Re: [IPsec] [tsvwg] TSVDIR-ish reviewofdraft-ietf-ipsecme-ikev2-fragmentation-04

2013-10-28 Thread Valery Smyslov
While I agree with you in general, I think that IKE has its own peculiarity, that makes things a bit different. There is a difference between IPv6 and IPv4. In IPv6 one can assume, that packets below 1280 bytes will not be fragmented en route. This leaves enough room to make IKE level fragmentati

Re: [IPsec] TSVDIR-ish reviewofdraft-ietf-ipsecme-ikev2-fragmentation-04

2013-10-28 Thread Valery Smyslov
Consider the situation when IKE responder is under attack via IP fragmentation (no matter which - poisoning attack or memory exhausting attack). In any case responder will not be able to reply. After some (short) timeout initiator will try to apply IKE Fragmentation. Then, if those new messages ar

Re: [IPsec] Some comments on draft-detienne-dmvpn-00

2013-10-28 Thread Mike Sullenberger (mls)
Lou, Thanks, again answer inline :-). Mike. Mike Sullenberger, DSE m...@cisco.com    .:|:.:|:. Customer Advocacy  CISCO > -Original Message- > From: Lou Berger [mailto:lber...@labn.net] > Sent: Thursday, October 24, 2013 8:57 AM > To: Mike Sullenberger (mls) > Cc: IPs

Re: [IPsec] TSVDIR-ish reviewofdraft-ietf-ipsecme-ikev2-fragmentation-04

2013-10-28 Thread Joe Touch
On 10/27/2013 10:41 PM, Valery Smyslov wrote: Always setting DF bit in this case will probably increase the delay before IKE SA is set up (as more probes will need to be done). Except that if you continue to allow IP fragmentation, you can't claim your solution is robust to IP fragment poison

Re: [IPsec] [tsvwg] TSVDIR-ish reviewofdraft-ietf-ipsecme-ikev2-fragmentation-04

2013-10-28 Thread Joe Touch
On 10/27/2013 11:20 PM, Yoav Nir wrote: I guess the idea is that if the packet is still bigger than the PMTU, then the IKE host gets back a "fragmentation needed" ICMP, and the IKE daemon learns of that and resends packets with appropriately small size. There are some issues with this: You p

Re: [IPsec] [tsvwg] TSVDIR-ish reviewofdraft-ietf-ipsecme-ikev2-fragmentation-04

2013-10-28 Thread Yoav Nir
OK, you convinced me. 576 is the right value to recommend for initiator. Not sure if for responder it's also preferable to use 576, or to go with the idea in 2.5.1 of using the fragment size from the request. Yoav -Original Message- From: Tero Kivinen [mailto:kivi...@iki.fi] Sent: Mond

Re: [IPsec] [tsvwg] TSVDIR-ish reviewofdraft-ietf-ipsecme-ikev2-fragmentation-04

2013-10-28 Thread Tero Kivinen
Yoav Nir writes: > 3. While the TCP stack has access to these ICMP packets and the > PMTU that they convey, a userspace IKE daemon usually doesn't. See > [1] for how people suggest doing it in C#. Actually for example our code tries to get ICMP messages for IKE packets, mostly so that we can ma

[IPsec] draft-ietf-ipsecme-ikev2-fragmentation-04

2013-10-28 Thread Tero Kivinen
I have reviewed this draft again. I tihnk we should add bit more in to the introduction. I.e explain the common case for this protocol is to fragment exactly ONE message pair (IKE_AUTH), and those messages are most commonly around 500-3000 bytes long. For example to do proper PMTU for sending exa

Re: [IPsec] Working Group Last Call: draft-kivinen-ipsecme-signature-auth-02

2013-10-28 Thread Tero Kivinen
Pekka Riikonen writes: > > The ASN.1 used here are the same ASN.1 which is used in the > AlgorithmIdentifier of the PKIX (Section 4.1.1.2 of [RFC5280]). The > > It should specify encoding rules, even though it references RFC5280. So > this could say something like: > > The ASN.1 u

Re: [IPsec] Working Group LastCall:draft-kivinen-ipsecme-signature-auth-02

2013-10-28 Thread Tero Kivinen
Valery Smyslov writes: > > And you can always retry when you notice that you get authentication > > error after using private key, provided you have multiple types of > > keys. > > In general you can't if it is responder who selected wrong key. That is something I realized on our way home, but i