On Wed, 23 Sep 2020, Valery Smyslov wrote:

This change will require both client and server to be updated to take an effect.
IMHO in this case a better option would be as follows: negotiate an extension
that will change AUTH payload input by zeroing out content of cookie.

What would this actually achieve?

We have a server that is under a serious DDoS attack. It is sending back
COOKIES and soon might have too many half open SA's to even accept any
new connections with COOKIES. Those problems are much more severe than
the legitimate client needing to once retry the overloaded server
because the server changed a cookie secret that should be a rare event
to begin with - in our implementation 1 hour. So the client, which can
do 1 exchange attempt per 10 seconds? Would have a 0.277 % change of
hitting that slot and having another 10s delay for the next keying
attempt to succeed. Is the chance of the DDoS attack plus the chance
of the secret reloading worth a new IKE extension at all?

Paul

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to