It looks to me like this "discovery" ends up being:

  1. a new end-node securely connecting to a known trusted server (hub)
  2. registering itself (attributes, protected subnets) with the hub
  3a. waiting for another end-node to find it via the hub, because that
      end-node has data traffic for it.
  3b. or trying to find another end-node via the hub, because it has
      data traffic for it.

Step 1. Is logically done using some level of IPsec, though I would say that
        you also need another tunneling protocol like GRE to facilitate the
        other steps.

Step 2. The Attribute part of step 2. could be done via IKE or NHRP. I would
        argue for using NHRP, since it already has the base functionality
        and it would be easy to add more attribute passing.

Step 2. The advertising of protected subnets, could be done using IKE or NHRP,
        but if you use either of these then you would end up creating another
        Routing Protocol, which seems like a waste of time when there are 
        routing protocols that you could use for this (RIP, OSPF, BGP).

        As end-nodes come and go access to the protected networks that
        they serve comes and goes. So you need to be able to dynamically
        advertise and revoke access to these protected subnets.

        Also to provide redundancy you will likely have at least two
        end-nodes (securuty gateways) that are providing access to the
        same set of protected subnets.  To provide different levels of
        load-balancing and redundnacy you are going to need to be able
        to prefer on path (SG) over another.

        All of these functions are capabilities that are already provided
        by routing protocols, so it would be a waste of time to have to
        provide inferior functionality in IKE.

        Note, if the end-node is a host that is only providing secure
        access to itself then perhaps it wouldn't need to advertise
        itself, the hub could add that advertisement into the network
        (routing protocol) on its behalf. 

Step 3a and 3b.  This functionality is already provided by NHRP.

Note, if you have two end-nodes in different security domains, then each
end-node is going to connect to its own trusted server (hub). Then any
attempt by the end-nodes to connect to each other will go through their 
respective hubs, and across a trusted interconnect between the hubs. At
that point any authorization and passing of security attributes that
the end-nodes need to use can be handled by their respective hub and then
the two end-nodes (if allowed) can build a direct secure connection and
send traffic to each other.

So by dividing this into securing traffic (IPsec), tunneling (GRE), finding
gloabl IP address of secure gateways/end-nodes (NHRP) and routing through
the VPN (routing protocol) you have solved the problem. 

Mike.

>We agree with Paul. It does look like overkill to us.
>
>We could have NHRP-like messaging. When a spoke establishes preconfigured
>spoke-to-hub (s2h), spoke will also does registration with HUB (policy,
>protected networks, PAD). Registration information would involve networks
>this particular spoke protects, SPD and PAD information.
>
>"Discovery" can be initiated by spoke or it could by hub.
>
>Spoke initiated:
>When spoke1 wants to spoke2, spoke1 sends resolution request to HUB. Hub,
>will resolves public IP address and SPD/PAD information of spoke2 to spoke1.
>Thus spoke1 can trigger direct tunnel to spoke2.
>
>Hub initiated:
>When spoke1 wants to talk to spoke2, it sends message to HUB via static
>tunnel (as generally done in HUB and Spoke scenario). Since HUB is aware
>of spoke2 information, HUB may ask spoke1 to establish direct tunnel to
>Spoke2.
>
>Today NHRP resolves IP addresses. Having NHRP-like, we may resolve 
>non-ip-address (like IKE ID Payload type). This will solve Mike Ko
>scenario, where user1 wants to talk to user2 (where users are not bound
>by IP address).
>
>Here user1 and user2 are similar to spoke1 and spoke2. Where user1 and
>user2 establish tunnel to HUB/universe/map-making, just like spokes do.
>
>-- Praveen
>________________________________________
>From: ipsec-boun...@ietf.org [ipsec-boun...@ietf.org] On Behalf Of Paul 
>Hoffman 
>[paul.hoff...@vpnc.org]
>Sent: Tuesday, November 29, 2011 5:48 PM
>To: Nico Williams
>Cc: IPsecme WG
>Subject: Re: [IPsec] Discovery (Was: Preparing a charter change for P2P VPN)
>
>On Nov 29, 2011, at 5:39 PM, Nico Williams wrote:
>
>> On Tue, Nov 29, 2011 at 7:31 PM, Paul Hoffman <paul.hoff...@vpnc.org wrote:
>> At this point, we are trying to state requirements. You have already ran
>> full-force into proposed solutions.
>>
>> Looking at the sorts of solutions that might be in scope can help me
>> understand the problem space by illustration, particularly when new
>> [to me] terminology is used that confuses me.  I'm proposing nothing
>> in particular so much as illustrative concepts.
>
>Noted.
>
>>> On Nov 29, 2011, at 2:17 PM, Nico Williams wrote:
>>>> As for nearest SG for a given administrative domain, well, I'm
>>>> thinking of anycasting and multicasting, as well as SRV RRs.
>>>
>>> That's "discovery by looking around". I propose that a much simpler
>>> solution is "discovery by listening for trusted parties to register
>>> with you their information". That is, the introducer has a list of
>>> trusted gateways (which might be other introducers), and it listens
>>> for them to tell it what addresses they are responsible for and the
>>> policies that are associated with them. There should also be a way
>>> for a gateway to ask an introducer what the introducer knows about
>>> the gateway.
>>
>> I see.  That makes sense, but you have to see the space of SGs or
>> other "introducers" that you know about.  They might multicast for
>> you to discover them.
>
>That's a push model; I would propose a pull model based on existing
>trust relationships. What do others think?
>
>--Paul Hoffman
>
>_______________________________________________
>IPsec mailing list
>IPsec@ietf.org
>https://www.ietf.org/mailman/listinfo/ipsec
>_______________________________________________
>IPsec mailing list
>IPsec@ietf.org
>https://www.ietf.org/mailman/listinfo/ipsec


+------------------------------------------------+
| Mike Sullenberger; DSE                         |
| m...@cisco.com                .:|:.:|:.         |
| Customer Advocacy              CISCO           |
+------------------------------------------------+
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to