As other experts said, this is an interesting issue and worth us spending
efforts on it. I would like to join this work.

> 
> In the Maastricht meeting there was just a tiny bit of 
> interest in the failure detection idea (reminder: the goal is 
> to ensure that one peer discovers that the other IKE peer has 
> restarted, within a short time duration, milliseconds instead 
> of minutes). But we didn't see enough interest to justify 
> having this as a WG item. So, one last time: if you think 
> this is a worthwhile idea, regardless of the proposals on the 
> table, please say so publicly. If you speak up, we will 
> expect you to contribute to the selection of the preferred document.
> 
> If this is of no interest, fine. But if it is an important 
> problem to solve and we don't take it on, we could end up 
> with competing non-WG proposals. Which would be far from ideal.
> 
> Thanks,
>       Yaron
> 
> -----Original Message-----
> From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] 
> On Behalf Of Paul Hoffman
> Sent: Wednesday, July 07, 2010 8:03 PM
> To: IPsecme WG
> Subject: [IPsec] NUDGE: Starting discussion of failure 
> detection proposals
> 
> [[ This topic generated a fair amount of discussion in the 
> past; are folks still interested? ]]
> 
> Greetings again. The WG has one item on our charter that we 
> have barely discussed, namely failure detection. The charter 
> item says that the work item is:
> 
> >- A standards-track IKEv2 extension that allows an IKE peer 
> to quickly and securely detect that its opposite peer, while 
> currently reachable, has lost its IKEv2/IPsec state. Changes 
> to how the peers recover from this situation are beyond the 
> scope of this work item, as is improving the detection of an 
> unreachable or dead peer. Ideas from draft-nir-ike-qcd-05 and 
> draft-detienne-ikev2-recovery-03 can be used as starting points.
> 
> I gave a brief presentation on failure detection at the last 
> IETF meeting in Anaheim. The slides are at 
> <http://www.ietf.org/proceedings/77/slides/ipsecme-4.pdf>, 
> and the following is directly derived from them.
> 
> The basic problem being covered by the new extension is:
> -  Alice and Bob have SAs up and ESP traffic is flowing, but 
> then Bob crashes
> -  Alice keeps sending ESP to Bob
> -  When Bob finally comes back up, he replies to Alice's ESP 
> with INVALID_SPI notifications
> -  Alice starts sending IKE liveness checks until she is 
> "sure" that the INVALID_SPI responses are not a DoS attack; 
> this could be "several minutes"
> -  Then Alice rekeys
> 
> Some other problem cases include:
> -  Bob has two gateways in some failover architecture. One 
> gateway goes down, the other gateway detects this and wants 
> to tell Alice to rekey
> -  Bob has a bunch of gateways in some load-balancing or 
> cluster architecture. One gateway is taken down on purpose, 
> and the system wants to tell Alice to rekey
> -  Protocol robustness:  Bob's gateway loses the SA without going down
> 
> Our primary goal is that, as soon as Bob starts sending 
> INVALID_SPI responses to Alice's ESP traffic, Bob and Alice 
> should be able to quickly determine that this is not an 
> attack and therefore they probably want to rekey right away. 
> Note that if Bob and Alice are also using session resumption, 
> they can use that instead of rekeying; however, in the 
> discussion here, we always use "rekey" to mean "rekey or, if 
> appropriate, resume". The proposed extension does not include 
> the actual rekeying, just the context for them to do it now.
> 
> The WG has seen two proposed solutions, QCD and SIR. The 
> following are brief summaries of the two proposals.
> 
> In QCD (<http://tools.ietf.org/html/draft-nir-ike-qcd>), Bob 
> gives Alice a secret token in the AUTH exchange, and then 
> puts the token in his INVALID_SPI response as a way to say 
> "this SPI is gone". Bob must remember his tokens across 
> reboots, or derive tokens from a master token that he 
> memorizes across reboots, and Alice must remember the token 
> (or a hash of it) for each SA.
> 
> In SIR
> (<http://tools.ietf.org/id/draft-detienne-ikev2-recovery-03.tx
> t>), Alice sends a new Check_SPI query with a stateless 
> cookie, essentially asking "do you really not know about this 
> SPI?"; Bob responds by saying "I'm sure I don't know that 
> SPI". Nothing is stored on either side, so a 
> man-in-the-middle can attack this to cause an unnecessary 
> rekey just as they can normal IKE.
> 
> The first task for the WG is to decide which of these two 
> quite different approaches to take. After we have done that, 
> we can then hone the chosen proposal. During earlier 
> discussion of the proposals, the following criteria were 
> mentioned as ones that the WG should consider when thinking 
> about the approaches:
> 
> -  Support for different scenarios (load balancers, active clusters,
> failover)
> -  Security from man-in-the-middle DoS attacks
> -  Resources used
> -  Intellectual property rights
> 
> So: please start discussing the two proposals with respect to 
> these criteria or other criteria that are important to you. 
> In a few weeks (hopefully well before the Maastricht 
> meeting), I make a call for consensus and see where it leads us.
> 
> --Paul Hoffman, Director
> --VPN Consortium
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to