On Mon, 14 Aug 2017, David Schinazi wrote:

[DS] I think "showing ID" is exactly what we're avoiding here. You can think of 
this in terms of the Socialist Millionaire Problem - we want to be able to assert 
identity without anyone disclosing anything first. And the proposed solution is to send a 
MAC without the identity of the key used to MAC. Peers can than iterate their list of 
peers to check the MAC against.

But when you are using X.509 based clients, you will have never seen the
cert/ID until you receive it via IKE ? So your use case is limited to
very static type deployments (which suffer less from this issue as they
tend to not move around)

[DS] Some security is still better than less security, you can imagine timing 
attacks and such but this is better than what we have today.

But I think we would need something a little better to make it part of
an RFC standard.

[DS] I was initially going to make this a separate proposal that only involved 
a pre shared key and SA_INIT MAC, but it was pointed out to me that once you 
have that might as well include the benefits of PPK. If you know of a way to 
solve the described privacy attack vectors without a pre shared key and without 
adding round trips, I'm interested - I couldn't come up with one myself.

A PreSharedKey based solution is also very limiting, and people should
be migrating away from PSK in favour of RSA/ECC based solutions :P

I understand your use case (prevent blocking of hidden IKE over TCP/TLS
servers) but it might not be a use case the IETF can solve. From an
IETF perspective, the way to solve this would be to IPsec everything,
so that blocking based on ESP visibility becomes impossible. Which
is why I'd like to see more Opportunistic IPsec.

But if we can fit in your goal, that would be great. And I think if
that takes another roundtrip people can make that decision. But I
think nation state actors are already active attackers, so I see
not too much value in a passive attackers only solution, which
IKE over TCP/TLS already is.

Paul

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to