Hi Yoav, responses inline.

> On Feb 16, 2018, at 10:25, Yoav Nir <[email protected]> wrote:
> 
>> On 16 Feb 2018, at 20:13, Tero Kivinen <[email protected]> wrote:
>> 
>> 1) It's not possible to run a server that obfuscates IKEv2/IPsec using
>>  TLS.
>> 
>>   Today thanks to RFC 8229 it is possible to run an IKEv2/IPsec
>>   server on TCP port 443 with TLS. However if a government agent
>>   tries to send an SA_INIT over that it will discover that this
>>   server runs IKEv2/IPsec, and may blacklist it. We should add a
>>   mechanism to IKEv2 that allows the server to only respond to
>>   SA_INIT from known entities (e.g. that possess a shared secret).
> 
> That would require that within the SA_INIT request, the initiator proves 
> possession of a shared secret and does so in a non-replayable way.

Actually, replay protection is not critical here. In the TLS scenario, 
attackers would not be able to observe SA_INITs from trusted peers.
In the privacy scenario, replaying the initiator SA_INIT will only get the 
SA_INIT of the responder which doesn't include IDi/IDr.
One approach to solving this would be to share a secret with the IKEv2 config 
to all the clients and have the initiator HMAC its SA_INIT with that secret.

> Wouldn’t it be better for the initiator to prove identity or group membership 
> in the TLS handshake?

As defined in RFC 8229, IKEv2 encapsulation does not rely on any security 
properties from TLS.
I don't think we should change that. Especially in the case of TLS <= 1.2, the 
client certificates are not encrypted so this would defeat privacy gains.

>> 2) The privacy of the initiator's identity in the presence of a man in
>>  the middle attacker is not protected.
>> 
>>   Today an attacker with full control of the network can receive the
>>   IDi/IDr sent by the initiator in the first AUTH packet. We should
>>   add a mechanism to IKEv2 that allows the initiator to only send
>>   IDi/IDr to known entities (e.g. that possess a shared secret).
> 
> This is more feasible. I understand the issue, but the only use case where I 
> think it’s important is remote access. It would make sense in remote access 
> to reverse the order of authentication so that the responder identifies and 
> authenticates first, but you’d still need the initiator to send the IDr first.

Agreed, changing the order would protect the IDi but not the IDr.

Thanks,
David Schinazi
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to