Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-20 Thread Yaron Sheffer
In fact I was referring to the whole extension. OK, since you're forcing my hand... General The mechanism must not reduce the security of IKEv2 or IPsec. Specifically, an eavesdropper must not learn any non-public information about the peers. DoS Resistance The proposed mechanism should

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-20 Thread Yaron Sheffer
Hi Dave, an active MITM, i.e. the sys admin at your local Starbucks, needs to only drop a few packets of an open IKE SA (a few retransmissions) for the peers to decide that they have a problem and attempt to renegotiate the SA. This attack is trivial to mount if you're at the right spot. On

Re: [IPsec] Ticket #195 - Protection against SPI enumeration

2010-10-20 Thread Stephen Kent
At 4:37 PM +0200 10/20/10, Yoav Nir wrote: Yaron: 10.3: of course, it is possible that *both* implementations generate predictable/short SPI values Hi all. I think this one was solved together with ticket #191 (The danger of predictable SPIs), but requiring that the token maker randomize

[IPsec] Review of PF_KEY extension

2010-10-20 Thread Laganier, Julien
Folks, We are trying to get this PF_KEY extension document published as an Informational RFC and it would be beneficial if some IPsec experts on this list could help us by reviewing the document. Please let me know if you are willing to review the document. Thanks. --julien PF_KEY

Re: [IPsec] Review of PF_KEY extension

2010-10-20 Thread Jari Arkko
A review from an IPsec implementation perspective would indeed be much appreciated. For background, my AD review is here http://www.ietf.org/mail-archive/web/mext/current/msg04450.html Jari ___ IPsec mailing list IPsec@ietf.org

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-20 Thread Yaron Sheffer
Hi Dave, if I had known of such an attack, you'd be the first to know :-) Seriously, I didn't like the approach in Sec. 10, where you start from the solution and nitpick some of its aspects. I would have preferred a top-down approach, where you start with a set of security goals and