[IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-10 Thread Yoav Nir
Yaron: The security considerations are focused on details of the QCD solution, rather then on the threats we are dealing with. These threats are non-trivial to describe, since an active MITM attacker can easily cause an IKE SA to be reset. OTOH, we don't want an active non-MITM attacker to be ab

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-20 Thread Yoav Nir
One week, and no replies... I will leave this issue open unless I get some suggested security considerations text. The first paragraph in section 10.1 says the following. What else is missing? Tokens MUST be hard to guess. This is critical, because if an attacker can guess the token asso

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-20 Thread David Wierbowski
ave bigger issues. Dave Wierbowski From: Yoav Nir To: IPsecme WG Date: 10/20/2010 04:10 AM Subject:Re: [IPsec] Issue #194 - Security Considerations should discuss the threat Sent by:ipsec-boun...@ietf.org One week, and no replies... I will leave

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-20 Thread Yoav Nir
reset? I would think he >> could only do so if he hi-jacked the original IKE_SA negotiation and is >> now impersonating the remote security endpoint. In that case you have >> bigger issues. >> >> Dave Wierbowski >> >> >> >> >>

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-20 Thread Yaron Sheffer
[IPsec] Issue #194 - Security Considerations should discuss the threat Sent by:ipsec-boun...@ietf.org One week, and no replies... I will leave this issue open unless I get some suggested security considerations text. The first paragraph in section 10.1 says the following. What else i

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-20 Thread Yaron Sheffer
could only do so if he hi-jacked the original IKE_SA negotiation and is now impersonating the remote security endpoint. In that case you have bigger issues. Dave Wierbowski From: Yoav Nir To: IPsecme WG Date: 10/20/2010 04:10 AM Subject: Re: [IPsec] Issue #194 - Security Cons

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-20 Thread David Wierbowski
heffer To: Yoav Nir Cc: David Wierbowski/Endicott/i...@ibmus, IPsecme WG Date: 10/20/2010 10:21 AM Subject: Re: [IPsec] Issue #194 - Security Considerations should discuss the threat In fact I was referring to the whole extension. OK, since you&#x

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-20 Thread Yaron Sheffer
bigger issues. Dave Wierbowski From: Yoav Nir To: IPsecme WG Date: 10/20/2010 04:10 AM Subject:Re: [IPsec] Issue #194 - Security Considerations should discuss the threat Sent by:ipsec-boun...@ietf.org One week, and no replies... I will leave

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-21 Thread Tero Kivinen
David Wierbowski writes: > Thanks for your answers, but I should have been more specific in my > question. I was not asking how a MITM could break IKE. I was asking for > an example of how draft-ietf-ipsecme-failure-detection-01 increases the > risk over what we have today in IKE. That's what I'

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-21 Thread Yoav Nir
On Oct 21, 2010, at 11:59 AM, Tero Kivinen wrote: > The section 10.4 seems to assume that attacker cannot force the load > balancer to send the faked packet to any other cluster member than the > one mapped by the source IP-address of the packet. As the algorithm > how the load balancer really

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-21 Thread Yaron Sheffer
Hi Yoav, as I mentioned in my mail yesterday, #194 is not just about this particular issue. Thanks, Yaron On 10/21/2010 12:33 PM, Yoav Nir wrote: On Oct 21, 2010, at 11:59 AM, Tero Kivinen wrote: The section 10.4 seems to assume that attacker cannot force the load balancer to se

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-26 Thread Frederic Detienne
On 21 Oct 2010, at 12:33, Yoav Nir wrote: > > On Oct 21, 2010, at 11:59 AM, Tero Kivinen wrote: > > > >> The section 10.4 seems to assume that attacker cannot force the load >> balancer to send the faked packet to any other cluster member than the >> one mapped by the source IP-address of the

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-28 Thread Tero Kivinen
Frederic Detienne writes: > In order to secure QCD, the token has to include all the fields that > can be used for routing a packet to any given server: > > - source/destinatition IP > - protocol (UDP / ESP) > - source/destination ports if applicable But the problem is that the IPsec implemen