Frederic Detienne writes:
> Like I explained earlier, sharing the address-less QCD token is
> problematic in multiple practical network designs: 
> - Stateless failover pairs (e.g. VRRP,  HSRP, ..)
> - Load Balanced clusters
> - Anycast server clusters

I do not think having address inside the QCD calculations help at all,
as the attacker can easily fake that address (it is source address of
the IKE SA packet triggering QCD).

Adding source address to the QCD token hash only helps if you can
guarantee that the load balancer forwarding packets to multiple
cluster members does it based on the source address and there is no
way to get packet past the load balancer without this demuxing. 

> In general, QCD address-less token generation is dangerous in all
> the scenarios where the server owning the state can be bypassed by
> the attacker and any other server in the cluster, not owning state,
> can be targeted to receive the "invalid" IKE or ESP packet.

I would remove the "address-less" there. QCD is dangerous in those
situations regardless whether address is there or not. 

> In the current proposal, I agree that the issues raised by
> address-less token should be more explicit and general. This token
> method should be explicitly forbidden when either

You misunderstood me. I am not proposing forbidding or adding text for
the address-less token. It is secure and works fine on those
environments where QCD can be used, i.e. where the QCD token
generation secret is not shared with other members.

I am opposed of including cookies with IP addresses, as I do not think
that solves any problem, as it puts way too much implicit assumptions
how the load balancer work. I think that section 5.2 is dangeours and
should be removed, and we should forbid sharing QCD token generation
secret in all cases where the IKE SA databases are not shared too.
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to