Hi, Graham.

Thanks for the endorsement, but see below.

On Oct 10, 2014, at 2:31 PM, Graham Bartlett (grbartle) <[email protected]> 
wrote:

> Hi Yaron / Yoav
> 
> I'm summarising my thoughts below, I've spoken to a few folk offlist and
> hopefully the following will help my understanding and also theirs.
> 
> So assuming a device is under potential attack by devices using their own
> addresses (botnet or similar), the cookie notification is not going to
> give any benefit (as they are using a legitimate IP address), but Yoav's
> puzzle will slow the attack down.

The cookie mechanism helps in one way. If my IPsec gateway is up against an 
X-node botnet, the cookie mechanism limits the botnet to X unique IP addresses 
(or IPv6 prefixes).

This in itself doesn’t help much, but we can limit the amount of concurrent 
half-open SAs that the gateway is willing to store from a particular IP address 
or prefix. So if, for example, we hold a half-open SA for 10 seconds and allow 
an IPv4 address / IPv6 prefix to have at most 5 half-open SAs, this limits each 
node in the botnet to 1 half-open SA every two seconds, even if their bandwidth 
is sufficient to create many more. It also limits the total half-open SAs that 
they can hold on the gateway to 5X. The limit mechanism doesn’t work without 
either cookies or puzzles.

Reducing the time an half-open SA is held doesn’t really help in this scenario, 
because I’m assuming that the attackers have enough bandwidth. So if we reduce 
the hold time to 1 second, they should be able to create 5 half-open SAs per 
second. This is where puzzles come in. They can reduce the rate that these 
attacking nodes can create new half-open SAs.

Yoav

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to