Re: [IPsec] draft-smyslov-ipsecme-ikev2-null-auth-01

2014-06-04 Thread Valery Smyslov
I've already asked co-chairs for a slot to present null-auth in a private e-mail. Great :) We should probably add a comment about rekeying. If the responder becomes the initiator, it might run into issues. Possibly an entity that did not authenticate the peer should not initiate a rekey.

Re: [IPsec] draft-smyslov-ipsecme-ikev2-null-auth-01

2014-06-05 Thread Valery Smyslov
Hi Yoav, AUTH_ANON ? Although I think AUTH_NONE is more in line with how we name things. I don't agree that it is anonymous. It says that the identity was not authenticated, it didn't say that no identity was provided. Section 2.2 says that “As peer identity is meaningless in this case,

Re: [IPsec] interoperability issue with modp transform mismatch forchild sa

2014-07-09 Thread Valery Smyslov
Hi Paul, RFC 5996 states: Although ESP and AH do not directly include a Diffie-Hellman exchange, a Diffie-Hellman group MAY be negotiated for the Child SA. This allows the peers to employ Diffie-Hellman in the CREATE_CHILD_SA exchange, providing perfect forward secrecy for the generated

[IPsec] draft-mglt-ipsecme-diet-esp-iv-generation

2014-07-15 Thread Valery Smyslov
transorms (for example AES-CBC with implicit IV) instead of negotiating IV compression separately. Regards, Valery Smyslov. ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

Re: [IPsec] draft-nir-ipsecme-puzzles-00 comments

2014-07-15 Thread Valery Smyslov
with just returned cookies and would give the former higher priority. I don't see any drawback with this modification, do you? Regards, Valery. Yoav On Jul 11, 2014, at 9:21 AM, Valery Smyslov sva...@gmail.com wrote: Hi Yoav, did you consider the following initial exchange: Initiator

Re: [IPsec] Garage door - let's pick a different example

2014-08-20 Thread Valery Smyslov
Hi Yaron, sorry for late reply - I was on vacation. I still think that the example is valid. The example describes the remote opener which opens the only door. If you want to open different doors using single opener then you might run into trouble you described. But this attack can be

Re: [IPsec] Garage door - let's pick a different example

2014-08-20 Thread Valery Smyslov
No, that is not caused by the unauthenticated protocol, but caused by the same device to be used with two different doors. Even if the device would do full authentication and would verify that the door is in his list of doors which can be opened, attacker could still do the same thing. Only way

Re: [IPsec] Garage door - let's pick a different example

2014-08-20 Thread Valery Smyslov
Hi Hannes, I agree that the example is a bit artificial and in real life one would not use IKE/IPsec to control garage door. At least now. But if IoT becomes ubiquitous then who knows, probably such setup will be default off shelf solution... Regards, Valery. P.S. What about mutual

Re: [IPsec] Rekeying of child sa, Question on TS handling according to RFC 5996

2014-08-21 Thread Valery Smyslov
Hi Tero, This is also question what should we do for the rfc5996bis. We have two options, we removed the text saying section 2.9.2 was added in the RFC5996, or we add the section 2.9.2 from the ticket #12, and add note that saying that this time we really added it... What does the working

[IPsec] Typos in draft-kivinen-ipsecme-ikev2-rfc5996bis-04

2014-08-28 Thread Valery Smyslov
Hi, if new version of draft-kivinen-ipsecme-ikev2-rfc5996bis is issued, then it is also possible fix a typo I've come across. Section 2.8.1, second para: This form of rekeying may temporarily result in multiple similar SAs between the same pairs of nodes. When there are two SAs eligible to

[IPsec] Fw: New Version Notification for draft-smyslov-ipsecme-ikev2-null-auth-03.txt

2014-09-02 Thread Valery Smyslov
as their native language, clearly let me know that yet and suggest better variants. Regards, Valery Smyslov. A new version of I-D, draft-smyslov-ipsecme-ikev2-null-auth-03.txt has been successfully submitted by Valery Smyslov and posted to the IETF repository. Name: draft-smyslov-ipsecme-ikev2-null

Re: [IPsec] Typos in draft-kivinen-ipsecme-ikev2-rfc5996bis-04

2014-09-05 Thread Valery Smyslov
Section 2.23, 4th bullet: o The recipient of either the NAT_DETECTION_SOURCE_IP or NAT_DETECTION_DESTINATION_IP notification MAY compare the supplied value to a SHA-1 hash of the SPIs, source or recipient IP address (respectively), address, and port, and if they don't match, it

Re: [IPsec] Call for adoption: The NULL Authentication Method in IKEv2Protocol

2014-09-08 Thread Valery Smyslov
Yes. Obviously, as the author of the document I can see its value, which is describet in the document itself. And I think it's better to standardize it with more people involved, than as individual submission. Regards, Valery. - Original Message - From: Yaron Sheffer

Re: [IPsec] Call for adoption: The NULL Authentication Method in IKEv2Protocol

2014-09-09 Thread Valery Smyslov
justify it over MUST. We can discuss it. And you are right - some (I dare to say many) words still need to be added into the Security Considerations section. Regards, Valery. Thanks Graham On 08/09/2014 07:27, Valery Smyslov sva...@gmail.com wrote: Yes. Obviously, as the author of the document

Re: [IPsec] IPsec Digest, Vol 125, Issue 9

2014-09-09 Thread Valery Smyslov
Hi Les, imho, this would be useful for bring-up work i.e. for both developers and deployers. However, as folks already pointed out, there are significant security tradeoffs (and mitigations) that SHOULD/MUST to be explicated (i.e.more verbiage). Points to consider: 1) allowing

Re: [IPsec] Call for adoption: The NULL Authentication Method in IKEv2 Protocol

2014-09-09 Thread Valery Smyslov
. The latter at least prevents passive eavesdropping... Finally, since Bellovin's attack was mentioned, I want to make sure that no one is thinking of not using the MAC authentication at the IP packet level, right? Absolutely. Hugo Regards, Valery Smyslov. On Mon, Sep 8, 2014 at 10:54 AM

Re: [IPsec] Mandatory Public Key based authentication with EAP

2014-09-11 Thread Valery Smyslov
Hi Rahul, Yaron, Hi Rahul, I am not aware of any additional conditions. Sorry to pop up, but doesn't text from RFC5998 apply only to EAP-only authentication? Isn't it an additional condition? I mean, that if you perform EAP authentication, as described in RFC5996, i.e. when responder does

Re: [IPsec] Typos in draft-kivinen-ipsecme-ikev2-rfc5996bis-04

2014-09-17 Thread Valery Smyslov
In Section 3.8 (Authentication Payload) the description of the 3-octet RESERVED field is absent. I think it is a typo, as in all other cases, when reserved field is present in payload (KE, ID, TS, CP), its description is given. ___ IPsec mailing list

Re: [IPsec] Typos in draft-kivinen-ipsecme-ikev2-rfc5996bis-04

2014-09-18 Thread Valery Smyslov
In Section 3.13.1 the description of the Selector Length field doesn't mention that it is unsigned integer (as it is mentioned for all other such fields). ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

Re: [IPsec] Typos in draft-kivinen-ipsecme-ikev2-rfc5996bis-04

2014-09-18 Thread Valery Smyslov
In Section 3.13.1 the description of the Selector Length field doesn't mention that it is unsigned integer (as it is mentioned for all other such fields). What's an unsigned integer? :P Do we mean octets? :) Unsigned integer is an interpretation of this two-octets value (presumably in network

Re: [IPsec] Call for adoption: MOBIKEv2: MOBIKE extension for Transportmode

2014-09-18 Thread Valery Smyslov
Hi Yaron, I think that the draft in its original form doesn't exist now (btw, it seemes to have expired), as the authors has clearly indicated, that the solution, that was presented in the draft, is no longer actual, and a new, more simple approach should be taken. But it is described in no

[IPsec] More nits in draft-kivinen-ipsecme-ikev2-rfc5996bis-04

2014-09-23 Thread Valery Smyslov
1. Section 3.15.1: o APPLICATION_VERSION - The version or application information of the IPsec host. This is a string of printable ASCII characters that is NOT null terminated. NOT is uppercase. Although it might be an intention to ephasise the fact, that it is not null

Re: [IPsec] Call for adoption: Client Puzzles

2014-09-26 Thread Valery Smyslov
Hi, I think that the DoS protection is very important problem for IKE and it needs to be addressed. I have, though, mixed feelings about the draft in its current form. The idea is very cute, but it has IMHO a limited usage in protection against DoS attack. It doesn't protect against DDoS

Re: [IPsec] I-D Action: draft-ietf-ipsecme-ikev2-null-auth-01.txt

2014-10-22 Thread Valery Smyslov
for adoption - some grammar errors are fixed I think that the Security Considerations section is still incomplete. Please, feel free to suggest the text that should be added there. Regards, Valery Smyslov. - Original Message - From: internet-dra...@ietf.org To: i-d-annou...@ietf.org Cc

Re: [IPsec] Survey for WG interest in adoptingdraft-mglt-ipsecme-clone-ike-sa

2014-11-27 Thread Valery Smyslov
, that share the same credentials. If client established IKE SA with any of them then the SA could be cloned and transfered to other nodes of this cluster without reauthentication, and the traffic from client then could be balanced among those gateways. Regards, Valery Smyslov. - Original

Re: [IPsec] Survey for WG interest in adoptingdraft-mglt-ipsecme-clone-ike-sa

2014-11-27 Thread Valery Smyslov
yaronf.i...@gmail.com To: Valery Smyslov sva...@gmail.com; Paul Hoffman paul.hoff...@vpnc.org; IPsecME WG ipsec@ietf.org Sent: Thursday, November 27, 2014 4:00 PM Subject: Re: [IPsec] Survey for WG interest in adoptingdraft-mglt-ipsecme-clone-ike-sa hat on: RFC 5723 co-author Hi Valery, Have you

[IPsec] Some speculations about puzzles

2014-12-01 Thread Valery Smyslov
(this is unlike puzzles in IKE_SA_INIT, where they should be optional). Regards, Valery Smyslov. ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

Re: [IPsec] Some speculations about puzzles

2014-12-03 Thread Valery Smyslov
and it is desirable that it survives reboots and so on, so it just becomes a timestamp :-) Regards, Valery. I like the two options of the header in the clear. Many thanks On 01/12/2014 15:34, Valery Smyslov sva...@gmail.com wrote: Hi, this is a long message. First of all I think

Re: [IPsec] Some speculations about puzzles

2014-12-03 Thread Valery Smyslov
Hi Scott, this is almost identical to what I proposed in my original e-mail, if you substitute difficulty level with puzzle id. In more generic way - responder encodes in cookie/puzzle all the information that could help him quickly reject invalid/stale/forged puzzles without wasting resources.

Re: [IPsec] Some speculations about puzzles

2014-12-03 Thread Valery Smyslov
Hi Scott, this is almost identical to what I proposed in my original e-mail, if you substitute difficulty level with puzzle id”. Or call it “generation id”, and increment it whenever you generate a new secret and/or change the difficulty level.= That will work. In this case it is better to

Re: [IPsec] Some speculations about puzzles

2014-12-04 Thread Valery Smyslov
you loose the ability to set a the hardness of the puzzle) On 03/12/2014 16:01, Yoav Nir ynir.i...@gmail.com wrote: On Dec 3, 2014, at 5:44 PM, Valery Smyslov sva...@gmail.com wrote: Hi Scott, this is almost identical to what I proposed in my original e-mail, if you substitute difficulty

Re: [IPsec] Some speculations about puzzles

2014-12-05 Thread Valery Smyslov
I get your point, but I think this is more than unfortunate, this is real ugly. RFC 7383 is primarily about IKE_AUTH, and now, in the case of those broken networks that limit the MTU, we are reducing the effective MTU yet again. Not much, a dozen of bytes. But I think we're looking at the

Re: [IPsec] Survey for WG interest in adopting draft-nagayama-ipsecme-ipsec-with-qkd

2014-12-09 Thread Valery Smyslov
it to have experimental status. Regards, Valery Smyslov. chair hats on Greetings again. There is a small emerging industry of crypto solutions that transmit keys using Quantum Key Distribution (QKD), and then use those keys for classical high-speed encryption. Several such solutions are using

Re: [IPsec] Some speculations about puzzles

2014-12-09 Thread Valery Smyslov
Hi Yaron, We are almost in agreement. My understanding is that both the IKE_SA_INIT and IKE_AUTH puzzles are needed, and each one has a different goal: - IKE_SA_INIT puzzle: should counteract the responder's memory cost of keeping the half-open SA, and its CPU cost in computing DH. - IKE_AUTH

Re: [IPsec] DDoS puzzle: PRF vs Hash

2015-02-02 Thread Valery Smyslov
Are we going into the right direction? Is it worth to solve the task of making puzzle difficulties less erratic if the computing power of clients may differ by the order of magnitude (or even magnitudes)? Can we make the process more flexible? For example - the server may indicate two difficulty

Re: [IPsec] DDoS puzzle: PRF vs Hash

2015-02-02 Thread Valery Smyslov
Hi Michael, Can we make the process more flexible? For example - the server may indicate two difficulty levels in puzzle request - the desired one and the acceptable one. For example, the desired level is 20 bits and the acceptable level is 16 bits. You are

Re: [IPsec] DDoS puzzle: PRF vs Hash

2015-02-05 Thread Valery Smyslov
I can see two drawbacks with this approach. First, to make it aligned with algorithm agility, we need to negotiate not only PRF, but also the encryption algorithm. And the selection criteria would become more complex. And second - it significantly increases the size of IKE_SA_INIT response

Re: [IPsec] Review of draft-ietf-ipsecme-ikev2-null-auth-03

2015-02-06 Thread Valery Smyslov
Is the following text for the entire section 2.4 OK for you? (I've borrowed some of your text): Looks mostly ok. 2.4. Interaction with Peer Authorization Database (PAD) Section 4.4.3 of [RFC4301] defines the Peer Authorization Database (PAD), which provides the link between Security

Re: [IPsec] Puzzle algorithm negotiation

2015-01-19 Thread Valery Smyslov
Hi Yoav, Pull Request: https://github.com/ietf-ipsecme/drafts/pull/2 Hi, Valery has created this pull request. During the meeting in Honolulu and subsequent discussion on the list, several people requested that there be a negotiation of the algorithm used in the puzzle rather than

Re: [IPsec] WG Last Call on The NULL Authentication Method in IKEv2 Protocol

2015-01-19 Thread Valery Smyslov
Hi Yaron, Paul, * The privileged IKE operations is obviously a bit thin. Initial Contact may be a good example of an operation that we'd be better off without. But if we don't have any specific examples, let's remove this section. I agree that this section currently is vague. Paul has

Re: [IPsec] WG Last Call on The NULL Authentication Method in IKEv2 Protocol

2015-01-19 Thread Valery Smyslov
That was partially because Valery and I didn't fully agree. Which means it might not belong in this document. Initial Contact is addressed in the document already in its own section. The question for example is about CREATE_CHILD_SA. Which comes back to your point below about making claims of

Re: [IPsec] I-D Action: draft-ietf-ipsecme-ikev2-null-auth-04.txt

2015-02-19 Thread Valery Smyslov
Protocol Authors : Valery Smyslov Paul Wouters Filename: draft-ietf-ipsecme-ikev2-null-auth-04.txt Pages : 13 Date: 2015-02-19 Abstract: This document specifies the NULL Authentication method and the ID_NULL Identification

[IPsec] Initiator Identity in case of EAP (was: My comments to the Null Authentication Method draft)

2015-01-26 Thread Valery Smyslov
I changed a subject field. Valery Smyslov writes: Hi Tero, On the other hand same section says that ID_NULL SHOULD only be used with NULL authentication method. In which scenarios do you think ID_NULL can be used when using normal authentication? I.e. which is the exception for the SHOULD

Re: [IPsec] Initiator Identity in case of EAP

2015-01-28 Thread Valery Smyslov
Hi Yaron, The text in RFC7296 specifically does not limit the uses of EAP identities more than that SHOULD NOT just because we wanted to leave things open so different implementations can do whatever is suitable for them. That's why I think that ID_NULL can be used as IDi in case of EAP -

Re: [IPsec] Initiator Identity in case of EAP

2015-01-29 Thread Valery Smyslov
Valery Smyslov writes: I don't see how this can be done without breaking existing implementations, and therefore I am unhappy with the new sentence in -03, Another example is EAP authentication when the client identity in ID payload is not used. A responder that receives a new, unknown ID type

Re: [IPsec] WG Last Call on The NULL Authentication Method in IKEv2 Protocol draft-smyslov-ipsecme-ikev2-null-auth

2015-01-26 Thread Valery Smyslov
Hi Yaron, there is already Section 3.2, which discusses possible impact of NULL Auth on DOS resistance, and the ddos/puzzles document is already referenced there. Do you think more words need to be added to this section? Regards, Valery. - Original Message - From: Yaron Sheffer

Re: [IPsec] Initiator Identity in case of EAP (was: My comments to the Null Authentication Method draft)

2015-01-27 Thread Valery Smyslov
It is fully legal for NAS to sent EAP Identity request and not use IKE Identity. Then, many modern EAP methods (like EAP-TLS) have their own means to exchange Identities within the method, and in this case the initial IKE Identity becomes almost useless. And for some EAP libraries getting rid

Re: [IPsec] WG Last Call on The NULL Authentication Method in IKEv2 Protocol draft-smyslov-ipsecme-ikev2-null-auth (fwd)

2015-01-14 Thread Valery Smyslov
Some clarifications below. (seems previous message was lost) https://tools.ietf.org/html/draft-ietf-ipsecme-ikev2-null-auth So since the WGLC came onto us a little early, the document authors still have some different opinions about some of this. So let me raise those in the WGLC :)

Re: [IPsec] AD review of draft-ietf-ipsecme-ikev2-null-auth

2015-03-18 Thread Valery Smyslov
Hi Tero, Kathleen Moriarty writes: Section 3.1 Shouldn't this new requirement only apply to unauthenticated sessions? Wouldn't requirements for existing authenti cated sessions remain in terms of audit capabilities and logging? This should be

Re: [IPsec] Puzzles in IKEv2

2015-03-06 Thread Valery Smyslov
What else could we recommend to do in this situation? If responder deletes IKE SA in case it receives IKE_AUTH message that doesn't pass ICV check, then it would give an attacker an easy way to prevent legitimate initiator to connect - just monitor the network and once IKE_SA_INIT from the

Re: [IPsec] Puzzles in IKEv2

2015-03-06 Thread Valery Smyslov
Hi Yaron, Hi Valery, Sorry if I was inconsistent on this one. This is a performance optimization, and it's a trade off for the responder: Do I want to cache keys, thereby saving on CPU but wasting more memory on potentially useless SAs? So I suggest to make it a MAY, not a SHOULD. At

Re: [IPsec] Call for WG adoption:draft-nir-ipsecme-chacha20-poly1305

2015-03-06 Thread Valery Smyslov
On Feb 26, 2015, at 2:11 PM, Paul Hoffman paul.hoff...@vpnc.org wrote: Greetings again. A few people have expressed interest in having https://tools.ietf.org/html/draft-nir-ipsecme-chacha20-poly1305 as a WG item for IPsecME. If you want this as a WG document, and you are willing to review

Re: [IPsec] Call for WG adoption: draft-nir-ipsecme-chacha20-poly1305

2015-02-26 Thread Valery Smyslov
Hi, I support adoption this draft as WG document. Valery Smyslov. - Original Message - From: Paul Hoffman paul.hoff...@vpnc.org To: IPsecME WG ipsec@ietf.org Sent: Friday, February 27, 2015 1:11 AM Subject: [IPsec] Call for WG adoption: draft-nir-ipsecme-chacha20-poly1305 Greetings

[IPsec] Puzzles in IKEv2

2015-03-03 Thread Valery Smyslov
. Regards, Valery Smyslov. ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

Re: [IPsec] Puzzles in IKEv2

2015-03-04 Thread Valery Smyslov
this clarifies the idea? Regards, Valery. Thanks, Yaron On 04/03/2015 02:45, Valery Smyslov wrote: Hi all, I've updated my previous pull request. The source file and changes are available at https://github.com/ietf-ipsecme/drafts/pull/2 Now it is completely described using puzzles in the IKE_SA_INIT

Re: [IPsec] Review of draft-ietf-ipsecme-ikev2-null-auth

2015-02-28 Thread Valery Smyslov
I'm not sure what the IETF definition is for Update an RFC. I would say this RFC only adds to 4306. That is, if you do not implement this document you do not need to know about this update. I would expect an updated by to be mandatory reading material for an implementor of the RFC being updated.

Re: [IPsec] Puzzles in IKEv2

2015-03-05 Thread Valery Smyslov
or just a genuine IKE_AUTH message from legitimate initiator which an attacker was able to outpace with a bogus one) would pass ICV check. Regards, Valery. Thanks, Yaron On 04/03/2015 07:47, Valery Smyslov wrote: Hi Yaron, Hi Valery, to make it easier for everyone, I suggest that you submit

Re: [IPsec] DDoS puzzle: PRF vs Hash

2015-01-30 Thread Valery Smyslov
Hi, I also had some concerns on the variance of the times. But then another thought came to me. Let's look on this issue from the other side. The responder will use puzzles only when it feels that it is under attack. It means, that there are a lot of (thouthands, tens of thouthands) half-open

[IPsec] Fw: [ipsecme] #229 (ddos-protection): Need to decide the nature of the puzzle

2015-04-14 Thread Valery Smyslov
Hi all, Yoav added a couple of new issues into the tracker, so I'd like to initiate the discussion of these issues. The first issue (#229) is concerned with the inconsistency of the puzzle solution time with the current definition of the puzzle. So the question - should we change the puzzle

[IPsec] Fw: [ipsecme] #230 (ddos-protection): Use puzzles for DoS protection within an IKE SA

2015-04-14 Thread Valery Smyslov
Hi again, another issue that is added to the tracker - whether to use puzzles for protection against nefarious IKE peers after IKE SA is established. My opinion - using puzzles after IKE SA is established is possible, but is not justified. It would significantly complicate IKE state machine (I

[IPsec] Fw: New Version Notification for draft-ietf-ipsecme-ikev2-null-auth-06.txt

2015-04-20 Thread Valery Smyslov
successfully submitted by Valery Smyslov and posted to the IETF repository. Name: draft-ietf-ipsecme-ikev2-null-auth Revision: 06 Title: The NULL Authentication Method in IKEv2 Protocol Document date: 2015-04-20 Group: ipsecme Pages: 14 URL: http://www.ietf.org/internet-drafts/draft-ietf-ipsecme-ikev2

Re: [IPsec] Please review draft-ietf-ipsecme-chacha20-poly1305

2015-04-22 Thread Valery Smyslov
Hi Yoav, Hi, Valery. Thanks for the review. See my reply inline. Technical issues. 1. For the question raised in the draft: TBD: do we want an extra 32 bits as salt for the nonce like in GCM, or keep the salt (=SenderID) at zero? I prefer to follow GCM-like approach, i.e. to take

Re: [IPsec] Please review draft-ietf-ipsecme-chacha20-poly1305

2015-04-21 Thread Valery Smyslov
since IANA will ask this question anyway. Regards, Valery Smyslov. ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

Re: [IPsec] Two questions aboutdraft-ietf-ipsecme-chacha20-poly1305-00

2015-04-15 Thread Valery Smyslov
Hi, On Mar 30, 2015, at 5:39 PM, Yoav Nir ynir.i...@gmail.com wrote: Hi, There is two questions I would like guidance from the group about. First is the nonce/IV question: In the current draft, there is a 64-bit IV with guidance not to repeat them (so use a counter or LFSR). The function

Re: [IPsec] Restarting the discussion about the puzzle

2015-05-20 Thread Valery Smyslov
Hi Yaron, First, I raised a third concern, which is that allowing the client to decide on the difficulty of the puzzle it is willing to solve adds unneeded complexity. Basically the client doesn't have enough information to make a good decision. The problem is that the server doesn't have

Re: [IPsec] How to negotiate a new capability with parameters

2015-05-20 Thread Valery Smyslov
to the lack of details you have given, but as you described it must be worked. Regards, Valery Smyslov. Hello, we would like to implement new vendor specific capabilities under IKEv2. This capability requires argument passing. These arguments should be protected (encrypted and signed). We were

Re: [IPsec] I-D Action: draft-ietf-ipsecme-ikev2-null-auth-07.txt

2015-06-03 Thread Valery Smyslov
Maintenance and Extensions Working Group of the IETF. Title : The NULL Authentication Method in IKEv2 Protocol Authors : Valery Smyslov Paul Wouters Filename: draft-ietf-ipsecme-ikev2-null-auth-07.txt Pages : 15 Date

Re: [IPsec] Stephen Farrell's Yes on draft-ietf-ipsecme-ikev2-null-auth-06: (with COMMENT)

2015-05-27 Thread Valery Smyslov
. Hope this long explanation helps. - 2.5: hand out is an odd phrase here - would be better to expand on that I think and say more precisely what should never be done. I think Paul Wouters, my co-author, will address this and will expand the text. Regards, Valery Smyslov

Re: [IPsec] Question about PFS in IKEv2

2015-05-28 Thread Valery Smyslov
If your setup is set to that you configure only one Diffie-Hellman for the IKEv2, which is then used for both IKE SA and Child SAs, then you would notice this misconfiguration immediately. My product has a separate configuration for phase 1 Diffie-Hellman group and phase 2 Diffie-Hellman

Re: [IPsec] PSK mode

2015-08-20 Thread Valery Smyslov
we add similar mode to IKEv2? Regards, Valery Smyslov. They don't mention IKEv2. I don't know IKEv2 well enough to know whether there are any symmetric PSK authentication schemes, but if not, perhaps there should be. The point they're making is that the ECC-based authentication methods

Re: [IPsec] [IPSec] The NULL Authentication Method in IKEv2 Protocol - draft-ietf-ipsecme-ikev2-null-auth-07

2015-08-11 Thread Valery Smyslov
to connect to. Regards, Valery Smyslov. - Original Message - From: Dharmanandana Reddy Pothula To: s...@elvis.ru ; pwout...@redhat.com Cc: ipsec@ietf.org Sent: Tuesday, August 11, 2015 5:44 PM Subject: [IPSec] The NULL Authentication Method in IKEv2 Protocol - draft-ietf

Re: [IPsec] DDoS draft next steps - CAPTCHA

2015-08-14 Thread Valery Smyslov
Hi Yaron, that was my idea to use CAPTCHA as a puzzle. My thoughts were the following. We came to the problem that weak clients cannot solve strong puzzles, so using puzzles for DDoS protection makes legitimate weak clients uncapable to establish IKE SA. Then I thought that probably we can use

Re: [IPsec] DDoS draft next steps - memory intensive puzzle

2015-08-14 Thread Valery Smyslov
Hi again, the idea of memory-intensive puzzle is present in Erik Nygren's draft TLS Client Puzzles Extension (http://www.ietf.org/id/draft-nygren-tls-client-puzzles-00.txt). The idea is to create puzzle in such a way, that the time to solve it depends rather on available RAM, than on CPU power.

Re: [IPsec] Call for adoption: draft-nir-ipsecme-curve25519 as a WGwork item

2015-08-26 Thread Valery Smyslov
Hi, I support adopting this document. Regards, Valery Smyslov. Greetings. There was some general interest in having a standard way to modern elliptic curves for ephemeral key exchange. Please respond in this thread whether or no you think this document is a good start on that work

Re: [IPsec] TCP Encapsulation draft

2015-12-15 Thread Valery Smyslov
Hi Tommy, thank you for the answers. See my comments inline. The idea of using TCP as the fallback from UDP is exactly what the entire draft is about. The preconfiguration is not whether to always use TCP, but whether to use TCP once UDP fails, and upon which port. Since the entire idea of

[IPsec] TCP Encapsulation draft

2015-12-14 Thread Valery Smyslov
termines peer IP address and protects to some extend from spoofing (I assume ISN is unpredictable as it should be). Another thing that becomes useless is sending NAT keepalive messages (but see previous comment). And IKEv2 extension that becomes useless with T

Re: [IPsec] TCP Encapsulation draft

2015-12-17 Thread Valery Smyslov
Hi Tero, If no cryptographically protected messages have been received on an IKE SA or any of its Child SAs recently, the system needs to perform a liveness check in order to prevent sending messages to a dead peer. Here - if you don't want to send message to a peer, you don't care

Re: [IPsec] TCP Encapsulation draft

2015-12-17 Thread Valery Smyslov
This is exactly what happens when you using NAT-T in normal case too. I.e. if the responder looses state, it cannot do anything until initiator reconnects. What do you mean by state here? SA? It is not so easy for attacker to force responder loose its SA. If the responder is rebooted than it

Re: [IPsec] TCP Encapsulation draft

2015-12-15 Thread Valery Smyslov
Hi Paul, The situation described above is quite real. Suppose the client is downloading a large file from the server. In this case the server always has data to be sent, while the client only responses with ACKs. If the client receives no new data it just waits. Of course if it has something

Re: [IPsec] TCP Encapsulation draft

2015-12-15 Thread Valery Smyslov
Since the liveliness of a peer is only questionable when no traffic is exchanged, a viable implementation might begin by monitoring idleness. Along these lines, a peer's liveliness is only important when there is outbound traffic to be sent. That I disagree with. I want to cleanup

Re: [IPsec] New Version Notification for draft-smyslov-ipsecme-ikev2-compression-00.txt

2016-01-08 Thread Valery Smyslov
Hi Yoav, First, the problem of IKE having too large packets in certain environments is a real problem. We’ve already addressed it with fragmentation, and the TCP encapsulation draft proposes yet another way. I don't think that compression is an alternative to TCP encapsulation. TCP

Re: [IPsec] New Version Notification for draft-smyslov-ipsecme-ikev2-compression-00.txt

2016-01-08 Thread Valery Smyslov
Hi Paul, If you mean TLS, then as far as I understand the compression-related attacks on TLS rely on an ability for an attacker to insert specific data into the encrypted (and compressed) stream that contains secret information (e.g. password). I don't think it's relevant to IKE and it is

Re: [IPsec] New Version Notification for draft-smyslov-ipsecme-ikev2-compression-00.txt

2016-01-09 Thread Valery Smyslov
It depends on the particular content of the messages. Those payloads that contain random (or randomly-looking) data like Nonce, KE, most VIDs are almost uncompressable. However the content of SA payload contains so many zeroes that it can be compressed of up to 90%. So, if your IKE_SA_INIT's SA

[IPsec] Fw: New Version Notification for draft-smyslov-ipsecme-ikev2-compression-00.txt

2015-12-25 Thread Valery Smyslov
Hi, I've posted a new draft on using compression in IKEv2. Comments, thoughts, criticism are very very welcome. Regards, Valery Smyslov. A new version of I-D, draft-smyslov-ipsecme-ikev2-compression-00.txt has been successfully submitted by Valery Smyslov and posted to the IETF repository

Re: [IPsec] Review of draft-ietf-ipsecme-ddos-protection-02

2015-12-01 Thread Valery Smyslov
Hi David, thank you for the careful review. I hope we'll manage to address your comments and issue an updated version shortly. Please find more inline. Regards, Valery. - Original Message - From: Waltermire, David A. To: IPsec@ietf.org Sent: Tuesday, December 01, 2015 6:15 AM

Re: [IPsec] RFC 7296 - Internet Key Exchange Protocol Version 2 (IKEv2)

2015-11-23 Thread Valery Smyslov
Initiators include wildcard traffic selectors in Request allowing Responders to narrow them according to its policy. Hope this helps. Feel free to ask more if you have any concerns. Regards, Valery Smyslov. - Original Message - From: Michael Christian To: ipsec@ietf.org Sent

Re: [IPsec] NIST question concerning IKEv2 and quantum resistance

2016-01-12 Thread Valery Smyslov
be addressed. Regards, Valery Smyslov. - Original Message - From: Panos Kampanakis (pkampana) To: Perlner, Ray ; ipsec@ietf.org Cc: Liu, Yi-Kai ; David McGrew (mcgrew) ; Waltermire, David A. ; Frankel, Sheila E. ; Scott Fluhrer (sfluhrer) ; Moody, Dustin Sent: Tuesday, January 12

Re: [IPsec] Review of draft-ietf-ipsecme-ddos-protection-06

2016-06-06 Thread Valery Smyslov
[ cut everything we agreed ] > > Depending on the Responder implementation, this can be repeated > > with > > the same half-open SA. > > > > I don't think this "depends on the implemention". Since any on-path > > attacker can spoof rubbish, a Responder MUST ignore the

Re: [IPsec] Review of draft-ietf-ipsecme-ddos-protection-06

2016-06-03 Thread Valery Smyslov
Hi Paul, An obvious defense, which is described in Section 4.2, is limiting the number of half-open SAs opened by a single peer. However, since all that is required is a single packet, an attacker can use multiple spoofed source IP addresses. I am not sure why this is

Re: [IPsec] Call for adoption on draft-pauly-ipsecme-tcp-encaps as an IPSecME WG document

2016-06-06 Thread Valery Smyslov
This is the official call for adoption of https://datatracker.ietf.org/doc/draft-pauly-ipsecme-tcp-encaps/ as an IPSecME working group (WG) document. By adopting this draft the WG is agreeing to take this on as an official WG item to continue work on the draft. Please reply with any comments

Re: [IPsec] Status of draft-ietf-ipsecme-ddos-protection

2016-05-30 Thread Valery Smyslov
Hi Paul, On the other hand, if we go this way and give the puzzles stuff an Experimantal status, then probably very few vendors (if any) will implement it and the real problem of defending against (D)DoS attacks will remain unaddressed. I don't think the puzzles implementation adoption will

Re: [IPsec] Status of draft-ietf-ipsecme-ddos-protection

2016-05-31 Thread Valery Smyslov
The concern is not about stand-alone puzzles document. It is about an Experimental status of that document versus Standards Track in the current draft. Vendors tend to ignore Experimental RFCs. The conventional wisdom is that vendors tend to ignore whatever status the IETF assigns to

Re: [IPsec] Review of draft-ietf-ipsecme-ddos-protection-06

2016-06-02 Thread Valery Smyslov
Hi Paul, thank you for the very thorough review (and especially - for the nits). This is a partial review of draft-ietf-ipsecme-ddos-protection-06 up to Section 6. I hope to complete the rest in the next few days. I think this document needs another revision before continuing. (and I would

[IPsec] Status of draft-ietf-ipsecme-ddos-protection

2016-05-26 Thread Valery Smyslov
Hi, in Buenos-Aires it was expressed a proposal to split the DDoS protection draft into two. One of them would describe possible kinds of (D)DoS attacks and would suggest some counter measures to thwart them without introducing anything new into the IKEv2 protocol. The other document (with

Re: [IPsec] Review of draft-ietf-ipsecme-ddos-protection-06

2016-06-22 Thread Valery Smyslov
rmire, David A. (Fed)" <david.walterm...@nist.gov> To: "Valery Smyslov" <sva...@gmail.com>; <p...@nohats.ca> Cc: <ipsec@ietf.org>; "Yoav Nir" <ynir.i...@gmail.com> Sent: Wednesday, June 22, 2016 8:21 PM Subject: RE: [IPsec] Review of draft-ietf-ips

Re: [IPsec] SLOTH & IKEv2

2016-01-15 Thread Valery Smyslov
Hi Tero, If I got it right the ability for an attacker to quickly find a hash collision is based (besides using weak hashes) on presumption that the cookie is always the very first payload in the message, as depicted in the Section 2.6 in the RFC 7296. So it is presumed that the cookie always

Re: [IPsec] SLOTH & IKEv2

2016-01-15 Thread Valery Smyslov
Hi Yoav, What does IPsec community think of it? Should we fix the protocol to thwart this attack completely? Is the recommendation to move the COOKIE to the end of the message enough to achive that? Will this change break many existing implementations? As far as I can tell, the cookie hash

Re: [IPsec] SLOTH & IKEv2

2016-01-15 Thread Valery Smyslov
The initiator cannot validate the cookie - it is an opaque blob for him. Should he reject the cookie if its length is more than 64 bytes? Possibly. I don't know. It's a bit strange to check an opaque object… It’s an opaque object that the RFC says should be up to 64 bytes. I know that.

Re: [IPsec] New Version Notification for draft-smyslov-ipsecme-ikev2-compression-00.txt

2016-01-13 Thread Valery Smyslov
As I've already said I'm not an expert in the IoT world. And I still think that the compression can also be used in a "big world". It would allow to keep the IKE_SA_INIT message size bounded when more features are added into the protocol. And I don't see it as an alternative to TCP

Re: [IPsec] New Version Notification for draft-smyslov-ipsecme-ikev2-compression-00.txt

2016-01-13 Thread Valery Smyslov
Hi Tommy, In those environments the IKEv2 is used to negotiate link keys between two devices. The payloads are already quite compacted, i.e. there will not be several proposals for ciphers, only one, and all extra payloads are omitted anyways. Tero’s comments seem to confirm the idea that

<    1   2   3   4   5   6   7   8   9   >