Hi Paul:

Thank you for your comments. Please, see mine inline.

>>> [Rafa] I guess, it will depend on the scenario. I remember an e-mail to 
>>> I2NSF (https://www.ietf.org/mail-archive/web/i2nsf/current/msg01111.html) 
>>> mentioning that they were doing sort of case 2 and they would like to have 
>>> a standard way of doing it. Precisely the effort behind our I-D is trying 
>>> to provide an standard interface standard not only for case 1 (with IKE in 
>>> the NSF) but also for case 2 (no IKE in the NSF). 
>>> 
> 
> Don't. You will need to builtin there same security features as IKE has.

[Rafa] Yes, but in case 2 all those features (e.g. key management operations) 
are in the controller but not in the NSFs. The NSFs only implements IPsec stack 
and deploys, for example, a NETFCONF server for the communication with the 
controller. Thus, all the key management operations are performed in the 
controller in case 2 and the resulting IPsec SAs are installed in the NSFs 
using, for example, NETCONF. 

> Focus instead of implementing "minimal ikev2"
> 
> https://tools.ietf.org/html/draft-kivinen-ipsecme-ikev2-minimal-01

[Rafa] Minimal IKEv2 implementation in the NSF would be case 1. 
Nevertheless, implementing minimal ikev2 does not solve, for example, NAT-T for 
case 1 so controller should do something anyway.

> 
> 
> For example, most modern ciphers require timely rekeying and must never reuse 
> IV/counters with the same private key.

[Rafa] Why do you imply that IV/counters will be the same with same private 
key? That is not the assumption in case 2 where the controller always generates 
fresh IPsec SAs.

> Synching that across independent hosts is impossible.

[Rafa] I do not see how it is impossible when a controller that have access to 
both NSFs provides that information. If it is not impossible when using IKEv2, 
it should not be impossible for case 2. 

The point is that the result of running IKEv2 is the IPsec SAs in the IPsec 
kernel of both NSFs. In case 2, that state is coming from the controller that 
is performing the key management operations (generate fresh key material, IV, 
etc… per each IPsec SA). The controller has a  connection with both NSFs using, 
for example, NETCONF. Moreover, as I commented , you can read this e-mail 
(https://www.ietf.org/mail-archive/web/i2nsf/current/msg01111.html). So there 
is proof that it is working.

Thus, it is more difficult to manage, yes, (in fact, we admit that in our I-D), 
but not impossible. 
In fact, I think it would be worthy if you can provide a concrete example of 
that use case where both NSFs are under the same controller. Maybe we can help 
you to address your concern and explain how the operation would be in that 
specific case you have in mind.

Best Regards and many thanks for your comments.

> 
> Paul
> _______________________________________________
> IPsec mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/ipsec

-----------------------------------------------------------
Rafael Marin Lopez, PhD
Dept. Information and Communications Engineering (DIIC)
Faculty of Computer Science-University of Murcia
30100 Murcia - Spain
Telf: +34868888501 Fax: +34868884151 e-mail: [email protected]
----------------------------------------------------------






_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to