Hi Michael,

> Tero Kivinen <kivi...@iki.fi> wrote:
>     >> Even without surpassing the 64KB limit, this must be a concern.
>     >> IKEv2's cookie mechanism and puzzles try to increase the cost of the
>     >> attacker per each connection. Now, an attacker must still accept
>     >> these costs but can use one connection to trigger several key
>     >> exchanges, all significantly larger than what we had with DH, making
>     >> the trade-off way better for them compared to non-pqc IKEv2.
> 
>     > No it cannot. Attacker can use cookie only once, and will only get one
>     > exchange created by each cookie exchange, thus it needs to do puzzles
>     > and cookies again for every single attack packet it wants to send.
> 
> I wonder if anyone has any stats on how often cookie challenge is used, how
> often puzzles are invoked.

I've implemented puzzles, but I'm not aware of any other implementation.

What about cookies - in stress tests they are used very intensively.
But I don't have any real life stats for them.

Regards,
Valery.

>     > So I do not think DoS attack properties of the IKEv2 is at all
>     > modified with addition to the multiple ke, or beyond 64k limit drafts.
> 
> I agree.
> 
> IKEv2 is not SSLv3.
> 
> --
> Michael Richardson <mcr+i...@sandelman.ca>   . o O ( IPv6 IøT consulting )
>            Sandelman Software Works Inc, Ottawa and Worldwide
> 
> 
> 


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to