Reminder... On Dec 26, 2010, at 11:38 AM, Yoav Nir wrote:
> Hi all. > > Issue #200 is about some text in section 8 ("Interaction with Session > Resumption"). The text says that a rebooted peer (and thus a defunct SA) may > go undetected for the lifetime of the SA. However, RFC 5996 says that at some > point, a peer that did not receive incoming traffic on a particular IKE SA or > its children, has to initiate a liveness check. > > Here's how I propose to resolve this. Seeing as it's the holiday season, I > won't close the issue until January 10th, but please get your comments in by > then. > > Existing text: > What Session Resumption does not help is the problem of detecting > that the peer gateway has failed. A failed gateway may go undetected > for as long as the lifetime of a child SA, because IPsec does not > have packet acknowledgement, and applications cannot signal the IPsec > layer that the tunnel "does not work". Before establishing a new IKE > SA using Session Resumption, a client should ascertain that the > gateway has indeed failed. This could be done using either a > liveness check (as in RFC 5996) or using the QCD tokens described in > this document. > > My proposed text: > What Session Resumption does not help is the problem of detecting > that the peer gateway has failed. A failed gateway may go undetected > for an arbitrarily long time, because IPsec does not have packet > acknowledgement, and applications cannot signal the IPsec layer that > the tunnel "does not work". Section 2.4 of RFC 5996 does not specify > how long an implementation needs to wait before beginning a liveness > check, and only says "not recently" (see full quote in Section 2). > In practice some mobile devices wait a very long time before > beginning liveness check, in order to extend battery life by allowing > parts of the device to remain in low-power modes. > > QCD tokens provide a way to detect the failure of the peer in the > case where liveness check has not yet ended (or begun). _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec