Or think of a single IKE gateway that sets up IPsec SAs for multiple IPsec 
boxes.  Like the key server in MSEC.

On Apr 27, 2010, at 3:27 PM, Yaron Sheffer wrote:

> Hi Jitender,
> 
> regarding your point #3: I am not sure that if I trust a gateway to
> connect to, I also trust it to say that all ESP traffic from an
> arbitrary IP address should be treated as a Child SA of this gateway. I
> cannot see a concrete attack based on this assumption, but it can surely
> result in interesting configuration issues. Just think of two IKE
> gateways that (possibly because of misconfiguration) share one IPsec
> box.
> 
> Thanks,
>       Yaron
> 
> On Mon, 2010-04-26 at 22:23 -0400, Jitender Arora wrote:
>> Hi Yaron,
>> 
>>     Thanks for the feedback. I will definitely read the 
>> draft-ietf-ipsecme-ipsec-ha and will get back to you.
>> 
>> Here are my answers to your suggestions:
>> 
>> 1.  I will point the section 5.1 in the introduction itself that way the 
>> purpose and applications of the draft are clear.
>> 
>> 2.  We did discuss the NAT scenarios and were of the opinion that if we take 
>> care of the NAT scenario's then it will change the IKEv2 protocol in a major 
>> way.
>> 
>> Here is how we were planning to solve the NAT issues:
>> 
>> We were thinking that once the IKE_AUTH exchange is completed and the 
>> different tunnel addresses are specified by the VPN client or the Gateway, 
>> each side can send the informational IKEv2 message containing the 
>> NAT_DETECTION_SOURCE_IP and the NAT_DETECTION_DESTINATION_IP payloads (they 
>> will have to send this informational message using the tunnel addresses as 
>> the IKEv2 peer addresses) to see if there are NAT devices between them or 
>> not. If they determine that there is a NAT device, they can always use NAT 
>> addresses as the tunnel address.
>> 
>> Using this approach the client or the gateway can determine whether there is 
>> a NAT device in the ESP traffic path or not. But using this approach 
>> requires that the Client and the gateway also to be able to listen for the 
>> IKE packets on the tunnel addresses and also these IKE packets will be 
>> protected by the IKE-SA negotiated on the IKE addresses.
>> 
>> So this will require a lot of changes in the current implementation, but 
>> this is certainly possible.
>> 3. The tunnel addresses are negotiated during the IKE-AUTH or the 
>> CREATE_CHILD_SA exchanges. These exchanges are protected using the IKE-SA 
>> and also the users are being authenticated by each side before the tunnel 
>> addresses are accepted. So once the users are authenticated, the Security 
>> Associations will be setup using the tunnel addresses as the tunnel src and 
>> the tunnel destination addresses, so the traffic will protected using these 
>> SA's. Should not this be enough for the case you mentioned below? 
>> 
>> Also as in our case all the IKEv2 signaling will be handled by the same 
>> gateway (load balancer will just act as a pass-through for IKEv2 traffic and 
>> will just choose the gateway), so I am not sure how the sections you 
>> mentioned in the RFC 5685 will be applicable.
>> 
>> Thanks,
>> Jitender
>> 
>> -----Original Message-----
>> From: Yaron Sheffer [mailto:yaronf.i...@gmail.com] 
>> Sent: Sunday, April 25, 2010 5:22 AM
>> To: Jitender Arora
>> Cc: ipsec@ietf.org
>> Subject: Re: [IPsec] New draft posted
>> 
>> Hi Jitender,
>> 
>> this is certainly an interesting approach to the
>> high-availability/load-balancing issue that we are just starting to
>> tackle, as a group. I would appreciate your inputs to the discussion on
>> draft-ietf-ipsecme-ipsec-ha.
>> 
>> Below are a few initial comments on your draft:
>> 
>> - I suggest moving Sec. 5.1 to the front (or at least pointing to it
>> from the Introduction) so that the motivation becomes clear before the
>> protocol details are presented.
>> - Of course, if there are additional usage scenarios, it would be nice
>> to include them.
>> - Essentially ignoring the issue of NAT severely hurts the applicability
>> of this protocol. Even saying something like "use STUN/TURN" is better
>> than limiting the protocol to closed networks.
>> - The security considerations never discuss the issue that the peer can
>> now claims ownership of ANY IP address. I *think* this is just a
>> denial-of-service issue, but it certainly needs to be analyzed. Which
>> leads to the main issue with this proposal:
>> - This is not just a change to IKEv2, it is a rather major change to the
>> IPsec architecture. So I would expect some discussion of RFC 4301
>> entities. See the last 2 paragraphs of
>> http://tools.ietf.org/html/rfc5685#section-3 for an example.
>> 
>> Thanks,
>>      Yaron
>> 
>> On Sat, 2010-04-24 at 10:09 -0400, Jitender Arora wrote:
>>> Hi All,
>>> 
>>> A new version of I-D, draft-arora-ipsecme-ikev2-alt-tunnel-addresses-00.txt 
>>> has been posted to the IETF repository.
>>> 
>>> Filename:    draft-arora-ipsecme-ikev2-alt-tunnel-addresses
>>> Revision:    00
>>> Title:               Alternate Tunnel Addresses for IKEv2
>>> 
>>> Please take a look and comment.
>>> 
>>> Regards,
>>> Jitender
>>> _______________________________________________
>>> IPsec mailing list
>>> IPsec@ietf.org
>>> https://www.ietf.org/mailman/listinfo/ipsec
>> 
>> 
> 
> 
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec
> 
> Scanned by Check Point Total Security Gateway.

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to