Re: [IPsec] Informal poll on IKEv2 { over TCP | fragmentation }

2013-03-14 Thread Brian Weis
My answer: - I would prefer the WG to continue working on IKEv2 over TCP If this is not the consensus, I agree with Yoav: I would prefer that we clear up the situation with Microsoft's IPR before working on standardizing IKEv2 fragmentation. Brian __

[IPsec] Informal poll on IKEv2 { over TCP | fragmentation }

2013-03-14 Thread Tero Kivinen
Paul Hoffman writes: > > > It is seeming that consensus is trending towards "let's document the > fragmentation method some vendors are already doing instead of > finishing IKEv2-over-TCP", but I would like to check that. Please > respond to the informal poll below. > > --Paul Hoffman > > - I

Re: [IPsec] IKE fragmentation

2013-03-14 Thread Yaron Sheffer
Hi Paul, Can't an off-path attacker DoS the gateway if they can guess the SPI values? We never mandated that SPIs should be random (except for RFC 6290, in Sec. 9.3, but this is rarely implemented), so implementations are free to use very small integers for the SPIs. In fact I think we should

[IPsec] BFD and IPsec

2013-03-14 Thread Michael Richardson
Do IPsec people know about: http://datatracker.ietf.org/wg/bfd/charter/ RFC5880 Description of Working Group The BFD Working Group is chartered to standardize and support the bidirectional forwarding detection protocol (BFD) and its extensions. A core goal of the working group is to standardiz

Re: [IPsec] Informal poll on IKEv2 { over TCP | fragmentation }

2013-03-14 Thread Paul_Koning
Our answer: - I would prefer the WG to stop working on IKEv2 over TCP and instead work on standardizing IKEv2 fragmentation paul On Mar 14, 2013, at 7:33 AM, Paul Hoffman wrote: > > > It is seeming that consensus is trending towards "let's document the > fragmentation method some ve

Re: [IPsec] Updated ESP/AH algorithm I-D

2013-03-14 Thread David McGrew (mcgrew)
Hi Sheila, Thanks for pointing this out. I agree that the draft needs to be changed to align with the ESP RFC. David On 3/12/13 10:01 AM, "Frankel, Sheila E." wrote: >Hi David and Wajdi, > >Your updated ESP/AH algorithm doc looks great, and is very much needed. I >just have one comment. You

Re: [IPsec] IKE fragmentation

2013-03-14 Thread Tero Kivinen
Paul Wouters writes: > Note that requires an observer that can see your cookies/spi. Yes. > Which would > mean a local attacker, whom could just as easilly send you nonsense > forged from the remote endpoint - as they are guaranteed to answer > faster. You'd be decrypting thousands of packets to

Re: [IPsec] IKE fragmentation

2013-03-14 Thread Valery Smyslov
>> What your draft does, is force the initiator to protect each >> fragment. To protect a fragment in a way that will cause the >> responder to store it, requires running the MAC function, and that >> in turn requires generating the keys (running the PRF), which in >> turn requires completing the

Re: [IPsec] IKE fragmentation

2013-03-14 Thread Paul Wouters
On Thu, 14 Mar 2013, Tero Kivinen wrote: As earlier explained not doing that allows very wasy DoS attack, which allows IKEv2 to finish by just sending very few packets, i.e. you send one corrupted fragment to the packet and if you do that before responder gets the correct fragment, the responder

Re: [IPsec] IKE fragmentation

2013-03-14 Thread Valery Smyslov
> There is no DH calculating per fragment. DH is calculated once in > IKE_SA_INIT > as in ordinary IKE SA establishment (note, that unprotected messages, > including IKE_SA_INIT > and IKE_SA_RESUME cannot be fragmented). If we do IKEv2 fragments the way everyone does IKEv1 fragments, the initi

Re: [IPsec] IKE fragmentation

2013-03-14 Thread Yoav Nir
On Mar 14, 2013, at 10:29 AM, Tero Kivinen wrote: > Yoav Nir writes: >>> There is no DH calculating per fragment. DH is calculated once in >>> IKE_SA_INIT as in ordinary IKE SA establishment (note, that >>> unprotected messages, including IKE_SA_INIT and IKE_SA_RESUME >>> cannot be fragmented).

Re: [IPsec] IKE fragmentation

2013-03-14 Thread Yoav Nir
On Mar 14, 2013, at 10:27 AM, Paul Wouters wrote: > On Thu, 14 Mar 2013, Yoav Nir wrote: > >> Measurably more, because MAC functions have an initialization part, so >> running it on a single packet by parts incurs the per-run overhead multiple >> times. See the differences in the throughput o

Re: [IPsec] IKE fragmentation

2013-03-14 Thread Tero Kivinen
Yoav Nir writes: > > There is no DH calculating per fragment. DH is calculated once in > > IKE_SA_INIT as in ordinary IKE SA establishment (note, that > > unprotected messages, including IKE_SA_INIT and IKE_SA_RESUME > > cannot be fragmented). > > If we do IKEv2 fragments the way everyone does IKE

Re: [IPsec] IKE fragmentation

2013-03-14 Thread Paul Wouters
On Thu, 14 Mar 2013, Yoav Nir wrote: Measurably more, because MAC functions have an initialization part, so running it on a single packet by parts incurs the per-run overhead multiple times. See the differences in the throughput of HMAC based on buffer size (obtained by running "opnessl speed

Re: [IPsec] IKE fragmentation

2013-03-14 Thread Yoav Nir
On Mar 14, 2013, at 9:38 AM, Valery Smyslov wrote: > Hi Yoav. > >> > I agree that term "authenticated" is a bit misleading here. >> > The better term would be "integrity protected". >> > In our proposal receiver can be absolutely sure that >> > each fragment comes from the very peer he/she exch

Re: [IPsec] Informal poll on IKEv2 { over TCP | fragmentation }

2013-03-14 Thread Valery Smyslov
- I would prefer the WG to stop working on IKEv2 over TCP and instead work on standardizing IKEv2 fragmentation I vote for this option. Valery. ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

Re: [IPsec] IKE fragmentation

2013-03-14 Thread Valery Smyslov
Hi Yoav. > I agree that term "authenticated" is a bit misleading here. > The better term would be "integrity protected". > In our proposal receiver can be absolutely sure that > each fragment comes from the very peer he/she exchanged > DH exponents and calculated shared secret with. > > All frag

Re: [IPsec] Informal poll on IKEv2 { over TCP | fragmentation }

2013-03-14 Thread Paul Wouters
On Thu, 14 Mar 2013, Yoav Nir wrote: "I would prefer the WG to stop working on IKEv2 over TCP and instead work on standardizing IKEv2 fragmentation" +1 However, I would prefer that we clear up the situation with Microsoft's IPR before making such a change to our charter. Less worried abo

Re: [IPsec] Informal poll on IKEv2 { over TCP | fragmentation }

2013-03-14 Thread Yoav Nir
On Mar 14, 2013, at 7:33 AM, Paul Hoffman wrote: > > > It is seeming that consensus is trending towards "let's document the > fragmentation method some vendors are already doing instead of finishing > IKEv2-over-TCP", but I would like to check that. Please respond to the > informal poll bel

[IPsec] Informal poll on IKEv2 { over TCP | fragmentation }

2013-03-14 Thread Paul Hoffman
It is seeming that consensus is trending towards "let's document the fragmentation method some vendors are already doing instead of finishing IKEv2-over-TCP", but I would like to check that. Please respond to the informal poll below. --Paul Hoffman - I would prefer the WG to continue workin