That's what I was thinking.
The point is that IPSec is a security mechanism, so if you're specifying its
use you need to discuss the security considerations. (The RFC will need to do
so.) That translates into discussing the possible attacks and what effect they
would have on the integrity of the service. And yes, active attacks are very
much part of the world in which IPSec is intended to live.
Usually, IPSec protects data, and the data carried by IPSec is protected from
eavesdropping and from undetected modification or replay. It is not protected
from denial of service.
All that is true for time synchronization as well. But unlike most data
transfer protocols, in your case it's not just the content of the packets that
matters, but also their arrival times. And my point is that IPSec does not
protect you from an attacker tampering with the arrival times. So you'd want
to call out the fact that a measured round trip time T means the time obtained
by the sync process is accurate to T - but that you cannot assume it is
accurate to better than T as you usually would.
paul
From: Kevin Gross [mailto:[email protected]]
Sent: Tuesday, October 18, 2011 2:57 PM
To: Koning, Paul
Cc: [email protected]; [email protected]; [email protected]; [email protected];
[email protected]; [email protected]
Subject: Re: [IPsec] [TICTOC] Review request for IPsec security for packet
based synchronization (Yang Cui)
I suppose there is a possible selective attack vector here based on messing
with packets based on their length and transmission timing. It's an interesting
topic but I don't think that was the intended topic of this discussion. We want
to figure out how/if can we make clock distribution work through an IPSec
connection. I guess your point is that an "IPSec connection" should be defined
as an IPSec connection _under active attack_. I'm afraid not qualified to
assess these larger-picture security questions.
...
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec