I'm ok with Dave's proposed text, with or without Tero's proposed changes.
Apologies for missing the fact that it is not strictly man-in-the-middle attack. Certainly the attacker won't be able to take advantage of the revelation if he is not in the middle, but it's still improper to reveal the token. I share Tero's concern with the general usefulness of Section 5.2. I think it's fine to keep it there, but I agree that his "made impossible" observation is absolutely essential for its use. That was the motivation behind my "important to note," although I am ok with removing that phrase. Scott Moonen (smoo...@us.ibm.com) z/OS Communications Server TCP/IP Development http://www.linkedin.com/in/smoonen From: Tero Kivinen <kivi...@iki.fi> To: Paul Hoffman <paul.hoff...@vpnc.org> Cc: ipsec@ietf.org Date: 02/14/2011 08:14 AM Subject: Re: [IPsec] Failure Detection - issue #202 Sent by: ipsec-boun...@ietf.org Paul Hoffman writes: > > A token maker MUST NOT send a QCD token in an unprotected > > message for an existing IKE SA. > > > > This requirement is obvious and easy in the case of a single gateway. > > However, some implementations use a load balancer to divide the load > > between several physical gateways. In such configuration it MUST NOT > > be possible to trick one gateway into sending a QCD token for an > > IKE SA which exists on another gateway. This is true whether the > > an attacker uses the token taker's IP address or a different IP > > address. > > > > Because it includes the token taker's IP address in the token > > generation, the method in Section 5.2 prevents revealing the QCD > > token for an existing pair of IKE SPIs to an attacker who is using a > > different IP address. I think this paragraph should be reformatted to include Section 5.2 in the beginning, so it would emphasize that this is case 1, i.e: The method in Section 5.2 prevents revealing the QCD token for an existing pair of IKE SPIs to an attacker who is using a different IP address by including the token taker's IP addres in the token generation. > > Note that the use of this method causes the > > tokens to be invalidated whenever the token taker's address changes. I am not sure that this paragraph belongs here, as it should already be mentioned in the section 5.2 and this is not a security issue.. I would remove the whole paragraph. > > It is also important to note that this method does not prevent > > revealing the QCD token to a man-in-the-middle attacker who is > > spoofing the token taker's IP address. Such an attacker may attempt > > to direct messages to a cluster member other than the member > > responsible for the IKE SA in an attempt to trick that gateway into > > sending a QCD token for an existing IKE SA. I think removing things like "It is also important to note ..." type of text, as they do not really help understanding the problem, i.e: This method does not prevent revealing the QCD token to a active attacker who is spoofing the token taker's IP address. Such an attacker may attempt to direct messages to a cluster member other than the member responsible for the IKE SA in an attempt to trick that gateway into sending QCD token for an existing IKE SA. (Also replaced man-in-the-middle as the attacker is not necessarely man-in-the-middle (http://en.wikipedia.org/wiki/Man-in-the-middle_attack) but instead simply active attacker sending faked packets). > > IPsec Failure Detection is not applicable to deployments where the QCD > > token is shared by multiple gateways and the gateways cannot assess > > whether the token can be legitimately sent in the clear while another > > gateway may actually still own the SA's. Load balancer configurations > > typically fall in this category. In order for a load balancing > > configuration of IPsec gateways to support this specification, > > all members MUST be able to tell whether a particular IKE SA is active > > anywhere in the cluster. One way to do it is to synchronize a list of > > active IKE SPIs among all the cluster members. I think this paragraph should perhaps be before the text about section 5.2, as this is more generic. > OK, let's have an extra round before we go to IETF Last Call. If no one > disagrees with Dave's new wording before Tuesday, Feb 15, I will ask the > authors to put it in a new draft. Actually by reading the section 5.2 text, it is does not give any way to actually safely use section 5.2 token generation in load balancing cases. I think people who wanted the section 5.2 text here wanted to actually use it in load balancing cases, and in their setup it was made impossible to forward packets with one load balancing gateways destination address to another gateway, i.e. made it impossible for the attacker to trick gateway sending QCD token for an existing IKE SA. -- kivi...@iki.fi _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec
<<inline: graycol.gif>>
_______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec