Hi Scott,

I just felt that the _why_ the tokens had to be protected was not so precisely 
covered (clarity). My re-write was only intended for the beginning of the 
section.

I agree that knowing the SA state is the only solution that we can think of but 
it is barely a solution in practice. This is why I stated it in a negative way 
("MUST NOT send" rather than "MUST verify"). But I agree the statement is 
roughly the same.

I also agree that 5.2 does not solve all problems and I do not mean to remove 
that part. It is good to keep it.


One more comment on section 9.3 (QCD Token Enumeration):

-8<---
  The methods in Section 5.1 and Section 5.2 allow for a periodic
      change of the QCD_SECRET.  Any such change invalidates the entire
      dictionary.
-8<---


Don't we mean that section 4.4 allows the replacement of the tokens should the 
QCD_SECRET change ?

thanks and regards,

        fred

On 04 Feb 2011, at 17:21, Scott C Moonen wrote:

> I'm ok with Frederic's first paragraph as an introduction to the issue; I 
> don't have a strong preference for his text there or for mine.
> 
> His second paragraph is lacking a warning that the approach of section 5.2 
> does not solve all problems in all cases (e.g., what I communicate in my 
> sentence "It is important to note ..."). But I'm ok with either (1) using my 
> paragraph as-is, (2) making some change to how my paragraph states "MUST be 
> able to tell ...," (3) or making some change to Frederick's second paragraph 
> to better convey this.
> 
> 
> Scott Moonen ([email protected])
> z/OS Communications Server TCP/IP Development
> http://www.linkedin.com/in/smoonen
> 
> <graycol.gif>David Wierbowski---02/02/2011 09:40:42 AM---I'm not sure what 
> Frederic means by this statement should "be moved under Security 
> Considerations."
> 
> From: David Wierbowski/Endicott/IBM@IBMUS
> To:   Yoav Nir <[email protected]>
> Cc:   "[email protected]" <[email protected]>, [email protected]
> Date: 02/02/2011 09:40 AM
> Subject:      Re: [IPsec] Fwd: Failure Detection - issue #202
> Sent by:      [email protected]
> 
> 
> 
> I'm not sure what Frederic means by this statement should "be moved under
> Security Considerations."  Section 9.2 is already in the Security
> Considerations section.
> 
> As far as his proposed text, I feel that Scott's text does a better job
> describing the concern.  Frederic's own text does not help with his concern
> of hiding the complexity in the statement that "all members MUST be able to
> tell whether a particular IKE SA is active anywhere in the cluster."  He
> just reworded the statement to be "Practically, IPsec Failure Detection is
> thus not applicable to deployments  where the QCD token is shared by
> multiple gateways and the gateways can not assess whether the token can be
> legitimately sent in the clear while another gateway may actually still own
> the SA's."    Both statements mean the same thing and impose the same
> requirement.
> 
> If consensus is that others prefer Frederic's statement over the one that
> Scott provided us, then I believe the "Practically" should be deleted from
> the sentence that I mentioned above and the last sentence should be changed
> to, "Load balancer designs may fall in this category."  I don't think we
> should presume to know what is typical in load balancers.
> 
> 
> Dave Wierbowski
> 
> 
> z/OS Comm Server Developer
> 
> Phone:
>    Tie line:   620-4055
>    External:  607-429-4055
> 
> 
> 
> 
> 
> 
> From:  Yoav Nir <[email protected]>
> To:    "[email protected]" <[email protected]>
> Date:  02/01/2011 04:30 PM
> Subject:       [IPsec] Fwd:  Failure Detection - issue #202
> Sent by:       [email protected]
> 
> 
> 
> Adding the IPsec list.
> 
> Begin forwarded message:
> 
>      From: Frederic Detienne <[email protected]>
>      Date: February 1, 2011 9:37:33 PM GMT+02:00
>      To: Paul Hoffman <[email protected]>
>      Cc: Yoav Nir <[email protected]>, Pratima Sethi <[email protected]>,
>      Yaron Sheffer <[email protected]>
>      Subject: Re: [IPsec] Failure Detection - issue #202
> 
>      Hi Paul, Yoav,
> 
>      thanks. We are rather puzzled and have been debating how to address
>      this.
> 
>      The proposal should either properly support Load Balancers or should
>      step down and rule out that use case.
> 
>      The statement:
> 
>      -8<---
>                  IPsec gateways would work, but in order to support this
>                    specification, all members MUST be able to tell whether
>                  a particular
>                    IKE SA is active anywhere in the cluster
> 
>      -8<---
> 
>      Hides a lot of complexity behind a single sentence. This sentence
>      actually makes Failure Detection impractical. Simplicity of
>      implementation (as compared to SA state synchronization) were key
>      drivers for us in this proposal.
> 
>      The statement should be more precise about the general scenario and
>      be moved under Security Considerations.
> 
>      -8<---
>      If an attacker can somehow access a QCD token while the SA's are
>      still active, this attacker will be able to tear down the sessions at
>      will. In particular, avoiding false positives is critical to the
>      security of the proposal and a token maker MUST NOT send a QCD token
>      in an unprotected message for an existing IKE SA.
> 
>      Practically, IPsec Failure Detection is thus not applicable to
>      deployments  where the QCD token is shared by multiple gateways and
>      the gateways can not assess whether the token can be legitimately
>      sent in the clear while another gateway may actually still own the
>      SA's. Load balancer designs typically fall in this category.
>      -8<---
> 
>      thanks and regards,
> 
>      Frederic
> 
>      On 01 Feb 2011, at 17:51, Paul Hoffman wrote:
> 
>            Pratima and Frederic: Please respond to Yaron and I ASAP,
>            either way, whether or not you agree with the wording. Given
>            that this was your issue and you did not comment during WG LC,
>            we are concerned that we have lost contact with you.
> 
>            If you do not agree with the wording, you need to say so on the
>            mailing list before Friday.
> 
>            --Paul Hoffman
> 
>            On 2/1/11 7:05 AM, Yoav Nir wrote:
>                  Hi all.
> 
>                  Following last week's conf call, Scott Moonen has
>                  proposed text to resolve issue #202. The idea is to
>                  remove section 9.4 entirely, and change section 9.2 as
>                  follows:
> 
> 
>                  OLD:
> 
>                  9.2.  QCD Token Transmission
> 
>                    A token maker MUST NOT send a QCD token in an
>                  unprotected message for
>                    an existing IKE SA.  This implies that a conforming QCD
>                  token maker
>                    MUST be able to tell whether a particular pair of IKE
>                  SPIs represent
>                    a valid IKE SA.
> 
>                    This requirement is obvious and easy in the case of a
>                  single gateway.
>                    However, some implementations use a load balancer to
>                  divide the load
>                    between several physical gateways.  It MUST NOT be
>                  possible even in
>                    such a configuration to trick one gateway into sending
>                  a QCD token
>                    for an IKE SA which is valid on another gateway.
> 
>                    This document does not specify how a load sharing
>                  configuration of
>                    IPsec gateways would work, but in order to support this
>                    specification, all members MUST be able to tell whether
>                  a particular
>                    IKE SA is active anywhere in the cluster.  One way to
>                  do it is to
>                    synchronize a list of active IKE SPIs among all the
>                  cluster members.
> 
> 
>                  NEW:
> 
>                  9.2.  QCD Token Transmission
> 
>                    A token maker MUST NOT send a valid QCD token in an
>                  unprotected
>                    message for an existing IKE SA.
> 
>                    This requirement is obvious and easy in the case of a
>                  single gateway.
>                    However, some implementations use a load balancer to
>                  divide the load
>                    between several physical gateways.  It MUST NOT be
>                  possible even in
>                    such a configuration to trick one gateway into sending
>                  a valid QCD
>                    token for an IKE SA which is valid on another gateway.
>                  This is true
>                    whether the attempt to trick the gateway uses the token
>                  taker's IP
>                    address or a different IP address.
> 
>                    Because it includes the token taker's IP address in the
>                  token
>                    generation, the method in Section 5.2 prevents
>                  revealing the QCD
>                    token for an existing pair of IKE SPIs to an attacker
>                  who is using a
>                    different IP address.  Note that the use of this method
>                  causes the
>                    tokens to be invalidated whenever the token taker's
>                  address changes.
>                    It is important to note that this method does not
>                  prevent revealing
>                    the QCD token to a man-in-the-middle attacker who is
>                  spoofing the
>                    token taker's IP address, if that attacker is able to
>                  direct messages
>                    to a cluster member other than the member responsible
>                  for the IKE SA.
>                    This document does not specify how a load-sharing
>                  configuration of
>                    IPsec gateways would work, but in order to support this
>                    specification, all members MUST be able to tell whether
>                  a particular
>                    IKE SA is active anywhere in the cluster.  One way to
>                  do it is to
>                    synchronize a list of active IKE SPIs among all the
>                  cluster members.
> 
> 
>                  Please discuss this issue this week, as I intend to
>                  publish version -04 on Friday if there are no objections
>                  to this change.
> 
>                  Yoav
> 
>                  _______________________________________________
>                  IPsec mailing list
>                  [email protected]
>                  https://www.ietf.org/mailman/listinfo/ipsec
> 
> 
> 
> 
> 
>      Scanned by Check Point Total Security Gateway.
> _______________________________________________
> IPsec mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/ipsec
> 
> 
> _______________________________________________
> IPsec mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/ipsec
> 
> _______________________________________________
> IPsec mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to