IPsec ME minutes IETF 91

PaulH: brief status report (see slides, new RFC's 7321, 7296, 7383, 
signature-auth in queue)

Yaov: Someone found a way to make TCP connections inside tunnels fail,
      but using PACKET_TOO_BIG messages to the gateway that make the tunnel
      MTU go below the minimum for the IP version by reducing the ESP PMTU
      down to the minimum.
Yoav: sector list[?] there is a paper?


Valery on NULL auth:

- intial contact clarified (must be ignored)
- early code point requested

- no formal security proof
- channel binding
  two peers can authenticate each other out of band if needed. not an issue

- more security considerations are needed

Paul Wouters offered help
PaulW: exposing ports can be desirable for some
Tero: can use transport mode to reveal those
Tero: waiting for this meeting for early code point
      id_null or empty id can be changed without much problems
      auth_none method won't change so that is safe too. if not speak up NOW
PaulH: any major change to be submitted? no. ok tero send to IANA.
PaulH: security proof is not required. Yaron backed down on requiring it.
Dan Harkins: been beaten on head for lack fo security proof. typically not 
required in ietf
             This follows usual path.
PaulH: mailing list said no channel binding
Brian Weis: Ok I wont ask for formal security proof
PaulW: there are places in code where we thought "this is fine becaus
       it is only authenticated". We need to revisit those decisions now.
Yaron: I am mostly worried about people assuming that one-sided auth is
       as good as TLS, which may not be true when investigated formally.

PaulH: WGLC soonish
PaulH: who else feels confident (2 more) (besides, Paul, Valery)
Yaron: for the record, I disagree with my esteemed co-chair. OK with code 
assignment, not yet OK with LC.
PaulH: chairs will discuss


Valery:  D. Migault and me published draft-clone-ike-sa
         Please look at this for adoption/rejection
PaulH: we'll ask for interest on the list


Yoav: Defending IKE Responders Against Denial of Service attacks" presentation
Yoav: anti-ddos slides
Michael Richardson: should we be changing our scope for this document due to 
null_auth?
Yoav: out of scope for now in the draft. We should think about it.
PaulH: we can ask that question later.
Yoav: for now we assume attacker cannot complete AUTH
Yoav: attacker receiving ike_init can cheaply sent nonsense AUTH, causing lots 
of work on responder
Yoav: even more complex, attacker send AUTH that decrypts OK, then fails
Yoav: basic defense, stateless cookies. does not stop attacks with return 
routability
Yoav: rate limiting of half-open based on v4 address or v6 range
Yoav: if half-open sa db is attacked, reduce retention time. usually 3-5 
seconds seems ok value
Yoav: puzzles for attackers that can send IKE_AUTH.
Yoav: puzzle now based on proof-of-work in bitcoin blockchain (see slide)
Tero: known ip's to use puzzles to proof (eg known home workers ip)
Valery: different puzzles for different IPs? [could not understand much]
Valery: crypto agility missing
Yoav: we can require more digits, more zeroes, if sha2 would become weaker / 
easier to solve
Brian Wise: do we want a registry of puzzles and only do one now?
Brian Wise: you changed puzzle, but mechanism is still the same ?
Yoav: previous one was responder gave initiator most of the cookie. But it was 
patented,
      so switched to current system. is used in bitcoin, no one has sued there 
yet
Brain Wise: if client can't do puzzle there are out in the last scenario?
Yoav: yes, that's why you do this last. it will affect legitimate clients
PaulH: that's why the draft now statesm ore about DOS and not just puzzle
Rene Hummen: the puzzle offsets connection establishment. doesn't it just moves 
the [problem point]
Rene: you are just delaying the problem.
Yoav: No, we are reducing the rate of the botnet as a whole
Yaron: with a 5/sec rate limit, the puzzle is meaningless, because
       attackers are desktops and so the puzzle is worth 0.1 sec or less. I
       still support puzzles, because they mitigate a botnet that's attacking
       *multiple* uncoordinated gateways
PaulW: asking if draft says something about making it easier for reconnecting 
puzzle solvers
       to help them not empty their battery
Yoav: use the ticket RFC for that.
Ron van Meter: What is the effect on network load going to be? I think only a 
factor 2 or 3, so modest
Yoav: it reduces the number of packets the attackers can really (usefully?) 
send.

PaulH: few minutes left

Rod van Meter: QKD draft revived from a couple of years ago. Got a lot of 
responses on the
               mailing list. we're planning this to the independant stream. we 
appreciate
               the feedback we got so far.

PaulH: we are not asking for WG daoption. Independant submission is outside the 
ietf. only
       thing that will happen is that they will ask IESG if this an endrun 
around something.
       It is okay to discuss on mailing list.

Rod: couple of Q's left, feedback sooner rather than later wouldbe good.

Tero: I'd rather have it as individual draft. it is still modification to IKE, 
would still
      like IETF to look at it.
PaulH: nothing prevents us to pull it in later, especially if we have concerns
Kathleen Moriarty: (our AD): was there a call for adoption?
PaulH: eons ago, no interest
Kathleen: has that changed? Tero seems to think so?
Tero: I have interest in everything..... even if experimental, doesnt need to 
be in WG because
      there are not that many people planning on implementing/modifying it. Not 
much point
      to go into WG.
PaulH: Kathleen, Yaron and I should talk and come up with some words on this
Kathleen: I do need more information from WG to see what is the right path. 
Implementations
          would be another factor. we do need to hear from everyone.
PaulH: we'll talk about how to ask the WG.
Kathleen: Lets do that within the next few weeks
Rod: just to be clear, we are okay with either.

end of meeting

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to