> On Mar 19, 2021, at 12:36 PM, Paul Wouters <p...@nohats.ca> wrote:
> 
> 
> Hi,
> 
> We have implemented TCP but are running in some issues where the RFC and
> the bis draft does not give us clarify.
> 
> If the IKE_INIT over TCP gets back an INVALID_KE, what is supposed to
> happen? Is the responder expected to close the TCP session, since it
> never created a state for this exchange? Is the initiator expected
> to re-use the TCP connection to send a fresh new IKE_INIT request
> with the proper KE ? This case is similar to the COOKIE case, but
> there the initiator is expected to keep state and re-use, except
> one is not supposed to trigger COOKIES on TCP.

My interpretation here, and the way our client works, is that the connection 
may be reused.

From 7296:

 If the
   initiator guesses wrong, the responder will respond with a Notify
   payload of type INVALID_KE_PAYLOAD indicating the selected group.  In
   this case, the initiator MUST retry the IKE_SA_INIT with the
   corrected Diffie-Hellman group.

This implies that the new IKE_SA_INIT is a retry of the same IKE SA. Indeed, at 
least for our client, we don’t reset the SA values.

If that is the interpretation of the retry after INVALID_KE_PAYLOAD, it doesn’t 
violate 8229:

   Multiple IKE SAs MUST NOT share a single TCP connection, unless one
   is a rekey of an existing IKE SA, in which case there will
   temporarily be two IKE SAs on the same TCP connection.

> 
> Note I think this sentence is incorrect:
> 
>       Moreover, a TCP Responder creates state once a SYN packet is received
> 
> libreswan listens on the TCP socket, but for INVALID_KE responses it
> creates a response without creating a state.

This sounds like a good clarification to make. We can say that it may create 
state at that point.
> 
> Similarly, when IKE_AUTH fails with NO_PROPOSAL_CHOSEN or
> AUTHENTICATION_FAILED, who is responsible for closing the TCP socket?
> The initiator or the responder?

8229 says:

   In order to close an IKE session, either the Initiator or Responder
   SHOULD gracefully tear down IKE SAs with DELETE payloads.  Once the
   SA has been deleted, the TCP Originator SHOULD close the TCP
   connection if it does not intend to use the connection for another
   IKE session to the TCP Responder.  If the connection is left idle and
   the TCP Responder needs to clean up resources, the TCP Responder MAY
   close the TCP connection.

This generally means: client goes first when closing TCP, but server should 
close if the client doesn’t in time.

> 
> Perhaps a similar issue happens when an IKE lifetime is reached before
> a rekey or re-auth happened. But in that case I guess the party sending
> the delete can linger briefly for the reply and then close the socket
> if it didn't get closed by the responder to the delete request.

Note also that a new TCP connection can always be used for an IKE SA from an 
old connection; that is allowed, so it’s possible that if the server closes too 
early, the client will reopen with a new connection to send remaining messages.

Thanks,
Tommy
> 
> Paul
> 
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to