> Hi Valery,
> 
> Both look good to me. Thanks!
> 
> One typo: s/mesages/messages/

Thank you!

Regards,
Valery.

> Thanks!
> Mirja
> 
> 
> 
> > On 8. Jan 2020, at 15:04, Valery Smyslov <s...@elvis.ru> wrote:
> >
> > Hi Mirja,
> >
> > [...]
> >
> >>> It is definitely better, thank you!
> >>>
> >>>   For this purpose, if using PPKs for communication with this responder
> >>>   is optional for the initiator (based on the mandatory_or_not flag),
> >>>   then the initiator includes a NO_PPK_AUTH notification in the above
> >> message
> >>>   to indicate this optionality to the responder.
> >>>
> >>> Is it OK now?
> >>
> >>
> >> I still think use of normative language would be appropriate here.
> >
> > OK.
> >
> >    For this purpose, if using PPKs for communication with this responder
> >    is optional for the initiator (based on the mandatory_or_not flag),
> >    then the initiator MUST include a NO_PPK_AUTH notification in the
> above
> >   message  to indicate this optionality to the responder.
> >
> >>> [...]
> >>>
> >>>>>>>> 3) Waiting for one or two RTTs is probably a good rule. The side-
> >> effect
> >>>>>> could
> >>>>>>>> be that the initiator stays waiting for responses for too long which
> >>>> delays
> >>>>>>>> the handshake. I am not sure we can mandate in absolute time
> >>>> because
> >>>>>> it
> >>>>>>>> depends on the relative distance between client and server. We
> can
> >>>>>>>> probably include " (e.g., one round-trip) " in the text.
> >>>>>>>
> >>>>>>> I think one or two RTT is too short, moreover since it's an initial
> >> request,
> >>>>>>> no RTT is yet measured (IKEv2 uses UDP as primary transport).
> >>>>>>> We try here to be in line with core IKEv2 spec, which deliberately
> >>>>>>> doesn't give any concrete figures of how long to wait for an
> response
> >>>>>>> (section 2.4 of RFC7296). So, I'd leave the text as is.
> >>>>>>
> >>>>>> Kind of same here. Given you two disagree here already, I think it
> >> would
> >>>> be
> >>>>>> good to give further advise.
> >>>>>
> >>>>> I'm reluctant to provide concrete figures, because RFC7296
> deliberately
> >>>>> doesn't do it and this is just an extension to the IKEv2. I'd rather
> >> reference
> >>>>> the core spec here. How about the following text:
> >>>>>
> >>>>> To thwart
> >>>>> this kind of attack it is RECOMMENDED, that if using PPKs is
> >>>>> mandatory for the initiator and the received response doesn't
> contain
> >>>>> the USE_PPK notification, then the initiator doesn't abort the
> >>>>> exchange immediately, but instead waits for more responses
> >>>>> retransmitting the request until either the received message
> >>>>> contains the USE_PPK or connection times out (see section 2.4 of
> >>>> [RFC7296]
> >>>>> for more details). If all the received responses contain no USE_PPK,
> >> then
> >>>> the exchange is aborted.
> >>>>
> >>>> I looked at section 2.4 of RFC7296 and the situation is actually 
> >>>> different
> >>>> there because the initiator will accept/open multiple connections and
> >> then
> >>>> close them again if detected to not be proper.
> >>>
> >>> I meant another part of 2.4:
> >>>
> >>>  The number of retries and length of timeouts are not covered in this
> >>>  specification because they do not affect interoperability.
> >>>
> >>>> So there is state anyway. Here you don’t have an open connection and
> >> therefore you need an
> >>>> timeout.
> >>>
> >>> Sure we need a timeout. But this is exactly the same timeout which
> >>> IKEv2 initiator uses when trying to establish initial connection with the
> >> peer.
> >>>
> >>>> I would recommend to at least say something like:
> >>>> "Ideally the timeout would be in the order of the RTT plus additional
> >>>> processing delays at the responder. As these times are not known the
> >>>> timeout should be choosen sufficiently larger, however, state may be
> >>>> removed anytime when needed (e.g. in an attack situation).”
> >>>>
> >>>> (Please use your own wording…)
> >>>
> >>> The whole idea of thwarting this attack is not to trust
> >>> the responses not containing USE_PPK notification (suspecting that they
> >> may be forged).
> >>> So the initiator continues to retransmit and wait for other responses.
> >>> For how long? For the same period of time that it would retransmit and
> >> wait for any response
> >>> as if no responses were received at all. So, we introduce no new
> timeouts
> >> here
> >>> comparing with the core spec.
> >>
> >> Okay. I wasn’t aware that these are existing time-outs. I think the
> document
> >> could be more clear about this then.
> >
> > Is this better?
> >
> > To thwart
> > this kind of attack it is RECOMMENDED, that if using PPKs is
> > mandatory for the initiator and the received response doesn't contain
> > the USE_PPK notification, then the initiator doesn't abort the
> > exchange immediately, but instead waits for more response mesages
> > retransmitting the request as if no responses were received at all,
> > until either the received message contains the USE_PPK or exchange times
> out
> > (see section 2.4 of [RFC7296] for more details on retransmission timers in
> IKEv2).
> > If all the received responses contain no USE_PPK, then the exchange is
> aborted.
> >
> > Regards,
> > Valery.
> >
> >> Mirja
> >>
> >>
> >>
> >>>
> >>> Regards,
> >>> Valery.
> >>>
> >>> [...]
> >>>
> >>>> Mirja
> >>>>
> >>>>
> >>>>>
> >>>>> Regards,
> >>>>> Valery.
> >>>>>
> >>>>>> Mirja
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>>>
> >>>>>>> Regards,
> >>>>>>> Valery.
> >>>>>>>
> >>>>>>>> Rgs,
> >>>>>>>> Panos
> >>>>>>>>
> >>>>>>>> -----Original Message-----
> >>>>>>>> From: IPsec <ipsec-boun...@ietf.org> On Behalf Of Mirja
> >> Kühlewind
> >>>> via
> >>>>>>>> Datatracker
> >>>>>>>> Sent: Tuesday, January 07, 2020 8:41 AM
> >>>>>>>> To: The IESG <i...@ietf.org>
> >>>>>>>> Cc: ipsec@ietf.org; ipsecme-cha...@ietf.org;
> >>>> david.walterm...@nist.gov;
> >>>>>>>> draft-ietf-ipsecme-qr-ik...@ietf.org
> >>>>>>>> Subject: [IPsec] Mirja Kühlewind's No Objection on draft-ietf-
> >> ipsecme-
> >>>> qr-
> >>>>>>>> ikev2-10: (with COMMENT)
> >>>>>>>>
> >>>>>>>> Mirja Kühlewind has entered the following ballot position for
> >>>>>>>> draft-ietf-ipsecme-qr-ikev2-10: No Objection
> >>>>>>>>
> >>>>>>>> When responding, please keep the subject line intact and reply to
> all
> >>>>>> email
> >>>>>>>> addresses included in the To and CC lines. (Feel free to cut this
> >>>>>> introductory
> >>>>>>>> paragraph, however.)
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> Please refer to https://www.ietf.org/iesg/statement/discuss-
> >>>> criteria.html
> >>>>>>>> for more information about IESG DISCUSS and COMMENT
> positions.
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> The document, along with other ballot positions, can be found
> here:
> >>>>>>>> https://datatracker.ietf.org/doc/draft-ietf-ipsecme-qr-ikev2/
> >>>>>>>>
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> ----------------------------------------------------------------------
> >>>>>>>> COMMENT:
> >>>>>>>> ----------------------------------------------------------------------
> >>>>>>>>
> >>>>>>>> 1) One small question on section 3:
> >>>>>>>> "if using PPKs for communication with this responder
> >>>>>>>> is optional for the initiator, then the initiator MAY include a
> >>>>>>>> notification NO_PPK_AUTH in the above message."
> >>>>>>>> This does mean that NO_PPK_AUTH notification should not be
> sent
> >>>> when
> >>>>>>>> the mandatory_or_not flag indicates that PPK is mandatory, right?
> >> Or
> >>>> is
> >>>>>> that
> >>>>>>>> a separate configuration? Would be good to clarify in the doc!
> >>>>>>>>
> >>>>>>>> 2) Section 6 says:
> >>>>>>>> "In this situation, it is RECOMMENDED
> >>>>>>>> that the initiator caches the negative result of the negotiation for
> >>>>>>>> some time and doesn't make attempts to create it again for some
> >>>> time,"
> >>>>>>>> Would it be possible to give any hints about what "some time"
> >> means
> >>>> or
> >>>>>> at
> >>>>>>>> least the order of magnitude? Maybe it could be recommended
> to
> >>>> wait a
> >>>>>>>> couple of seconds? Or how long is it usually expected to take until
> >> the
> >>>>>> half-
> >>>>>>>> open connection will be expired?
> >>>>>>>>
> >>>>>>>> 3) Also here:
> >>>>>>>> "then the initiator doesn't abort the
> >>>>>>>> exchange immediately, but instead waits some time for more
> >>>> responses
> >>>>>>>> (possibly retransmitting the request)."
> >>>>>>>> How long should one wait? Probably 1-2 RTTs if the RTT is known
> or
> >>>>>> maybe
> >>>>>>>> there is some good max value like 500ms or 1s or more...?  Is
> there
> >>>> any
> >>>>>> risk
> >>>>>>>> in waiting too long?
> >>>>>>>>
> >>>>>>>> 3) And one high-level comment (without knowing to much details
> >>>> about
> >>>>>>>> IKEv2):
> >>>>>>>> Would it be possible do a downgrade detection, meaning when
> >> non-
> >>>> PKK
> >>>>>>>> encryption is established the initiator would tell the responser
> again
> >>>> that
> >>>>>> it
> >>>>>>>> was initially requesting PKK, just to double-check...?
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> _______________________________________________
> >>>>>>>> IPsec mailing list
> >>>>>>>> IPsec@ietf.org
> >>>>>>>> https://www.ietf.org/mailman/listinfo/ipsec
> >>>>>>>
> >>>>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>
> >>>
> >
> >
> >
> 
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to