Paul,

Before the one roundtrip mechanism is deleted, could you summarize how the security issue that was raised is applicable under the threat model we work with? Let me help you out. It is not really applicable. Here is why:

RFC 3552 says that "While it is not a requirement that any given protocol or system be
   immune to all forms of attack, it is still necessary for authors to
   consider as many forms as possible.  Part of the purpose of the
   Security Considerations section is to explain what attacks are out of
   scope and what countermeasures can be applied to defend against them.
   In"

That poorly written and poorly edited RFC (notice the dangling "In") is all we have as guidance unfortunately. What it does say is that it is perfectly fine to specify what attacks are out of scope. We cannot have someone noting that "auditors" will force large installations to do this or that and have that dictate using a grossly inefficient resumption protocol! It begs that questions of who those auditors are, what jurisdiction they are operating under and assuming what threat model?

The IKEv2 RFC really defines what is in scope. Server state exhaustion attacks are not in scope for being mandatorily made "more difficult" for some definition of more.

Finally, if we don't like options, we are in the wrong standards body! When we design a security protocol for a variety of threat models and performance constraints, we are bound to have options.

Thank you.

best regards,
Lakshminath

On 4/20/2009 10:45 PM, Paul Hoffman wrote:
<co-chair hat on>

Greetings again. Of the people who replied, two favored mandating two
round trips, and one favored keeping the current one round trip. That
(anemic) result, plus the comment that lead to this thread, leads me
to say that we need to change draft-ietf-ipsecme-ikev2-resumption to
require two round trips.

Draft authors: please prepare a -03 with only the two-round-trip
solution, and pull out the text about the one-round-trip option.

If someone really objects to this, please prepare a personal Internet
Draft that lists exactly how you would change the current -03 draft
to cover all the security issues that were brought forward.

--Paul Hoffman, Director --VPN Consortium
_______________________________________________ IPsec mailing list
IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to