http://trac.tools.ietf.org/wg/ipsecme/trac/ticket/226 
<http://trac.tools.ietf.org/wg/ipsecme/trac/ticket/226>

Hi.

I think this one we should get out of the way first.

Puzzles limit the rate at which a particular host can create half-open SAs. If 
the puzzle takes 2 seconds to solve then a particular initiator (whether 
legitimate initiator, or a node in a bot-net) can create at most 1 half-open SA 
every 2 seconds.

Another way to achieve the same goal is to limit the half-open SA lifetime to 
10 seconds and have a hard limit of 5 concurrent half-open SAs per peer. Sure, 
the attacker will be able to open 5 half-open SAs within one second, but will 
then be rejected for the next 9.

So why do I think we still need puzzles?

I don’t like hard limits. Hard limits allow a very easy form of DoS. If 
everyone in this hotel is behind a single NAT device, then it’s fairly easy for 
me to create multiple half-open SAs from my room until I hit the hard limit. 
After that, everyone will be effectively blocked from initiating. So while this 
is not a “nobody can connect to victim gateway” attack, it is “nobody in this 
hotel can connect to victim gateway”.  Soft limits are better. With soft limits 
you start dishing out puzzles when you reach a certain threshold, and you never 
completely block.

That’s why I think puzzles should stay.

Yoav
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to