Re: [Tcpcrypt] New version of the charter text

Joe Touch <touch@isi.edu> Wed, 30 April 2014 15:09 UTC

Return-Path: <touch@isi.edu>
X-Original-To: tcpcrypt@ietfa.amsl.com
Delivered-To: tcpcrypt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2D341A6FD7 for <tcpcrypt@ietfa.amsl.com>; Wed, 30 Apr 2014 08:09:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.551
X-Spam-Level:
X-Spam-Status: No, score=-2.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W6zcksukhrJd for <tcpcrypt@ietfa.amsl.com>; Wed, 30 Apr 2014 08:09:53 -0700 (PDT)
Received: from darkstar.isi.edu (darkstar.isi.edu [128.9.128.127]) by ietfa.amsl.com (Postfix) with ESMTP id 375481A6FBB for <tcpcrypt@ietf.org>; Wed, 30 Apr 2014 08:09:53 -0700 (PDT)
Received: from [192.168.1.93] (pool-71-105-87-112.lsanca.dsl-w.verizon.net [71.105.87.112]) (authenticated bits=0) by darkstar.isi.edu (8.13.8/8.13.8) with ESMTP id s3UF9D2r013184 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Wed, 30 Apr 2014 08:09:16 -0700 (PDT)
Message-ID: <53611219.2030106@isi.edu>
Date: Wed, 30 Apr 2014 08:09:13 -0700
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: Tero Kivinen <kivinen@iki.fi>
References: <53576572.5030805@it.uc3m.es> <53589161.4090700@mti-systems.com> <20140424155532.GR43976@funkthat.com> <21342.18899.736731.804370@fireball.kivinen.iki.fi> <535E71E8.6020001@isi.edu> <21344.65512.465866.311361@fireball.kivinen.iki.fi>
In-Reply-To: <21344.65512.465866.311361@fireball.kivinen.iki.fi>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpcrypt/-QgOlQzqclx6323dK3NX1Nm5VNg
Cc: Wesley Eddy <wes@mti-systems.com>, John-Mark Gurney <jmg@funkthat.com>, tcpcrypt@ietf.org
Subject: Re: [Tcpcrypt] New version of the charter text
X-BeenThere: tcpcrypt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion list for adding encryption to TCP." <tcpcrypt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpcrypt/>
List-Post: <mailto:tcpcrypt@ietf.org>
List-Help: <mailto:tcpcrypt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpcrypt>, <mailto:tcpcrypt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Apr 2014 15:09:55 -0000

On 4/30/2014 6:51 AM, Tero Kivinen wrote:
> Joe Touch writes:
>>> The current IPsec specifications (IKEv2, RFC5996) do specify how rekey
>>> happens and it is specified so that no packets are lost: i.e. first
>>> create new Child SA proactively, i.e. before the old Child SA expires;
>>> then wait for traffic to move to this new SA (i.e. when you see
>>> packets on new Child SA, you know that other end has installed it);
>>> and only then remove old Child SA.
>>
>> You can't ensure that no packets are lost that way. Once you transition
>> to a new SA - even if you coordinate that handoff - there may be
>> out-of-order packets that arrive after that coordination.
>
> The timer to delete the old SA after the new is up (and we are seeing
> traffic on the new SA) are usually in order of 5-10 seconds or
> something like that, just to take care of the old packets.
>
> If the out-of-order packet is delayed by more than 5-10 seconds before
> it finally arrive to the other peer, it might already be dropped by
> the replay window checks (depending how big window you are using), and
> it would most likely already been considered as being lost by the
> upper layers.

But in that case the replay prevention would be dropping packets that 
could be valid (i.e., they're only replayed if the particular byte range 
overlaps, but merely if it's "earlier than expected".

...
> I.e. in normal case there is no lost packets.

You just said that replay would drop them - that's a drop TCP would see 
too.

Joe