Re: [IPsec] I-D Action: draft-ietf-ipsecme-iptfs-12.txt

2021-11-08 Thread Christian Hopps


Paul Wouters  writes:


On Mon, 8 Nov 2021, internet-dra...@ietf.org wrote:


Filename: draft-ietf-ipsecme-iptfs-12.txt



A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-ipsecme-iptfs-12


Looks good to me other than a typo:  s/the they fall/they fall/

(but we can let the RFC editor fix that one without issuing a new draft)


Thanks, I've made the update locally to keep track of it as well.

Also, Yoav flagged "is comprised of" to me off-list, so I locally changed those to "consists 
of". There's a subgroup of language experts that really don't like people to use "is comprised 
of". :)

Thanks,
Chris.



Paul

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec




signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] I-D Action: draft-ietf-ipsecme-iptfs-12.txt

2021-11-08 Thread Michael Richardson

I've read the diff, and it looks good to me.
--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-





signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Comments on draft-smyslov-ipsecme-ikev2-auth-announce

2021-11-08 Thread Paul Wouters

On Mon, 8 Nov 2021, Tero Kivinen wrote:


Does the AuthMethod apply to the algorithms within the certificate
as well? The RFC should clarify this.


The reason for this notify is that if the peer has multiple key pairs
(i.e., private keys) it needs to pick one private key to sign the AUTH
payload with. If one of those private keys is using EC and another is
using RSA, then without this notification there is no way of knowing
which one to pick (except perhaps by prior configuration or by
heuristics based on the CERTREQ etc).


What will be in the notification then? Since the authenticaion method
for both is "RFC 7425 Digital Signatures" as per existing IANA registry
for IKEv2 Authentication Methods.

We would still need a new registry or we need to identify auth algorithms
by their SPKI similar to how we can signature supported hash algorithms.
But we would prob end up with seeing lots of duplicate entries with
slightly different SPKI prefixes.

The RSS-v1.5 vs RSS-PSS is a major pain right now, and implementations
using 7425 and specifying RSA-v1.5 SHA1 are a double pain as the RFCs
clearly doesn't allow that. We run into frequent interop issues with
these.

Paul

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] Comments on draft-smyslov-ipsecme-ikev2-auth-announce

2021-11-08 Thread Tero Kivinen
Scott Fluhrer \(sfluhrer\) writes:
> I’m glad to see this work; however I see a potentially important
> constraint on authentication that the current draft does not appear
> to address.
> 
> It allows the peers to specify which signature algorithms they
> accept; however if we are talking about certificates, those include
> internal signature algorithms, which may be different. One instance
> where I expect this to come up is that the root certificate may have
> a more conservative algorithm choice (e.g. a hash based signature,
> or one with NIST level 5) than the device certificates (which may
> have a short expiry time, and so being so conservative might not be
> necessary).
> 
> Does the AuthMethod apply to the algorithms within the certificate
> as well? The RFC should clarify this.

The reason for this notify is that if the peer has multiple key pairs
(i.e., private keys) it needs to pick one private key to sign the AUTH
payload with. If one of those private keys is using EC and another is
using RSA, then without this notification there is no way of knowing
which one to pick (except perhaps by prior configuration or by
heuristics based on the CERTREQ etc).

Also in some cases same private key can be used with multiple hashing
methods etc, thus indicating what formats of signature are accepted is
also needed.

On the other hand the signatures in the certificates are already
there, and the peers do not have any way of changing them, thus
negotiating what are accepted does not help. Peers can already send as
many certificates they want and they can also indicate the CAs they
trust using CERTREQs, so that should be enough for peers to get
algorithms in the certificates sorted out.

I.e., if they have multiple paths from certificate(s) matching their
private key they are going to use for signing to the trusted roots
trusted by other end, they can send all those paths out.

The one who gets all those certificate payloads will then search from
them, and from its local cache, or even querying more intermediate
certificates from the CA and form a trusted path from the one EE
certificate to any trusted root that matches the security policy
required for the that end.
-- 
kivi...@iki.fi

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] Comments on draft-smyslov-ipsecme-ikev2-auth-announce

2021-11-08 Thread Scott Fluhrer (sfluhrer)
I’m glad to see this work; however I see a potentially important constraint on 
authentication that the current draft does not appear to address.

It allows the peers to specify which signature algorithms they accept; however 
if we are talking about certificates, those include internal signature 
algorithms, which may be different.  One instance where I expect this to come 
up is that the root certificate may have a more conservative algorithm choice 
(e.g. a hash based signature, or one with NIST level 5) than the device 
certificates (which may have a short expiry time, and so being so conservative 
might not be necessary).

Does the AuthMethod apply to the algorithms within the certificate as well?  
The RFC should clarify this.


Listing the AlgorithmIdentifier’s for all the signature algorithms we can 
support seems unnecessarily chatty; would it be more prudent to extend the 
AuthMethod field to 16 bits (and so we (or IANA) would feel more free to dole 
them out?


And, finally, a typo: it’s P-521, not P-512 
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] WGLC for draft-ietf-ipsecme-rfc8229bis

2021-11-08 Thread Tero Kivinen
This is the start of 2 week WGLC on the draft-ietf-ipsecme-rfc8229bis
document, ending 2021-11-26.

Please submit your comments to the list, also send a note if you have
reviewed the document, so we can see how many people are interested in
getting this out.
-- 
kivi...@iki.fi

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] I-D Action: draft-ietf-ipsecme-iptfs-12.txt

2021-11-08 Thread Paul Wouters

On Mon, 8 Nov 2021, internet-dra...@ietf.org wrote:


Filename: draft-ietf-ipsecme-iptfs-12.txt



A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-ipsecme-iptfs-12


Looks good to me other than a typo:  s/the they fall/they fall/

(but we can let the RFC editor fix that one without issuing a new draft)

Paul

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike

2021-11-08 Thread Paul Wouters

On Mon, 8 Nov 2021, mohamed.boucad...@orange.com wrote:


Note the text of the draft claims it updates RFC 8598 but doesn't do so
via an Updates: statement.


[Med] We considered to have an "update" header because we were concerned with 
some MUSTs in 8598. We finally didn't include the update header because of a comment we 
received from you prior to publishing the first version of the draft. FWIW, here is the 
exchange we had at that time:

**
Med: I have a question for you: now that we don't depend anymore on 
INTERNAL_IP*_DNS and given that a client can be supplied with 8598 attributes 
and that 8598 says the following:

==
If an INTERNAL_DNS_DOMAIN attribute is
  included in the CFG_REPLY, the responder MUST also include one or
  both of the INTERNAL_IP4_DNS and INTERNAL_IP6_DNS attributes in the
  CFG_REPLY.

..

  the INTERNAL_DNS_DOMAIN attributes in a CFG_REPLY payload form a
  single list of Split DNS domains that applies to the entire list of
  INTERNAL_IP4_DNS and INTERNAL_IP6_DNS attributes.

==

Should we add an update to our daft to indicate that first "MUST" does not 
apply and that the domains are associated with **ANY** supplied server?

Paul: You cannot update that RFC for that kind of processing. The above really says that it makes 
no sense to have "internal domains" without providing "internal DNS servers".



Note that what I said there was that you should not update the _mechanism_
of how CFG requests/responds are done. You should use the existing
mechanism with a new value, but use the same negotation mechanism.

So the client sends FOO(x) and the server respones with FOO(y)

x can be empty (eg the client has no previous notion or preference for
FOO. Or if it has one, it can suggest it. The server takes that value
only as a preference of the client, but the server is the one making
the ultimate decsion if it returns "x" or "y".

So your draft should not say the initiator MUST send a zero size request
for FOO. That is changing the mechanism.

What I was saying in my last email was that making a protocol update
where a server receiving a INTERNAL_IP4_DNS may choose not to return
any INTERNAL_IP4_DNS is an update to the protocol that would require
the Updates: clause to warn implementers to read this document too,
as it updates older RFC text.


Also, I think the relaxing of the requirement

is actually wrong, as it might cause lack of interop between newer servers
and older clients not being able to negotiate working DNS if the new
servers no longer serve INTERNAL_IP*_DNS CFG payloads.


[Med] Older clients can always ask for INTERNAL_IP6_DNS or INTERNAL_IP4_DNS. We 
will update the note to make this clearer.


They can indeed. So I think you should just stick with the CFG request/response
semantics and not talk about omitting INTERNAL_IP*_DNS replies if the
client asks for those via CFG. This way, the ENC_DNS* payloads are
simply defined as new CFG options, and clients and servers will do the
right thing when encountering them. And it requires no Updates: clause
because it does not modify the behaviour with respect to
INTERNAL_IP*_DNS. You might want to say a client SHOULD prefer ENC_DNS*
servers over INTERNAL_IP*_DNS servers.




I am also not clear on the real use of negotiating hash algorithms for the
digest receiving of the ADD server "identity?", as the document states the
authentication happens as per Section 8 of [RFC8310] which lists WebPKI or
DANE authentication against the name and these methods do not use this
digest. I also do not understand the use of the digest. For
authentication, is it not needed as the entire IKEv2 exchange is
authenticated.


[Med] We added the digest to address one of the comments raised in a previous 
ipsecme meetings: allow to not rely on PKI for validating the encrypted DNS 
server certificate but convey the end-entity certificate in IKEv2 itself.


Ah, I see. I would probably use some different terminology then, and
extend the text talking aboyt "as per Section 8 of [RFC8310]" to
clarify that. I'll see about producing some text for you.

Paul

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike

2021-11-08 Thread mohamed.boucadair
Hi Paul, 

Please see inline.

Cheers,
Med

> -Message d'origine-
> De : IPsec  De la part de Paul Wouters
> Envoyé : lundi 8 novembre 2021 16:20
> À : Tero Kivinen 
> Cc : ipsec@ietf.org
> Objet : Re: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike
> 
> On Mon, 8 Nov 2021, Tero Kivinen wrote:
> 
> > Subject: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike
> >
> > This is the start of 2 week WG adoption call for this document, ending
> > 2021-11-22. Please send your reply about whether you support adopting
> > this document as WG document or not.
> 
> I support the idea of conveying a list of DNS servers that support
> encryption. I am not sure if this draft's format and content is the right
> way forward.

[Med] Thanks. The format can always be updated to reflect the feedback from the 
WG.

> 
> Note the text of the draft claims it updates RFC 8598 but doesn't do so
> via an Updates: statement.

[Med] We considered to have an "update" header because we were concerned with 
some MUSTs in 8598. We finally didn't include the update header because of a 
comment we received from you prior to publishing the first version of the 
draft. FWIW, here is the exchange we had at that time: 

**
Med: I have a question for you: now that we don't depend anymore on 
INTERNAL_IP*_DNS and given that a client can be supplied with 8598 attributes 
and that 8598 says the following:
 
==
If an INTERNAL_DNS_DOMAIN attribute is
   included in the CFG_REPLY, the responder MUST also include one or
   both of the INTERNAL_IP4_DNS and INTERNAL_IP6_DNS attributes in the
   CFG_REPLY. 
 
..
 
   the INTERNAL_DNS_DOMAIN attributes in a CFG_REPLY payload form a
   single list of Split DNS domains that applies to the entire list of
   INTERNAL_IP4_DNS and INTERNAL_IP6_DNS attributes.
 
==

Should we add an update to our daft to indicate that first "MUST" does not 
apply and that the domains are associated with **ANY** supplied server?

Paul: You cannot update that RFC for that kind of processing. The above really 
says that it makes no sense to have "internal domains" without providing 
"internal DNS servers".



 Also, I think the relaxing of the requirement
> is actually wrong, as it might cause lack of interop between newer servers
> and older clients not being able to negotiate working DNS if the new
> servers no longer serve INTERNAL_IP*_DNS CFG payloads.

[Med] Older clients can always ask for INTERNAL_IP6_DNS or INTERNAL_IP4_DNS. We 
will update the note to make this clearer. 

> 
> I am also not clear on the real use of negotiating hash algorithms for the
> digest receiving of the ADD server "identity?", as the document states the
> authentication happens as per Section 8 of [RFC8310] which lists WebPKI or
> DANE authentication against the name and these methods do not use this
> digest. I also do not understand the use of the digest. For
> authentication, is it not needed as the entire IKEv2 exchange is
> authenticated.

[Med] We added the digest to address one of the comments raised in a previous 
ipsecme meetings: allow to not rely on PKI for validating the encrypted DNS 
server certificate but convey the end-entity certificate in IKEv2 itself.

> 
> Paul
> 
> ___
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] WG adoption call for draft-smyslov-ipsecme-ikev2-auth-announce

2021-11-08 Thread Paul Wouters

On Mon, 8 Nov 2021, Tero Kivinen wrote:


draft-smyslov-ipsecme-ikev2-auth-announce

This is the start of 2 week WG adoption call for this document, ending
2021-11-22. Please send your reply about whether you support adopting
this document as WG document or not.


I support working on the idea. I am not sure if this document in its
current form, properly conveys the differences between supported,
accepted and unsupported, rejected. This is especially tricky in the
responder side that does not yet know the ID of the peer and cannot
lookup configuration details yet.

Also, as we have been merging authentication methods into RFC 7427
digital signature format, it is unclear to me how we can convey some
of these parameters using existing IANA registries, since the whole
point here was that we didnt need to create and maintain one. Eg if we
support or allow EDDSA or some new signature algorithm, we might not
have any IANA registry for it, and just stating "we support RFC 7427"
does not solve the actual problem.

Paul

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike

2021-11-08 Thread Paul Wouters

On Mon, 8 Nov 2021, Tero Kivinen wrote:


Subject: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike

This is the start of 2 week WG adoption call for this document, ending
2021-11-22. Please send your reply about whether you support adopting
this document as WG document or not.


I support the idea of conveying a list of DNS servers that support
encryption. I am not sure if this draft's format and content is the
right way forward.

Note the text of the draft claims it updates RFC 8598 but doesn't do so
via an Updates: statement. Also, I think the relaxing of the requirement
is actually wrong, as it might cause lack of interop between newer
servers and older clients not being able to negotiate working DNS if
the new servers no longer serve INTERNAL_IP*_DNS CFG payloads.

I am also not clear on the real use of negotiating hash algorithms for
the digest receiving of the ADD server "identity?", as the document
states the authentication happens as per Section 8 of [RFC8310]
which lists WebPKI or DANE authentication against the name and these
methods do not use this digest. I also do not understand the use of the
digest. For authentication, is it not needed as the entire IKEv2 exchange
is authenticated.

Paul

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] IPsecME Meeting minutes

2021-11-08 Thread Tero Kivinen
Here is IPsecME WG minutes. Thanks to minute takers, for making good
minutes and including enough of the discussion, especially for the
IPTFS issues. 
--
IP Security Maintenance and Extensions (IPsecME) WG

IETF 112 - Monday November 8th, 2021 12:00-14:00 UTC
https://meetings.conf.meetecho.com/ietf112/?group=ipsecme==1

Minutes by Paul Wouters, Donald Eastlake, and Jonathan Hammell.

Agenda bashing - no changes.

# Agenda

- Note Well, technical difficulties and agenda bashing - 
  Chairs (5 min)
- Document Status -
  Chairs (10 min)
- Work items
  - IPTFS
Christian Hopps (20 min)
  - Quantum-resistant IKEv2 and big keys
Stefan-Lukas Gazdag and Daniel Herzinger (10 min)
  - Group Key Management using IKEv2
Valery Smyslov (10 min)
  - Announcing Supported Authentication Methods in IKEv2
Valery Smyslov (10 min)
- AOB + Open Mic (55 min)

# WG Status Update

Non-adopted documents not listed in the WG Status Report haven't had recent 
activity, so if editors wish to progress they will need updating.

Mohamed Boudacair (on Jabber): Question about draft-btw-add-ipsecme-ike.
Tero: Yes. I think that is ready and we should probably start an adoption.

# Work items
## IPTFS
Christian Hopps, draft-ietf-ipsecme-iptfs

WGLC completed in February 2021.  Versions -08-11 cover post WGLC comments. 
Clarified that the reorder window should be small. Recommend use of drop timer 
instead of reorder window to address packet loss. One last issue from Tero (Oct 
31) to resolve.

Tero presented on the problem he sees 
(slides-112-ipsecme-ip-traffic-flow-security-reorderlost-frame-issue-00). 

Christian: The drop timer is meant to address the delay of inner packets when 
there is a lost frame.

Tero: If IPTFS is fixing reordering, that is a service IPsec wasn't defined for.

Christian: Indeed, we are also defining aggregation of packets and fixing the 
MTU issues with fragmentation, IPTFS is a new technologoy that does new things.

Christian: Reorder window is useful in non-constant send-rate scenarios. Drop 
timer fixes the issue.

Ben Kaduk summarized the discussion up to this point. 

Christian: The drop timer determines the delay. The text should already 
indicate this.

Ben: Others in broader IETF may have thoughts on this. 

Christian: Using MAYs in Tero's text allows for either behaviour. Should not 
wait to publish.

Ben: Prefer to pick a single solution that we are comfortable with. 

Lou Berger: Protocols are not built to handle massive reorder windows. Some 
delay is acceptable. Seems risky to recommend SHOULD in Tero's text. It makes a 
strong assumption on applications. We don't have the operational experience. 
Could live with MAY. 

Valery Smyslov: Processing in reordered flow may cause congestion when the 
group of inner packets sent. Transport recommendations should be in the draft.

Christian: This is still an area of study for the transport area.

Tero: Clarified that Valery was recommending documenting the effects of the 
different scenarios on the flow (will be bursty or delayed) but not on higher 
protocols.

Ben: There are many things we could document, but we might have to be careful 
about too much. There are many different applications and it will be difficult 
to give recommendations. Using MAY in both places in the text will allow for 
this.

Tero: Could live with MAY. Recommend renaming the 'drop timer' as 'lost timer'. 
Should also include a note on the burstiness of inner packets with out-of-order 
outer packets.

Lou: delay and burstiness is documented in the text already.

Yoav: Should have a recommendation for the length of the packet lost timer.

Deb Cooley (in Jabber): Timer could be proportional to the tunnel rate.

Christian: Will publish new draft based on the above agreements/comments.

## Quantum-resistant IKEv2 and Big Keys
Stefan-Lukas Gazdag, Daniel Herzinger, 
slides-112-ipsecme-quantum-resistant-ikev2-and-big-keys-00

Motivation to use of McEliece KEM. Implemented IKE_INTERMEDIATE, Muliple-KE, 
and Beyond-64KB drafts, using UDP rather than mixed-mode. First slide 100 Mbps. 
As long as packet loss rate is not too high, around 10 seconds for SA 
establishment. May be acceptable for high-security scenarios. Second slide is 1 
Mbps. The handshake takes much too long. This draft does not seem to be 
appropriate for this use case. 

Large key sizes of McEliece could cause memory-exhaustion leading to denial of 
service attack. Recommend sending large KEs after the AUTH exchange. 

Valery: Using UDP in unreliable networks is not desirable and is why mixed-mode 
was introduced. A single classical and single post-quantum exchange may not be 
desired in all scenarios; Multiple-KE gives much more flexibility. 

Scott Fluhrer: Questioned whether a 20 second delay was acceptable. Often a 
single gateway talks to many clients coming in at the same time. How would this 
proposal be affected?

Daniel: Hopefully the 

Re: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike

2021-11-08 Thread mohamed.boucadair
Hi Tero, all, 

I support adoption. 

FWIW, I'm not aware of any IPR related to this I-D.

Cheers,
Med

> -Message d'origine-
> De : IPsec  De la part de Tero Kivinen
> Envoyé : lundi 8 novembre 2021 15:17
> À : ipsec@ietf.org
> Objet : [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike
> 
> This is the start of 2 week WG adoption call for this document, ending
> 2021-11-22. Please send your reply about whether you support adopting this
> document as WG document or not.
> --
> kivi...@iki.fi
> 
> ___
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] WGLC for draft-ietf-ipsecme-g-ikev2

2021-11-08 Thread Tero Kivinen
This is the start of 2 week WGLC on the draft-ietf-ipsecme-g-ikev2
document, ending 2021-11-26.

Please submit your comments to the list, also send a note if you have
reviewed the document, so we can see how many people are interested in
getting this out.
-- 
kivi...@iki.fi

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] The IPSECME WG has placed draft-smyslov-ipsecme-ikev2-auth-announce in state "Call For Adoption By WG Issued"

2021-11-08 Thread IETF Secretariat


The IPSECME WG has placed draft-smyslov-ipsecme-ikev2-auth-announce in state
Call For Adoption By WG Issued (entered by Tero Kivinen)

The document is available at
https://datatracker.ietf.org/doc/draft-smyslov-ipsecme-ikev2-auth-announce/


___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] The IPSECME WG has placed draft-btw-add-ipsecme-ike in state "Call For Adoption By WG Issued"

2021-11-08 Thread IETF Secretariat


The IPSECME WG has placed draft-btw-add-ipsecme-ike in state
Call For Adoption By WG Issued (entered by Tero Kivinen)

The document is available at
https://datatracker.ietf.org/doc/draft-btw-add-ipsecme-ike/


___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] WG adoption call for draft-smyslov-ipsecme-ikev2-auth-announce

2021-11-08 Thread Tero Kivinen
This is the start of 2 week WG adoption call for this document, ending
2021-11-22. Please send your reply about whether you support adopting
this document as WG document or not.
-- 
kivi...@iki.fi

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] WG Adoption call for draft-btw-add-ipsecme-ike

2021-11-08 Thread Tero Kivinen
This is the start of 2 week WG adoption call for this document, ending
2021-11-22. Please send your reply about whether you support adopting
this document as WG document or not.
-- 
kivi...@iki.fi

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] I-D Action: draft-ietf-ipsecme-iptfs-12.txt

2021-11-08 Thread internet-drafts


A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Security Maintenance and Extensions WG of 
the IETF.

Title   : IP-TFS: Aggregation and Fragmentation Mode for ESP 
and its Use for IP Traffic Flow Security
Author  : Christian Hopps
Filename: draft-ietf-ipsecme-iptfs-12.txt
Pages   : 31
Date: 2021-11-08

Abstract:
   This document describes a mechanism for aggregation and fragmentation
   of IP packets when they are being encapsulated in ESP payload.  This
   new payload type can be used for various purposes such as decreasing
   encapsulation overhead for small IP packets; however, the focus in
   this document is to enhance IPsec traffic flow security (IP-TFS) by
   adding Traffic Flow Confidentiality (TFC) to encrypted IP
   encapsulated traffic.  TFC is provided by obscuring the size and
   frequency of IP traffic using a fixed-sized, constant-send-rate IPsec
   tunnel.  The solution allows for congestion control as well as non-
   constant send-rate usage.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-iptfs/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-iptfs-12

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-ipsecme-iptfs-12


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Cost-efficient quantum-resistant DoS protection

2021-11-08 Thread Yoav Nir


> On 1 Nov 2021, at 13:07, Valery Smyslov  wrote:
> 
> Hi Michael,
> 
>> Tero Kivinen  wrote:
 Even without surpassing the 64KB limit, this must be a concern.
 IKEv2's cookie mechanism and puzzles try to increase the cost of the
 attacker per each connection. Now, an attacker must still accept
 these costs but can use one connection to trigger several key
 exchanges, all significantly larger than what we had with DH, making
 the trade-off way better for them compared to non-pqc IKEv2.
>> 
>>> No it cannot. Attacker can use cookie only once, and will only get one
>>> exchange created by each cookie exchange, thus it needs to do puzzles
>>> and cookies again for every single attack packet it wants to send.
>> 
>> I wonder if anyone has any stats on how often cookie challenge is used, how
>> often puzzles are invoked.
> 
> I've implemented puzzles, but I'm not aware of any other implementation.
> 
> What about cookies - in stress tests they are used very intensively.
> But I don't have any real life stats for them.
> 
> Regards,
> Valery.

I also implemented puzzles. So that makes two of us.

Yoav___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec