[mif] Securing Multiple Interfaces with IPsec

Daniel Migault <mglt.ietf@gmail.com> Tue, 02 December 2014 12:42 UTC

Return-Path: <mglt.ietf@gmail.com>
X-Original-To: mif@ietfa.amsl.com
Delivered-To: mif@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD82C1A1B3D; Tue, 2 Dec 2014 04:42:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_IMAGE_ONLY_32=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OTXC-z6LNMpi; Tue, 2 Dec 2014 04:42:52 -0800 (PST)
Received: from mail-wg0-x232.google.com (mail-wg0-x232.google.com [IPv6:2a00:1450:400c:c00::232]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9488D1A1B12; Tue, 2 Dec 2014 04:42:52 -0800 (PST)
Received: by mail-wg0-f50.google.com with SMTP id k14so16743247wgh.23 for <multiple recipients>; Tue, 02 Dec 2014 04:42:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:cc:content-type; bh=dxR6jsChQi6T/tWB1dEV71z6F88XXbKMrKeOC4lz8F8=; b=Bb71zhlV0t4dLiy+HpNhUSW80VMiSl3FqEgpzQo1ToDPyGP4upH2TVOa7Qzy0M0fqT 9Qz6gigoVDhLQYZvql9RQGEGzChcaP0jtSb/bR9XdY6jI3zgsk4EOBaMZ2Ua3XNDh34q i6E43SJ7bBncoO+SAETG7briQPe+UM4fAHGpSgqoAMyC85fddne0s5B/pcY9CjO6xadf zB71MsfWvLX2mg/Dzp19vNStZsZvQbC7e1xdeJAbS662+LHUI3qzyOH6YmW8HrHC6NRu WHDPt4c2+rW8rbF9X6cSA76BKGNlR80BvUaAjegcysYeBW4alX0kHRNO7wHrOAbdSj4q ba2A==
MIME-Version: 1.0
X-Received: by 10.180.98.100 with SMTP id eh4mr5016915wib.54.1417524171178; Tue, 02 Dec 2014 04:42:51 -0800 (PST)
Received: by 10.194.76.237 with HTTP; Tue, 2 Dec 2014 04:42:51 -0800 (PST)
Date: Tue, 02 Dec 2014 13:42:51 +0100
Message-ID: <CADZyTkktQa7awht-hgpCBV9oO6bTkh3noBh+z09UKEF_EESCTA@mail.gmail.com>
From: Daniel Migault <mglt.ietf@gmail.com>
To: "mif@ietf.org" <mif@ietf.org>, "multipathtcp@ietf.org Mailing List" <multipathtcp@ietf.org>
Content-Type: multipart/alternative; boundary="f46d04428cd2af0a0105093b1098"
Archived-At: http://mailarchive.ietf.org/arch/msg/mif/aeUJgJSlb6FWpGv4Pb9c65bjUWg
Cc: Yaron Sheffer <yaronf.ietf@gmail.com>, Valery Smyslov <svanru@gmail.com>, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: [mif] Securing Multiple Interfaces with IPsec
X-BeenThere: mif@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multiple Interface Discussion List <mif.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mif>, <mailto:mif-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mif/>
List-Post: <mailto:mif@ietf.org>
List-Help: <mailto:mif-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mif>, <mailto:mif-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Dec 2014 12:42:58 -0000

Hi,

We would like to inform you that the ipsecme WG has started an survey of
interest <http://www.ietf.org/mail-archive/web/ipsec/current/msg09442.html>
[1] for the draft-mglt-ipsecme-clone-ike-sa
<https://datatracker.ietf.org/doc/draft-mglt-ipsecme-clone-ike-sa/> [2].
This draft details how to set IPsec Security Associations with multiple
Interfaces. If you think this topic should or should not be addressed
please respond to this mail by December 8.

If you have any question regarding the document, feel free to let us know.

BR

Daniel and Valery (authors of the draft)

*I. Area that may benefit from this optimization:*

The main scenarios we envisioned IPsec with multiple interfaces were:
    - Offload from RAN to WLAN network
    - Resilience
    - Multiple Path TCP: I believe this is the optimal way to have IPsec
with multiple Path TCP for example.


*II. Scenarios that motivated the document*

Initial motivation for the document was to optimize setting IPsec
associations with devices that have more than one interface. Briefly
speaking, currently, setting an IPsec association with multiple interfaces
requires one authentication per interface. This introduces multiple delays,
especially when authentication requires multiple round trip. With the
optimization, we make it possible to configure it with a single
authentication. Authentication is performed on a single interface, and for
the other interfaces, IPsec authentication and settings is "replicated".

Another scenario that motivated us was load sharing between different
security gateways (each of them has its own IP addresses). In this case
client creates IKE SA with any of these security gateways and then could be
moved to another without re-authentication. Of course this assumes that
security gateways can communicate between each other and exchange IKE &
IPsec SA states.


[1] http://www.ietf.org/mail-archive/web/ipsec/current/msg09442.html
[2] https://datatracker.ietf.org/doc/draft-mglt-ipsecme-clone-ike-sa/

-- 
Daniel Migault
Orange Labs -- Security
+33 6 70 72 69 58