Re: [IPsec] Issue #138: Calculations involving Ni/Nr

2010-01-20 Thread Yoav Nir
I agree, and I don't think you need brackets: only the first 64 bits of Ni and the first 64 bits of Nr are used in calculating SKEYSEED, but all the bits are used for input to the prf+ function. (although I personally did not find it confusing) On Jan 19, 2010, at 4:25 AM, Paul Hoffman wrote:

Re: [IPsec] Issue #139: Keying material taken in the order for RoHC

2010-01-21 Thread Yoav Nir
I think extensions such as RoHC that change (or extend) the way keying material is generated, should and do specify how it is done. Leaving that text there becomes a recommendation for future draft writers, which I think is superfluous. I think we should leave the text as it is. On Jan 19, 20

[IPsec] Closing some of the open tickets for IKEv2bis

2010-01-24 Thread Yoav Nir
Hi all We would like to begin closing IKEv2bis issue at a faster rate than we are opening new ones. Paul has sent the list a several issues. Some we have discussed, others - not so much. Here's a summary of three issues, which I think are ready for closure. Issue #138 - Calculations involvin

Re: [IPsec] Issue #157: Illustrate the SA payload with a diagram

2010-01-25 Thread Yoav Nir
On Jan 22, 2010, at 11:57 PM, Yaron Sheffer wrote: > The text in 3.3 requires "peace of mind" to fully appreciate. A diagram might > be helpful. > > Here's a first shot (we'll need to add some descriptive text): > >SA Payload >| >

Re: [IPsec] Closing some of the open tickets for IKEv2bis

2010-01-25 Thread Yoav Nir
On Jan 25, 2010, at 1:44 PM, Tero Kivinen wrote: > Yoav Nir writes: > >> Issue #141 - Silently deleting the Child SA after a CHILD_SA_NOT_FOUND >> == >> Section 2.25: "A peer that receives a CHILD

[IPsec] Closing some more issues for IKEv2bis

2010-01-26 Thread Yoav Nir
Hi all. Time for another set of issues. Issue #142 - Difference from RFC 4718 in rekeying IKE SA Section 2.25.2, "If a peer receives a request to delete a Child SA when it is currently rekeying the IKE SA, it SHOULD reply as usual, with a

Re: [IPsec] Fwd: Internal WG Review: Recharter of IP Security Maintenance and Extensions (ipsecme)

2010-01-26 Thread Yoav Nir
Hasn't this item just been approved by the IESG? Isn't it done? > >- A standards-track mechanism that allows an intermediary device, such >as a firewall or intrusion detection system, to easily and reliably >determine whether an ESP packet is encrypted wit

Re: [IPsec] Fwd: Internal WG Review: Recharter of IP Security Maintenance and Extensions (ipsecme)

2010-01-26 Thread Yoav Nir
Yes, but the heuristics document is not standards-track. Never mind, I'm not trying to nit-pick our charter proposal. On Jan 26, 2010, at 11:41 PM, Paul Hoffman wrote: > At 11:27 PM +0200 1/26/10, Yoav Nir wrote: >> Hasn't this item just been approved by the I

[IPsec] Closing issue #143 (rewrite of section 1.5)

2010-01-28 Thread Yoav Nir
Hi all. Combining Pasi's proposed text with Tero's comments I came up with this version. Is this acceptable to everyone? Yoav There are couple of cases when a node receives a packet it cannot process, but may want to notify the sender about this situation: o If an ESP or AH packet ar

[IPsec] Closing Issue #146 - Encapsulation wording

2010-01-28 Thread Yoav Nir
Hi all The "offending" paragraph is the following; An initiator can use port 4500, regardless whether or not there is NAT, even at the beginning of IKE. When either side is using port 4500, sending with UDP encapsulation is not required, but understanding received packets with UDP en

Re: [IPsec] Closing issue #143 (rewrite of section 1.5)

2010-01-31 Thread Yoav Nir
from the request. The Response bit is set to 1, and the version flags are set in the normal fashion. -Original Message- From: Tero Kivinen [mailto:kivi...@iki.fi] Sent: Thursday, January 28, 2010 4:40 PM To: Yoav Nir Cc: ipsec@ietf.org Subject: [IPsec] Closing issue #143 (rewrite

Re: [IPsec] DHCP over IPSEC

2010-01-31 Thread Yoav Nir
IKE & IPsec treat DHCP like any other protocol. The selectors for DHCP traffic are a little strange, because the DHCP client begins by using IP address 0.0.0.0. Please have a look at http://tools.ietf.org/html/rfc3456 In IKEv2, the CP payload takes over the function of DHCP over IPsec. Hope th

[IPsec] Five more issues to close in IKEv2bis

2010-02-01 Thread Yoav Nir
Hi all. Yet another batch of issues that we wish to close. Issue #140 - No SPD entry for transport mode Section 2.23.1: If the responder doesn't find SPD entry for transport mode with the modified traffic selectors, and does a lookup with the origin

Re: [IPsec] Issue #173: Trigger packets should not be required

2010-02-02 Thread Yoav Nir
Me too, but the draft still requires *some* selectors, so the childless draft is still needed. -Original Message- From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Raj Singh Sent: Wednesday, February 03, 2010 5:25 AM To: Dan McDonald Cc: IPsecme WG; Paul Hoffman S

Re: [IPsec] Fwd: Issue : Regarding EAP identity

2010-02-03 Thread Yoav Nir
Hi Raj I don’t think we can specify MUST requirements for the AAA servers, because we’re not specifying RADIUS or DIAMETER here. For example in RADIUS, the VPN gateway sends an Access-Request to the server, which contains the user-name, presumably the same user-name from the IDi payload. If t

[IPsec] Yet another closing session - issues #153-#157

2010-02-03 Thread Yoav Nir
Hi all. 5 more issues. Issue #153 - List of EAP methods 3.16: I suggest to remove the table quoted from the EAP RFC. There are dozens of methods now in the IANA registry, many of which are preferable to the ones mentioned here. I agree, especially since we have

Re: [IPsec] Fwd: Issue : Regarding EAP identity

2010-02-04 Thread Yoav Nir
, you do need the user identity. -Original Message- From: Alper Yegin [mailto:alper.ye...@yegin.org] Sent: Thursday, February 04, 2010 3:40 PM To: Yoav Nir; 'Raj Singh'; Yaron Sheffer Cc: 'ipsec' Subject: RE: [IPsec] Fwd: Issue : Regarding EAP identity Hello, Why

[IPsec] More Issues for IKEv2bis

2010-02-07 Thread Yoav Nir
Hi. Another week, another 5 issues to discuss. Issue #159 - Payload processing order within messages = (3.1) Clarify that the text: Payloads are processed in the order in which they appear in an IKE message by invoking

[IPsec] yet more ikev2bis issues

2010-02-10 Thread Yoav Nir
Hi all. Again we have some more issues: Issue #147 - Allowing limited retransmission of one-way IKE messages Either in 2.1 or in 1.5 we should say something about allowing limited retransmission of the rare one-way IKE messages

Re: [IPsec] Fwd: Issue : Regarding EAP identity

2010-02-10 Thread Yoav Nir
Hi. This is an interesting subject, and perhaps could be a good candidate for discussion at Anaheim. However, from the narrow perspective of a VPN vendor, I don't think this issue is very complicated: - In the first IKE_AUTH request the initiator provides *an* identity. This could be something

[IPsec] Getting there... 5 more issues

2010-02-15 Thread Yoav Nir
Hi all. Wer'e down to single digits with the open issues on IKEv2bis. Here are 5 more. Issue #168 - Identifier field in the EAP payload 3.16: the text here, "...this field MAY be set to any value" implies that the Identifier field can be constant,

Re: [IPsec] IKE6 Negitaion when Peer Address ND not yet started.

2010-02-18 Thread Yoav Nir
Hi, Syed Ajim. In future please expand acronyms, because while it's safe to assume that anyone reading this list knows what an SA is, not all of us are proficient in IPv6 terminology. Having said that, policies usually have exceptions for protocols, that need to run in the clear. IKE is an exa

Re: [IPsec] information about choosing hash/crypt for different services

2010-02-18 Thread Yoav Nir
Hi Rahul. I don’t have a link, but common sense says that there are four things to consider when choosing algorithms: - required strength - for example DES is only 56 bits. - compliance - certain industries have regulations specifying which algorithms to use. - performance - of all the accept

[IPsec] Just three more issues for IKEv2bis

2010-02-18 Thread Yoav Nir
Hi all. There are only three issues this time, because this is the last batch. Issue #173 - Trigger packets should not be required === In a few places in the new section 2.23.1 in IKEv2bis, it says that one must have a trigger packet when starting

Re: [IPsec] IKE6 Negitaion when Peer Address ND not yet started.

2010-02-21 Thread Yoav Nir
On Feb 19, 2010, at 6:30 AM, Syed Ajim Hussain wrote: > Hi Yoav Nir & All Group Member > > Thanks for your quick response. I think, instead of user takes special > care by adding extra Rule to allow un-encrypted ND traffic(unicast) , > There should be some RFC gu

Re: [IPsec] Just three more issues for IKEv2bis

2010-02-21 Thread Yoav Nir
Hi Raj On Feb 19, 2010, at 9:25 AM, Raj Singh wrote: > Hi Yoav, > > >> Issue #174 - How to behave when EAP identity is not send by AAA >> === >> In ikev2bis07 >> >> - ikev2-bis-07 section 2.16, last paragraph >> >>

Re: [IPsec] IKE6 Negitaion when Peer Address ND not yet started.

2010-02-23 Thread Yoav Nir
On Feb 22, 2010, at 5:48 PM, Stephen Kent wrote: > At 7:22 PM +0530 2/22/10, Syed Ajim Hussain wrote: >> Hi Steve >>According to me IPSEC/IKE should have intelligence by by-pass ND Traffic >> >>when SA is not ready state without end-user intervention, and same >>should be accepted by

[IPsec] Sorry, 5 more

2010-02-24 Thread Yoav Nir
Hi folks. 5 issues got lost in the system (they were tagged wrong). Hopefully these are really the last 5. Issue #132 - Should NO_ADDITIONAL_SAS cover rekeying IKE SAs? = In section 1.3 at the end there is text talking about the NO_ADDI

Re: [IPsec] Beginning discussion on secure password-only authentication for IKEv2

2010-03-03 Thread Yoav Nir
Yes, you can sort-of negotiate DH groups, but you don't have the "New Group Mode" that we had in section 5.6 or RFC 2409. So with RFC 4306, you're stuck with only those groups that appear in the IANA registry, rather than your own pet DH groups. On Mar 2, 2010, at 10:49 PM, Yaron Sheffer wrote:

Re: [IPsec] Please review draft-ietf-ipsecme-aes-ctr-ikev2-05.txt

2010-03-03 Thread Yoav Nir
Paragraph 5 of section #2: MUST accept any length that results in proper alignment. It should be noticed that the ESP [RFC4303] Encrypted Payload requires Please change "noticed" to "noted". Other than that, the document looks good enough for implementation. -Original Message- Fro

Re: [IPsec] [Cfrg] Beginning discussion on secure password-only authentication for IKEv2

2010-03-04 Thread Yoav Nir
Explaining a joke spoils all the fun, but here goes: It's not like PKI is working out better for user authentication. And password-in-https-form is also vulnerable to online dictionary attacks. Now if they were using TLS-EAP But that, of course, suffers from excessive layering. __

Re: [IPsec] Issue #176: What to do with a proposal of NONE

2010-03-08 Thread Yoav Nir
Me too. From: ipsec-boun...@ietf.org [ipsec-boun...@ietf.org] On Behalf Of David Wierbowski [wierb...@us.ibm.com] Sent: Monday, March 08, 2010 19:55 To: Paul Hoffman Cc: IPsecme WG; ipsec-boun...@ietf.org Subject: Re: [IPsec] Issue #176: What to do with a p

Re: [IPsec] IETFLC comments for draft-ietf-ipsecme-ikev2bis-08

2010-03-09 Thread Yoav Nir
To me it’s pretty obviously the former, although the latter is also true. From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Keith Welter Sent: Monday, March 08, 2010 6:18 PM To: ipsec@ietf.org Subject: [IPsec] IETFLC comments for dr

Re: [IPsec] Password-Based Auth: Two criteria comments

2010-03-22 Thread Yoav Nir
On Mar 22, 2010, at 11:18 AM, wrote: > Summarizing what I said in the meeting: > > (1) The performance criteria should include performance with large complex > secrets (e.g., pre-shared keys), not just the smaller passwords that people > can reasonably be expected to remember. > > This is b

Re: [IPsec] synchronizing crypto state

2010-03-22 Thread Yoav Nir
That would be good, but we don't want to madate not using certain modes of operation when you have a cluster. That would be very counter-productive. OTOH, because of the replay counter, we've already agreed that an outbound child SA cannot be shared among members of a load-sharing cluster. As f

Re: [IPsec] criteria for failure detection

2010-03-22 Thread Yoav Nir
Failure detection by either QCD or SIR takes 1-2 roundtrips, whether this is subsecond or not depends on round-trip time. In case of a non-synchronized hot-standby gateway, those 2 roundtrips begin the moment that the standby gateway becomes active, so the call probably doesn't get dropped. In

[IPsec] Issue #177. (was: HA/LS terminology)

2010-03-23 Thread Yoav Nir
And thank you for taking the time, Rod. The linktionary has a pretty good definition, though I don't know if it counts as "textbook". Same for Wikipedia http://www.linktionary.com/f/fault_tolerance.html http://en.wikipedia.org/wiki/Fault-tolerant_system Anyway, we need to limit the scope of this

Re: [IPsec] Issue #177. (was: HA/LS terminology)

2010-03-23 Thread Yoav Nir
On Mar 23, 2010, at 2:31 PM, Melinda Shore wrote: > On Tue, March 23, 2010 1:20 pm, Yoav Nir wrote: >> - For the cluster with just one member doing IKE and IPsec, I propose >> "hot-standby cluster" >> - For the cluster with several members doing IKE and IPsec, I p

Re: [IPsec] Issue #177. (was: HA/LS terminology)

2010-03-23 Thread Yoav Nir
On Mar 23, 2010, at 6:05 PM, Dan Harkins wrote: > > Hi, > > "hot standby" implies a box sitting ("hot") twiddling its thumbs doing > little but waiting for another box to fail ("standby"). It's the VRRP > model. And that's exactly what I want to describe. Well, not twiddling its thumbs. The

Re: [IPsec] Issue #177. (was: HA/LS terminology)

2010-03-25 Thread Yoav Nir
Hi Dan I am not trying to create a complete taxonomy of cluster types. I should also note that we don't really have a term for a single "thing" that does IKE and IPsec. Our documents use terms like "gateway" and "peer", but "gateway" does not encompass VPN clients and hosts, and "peer" is not j

[IPsec] Another round of IKEv2-bis issues

2010-04-07 Thread Yoav Nir
Hi all Following Sean's review, Paul has opened 7 issues, which we'd like to close. I think issues #182, #183, #185 and #186 can be closed immediately. I think issues #181, #184 and #187 can also be closed, and I have included below my suggestions. Please take a look and respond if you object

[IPsec] Issue #177

2010-04-13 Thread Yoav Nir
Hi all. As the previous discussion on this topic showed, the WG would like a more thorough taxonomy in section 2 of the HA/LS draft. Here's what I have come up with so far. Please send comments to the list. 2. Terminology "Single Gateway" is an implementation of IKE and IPsec enforcing a

Re: [IPsec] Issue #177

2010-04-13 Thread Yoav Nir
On Apr 13, 2010, at 1:17 PM, Yaron Sheffer wrote: > Looks good. A few comments down below. > > Yaron > > On Tue, 2010-04-13 at 11:49 +0300, Yoav Nir wrote: >> >> "Fault Tolerance" is a condition related to high availability, where >> a

Re: [IPsec] Issue #177

2010-04-13 Thread Yoav Nir
On Apr 13, 2010, at 4:42 PM, Yaron Sheffer wrote: > [snip] "Failover" is the event where a one member takes over some load from some other member. In a hot standby cluster, this hapens when a standby memeber becomes active due to a failure of the former active member, or

[IPsec] Fwd: New Version Notification for draft-ietf-ipsecme-ipsec-ha-01

2010-04-14 Thread Yoav Nir
Begin forwarded message: > From: IETF I-D Submission Tool > Date: April 14, 2010 8:21:14 PM GMT+03:00 > To: Yoav Nir > Subject: New Version Notification for draft-ietf-ipsecme-ipsec-ha-01 > > > A new version of I-D, draft-ietf-ipsecme-ipsec-ha-01.txt has been > s

[IPsec] Issue #179 (was: Terminology issue (minor))

2010-04-21 Thread Yoav Nir
On Mar 22, 2010, at 6:44 PM, wrote: > This is probably a small thing, but in general the term "cluster" > implies at least some degree of shared state among cluster members. > I understand that there's some suggestion of that in saying that > a cluster protects the same domain but there's really

Re: [IPsec] I-D ACTION:draft-ietf-ipsecme-ikev2bis-10.txt

2010-04-22 Thread Yoav Nir
Hi. It's true that the standard is more geared to full implementations than those minimal implementations, but in this case there really is no solution. The minimal implementation can delete the IKE SA that was created and start fresh with a single pair. But since the responder is also not full

Re: [IPsec] New draft posted

2010-04-25 Thread Yoav Nir
I agree. And whatever we may think of the particular solution, it does present a problem that can and should be in the problem statement draft. So how about adding teh following sub-section: 3.7. Different IP addresses for IKE and IPsec In many implementations there are separate IP addresse

Re: [IPsec] New draft posted

2010-04-26 Thread Yoav Nir
This is why we need multiple vendors to look at this draft. On Apr 26, 2010, at 2:29 PM, Tero Kivinen wrote: > Yoav Nir writes: >> I agree. And whatever we may think of the particular solution, it does >> present a problem that can and should be in the problem statement draft

Re: [IPsec] New draft posted

2010-04-27 Thread Yoav Nir
Or think of a single IKE gateway that sets up IPsec SAs for multiple IPsec boxes. Like the key server in MSEC. On Apr 27, 2010, at 3:27 PM, Yaron Sheffer wrote: > Hi Jitender, > > regarding your point #3: I am not sure that if I trust a gateway to > connect to, I also trust it to say that all

Re: [IPsec] Start of WG Last Call on draft-ietf-ipsecme-eap-mutual (EAP-Only Authentication)

2010-05-03 Thread Yoav Nir
Can't compete with Martin's "running code", but I have a few comments. Before that, the draft seems good, and easy to follow. I think developers who have never heard of the IPsec list should have no problem reading and implementing this correctly. Having said that, here's two comments. The intr

Re: [IPsec] IPsec HA problem statement

2010-05-03 Thread Yoav Nir
Well, this draft is kind of a smorgasbord of issues, so once the issue that bothers you is in there, you're not that interested any more. I would like to post another draft with section 3.7 that I posted on the list on 25-Apr, and unless anyone has another issue that's not addressed, I think we

Re: [IPsec] IPsec HA problem statement

2010-05-03 Thread Yoav Nir
Well, this draft is kind of a smorgasbord of issues, so once the issue that bothers you is in there, you're not that interested any more. I would like to post another draft with section 3.7 that I posted on the list on 25-Apr, and unless anyone has another issue that's not addressed, I think we

Re: [IPsec] IPsec HA problem statement

2010-05-03 Thread Yoav Nir
Sorry for the dual post. Some mail client problem. ___ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec

Re: [IPsec] IESG DISCUSS re: IKEv2-bis and RFC 4307

2010-05-08 Thread Yoav Nir
I'm fine with the change, and with the reference being either normative or informative. I prefer informative, though. -Original Message- From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Yaron Sheffer Sent: Saturday, May 08, 2010 11:55 PM To: IPsecme WG Subject: [

Re: [IPsec] Working Group LC: draft-ietf-ipsecme-ipsec-ha-03

2010-05-27 Thread Yoav Nir
1. I didn't want to make ha-03 dependent on bis, but since bis is now approved, we may as well do it. 2. OK 3. It should be out of scope, because this is internal to the cluster. We are not going to require a peer to accept having two SAs with the same SPIs with the same peer, so it's up to th

Re: [IPsec] Working Group LC: draft-ietf-ipsecme-ipsec-ha-03

2010-05-27 Thread Yoav Nir
How about the following text? 3.8 Allocation of SPIs SPIs for child and IKE SAs MUST be unique with the same peer. However, in a cluster, both members may create SAs and assign SPIs to them, so a collision is possible. We believe that peers should not be required to accept duplicate

Re: [IPsec] Working Group LC: draft-ietf-ipsecme-ipsec-ha-03

2010-05-27 Thread Yoav Nir
Works for me. -Original Message- From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of Stephen Kent Sent: Thursday, May 27, 2010 5:18 PM To: Yoav Nir Cc: IPsecme WG Subject: Re: [IPsec] Working Group LC: draft-ietf-ipsecme-ipsec-ha-03 At 11:36 AM +0300 5/27/10, Yoav

Re: [IPsec] I-D Action:draft-ietf-ipsecme-ipsec-ha-04.txt

2010-06-01 Thread Yoav Nir
Hi. This draft revision includes comments from Jean-Michel Combes and Yaron. -Original Message- From: i-d-announce-boun...@ietf.org [mailto:i-d-announce-boun...@ietf.org] On Behalf Of internet-dra...@ietf.org Sent: Tuesday, June 01, 2010 10:15 AM To: i-d-annou...@ietf.org Cc: ipsec@iet

Re: [IPsec] AD review: draft-ietf-ipsecme-ipsec-ha

2010-06-10 Thread Yoav Nir
Hi Sean. I have just submitted version -05 which addresses most (but not all) of your comments. Here's a list of the exceptions (hope I didn't miss any) #2. I've worded the abstract a little differently. Main difference is adding to "gaps in existing standards" the words "and their implementati

Re: [IPsec] AD review: draft-ietf-ipsecme-ipsec-ha

2010-06-10 Thread Yoav Nir
On Jun 10, 2010, at 6:39 PM, Sean Turner wrote: > Yoav Nir wrote: > >> #13, #15, a few more (no MUST/SHOULD/MAY language). I have two issues with >> this. The first, is that this document is a problem statement, and intended >> to be INFORMATIONAL. No gateway is

Re: [IPsec] AD review: draft-ietf-ipsecme-ipsec-ha

2010-06-10 Thread Yoav Nir
Done in -06 On Jun 10, 2010, at 7:17 PM, Sean Turner wrote: > Yoav Nir wrote: >> On Jun 10, 2010, at 6:39 PM, Sean Turner wrote: >> >>> Yoav Nir wrote: >>> >>>> #13, #15, a few more (no MUST/SHOULD/MAY language). I have two issues with >>>

Re: [IPsec] I-D Action:draft-ietf-ipsecme-ipsec-ha-07.txt

2010-06-24 Thread Yoav Nir
Hi all No big changes here. Just some nits from the secdir review. Yoav On Jun 24, 2010, at 6:00 PM, wrote: > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > This draft is a work item of the IP Security Maintenance and Extensions > Working Group of the IET

[IPsec] Fwd: New Version Notification for draft-ietf-ipsecme-ipsec-ha-09

2010-07-04 Thread Yoav Nir
, 2010 5:15:22 PM GMT+03:00 To: Yoav Nir mailto:y...@checkpoint.com>> Subject: New Version Notification for draft-ietf-ipsecme-ipsec-ha-09 A new version of I-D, draft-ietf-ipsecme-ipsec-ha-09.txt has been successfully submitted by Yoav Nir and posted to the IETF repository. Filename: d

Re: [IPsec] NUDGE: Starting discussion of failure detection proposals

2010-07-07 Thread Yoav Nir
Sure we are, but I didn't want to start the discussion, because QCD is my proposal. Hopefully we've learned something from the history of XAuth vs Hybrid, and we won't end up with two non-interoperable, proprietary ways of doing this, neither of which makes it to RFC. I think that failure led

Re: [IPsec] DPD in IKEv2

2010-07-11 Thread Yoav Nir
Hi. Liveness check in IKEv2 is very much like any other INFORMATIONAL exchange. Here's what the introduction says about this. An INFORMATIONAL request with no payloads (other than the empty Encrypted payload required by the syntax) is commonly used as a check for liveness. S

[IPsec] QCD Interop test report

2010-07-19 Thread Yoav Nir
Hi all The Quick Crash Detection protocol is one of the candidates for the failure detection work item in our charter. I have implemented in my company's product with a private Notify type and a VendorID, and up until a few months ago, this has been the only implementation that I know of. As

Re: [IPsec] New version of IPsec Cluster Solution Draft posted [earliar, HA design team started]

2010-07-19 Thread Yoav Nir
I'd like to point out that section 3 is kind of skeletal at this point, and I expect that in the final document, each bullet point will be expanded to its own subsection. I think in the end, section 3 will contain most of the volume of the document. We've found that (at least in our opinion) mo

Re: [IPsec] Comments draft-kagarigi-ipsecme-ikev2-windowsync-04

2010-07-25 Thread Yoav Nir
Thanks for the extensive review, Tero. I haven't had time to read it through yet, but I would like to respond to one point in this (below) On Jul 25, 2010, at 4:30 PM, Tero Kivinen wrote: > The big issue is that the draft does not provide solution to case > where the IKEv2 SA messages missed a

[IPsec] Some back-of-the-envelope calculations

2010-07-26 Thread Yoav Nir
In today's session there was an disagreement between Yaron and Tero about how likely it is that messages are missing. Let's assume our cluster has tunnels with 10,000 peers, and that we do Liveness Check (DPD) every 20 seconds (StrongSwan default) Also, let's assume that we synch every 0.1 seco

Re: [IPsec] a new IKEv2 labeled security draft is published

2010-07-28 Thread Yoav Nir
On Jul 28, 2010, at 9:30 AM, jarrett...@oracle.com wrote: > A new 00 version of IKEv2 extension for security label has just been > published: > > http://tools.ietf.org/html/draft-jml-ipsec-ikev2-security-label-00 > > Authors welcome comments from IPsec community. > > Thanks. You will get tha

Re: [IPsec] Failure detection proposals

2010-08-05 Thread Yoav Nir
On Aug 4, 2010, at 11:40 PM, Yaron Sheffer wrote: > In the Maastricht meeting there was just a tiny bit of interest in the > failure detection idea (reminder: the goal is to ensure that one peer > discovers that the other IKE peer has restarted, within a short time > duration, milliseconds inst

Re: [IPsec] Failure detection proposals, stage 2

2010-08-13 Thread Yoav Nir
On Aug 13, 2010, at 10:07 PM, Scott C Moonen wrote: > I've looked over the two drafts. My summary impression is that I prefer QCD, > albeit for subjective reasons. It is less complicated and therefore simpler > to implement and test. I think I would have a higher degree of confidence in > plan

[IPsec] Fwd: [saag] IPv6 Node Requirements: Updated IPsec/IKEv2 text

2010-08-25 Thread Yoav Nir
Hi all This might be of interest to the group. Joe is suggesting here (and in the next messages on the thread) to update RFC 4301. Begin forwarded message: > From: Joe Touch > Date: August 25, 2010 10:55:27 PM GMT+03:00 > To: Thomas Narten > Cc: "s...@ietf.org" > Subject: Re: [saag] IPv6 Nod

Re: [IPsec] I-D Action:draft-ietf-ipsecme-failure-detection-00.txt

2010-09-04 Thread Yoav Nir
Hi Scott. On Sep 3, 2010, at 10:43 PM, Scott C Moonen wrote: > Looks good. I have one technical question: > > - What is the purpose of sending an empty response to the unprotected > N(INVALID[_IKE]_SPI)&N(QCD_TOKEN)+ message? I'm not sure it provides any real > value and would really prefer no

Re: [IPsec] Comments draft-kagarigi-ipsecme-ikev2-windowsync-04

2010-09-04 Thread Yoav Nir
On Sep 4, 2010, at 3:01 PM, Kalyani Garigipati (kagarigi) wrote: > > 1. If window size is say some five and range expected is 4-8, and if > peer has got all four requests with values 5,6,7,8 and 4 is lost, then > there would be no message id that can be used to send the notify > reset_window. >

Re: [IPsec] Comments on draft-ietf-ipsecme-failure-detection-00

2010-09-05 Thread Yoav Nir
On Sep 5, 2010, at 11:03 AM, Yaron Sheffer wrote: > In general, the draft is in good shape. But IMO, we have one major > security issue left: the dependence on SPI values which potentially come > from a small space, i.e. may be repeated in normal operation, or may be > coerced into repeating.

Re: [IPsec] Comments draft-kagarigi-ipsecme-ikev2-windowsync-04

2010-09-09 Thread Yoav Nir
On Sep 8, 2010, at 1:50 PM, Tero Kivinen wrote: > Raj Singh writes: >>> It's actually worse than that. If message #4 was missed, and 5-8 were >>> received, then messages 5-8 are stored, but not processed. This has to be >>> so, because suppose message 7 deletes the SA that was created in message

[IPsec] Issue #189 - Reply is not needed for unprotected message containing QCD

2010-09-21 Thread Yoav Nir
Hi all. We're starting discussions of the issues that are open for the failure detection draft. Reported by Scott C Moonen: What is the purpose of sending an empty response to the unprotected N(INVALID[_IKE]_SPI)&N(QCD_TOKEN)+ message? I'm not sure it provides any real value and would reall

[IPsec] Issue #190 - Move QCD token to first AUTH exchange

2010-09-21 Thread Yoav Nir
Reported by Yaron Sheffer: I would have preferred the token to be resistant to stealing (and duplication), in which case it can be sent in the *first* AUTH message. If we ensure that the token maker's SPI is long/random (see below), this might be possible. The relevant part of the document i

Re: [IPsec] Failure Detection - Issue #190

2010-09-28 Thread Yoav Nir
It should be noted that this token protection is available only to EAP users. endpoints that authenticate with certificates or PSKs are vulnerable to a MITM enumerating the tokens. Since issue #191 is up next (tomorrow or thursday), I won't publish a -01 version before #191 is resolved. On S

Re: [IPsec] Issue #189 - Reply is not needed for unprotected message containing QCD

2010-09-30 Thread Yoav Nir
OK. there were zero responses to this. Since this seems obvious to me, I will correct it as Scott suggests, and close the issue with the publication of -01. On Sep 21, 2010, at 2:58 PM, Yoav Nir wrote: > Hi all. > > We're starting discussions of the issues that are open f

Re: [IPsec] Issue #190 - Move QCD token to first AUTH exchange

2010-09-30 Thread Yoav Nir
This was actually reported by both Yaron and Tero. I have no problem moving the QCD token to the first message (in case of EAP), but as Yaron requested, I will not publish the fixed version before the resolution of #191. Two more issues soon. Yoav On Sep 21, 2010, at 3:06 PM, Yoav Nir wrote

[IPsec] Issue #191 - The danger of predictable SPIs

2010-09-30 Thread Yoav Nir
Reported by Yaron Sheffer: 5.1: this method is indeed problemmatic if SPIi/SPIr pairs are repeated with high probability. If SPI pairs only repeat across reboots (somewhat unlikely), then an "epoch" (time of last reboot) value can be included to mitigate this problem. This is still close enough

[IPsec] Issue #192 - RFC 2119 language in section 9.1

2010-09-30 Thread Yoav Nir
Reported by Yaron Sheffer: 9.1: this is not really a MUST, let's use some non-RFC 2119 wording. Yoav Nir: I disagree. We are giving requirements for implementations that conform to this spec. The requirements vary by the role that the implementation plays: RA client, RA gateway, Site to

Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-00

2010-10-05 Thread Yoav Nir
Hi Keith. After reading your draft, I wish I had done this in RFC 4478. Still, I have some comments. What are the considerations for the responder accepting a re-authentication? Suppose we have an active IKE SA between Alice and Bob. Now Bob gets a new IKE_SA_INIT request with an N(REAUTH_SA)

Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-00

2010-10-05 Thread Yoav Nir
nly > makes sense. > > Thanks, > Yaron > > On 10/05/2010 04:33 PM, Yoav Nir wrote: >> Hi Keith. >> >> After reading your draft, I wish I had done this in RFC 4478. Still, I have >> some comments. >> >> What are the considerations fo

Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-00

2010-10-07 Thread Yoav Nir
f storing those for the lifetime of the IKE SA. Perhaps we could store the contents of the previous AUTH payload (or a hash thereof) and sign that. On Oct 6, 2010, at 11:17 PM, Keith Welter wrote: > > Yoav Nir wrote on 10/05/2010 07:33:33 AM: > > > Hi Keith. > > > > A

Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-00

2010-10-07 Thread Yoav Nir
I was not suggesting to use SK_d itself. RFC 5996 says this: {SK_d | SK_ai | SK_ar | SK_ei | SK_er | SK_pi | SK_pr } = prf+ (SKEYSEED, Ni | Nr | SPIi | SPIr ) I suggest replaceing/augmenting it with this: {SK_d | SK_ai | SK_ar | SK_ei | SK_er | SK_pi | SK_pr | SK_ri

Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-00

2010-10-07 Thread Yoav Nir
On Oct 7, 2010, at 10:50 PM, Keith Welter wrote: Yoav Nir mailto:y...@checkpoint.com>> wrote on 10/07/2010 12:26:36 PM: > I was not suggesting to use SK_d itself. Sorry, I misread your note. You clearly did not suggest using SK_d itself. > > RFC 5996 says this: > >

Re: [IPsec] draft-welter-ipsecme-ikev2-reauth-00

2010-10-07 Thread Yoav Nir
On Oct 7, 2010, at 11:15 PM, Keith Welter wrote: Keith Welter mailto:welt...@us.ibm.com>> wrote on 10/07/2010 10:26:56 AM: [...] > Yoav Nir mailto:y...@checkpoint.com>> wrote on > 10/07/2010 12:48:17 AM: > [...] > > Hi Keith. > > > > My responses are b

Re: [IPsec] I-D Action:draft-ietf-ipsecme-failure-detection-01.txt

2010-10-10 Thread Yoav Nir
Hi all This version resolves issues #189, #190, #191, and #192. Also the content of section 9.3 has been moved to section 10.4 because, as Frederic pointed out, it's more a security considerations than operational. Yoav On Oct 10, 2010, at 10:30 AM, wrote: > A New Internet-Draft is availa

[IPsec] Issue #193 - Is section 10.4 needed

2010-10-10 Thread Yoav Nir
Hi. In -00 this section was labeled 9.3. This issue is very much about substance, so we would very much like to see discussion of it. Ultimately it goes to the question of whether and when the methods in 5.1 and 5.2 should be recommended. Yaron: 10.4: this entire discussion is probably redund

[IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-10 Thread Yoav Nir
Yaron: The security considerations are focused on details of the QCD solution, rather then on the threats we are dealing with. These threats are non-trivial to describe, since an active MITM attacker can easily cause an IKE SA to be reset. OTOH, we don't want an active non-MITM attacker to be ab

Re: [IPsec] draft-ietf-ipsecme-failure-detection-01 -- issue 193

2010-10-17 Thread Yoav Nir
On Oct 17, 2010, at 2:57 PM, Yaron Sheffer wrote: > Hi Frederic, > > I understand the scenario now and I agree that a solution is needed. But > I have two issues, one general and one specific: > > - Even though there are no interoperability implications, I think we > should specify the token

Re: [IPsec] draft-ietf-ipsecme-failure-detection-01 -- issue 193

2010-10-20 Thread Yoav Nir
less method will likely require more severe warnings in order to > restrict or constraint its domain of applicability. > > regards, > > fred > > On 17 Oct 2010, at 15:41, Yoav Nir wrote: > >> >> On Oct 17, 2010, at 2:57 PM, Yaron Sheffer wrote: &

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-20 Thread Yoav Nir
11, 2010, at 8:22 AM, Yoav Nir wrote: > Yaron: The security considerations are focused on details of the QCD > solution, rather then on the threats we are dealing with. These threats are > non-trivial to describe, since an active MITM attacker can easily cause an > IKE SA to be res

Re: [IPsec] Issue #194 - Security Considerations should discuss the threat

2010-10-20 Thread Yoav Nir
reset? I would think he >> could only do so if he hi-jacked the original IKE_SA negotiation and is >> now impersonating the remote security endpoint. In that case you have >> bigger issues. >> >> Dave Wierbowski >> >> >> >> >>

[IPsec] Ticket #195 - Protection against SPI enumeration

2010-10-20 Thread Yoav Nir
Yaron: 10.3: of course, it is possible that *both* implementations generate predictable/short SPI values Hi all. I think this one was solved together with ticket #191 ("The danger of predictable SPIs"), but requiring that the token maker randomize IKE SPIs. Unless somebody (like Yaron) objec

Re: [IPsec] Ticket #195 - Protection against SPI enumeration

2010-10-20 Thread Yoav Nir
On Oct 20, 2010, at 5:01 PM, Stephen Kent wrote: > At 4:37 PM +0200 10/20/10, Yoav Nir wrote: >> Yaron: 10.3: of course, it is possible that *both* implementations >> generate predictable/short SPI values >> >> >> Hi all. >> >> I think this o

<    3   4   5   6   7   8   9   >