On Oct 21, 2010, at 11:59 AM, Tero Kivinen wrote: <snip />
> The section 10.4 seems to assume that attacker cannot force the load > balancer to send the faked packet to any other cluster member than the > one mapped by the source IP-address of the packet. As the algorithm > how the load balancer really selects the peer where it sends the > packet is not necessarely known by the IPsec implementations, I do not > think we can trust we can include all same information to the token > generation. I agree, although I suspect some of my co-authors might not. > For example it could use source port numbers, or destination > IP-address, etc so I think it is quite unsafe to assume anything what > the load balancer might do. > > I think it would be safer to forbid situations where the cluster > members share the same QCD token unless they also share the IKE SA > state. I agree that there is a problem that needs solving here, but I also see some great utility in allowing QCD on such configurations. In a hot-standby cluster, you can have QCD instead of synchronizing state. When one gateway fails, the other takes over immediately (or in less than one second). This is like a reboot, but instantaneous, and it's easier and cheaper to implement than a real cluster with state synchronization - you only need to make sure that the QCD token secret is the same. In this configuration you don't have a problem, unless there's a way to get responses out of the standby member before it becomes active. If you also want to achieve scalability with your cluster, you implement load sharing. There is no state synch, but in case one of the gateways fails, we want the other to be able to use QCD to quickly destroy the existing IKE SAs. Again, if I can get one member to generate a token for an IKE SA owned by another gateway, the attacker wins. I'd say that this requires some very big assumptions for the load balancer anyway (for example, that without a failure, all IKE traffic for a particular SA goes to the same gateway, and even after a failure, old IKE SAs owned by other gateways remain with their respective gateways). We might need some interesting text to describe the requirements there. I think I will close #194, and open a new one that makes the contentious point clearer. _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec