Yaron Sheffer writes:
> If the authentication fails in such ways that the entries cannot
> create IKE SA (authentication failure or similar), then the response
> will be unencrypted, unauthenticated notify. There is no point of
> sending the notify encrypted and integrity protected, as it is not
> authenticated (as initiator and responder have not yet verified the
> AUTH payloads):
> 
>                                  <--  HDR, N(error_for_ike_sa)
> 
> The initiator receiving such reply MUST NOT immediately stop the SA
> creation, but it should still retransmit the message few times, in
> case that error notify was forgery and the real responder will reply
> with valid reply. It can use the recipient of such message as a hint
> to tell that authentication failed, thus it can shorten the
> retransmission timers from few minutes down to few tens of seconds.
> 
> Paul:
> 
> The first part (don't nuke the IKE SA) is resolved, but the second part
> (should the error message be encrypted) is still an open issue.
> 
> Yaron:
> 
> And then we had a long discussion (see e.g.
> http://www.ietf.org/mail-archive/web/ipsec/current/msg03783.html) but it was
> never resolved.

I think I have now changed my mind about this issue, meaning I think
the reply should be encrypted and MAC'ed but it should still be
clearly specified that it is unauthenticated, as we have not yet
verified the identity of the other end. Having the message encrypted
and MAC'ed proofs that the entity who sent us the IKE_SA_INIT is also
responsible for this IKE_AUTH error, which means there is no point of
retransmitting our request anymore, as only the party participating
the Diffie-Hellman could have generated the error.

I.e. when error of type:

                                <--- HDR, SK { N(error_for_ike_sa) }

is received we can consider that IKE SA connection as failed, and
delete the IKE SA immediately, but we should not consider that error
as permanent error from that node, as man in the middle attacker could
have generated such error instead of the intended party.

After receiving such error initiator MAY restart IKE SA creation from
the beginning few times before completely failing the IKE SA creation.
This is related to the section 2.4 3rd last paragraph which explains
how initiator can protect himself against this kind of poison the
connection setup attempt. I.e. if IKE SA negotiation failed then
initiator should perhaps consider there might be man-in-the-middle and
enable that protocol described there, i.e. process multiple
IKE_SA_INIT replies, and continue them in paralleal and then pick the
one which succeeds and fail the others. 
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to