Michael Richardson writes:
>     > We added a suspend commend, but since that deleted states on the
>     > initiator, it ended up sending delete's to the server. The server
>     > deleted the IKE SAs. Now the client can resume a connection that
>     > technically was ended by Delete.
> 
> It seems that either the client shouldn't send deletes, or:

I think the original idea is that if the client or server send explict
delete, that is supposed to mean that IKE SA is deleted, and all
information about it should be deleted, including resumption. 

>     > If the client comes back with a valid ticket within the valid expiry
>     > time, the server does not know if A) the IKE SA was already deleted
>     > and the ticket theoretically should no longer be valid or B) the server
>     > deleted the IKE SA due to liveness timeouts and the client comes back
>     > with tickets to resume this.
> 
> the server should behave the same way regardless of who deleted the SA.

If the server deletes the IKE SA, because of liveness failure, that is
not explicit delete, i.e. not something that happened based on the
adminstrative action or similar, but instead it could be just
temporary failure in the network. So if the server deletes IKE SA
because of livenss check failures it should not mean that resumption
state or the IKE SA is permanently deleted. 

>     >> >> The case of a cluster of gateways is not handled by the RFC. This is
>     >> >> alluded to at the end of the Introduction.
>     >>
>     >> > that was an unfortunate easy way to not address the problem of 
> syncing
>     >> > state between servers :)
>     >>
>     >> Can you explain what the problem is if the ticket is used more than 
> once
>     >> (with different gateways) within the time B?
> 
>     > So this indeed is the important question for all of these cases. What is
>     > the harm? Because why does the RFC state that deleted IKE SAs should not
>     > be resumed?
> 
> I think that maybe the intention was that IKE SAs deleted by the server due to
> operator action should never be resumed.   Because the user changed their
> password, or their 2FA was compromised, or ...
> Maybe the state-lite way is that the identity that involved in the deleted
> state is marked as needing re-authentication.

This is what I think the RFC tries to say. I.e., if either end
explictly did adminstrative action to delete the IKE SA, then it
should not be possible to do resumption to it.

Of course if the user crendentials were compromised or
re-authentication is required that means that the configuration of the
server has changed for that user, and then ticket should be invalid
because the configuration is different.

Normally the ticket is encrypted with key that is changed every time
the server configuration changes, which means changing the server
configuration will invalidate all tickets. If this is not wanted for
change which only affects certain user, then ticket should contain
user identification number or similar, and the configuration serial
number for that user, and every time something changes in the user
configuration which requires revoking outstanding tickets, the
configuration serial number for that user is incremented. If client
tries to use ticket which has wrong configuration serial number for
user, then server will simply reject that ticket.

Anyways server or client should NOT invalidate tickets just because
it deleted the IKE SA because of liveness failures. 
-- 
kivi...@iki.fi

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to