Hi David,

thank you for the careful review. I hope we'll manage to address your comments 
and issue an updated version shortly. Please find more inline.

Regards,
Valery.
  ----- Original Message ----- 
  From: Waltermire, David A. 
  To: [email protected] 
  Sent: Tuesday, December 01, 2015 6:15 AM
  Subject: [IPsec] Review of draft-ietf-ipsecme-ddos-protection-02


  Please find my comments on draft-ietf-ipsecme-ddos-protection-02 below. 
Overall I found the content of the draft to be very good.

   

  Here is a quick summary of my comments:

  - There are still some placeholder sections in the draft that need to be 
written (i.e. sections 3.1, 3.2, 11).

That's true. However sections 3.1 and 3.2 are left due to miscommunication 
between the authors

while preparing the draft for publication. The Keyed-Cookie Notification
and the Puzzle-Required Notification are left from the earlier version of the 
draft,

they are now replaced with the PUZZLE Notification and the Puzzle Solution 
Notification,

which are covered in Sections 10.1 and 10.2.



The Security Considerations section need to be filled and I think we need more 
input

from the WG, since the topic is both important and subtle.

  - I don't recall seeing many comments on the list, if any, on sections 6 
through 10. In general I'd like to see more review and comments on these 
sections in the draft before the draft goes to WGLC.

  - Also related to sections 6 - 10, there appear to be a number of 
requirements that are not capitalized according to RFC 2119 in these sections. 
Anyone willing to volunteer to review the draft and make recommendations for 
RCF2119 wording changes?

  - I also found quite a few NITS relating to spelling, grammar, and 
punctuation. Given the number of nits, it would be good to produce a clean 
draft for additional review, so we don't duplicate review effort.

   

  Yoav and Valery, do you have a sense of when you can turn around an update to 
this draft with these comments addressed?

   

  Regards,

  Dave

   

  Comments/Questions:

  ----------------------------

   

  General:

   

  There seem to be places in the draft where RFC2119  wording should be used 
(i.e. sections 6 - 10). It would be good to see more review and comments on 
this section to make sure we are 1) providing appropriate guidance and 2) using 
the appropriate normative language. For example in section 6:

   

  s/DDoS attack, it is suggested that no Cookie or puzzles be used/DDoS attack, 
it is RECOMMENDED that no Cookie or puzzles be used/

I agree that it is good idea if the draft is reviewed for the proper use of 
RFC2119 keywords.

  Section 3:

   

  Is it possible if "the same value is sent to all Initiators", that the 
attacker could coordinate solving the puzzle across a number of attack hosts to 
achieve some efficiency? If so, it might be good to recommend that a new 
challenge be sent to each host for each SA.

Here "the same value" means "the same number of zero bits", i.e. the same 
puzzle difficulty. The puzzles themselves must be different

for each initiator. Should we rephrase the para to make it more clear?

  Sections 3.1 and 3.2 need to be completed or removed. Some of this looks like 
it may be included in Section 8. It also looks to be fully described in 
sections 10.1 and 10.2. Some work is needed to sort this out.

They should be removed. As I've said they were left due to miscommunication in 
a rush conditions.

  Section 5:

   

  I am not a fan of using the phrase "but the current thinking", since this may 
be read many years from now. This paragraph should be reworked to make it more 
temporally relevant. Perhaps you can tie the thinking directly to the degree of 
IPv6 NAT usage directly and avoid the temporal qualifier?

I tend to agree with you, however I'd let Yoav comment on this.

  Section 6:

   

  The phrase "the amount of failed IKE_AUTH exchanges to never exceed the 
threshold of attack detection" doesn't make sense and needs to be reworded. 

   

  In the phrase "only defensive measure is the monitoring", it is not clear 
what is being monitored. I am assuming this is about monitoring half-open SAs. 
This should be clarified.

OK.

  Section 8.2.1:

   

  Shouldn't the puzzle used in the IKE_SA_INIT be different than the puzzle 
used in the IKE_AUTH exchange to prevent the initiator from sending back a 
cached response or am I misunderstanding something? Same comment for section 
8.2.1.2.

They will be different due to the differences in construction of the string S. 
In initial exchange the S is the content

of the cookie, while in the IKE_AUTH puzzles the S is the concatenation of the 
Responder's nonce (Nr) and Responder's SPI (SPIr).

It is very unlikely that these two S are the same. Should we add some 
clarification on this?

   Section 11:

   

  The security consideration section needs to be completed. Perhaps this could 
be made a summary of the threats and related countermeasures described in the 
document?

Certainly. However this summary might not be enough, since the topic is subtle 
and it's easy to miss some important details.

I think we need more reviews and more comments.

  Nits:

  ------

I agree with all of the nits even before I read them. Thank you,

we'll incorporate the suggested changes into the next version of the draft.


_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to