Michael Richardson writes:
> 
> Tero Kivinen <kivi...@iki.fi> wrote:
>     > Normally the ticket is encrypted with key that is changed every time
>     > the server configuration changes, which means changing the server
>     > configuration will invalidate all tickets.
> 
> This is probably a rather bad thing.

If server configuration is changed to require AES-GCM instead of 3DES
then I think all active tickets needs to be invalidated to make sure
they do not work. Easiest way is to change the ticket encrypting key.
Or if configuration is changed so that tunnels to 10.0.0.0/8 is no
longer allowed...

Global configuration changes are quite rare, and most implementations
I know do not bother checking whether existing IKE SAs match the new
policy or not, but simply delete all IKE SAs and recreates them.

Of course things that do not affect existing IKE SAs like adding new
users, or new networks etc are not really such global changes, and do
not require IKE SAs to be recreated.

Again if you want you can make your implementation so it matches the
policy and all existing IKE or Child SAs, and deletes only those IKE
or Child SAs which are against new policy, but that is quite
complicated thing to do, especially as you might not have stored all
information needed to match the policy (i.e., you might not have the
original certificate used to authenticate the specific IKE SA, so you
might not be able to match whether that has something that is no
required by new policy). 

>     > If this is not wanted for
>     > change which only affects certain user, then ticket should contain
>     > user identification number or similar, and the configuration serial
>     > number for that user, and every time something changes in the user
>     > configuration which requires revoking outstanding tickets, the
>     > configuration serial number for that user is incremented. If client
>     > tries to use ticket which has wrong configuration serial number for
>     > user, then server will simply reject that ticket.
> 
> In many cases there is a single configuration "template" which applies to all
> users who authenticate with a certificate from a certain CA, or with a login
> matching some pattern.
> 
> In order to store the configuration serial number, on a per-user basis, then
> some state is created a per-user basis.  This does not sound like a horrible
> thing to me, but it is probably something new.

Almost always there is some per user data anyways, most commonly the
password etc, and/or all kind policy information coming from the AAA
server...

I do not think people will configure remote users in such way, that
anybody with EE cert signed with that CA can log in... Almost always
they use EAP or similar and those have per user data.
-- 
kivi...@iki.fi

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to