Sure we are, but I didn't want to start the discussion, because QCD is my 
proposal.

Hopefully we've learned something from the history of XAuth vs Hybrid, and we 
won't end up with two non-interoperable, proprietary ways of doing this, 
neither of which makes it to RFC.  I think that failure led to the rise of L2TP 
client and maybe even the SSL VPN client.

On Jul 7, 2010, at 8:02 PM, Paul Hoffman wrote:

> [[ This topic generated a fair amount of discussion in the past; are folks 
> still interested? ]]
> 
> Greetings again. The WG has one item on our charter that we have barely 
> discussed, namely failure detection. The charter item says that the work item 
> is:
> 
>> - A standards-track IKEv2 extension that allows an IKE peer to quickly and 
>> securely detect that its opposite peer, while currently reachable, has lost 
>> its IKEv2/IPsec state. Changes to how the peers recover from this situation 
>> are beyond the scope of this work item, as is improving the detection of an 
>> unreachable or dead peer. Ideas from draft-nir-ike-qcd-05 and 
>> draft-detienne-ikev2-recovery-03 can be used as starting points.
> 
> I gave a brief presentation on failure detection at the last IETF meeting in 
> Anaheim. The slides are at 
> <http://www.ietf.org/proceedings/77/slides/ipsecme-4.pdf>, and the following 
> is directly derived from them.
> 
> The basic problem being covered by the new extension is:
> -  Alice and Bob have SAs up and ESP traffic is flowing, but then Bob crashes
> -  Alice keeps sending ESP to Bob
> -  When Bob finally comes back up, he replies to Alice's ESP with INVALID_SPI 
> notifications
> -  Alice starts sending IKE liveness checks until she is "sure" that the 
> INVALID_SPI responses are not a DoS attack; this could be "several minutes"
> -  Then Alice rekeys
> 
> Some other problem cases include:
> -  Bob has two gateways in some failover architecture. One gateway goes down, 
> the other gateway detects this and wants to tell Alice to rekey
> -  Bob has a bunch of gateways in some load-balancing or cluster 
> architecture. One gateway is taken down on purpose, and the system wants to 
> tell Alice to rekey
> -  Protocol robustness:  Bob's gateway loses the SA without going down
> 
> Our primary goal is that, as soon as Bob starts sending INVALID_SPI responses 
> to Alice's ESP traffic, Bob and Alice should be able to quickly determine 
> that this is not an attack and therefore they probably want to rekey right 
> away. Note that if Bob and Alice are also using session resumption, they can 
> use that instead of rekeying; however, in the discussion here, we always use 
> "rekey" to mean "rekey or, if appropriate, resume". The proposed extension 
> does not include the actual rekeying, just the context for them to do it now.
> 
> The WG has seen two proposed solutions, QCD and SIR. The following are brief 
> summaries of the two proposals.
> 
> In QCD (<http://tools.ietf.org/html/draft-nir-ike-qcd>), Bob gives Alice a 
> secret token in the AUTH exchange, and then puts the token in his INVALID_SPI 
> response as a way to say "this SPI is gone". Bob must remember his tokens 
> across reboots, or derive tokens from a master token that he memorizes across 
> reboots, and Alice must remember the token (or a hash of it) for each SA.
> 
> In SIR (<http://tools.ietf.org/html/draft-ditienne-ikev2-recovery>), Alice 
> sends a new Check_SPI query with a stateless cookie, essentially asking "do 
> you really not know about this
> SPI?"; Bob responds by saying "I'm sure I don't know that SPI". Nothing is 
> stored on either side, so a man-in-the-middle can attack this to cause an 
> unnecessary rekey just as they can normal IKE.
> 
> The first task for the WG is to decide which of these two quite different 
> approaches to take. After we have done that, we can then hone the chosen 
> proposal. During earlier discussion of the proposals, the following criteria 
> were mentioned as ones that the WG should consider when thinking about the 
> approaches:
> 
> -  Support for different scenarios (load balancers, active clusters, failover)
> -  Security from man-in-the-middle DoS attacks
> -  Resources used
> -  Intellectual property rights
> 
> So: please start discussing the two proposals with respect to these criteria 
> or other criteria that are important to you. In a few weeks (hopefully well 
> before the Maastricht meeting), I make a call for consensus and see where it 
> leads us.
> 
> --Paul Hoffman, Director
> --VPN Consortium
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
> 
> --Paul Hoffman, Director
> --VPN Consortium
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
> 
> Scanned by Check Point Total Security Gateway.

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to