Re: [IPsec] Puzzles in IKEv2

2015-03-06 Thread Yaron Sheffer
Please keep it a SHOULD, but include the explanation. Thanks, Yaron On 03/06/2015 09:50 PM, Valery Smyslov wrote: Hi Yaron, Hi Valery, Sorry if I was inconsistent on this one. This is a performance optimization, and it's a trade off for the responder: Do I want to cache keys, thereb

Re: [IPsec] Puzzles in IKEv2

2015-03-06 Thread Valery Smyslov
Hi Yaron, Hi Valery, Sorry if I was inconsistent on this one. This is a performance optimization, and it's a trade off for the responder: Do I want to cache keys, thereby saving on CPU but wasting more memory on potentially useless SAs? So I suggest to make it a MAY, not a SHOULD. At this

Re: [IPsec] Puzzles in IKEv2

2015-03-06 Thread Yaron Sheffer
Hi Valery, Sorry if I was inconsistent on this one. This is a performance optimization, and it's a trade off for the responder: Do I want to cache keys, thereby saving on CPU but wasting more memory on potentially useless SAs? So I suggest to make it a MAY, not a SHOULD. Thanks, Yar

Re: [IPsec] Puzzles in IKEv2

2015-03-06 Thread Valery Smyslov
What else could we recommend to do in this situation? If responder deletes IKE SA in case it receives IKE_AUTH message that doesn't pass ICV check, then it would give an attacker an easy way to prevent legitimate initiator to connect - just monitor the network and once IKE_SA_INIT from the legitim

Re: [IPsec] Puzzles in IKEv2

2015-03-06 Thread Tero Kivinen
Valery Smyslov writes: > > Thanks for the detailed clarification, and I still disagree... This > > situation is very unlikely with correctly functioning peers, and I don't > > think we should recommend acting on unauthenticated information, even if > > it slightly improves performance. Actually,

Re: [IPsec] Puzzles in IKEv2

2015-03-05 Thread Valery Smyslov
Hi Yaron, Hi Valery, Thanks for the detailed clarification, and I still disagree... This situation is very unlikely with correctly functioning peers, and I don't think we should recommend acting on unauthenticated information, even if it slightly improves performance. Actually, I think it is

Re: [IPsec] Puzzles in IKEv2

2015-03-05 Thread Yaron Sheffer
Hi Valery, Thanks for the detailed clarification, and I still disagree... This situation is very unlikely with correctly functioning peers, and I don't think we should recommend acting on unauthenticated information, even if it slightly improves performance. Actually, I think it is a prototypi

Re: [IPsec] Puzzles in IKEv2

2015-03-04 Thread Valery Smyslov
Hi Yaron, Hi Valery, to make it easier for everyone, I suggest that you submit a new draft version. I completely agree with you - the amount of changes makes it difficult to track them. We will definitely issue a new version shortly. Commenting on the pull request, specifically: "If the p

Re: [IPsec] Puzzles in IKEv2

2015-03-04 Thread Yaron Sheffer
Hi Valery, to make it easier for everyone, I suggest that you submit a new draft version. Commenting on the pull request, specifically: "If the puzzle is successfully verified and the SK_* key are calculated, but the message authenticity check fails, the responder SHOULD save the calculate

[IPsec] Puzzles in IKEv2

2015-03-03 Thread Valery Smyslov
Hi all, I've updated my previous pull request. The source file and changes are available at https://github.com/ietf-ipsecme/drafts/pull/2 Now it is completely described using puzzles in the IKE_SA_INIT and IKE_AUTH exchanges. Payload formats and IANA considerations are also provided. Regard