📄 redmond.txt
字号:
Appendix:It's summary report of IPsec Interoperability Workshop Aug 31st- Sept 3 1998.To be consider each following items.. ;-(Location: Microsoft Campus, Redmond WAAttending: 60 people, 19 companies. Axent/Raptor, Cisco IOS, Checkpoint, Intel, HiFn, Interlink,IRE, Microsoft NT5, Netscreen, Redcreek, SSH, Timestep, Worldcom/ANS, IRE,Free SWAN Verisign, Entrust, Worldcom Advanced Networks - JamesMatheke, Digital Signature Trust Company, Microsoft PKI & Directory reps L2TP/IPsec: Microsoft NT5 and Cisco IOSHandouts:(I will get these on a public web site ASAP. Stay tuned for pointer)Network Configuration Tear Sheet - network topology explanation & diagramTesting Matrix: had 43 options * (transport + tunnel) * (initial + rekey) =172 tests.Rodney Thayer's draft IPsec certificate profileIPsec Rekeying Issues powerpoint slides, by Tim Jenkins of TimestepWorking copy of Draft-ietf-ipsec-ldap-schema.txtPowerpoint slides presented at IETF Policy BOF explainingdraft-ietf-ipsec-ldap-schema.txtMicrosoft Directory Enabled Networking Powerpoint slides by Steve JuddMicrosoft Public Key Infrastructure Powerpoint slides by Rick JohnsonWindows NT5.0 Beta2 walkthrough guide for creating IPsec policyDebriefing Survey=================On Wed and Thursday, I surveyed 8 companies with the following questions,saying that I would compile a list of responses without indicating vendorsand post the compiled report to the IETF IPsec mailing list. Here are theresults. I have attempted to reduce duplication by indicating inparentheses how many of the respondants indicated a similar response, eg (4)means 4 out of 8 vendors. There is no priority or ordering on theselistings, other than popular reponses appear first.What did you fix?===========================================================Policy mgmt bugs. Modification on end-to-end policy configuration (3)Fragmentation on large packet (2)Vendor id payload support3DES key generationMultiple MM proposals are not draft compliantInitial contact handlingAdditional padding that expands payload in IKE MMConstruction of id payload of type ID FQDN and ID USER NAME during RSASignaturesFixed the parsing of pulling out the SubjectAltName out of the cert.Problems handling multiple proposalsProblems handling the payload when 2 lifetypes were being sent, for exampleseconds and bytes.Better understanding of what is in main modeCircular cert chain signature handlingDraft change to support initial contactMake sure that if peer sends back invalid ids, that they do not overwritethe initiators ids Ignore empty cert request payloadWrong checksum in inner payload header. Other implementations were notcheckingEmpty payload of cert caused AVCert signed circular chain handlingISAKMP config mode- hashing incorrectlyRSA encryption mode- not encrypting all that we shouldAH + ESP negotiated for tunnel modeNothingIf we didn't receive proxy IDs during QM when negotiating transport mode, wewould fail. Most vendors don't send these. IOS and NT do this to supportprotocol and port based filters. We need to add a test case to do thisregularly.If we did not receive the encapsulation attribute, we would send it back. Wrongly padding the Oakley header length to 4 byte boundariesBug found in test toolsWhere and HOW to encode v3 extensions in PKCS10 requests. Mostly due to howold BCERT toolkits used to do it which is not what RSA actually spec'd.What did you not fix - what still needs to be worked on?=========================================================PKI usage: Cert subject altname comparison with MM id payload, Certificatechain processing, CRL support, Cross-certification, DN in certs, Every (CA?)vendor had different cert request format (5)Using DSS/DSA - only supported by HiFn, CA vendors MS & Entrust & GTE (2)Fragmented TCP packets failing auth checksNeed to send deletes for all of the SPIs when doing an AND proposalInitiating SAsCommit bit handlingRekey issues: Initiator switching to responder because original responderhit lifetime timeout first and visa-versa.Responder changing attributes in transform.The PKCS10 requests with v3 extensions. Currently MS puts then in aproprietary attribute (said they would change), the 'standard' attribute toput them in is the rsaExtensionsAttribute, however RSA BCERT and TIPEMtoolkits add an extra level of encoding and encode the sequence of extensionas a T61String which is NOT the documented format. The cure is to have CAvendors try to decode from both and have all new clients only dorsaExtensionsAttribute as Seq of Ext.What are the open IPsec design issues?========================================================PKI usage, cert formats, CA enrollment, deployment model for cert-basedtrust, supporting CRLs, supporting cert request payload (5)Peer Recovery, stale/Inactive SAs which linger when peer has lost state.Orphaned phase2 SA. This can be due to a missed delete (since deletes arenot reliable) or a system crash of a peer (4)ISAKMP header not authenticated. Initial contact & all notifications are notauthenticated (4)Commit bit. Since it is unauthenticated if it is present in the IKE header.Is it still a MUST? (2)Version#s not authenticated in IKE headerCommon policy configuration & distribution for multiple vendor devices thata single manager can use.Mobile clients - preshared key per user? Lose identity protection withaggressive modeRekey mechanism that doesn't lose traffic by designWhen tunneling traffic, do you reassemble packet first, then filter, thenforward to tunnel?Configuration problems, ISAKMP config needs further workSupport in drafts for authentication method per selector conflicts withusing MM with QM. Applications can't use their own trust system for theirtraffic - must be manually configured out-of-band between machines (IPaddresses). This is why MM with QM protection is abandoned by vendors infavor of aggressive mode, so that QM parameters, and also identities, can beknown first to succeed with authentication.Race conditions when have multiple SAs to same box from one source, rekeyingMM over multiple QMMultiple QM proposalsHow to get tunnels set upMismatch filters in policy. When initiator should propose both the fullfilter breadth, as well as the specific packet protocol type/ports to theresponder, so the responder can pick the widest clean match.Need some kind of model for using SNMP MIB for reporting and management ofIPsec enabled devices.Think IKE is open to denial of service attack because anyone can provoke DHcomputation in MM. Should only create state when get cookie back to reducedenial of service.IKE over non-IPDisagreement on how AH with ESP in transport or tunnel mode should beexpressed in policy, negotiated, or have their separate SAs managedNeed full client-side configuration to support simultaneous tunnels from oneclient to different gatewaysNeed "Credential Request Payload" more general than just certificate requestpayload, to support retry for authentication when both systems participatein multiple trust models.What are the open IPsec interop issues? If products shipped today, whatproblems would customers encounter with multiple IPsec products?================================================================Policy expression, configuration for interop (5)Peer recovery of SAs, with mobile users, between two gateways (2)US export IPsec interop- no support at all in drafts for what products haveto implement for ESP. Custom DH group for export not supported in drafts (2)Understanding why proposals failed- Error messages to detail why proposalnot chosen (Michael Richardson going to collect error codes & messages fromvendors)Multiple proposals for export not supportedPolicy distributionClient interop because clients haven't been tested much, mostly GW/FWReal world application usage/admin, where systems are taken up/down, addresschanges, etc.Biggest challenge is to cover all aspects/combinationsHard to balance tolerance of variance among IPsec implementations which isnecessary for interop with strictness of checks to fulfill security anddraft requirements.ScalabilitySome/many vendors not installing SA parameters which were negotiated, usingwhat filter policy specified.Cert encoding for CRP, most people understand X.509Key usage flags in cert, what you expect to get back for generic or specificfor data encryperment. Maybe define another type of cert field encoding,have 1-9, need 10.How to process Subject AltnameNobody else is doing encrypted noncesEnforcing check that traffic sent through IPsec format matches filter whichwas negotiated. This must be agreed upon by other vendors. Not coveringthis in bakeoff testing because people mostly ping and ftp test, notmulti-protocol or multi-port through same SA.Having certificate storage and key signing operations on smartcards, wherethey don't provide a signature without the OIDWhat was good about the bakeoff?=========================================================Small size, good working time (4)Organized well (2)Providing PCs, cables (2)Beer (2)Having a preplanned test matrixHaving several CA vendors, ability to discuss and try CRLs, different certsPlenty of space, good friendly atmosphere. Microsoft people being veryhelpfulTiming was goodThe network was setup when we got there.More than one network allocated for each vendor to allow gateway testingWhat wasn't so good about bakeoff?========================================================Had to reconfigure because test net was not on Internet which for manycaused a reboot. Only really need 4-5 class C addresses with preplannedprivate net space. Should have DHCP on external net. NAT from private topublic wouldn't work using IPsec, of course, because using IPsec to get backhome to company net. (3)Power failure Monday morning (2)Internet access via ISDN 128Kb was very slow (2)Didn't seem that anyone could cover the test matrix with another vendor even50%.Everyone still ping testing, not real traffic, limited ftp transfers forthose who tried rekeyingNo T-shirtsClients were not really tested, mostly vendor's gateway/Firewall products.Not testing CRLs, not testing cert expirationsHard to understand why two systems would not interoperateNeed phones at each stationNetwork addressing plan was hard to read and understand what is needed.Need picture of topology.Impossible to design comprehensive test matrix, don't have time in a bakeoffto test all of theseNo time to get into real situation testTest matrix too confusing. Rather see list of topologies with spec of "toreach my network do this MM proposal and these different policies for telnetand http"For next bakeoff at IBM, what should be done?========================================================Test rekey in each direction under stress (4). Use FTP for this.Huge payload to test fragmentation & reassembly in IPsec ESP, AH under load(2)Seat vendors together who more advanced in their IPSEC/IKE implementations.Otherwise it will be n-X-n testing matrix which is impossible with 60vendors present.Post test matrix to the IPsec list before the event to get comments on it'scompletenessMake sure real world topology is tested: static IP client -> GW -- internalnet -- servers on PCsICSA should say more about rekeying issues, or allow vendors out of theirNDA signed during certification testing to discuss rekeying issuesNot relying on non-mandatory messagesPeer recovery testingNegotiating and maintaining many SAsNeed next NT5.0 post-beta2 release to test withNeed denial of service and IPsec knowlegable attack testsNeed a complete implementation of all IPsec capabilities to test against,Need an attacker box to test againstAll CA vendors should support Subject AltnameNeed telephone at deskNeed vendors capabilities listed and what they want to test in advanceTest nested tunnelsTest transport over tunnel modeTest random IP addresses to simulate mobilityHave bakeoff at the same place where you stay, in hotelAttack testingEnd of Report
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -