On Wed, 23 Sep 2020, Valery Smyslov wrote:
This change will require both client and server to be updated to take an effect. IMHO in this case a better option would be as follows: negotiate an extension that will change AUTH payload input by zeroing out content of cookie.
What would this actually achieve? We have a server that is under a serious DDoS attack. It is sending back COOKIES and soon might have too many half open SA's to even accept any new connections with COOKIES. Those problems are much more severe than the legitimate client needing to once retry the overloaded server because the server changed a cookie secret that should be a rare event to begin with - in our implementation 1 hour. So the client, which can do 1 exchange attempt per 10 seconds? Would have a 0.277 % change of hitting that slot and having another 10s delay for the next keying attempt to succeed. Is the chance of the DDoS attack plus the chance of the secret reloading worth a new IKE extension at all? Paul _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec