996) support tunnels with end point being (virtual) CPEs which has a set of workload attached (say Virtual Machines) all having virtual IP addresses?

Rafa Marin Lopez <rafa@um.es> Thu, 27 April 2017 22:30 UTC

Return-Path: <rafa@um.es>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 757D81296C9; Thu, 27 Apr 2017 15:30:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_SORBS_WEB=1.5, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FStFqjC1Wsj5; Thu, 27 Apr 2017 15:30:06 -0700 (PDT)
Received: from xenon24.um.es (xenon24.um.es [155.54.212.164]) by ietfa.amsl.com (Postfix) with ESMTP id 7A08C129A9E; Thu, 27 Apr 2017 15:27:04 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by xenon24.um.es (Postfix) with ESMTP id 61896D00; Fri, 28 Apr 2017 00:27:01 +0200 (CEST)
X-Virus-Scanned: by antispam in UMU at xenon24.um.es
Received: from xenon24.um.es ([127.0.0.1]) by localhost (xenon24.um.es [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 5AYhHiNOXyF4; Fri, 28 Apr 2017 00:27:01 +0200 (CEST)
Received: from [192.168.1.36] (148.red-88-10-88.dynamicip.rima-tde.net [88.10.88.148]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: rafa) by xenon24.um.es (Postfix) with ESMTPSA id 8AC62853; Fri, 28 Apr 2017 00:26:56 +0200 (CEST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Rafa Marin Lopez <rafa@um.es>
In-Reply-To: <FF58BAB9-7ABC-4E76-98A8-0CE6B78A0250@nohats.ca>
Date: Fri, 28 Apr 2017 00:26:55 +0200
Cc: Rafa Marin Lopez <rafa@um.es>, "IPsec@ietf.org" <IPsec@ietf.org>, Linda Dunbar <linda.dunbar@huawei.com>, i2nsf@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <FAB07CAE-7758-42CC-83AA-589B81FDC465@um.es>
References: <4A95BA014132FF49AE685FAB4B9F17F65927260F@SJCEML702-CHM.china.huawei.com> <18474.1492112893@obiwan.sandelman.ca> <07C6044A-255C-42AB-855B-43B4B53CB6E2@gmail.com> <960CA8F1-256D-485F-91D7-20AFDB332BD5@um.es> <FF58BAB9-7ABC-4E76-98A8-0CE6B78A0250@nohats.ca>
To: Paul Wouters <paul@nohats.ca>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/uYzAcpV7uZ8mljN_qJ82GNwaqkw>
Subject: Re: [IPsec] Can IPSec (RFC 5996) support tunnels with end point being (virtual) CPEs which has a set of workload attached (say Virtual Machines) all having virtual IP addresses?
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Apr 2017 22:30:09 -0000

Hi Paul:

Thank you for your comments. Please, see mine inline.

>>> [Rafa] I guess, it will depend on the scenario. I remember an e-mail to I2NSF (https://www.ietf.org/mail-archive/web/i2nsf/current/msg01111.html) mentioning that they were doing sort of case 2 and they would like to have a standard way of doing it. Precisely the effort behind our I-D is trying to provide an standard interface standard not only for case 1 (with IKE in the NSF) but also for case 2 (no IKE in the NSF). 
>>> 
> 
> Don't. You will need to builtin there same security features as IKE has.

[Rafa] Yes, but in case 2 all those features (e.g. key management operations) are in the controller but not in the NSFs. The NSFs only implements IPsec stack and deploys, for example, a NETFCONF server for the communication with the controller. Thus, all the key management operations are performed in the controller in case 2 and the resulting IPsec SAs are installed in the NSFs using, for example, NETCONF. 

> Focus instead of implementing "minimal ikev2"
> 
> https://tools.ietf.org/html/draft-kivinen-ipsecme-ikev2-minimal-01

[Rafa] Minimal IKEv2 implementation in the NSF would be case 1. 
Nevertheless, implementing minimal ikev2 does not solve, for example, NAT-T for case 1 so controller should do something anyway.

> 
> 
> For example, most modern ciphers require timely rekeying and must never reuse IV/counters with the same private key.

[Rafa] Why do you imply that IV/counters will be the same with same private key? That is not the assumption in case 2 where the controller always generates fresh IPsec SAs.

> Synching that across independent hosts is impossible.

[Rafa] I do not see how it is impossible when a controller that have access to both NSFs provides that information. If it is not impossible when using IKEv2, it should not be impossible for case 2. 

The point is that the result of running IKEv2 is the IPsec SAs in the IPsec kernel of both NSFs. In case 2, that state is coming from the controller that is performing the key management operations (generate fresh key material, IV, etc… per each IPsec SA). The controller has a  connection with both NSFs using, for example, NETCONF. Moreover, as I commented , you can read this e-mail (https://www.ietf.org/mail-archive/web/i2nsf/current/msg01111.html). So there is proof that it is working.

Thus, it is more difficult to manage, yes, (in fact, we admit that in our I-D), but not impossible. 
In fact, I think it would be worthy if you can provide a concrete example of that use case where both NSFs are under the same controller. Maybe we can help you to address your concern and explain how the operation would be in that specific case you have in mind.

Best Regards and many thanks for your comments.

> 
> Paul
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

-----------------------------------------------------------
Rafael Marin Lopez, PhD
Dept. Information and Communications Engineering (DIIC)
Faculty of Computer Science-University of Murcia
30100 Murcia - Spain
Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es
----------------------------------------------------------