Re: session resumption, I would like to propose the following text:

6.1. Session Resumption

When the Responder is under attack, it MAY choose to prefer previously authenticated peers who present a session resumption [RFC 5723] ticket. The Responder MAY require such Initiators to include a return routability ticket in the IKE_SESSION_RESUME message, as allowed by RFC 5723, Sec. 4.3.2. Note that the Responder SHOULD cache tickets for a short time to reject reused tickets (Sec. 4.3.1), and therefore there should be no issue of half-open SAs resulting from replayed IKE_SESSION_RESUME messages.

Thanks,
        Yaron

On 02/09/2015 04:52 PM, Yoav Nir wrote:

On Feb 9, 2015, at 4:03 AM, Paul Wouters <[email protected]> wrote:

On Sun, 8 Feb 2015, Yaron Sheffer wrote:

I think we've come a full circle. We now have a proposal that makes 
proof-of-work more deterministic for each type of client (which I find very 
useful). But the weaker clients will always lose, no matter what POW solution 
we choose. This has been a problem with this proposal from day one and it's a 
limitation that we as a group need to decide whether to accept or not.

I'm not yet convinced this proposal will provide a working solution to
the DDOS problem.

Hi, Paul

“solution” is hard. Whatever we do, an attacker with unlimited resources can 
throw more at us.

We could block all regular initiations under load, allowing only RFC 5723 
resumptions. But this allows an attacker to force us into this mode and 
effectively deny service to all initiators that don’t have a saved session.

So instead we can allow resumptions and also make it more costly for the 
attacker to mount the attack on regular initiations. Even an easy puzzle, one 
that my 1.2 GHz single-core ARMv5 with C code can solve in a second is much 
harder than just the return routability that COOKIE provides. The draft has 
text about how to make these puzzles a weapon of last resort, so legitimate 
users hardly ever need to solve them, but even setting the puzzle difficulty to 
something a strong desktop can do 20 times a second, it’s still better than the 
two other alternatives: allow the strong desktop to create 1000 half-open SAs 
in a second, or entirely block the subnet from which the desktop seems to come.

Yoav


_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to