Frederic Detienne writes:
> In order to secure QCD, the token has to include all the fields that
> can be used for routing a packet to any given server: 
> 
>  - source/destinatition IP
>  - protocol (UDP / ESP)
>  - source/destination ports if applicable

But the problem is that the IPsec implementation does not have way to
know what fields is used. Some future load balancer might use
something else in addition to those you listed there and if that
happens we immediately open the QCD protocol for attacks.

> 
> This is of course on top of the SPI and the QCD Secret.
> 
> In doing so, we impose additional constraints on QCD's security and
> scope but this is necessary to ensure QCD is a secure protocol. 
> 
> So we are now facing three main options
>  1- keep using 5.1 token generation and mention that it is dangerous
> in specific situations

5.1 token generation is not dangerous, unless you share QCD token
generation secrets.

Both 5.1 and 5.2 token generations are dangerous if you share QCD
token generation secrets unless you know exactly how your load
balancer demuxes the IKE packets, and include all information used for
this demuxing to your QCD token and make sure load balancer cannot
pass packets to any members directly (i.e. bypassing the demuxing). 
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to