Hi again,

another issue that is added to the tracker - whether to  use
puzzles for protection against nefarious IKE peers after
IKE SA is established.

My opinion - using puzzles after IKE SA is established
is possible, but is not justified. It would significantly
complicate IKE state machine (I presume that the initiator
would have to be able to restart any exchange if it received
puzzle). On the other hand, after the IKE SA is established
the host has various means to deal with nefarious peer.
Some of them are listed in the draft, such as TEMPORARY_FAILURE and
NO_ADDITIONAL_SAS notifications, artificial delays,
limiting IKE window size to 1 etc.

Regards,
Valery.


#230: Use puzzles for DoS protection within an IKE SA

Earlier versions of the draft did not cover DoS by an authenticated
client. With the approval of NULL-auth, the fact that a peer has a valid
IKE SA is less of an indication that it is not an attacker.

At IETF 92 the question was asked if we wanted to use puzzles within
encrypted IKE, so that a peer with an IKE SA is not able to needlessly
rekey a child SA (with PFS), flood the responder with liveness checks, or
do other kinds of nefarious IKE.

--
-------------------------+-------------------------------------------------
Reporter:               |      Owner:  draft-ietf-ipsecme-ddos-
 ynir.i...@gmail.com    |  protect...@tools.ietf.org
    Type:  enhancement  |     Status:  new
Priority:  normal       |  Milestone:
Component:  ddos-        |   Severity:  Active WG Document
 protection             |
Keywords:               |
-------------------------+-------------------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/ipsecme/trac/ticket/230>
ipsecme <http://tools.ietf.org/ipsecme/>


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to