What you are referring to is when a single SA/key is shared across multiple
devices (or the entire network). Here, we are talking about a unique SA pair
between any two devices. I.e. each device pair on the network has its own IPsec
SA.
fred
On 15 Nov 2011, at 19:36, Ulliott, Chris wrote:
> Classification:UNCLASSIFIED
>
> The problem with a single SA is that it usually means a single key (what ever
> form that takes) such that a compromise of a single spoke puts all traffic at
> risk... So what ever solution we go for - we need to keep one eye on the
> security requirements...
>
> Chris
>
> [This message has been sent by a mobile device]
>
> ----- Original Message -----
> From: Yoav Nir [mailto:[email protected]]
> Sent: Tuesday, November 15, 2011 11:08 AM
> To: Mike Sullenberger <[email protected]>
> Cc: [email protected] <[email protected]>; [email protected] <[email protected]>
> Subject: Re: [IPsec] P2P VPN - Side Meeting
>
> Hi Mike
>
> On Nov 15, 2011, at 6:25 PM, Mike Sullenberger wrote:
>
>> Hi Yoav,
>>
>> Please see inline.
>>
>> Mike.
>>
>>> On Nov 15, 2011, at 12:12 PM, Frederic Detienne wrote:
>>>
>>>>
>>>> On 15 Nov 2011, at 12:05, Yoav Nir wrote:
>>>>
>>>>> Hi Frederic
>>>>>
>>>>> Inline...
>>>>>
>>>>> On Nov 15, 2011, at 11:42 AM, Frederic Detienne wrote:
>>>>>
>>>>>> Hi Yoav,
>>>>>>
>>>>>> We will be there (following offline with you for the details).
>>>>>>
>>>>>> I do not think there is a need to spend 20 minutes on the draft
>>>>>> which everyone should have read. There are three vague points in
>>>>>> it and 10 min seem largely sufficient.
>>>>>
>>>>> 20 minutes includes time spent on hellos, introductions, asking
>>>>> if everyone has read the draft, jabber scribe, testing the audio,
>>>>> and all other kinds of administrivia. You've been to IETF sessions
>>>>> before, and you know how that goes.
>>>>
>>>> absolutely. Then we agree on the 20 min.
>>>>
>>>>>> At this stage several vendors think they have a fair
>>>>>> understanding of the requirements and a gap analysis is much more
>>>>>> productive and constructive. I have just asked Chris Ulliott to
>>>>>> provide his feedback in case audio fails on us. We can factor his
>>>>>> reply in the discussions.
>>>>>
>>>>> To me the biggest gap in existing solutions is that they require
>>>>> kludges like GRE tunnels and route-based VPN, and also that they
>>>>> don't cover the provisioning of credentials. GRE tunnels and
>>>>> route-based VPNs I consider a kludge because you are then required
>>>>> to treat VPN tunnels as interfaces. Interfaces are much more
>>>>> resource intensive when compared to simple SAs, and most operating
>>>>> systems are very limited in the number of interfaces that they
>>>>> support.
>>>>
>>>> These are all very vague but generally misinformed statements.
>>>
>>> I'm sorry if they have offended you or your company.
>>>
>>> My point remains, that IPsec does define a mechanism for tunneling
>>> packets. It's called "tunnel mode IPsec". That Cisco and perhaps
>>> other vendors choose to use other tunneling mechanisms such as GRE
>>> when they need some fancy features such as peer discovery or dynamic
>>> protected domain discovery, tells me that something is lacking in
>>> IPsec tunnels. That is what I meant by "kludge".
>>>
>>> It may be that the problem with IPsec tunnels is not in the tunnels
>>> themselves, but that there are no configuration protocols associated
>>> with them, such as the routing protocols or such as NHRP that can be
>>> used with GRE tunnels.
>>>
>>> I will take your word that using GRE+NHRP can scale as far as anyone
>>> would like. However, in evaluating solutions, we should not
>>> automatically go with the analogy that IPsec VPNs are like overlay
>>> networks on top of the Internet, and that tunnels are analogous to
>>> links. GRE is an overhead that is added to every packet. NHRP is yet
>>> another protocol that needs to be implemented and carried over the
>>> IPsec SA. All that should be compared with cost and complexity of
>>> potential extensions to IKE and IPsec that would carry the same
>>> information.
>>>
>>
>> We use other tunnel mechanisms (GRE), because IPsec tunneling mode
>> is lacking in functionality. For example, when you use GRE for the
>> tunneling you also reduce the IPsec SA's that are needed to "describe"
>> the traffic for IPsec to encrypt. If you use IPsec tunnel mode only
>> then for each pairing of subnets behind each peer you need a separate
>> IPsec SA. For example if there are 5 subnets each behind two peers
>> then you need up to 25 SA pairs to describe exactly what needs to be
>> encrypted and nothing more. If you tunnel the data traffic first then
>> you only need 1 SA pair for all traffic, since IPsec encrypts the
>> tunnel itself and not the traffic within the tunnel.
>
> This was correct in IKEv1, but in IKEv2 you can have a bunch of ranges for
> each traffic selector. Regardless, it has long been a (undocumented)
> practice, by more than one vendor, to negotiate universal tunnels, so that a
> single IPsec SA can be used for all the traffic between two peers.
>
>> What you call other fancy features is what I call functional separation.
>> IPsec does encryption well, but in reality it does a fairly poor job of
>> tunneling. So lets have IPsec do what it does well and have GRE do what
>> it does well and that is tunneling. Then you add NHRP do to next-hop
>> resolution, which is what it was specifically designed to do, so that
>> you can dynamically find peers and dynamically build new GRE tunnels
>> protected by IPsec. Note, NHRP runs through the GRE tunnel so the
>> single IPsec SA, since it encrypts the tunnel, also protects NHRP.
>> Finally you add a routing protocol to advertise the reachablity of
>> subnets/networks through the tunnel. Again this all goes through
>> tunnel so the single IPsec SA protects this traffic as well.
>>
>> Basically you now have a system where you are using the proper tool
>> to do the job that it was designed to do and that it does best. If you
>> were to to try to overload these functions back into IPsec/IKE then
>> you would end up with a less efficient system.
>
> I agree that this is a solution, but I don't agree that this is necessarily
> the best solution. I'm also missing how trust is established, and how
> advertising the reachability can be made secure. As long as you don't have
> tunneling, a router can only lie to its neighbors, and even that problem was
> severe enough that the SIDR group was set up to solve it. Once you add
> tunneling, those lies can propagate all around the world. So within the large
> overlay network, you either have to assume that everyone "plays nice", or
> else you need some security mechanism to secure these advertisements.
>
> To my mind, the security part of this is the real challenge, regardless of
> whether we model IPsec tunnels as links or not.
>
> Yoav
>
> _______________________________________________
> IPsec mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/ipsec
>
> ****************************************************************************
> Communications with GCHQ may be monitored and/or recorded
> for system efficiency and other lawful purposes. Any views or
> opinions expressed in this e-mail do not necessarily reflect GCHQ
> policy. This email, and any attachments, is intended for the
> attention of the addressee(s) only. Its unauthorised use,
> disclosure, storage or copying is not permitted. If you are not the
> intended recipient, please notify [email protected].
>
> This information is exempt from disclosure under the Freedom of
> Information Act 2000 and may be subject to exemption under
> other UK information legislation. Refer disclosure requests to
> GCHQ on 01242 221491 ext 30306 (non-secure) or email
> [email protected]
>
> ****************************************************************************
>
>
> The original of this email was scanned for viruses by the Government Secure
> Intranet virus scanning service supplied by Cable&Wireless Worldwide in
> partnership with MessageLabs. (CCTM Certificate Number 2009/09/0052.) On
> leaving the GSi this email was certified virus free.
> Communications via the GSi may be automatically logged, monitored and/or
> recorded for legal purposes.
>
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec