Hi all. 

Issue #200 is about some text in section 8 ("Interaction with Session 
Resumption"). The text says that a rebooted peer (and thus a defunct SA) may go 
undetected for the lifetime of the SA. However, RFC 5996 says that at some 
point, a peer that did not receive incoming traffic on a particular IKE SA or 
its children, has to initiate a liveness check.

Here's how I propose to resolve this.  Seeing as it's the holiday season, I 
won't close the issue until January 10th, but please get your comments in by 
then.

Existing text:
   What Session Resumption does not help is the problem of detecting
   that the peer gateway has failed.  A failed gateway may go undetected
   for as long as the lifetime of a child SA, because IPsec does not
   have packet acknowledgement, and applications cannot signal the IPsec
   layer that the tunnel "does not work".  Before establishing a new IKE
   SA using Session Resumption, a client should ascertain that the
   gateway has indeed failed.  This could be done using either a
   liveness check (as in RFC 5996) or using the QCD tokens described in
   this document.

My proposed text:
   What Session Resumption does not help is the problem of detecting
   that the peer gateway has failed.  A failed gateway may go undetected
   for an arbitrarily long time, because IPsec does not have packet
   acknowledgement, and applications cannot signal the IPsec layer that
   the tunnel "does not work".  Section 2.4 of RFC 5996 does not specify
   how long an implementation needs to wait before beginning a liveness
   check, and only says "not recently" (see full quote in Section 2).
   In practice some mobile devices wait a very long time before
   beginning liveness check, in order to extend battery life by allowing
   parts of the device to remain in low-power modes.

   QCD tokens provide a way to detect the failure of the peer in the
   case where liveness check has not yet ended (or begun).
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to