Skip to main content

A Quick Crash Detection Method for the Internet Key Exchange Protocol (IKE)
draft-ietf-ipsecme-failure-detection-08

Revision differences

Document history

Date Rev. By Action
2012-08-22
08 (System) post-migration administrative database adjustment to the Yes position for Jari Arkko
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Dan Romascanu
2011-04-06
08 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2011-04-06
08 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2011-04-05
08 (System) IANA Action state changed to Waiting on Authors from In Progress
2011-04-05
08 (System) IANA Action state changed to In Progress
2011-04-04
08 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent.
2011-04-01
08 Amy Vezza IESG state changed to Approved-announcement sent
2011-04-01
08 Amy Vezza IESG has approved the document
2011-04-01
08 Amy Vezza Closed "Approve" ballot
2011-04-01
08 Amy Vezza Approval announcement text regenerated
2011-04-01
08 Amy Vezza Ballot writeup text changed
2011-04-01
08 (System) New version available: draft-ietf-ipsecme-failure-detection-08.txt
2011-04-01
08 Jari Arkko [Ballot comment]
Expecting a new version still though per agreement in e-mail on April 1st, 2011.
2011-04-01
08 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to Yes from Discuss
2011-03-28
08 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss
2011-03-28
08 (System) Sub state has been changed to AD Follow up from New Id Needed
2011-03-28
07 (System) New version available: draft-ietf-ipsecme-failure-detection-07.txt
2011-03-17
08 Cindy Morgan Removed from agenda for telechat
2011-03-17
08 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation.
2011-03-17
08 Jari Arkko
[Ballot discuss]
This is a very good specification, and I would have voted Yes if it weren't for one technical issue:

I do not understand …
[Ballot discuss]
This is a very good specification, and I would have voted Yes if it weren't for one technical issue:

I do not understand how Section 5.2 mechanism:

        TOKEN_SECRET_DATA = HASH(QCD_SECRET | SPI-I | SPI-R | IPaddr-T)

works in an implementation that supports multihoming (e.g., RFC 4555). Can you clarify?
I would expect that the document at least has to be clearer about this, or perhaps the
Section 5.2 mechanism needs to be changed or removed to accommodate for
multihoming.
2011-03-17
08 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded
2011-03-17
08 Tim Polk [Ballot Position Update] New position, No Objection, has been recorded
2011-03-16
08 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded
2011-03-16
08 Peter Saint-Andre [Ballot Position Update] New position, No Objection, has been recorded
2011-03-16
08 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded
2011-03-16
08 Adrian Farrel [Ballot comment]
Please expand acronyms on first use (such as "SA" in the Abstract)
2011-03-16
08 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded
2011-03-16
08 Dan Romascanu
[Ballot comment]
1. An abbreviation sub-section would have been very useful

2.  Section 9.1 "QCD Token Generation and Handling", first paragraph, second sentence:

Replace 'she' …
[Ballot comment]
1. An abbreviation sub-section would have been very useful

2.  Section 9.1 "QCD Token Generation and Handling", first paragraph, second sentence:

Replace 'she' with 'they'

OLD                 

because if an attacker can guess the token associated with an IKE SA, she can tear down

SUGGESTED

because if an attacker can guess the token associated with an IKE SA, they can tear down

3. Section 9.2 "QCD Token Transmission" 3rd paragraph last sentence:

Replace 'it' with 'this'

OLD               

One way to do it is to synchronize

SUGGESTED 

One way to do this is to synchronize
2011-03-16
08 Dan Romascanu
[Ballot discuss]
The DISCUSS and COMMENT is based in part on the OPS-DIR review performed by Menachem Dodge.

This is a well written and useful …
[Ballot discuss]
The DISCUSS and COMMENT is based in part on the OPS-DIR review performed by Menachem Dodge.

This is a well written and useful document and I will support its approval after the following two issues are discussed and fixed if agreed:

1. I would have expected that the Operational Considerations section include some information about configuration. It looks at a minimum the activation of the QCD method should be configurable, and the capability to shitch it off in networks where it involves a security risk should be provided.

2. In Section 9.2 last paragraph, it is not completely clear as to what method should be implemented in the case of a load-sharing cluster when the load balancer cannot guarantee that all "IKE packets from the same source IP address always go to the same cluster". Should QCD Token Transmission not be implemented in such a situation?
2011-03-16
08 Dan Romascanu [Ballot Position Update] New position, Discuss, has been recorded
2011-03-15
08 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded
2011-03-15
08 Robert Sparks [Ballot Position Update] New position, Yes, has been recorded
2011-03-15
08 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded
2011-03-13
08 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded
2011-03-11
08 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Magnus Nystrom.
2011-03-10
08 Wesley Eddy Request for Last Call review by TSVDIR Completed. Reviewer: Mark Allman.
2011-03-10
06 (System) New version available: draft-ietf-ipsecme-failure-detection-06.txt
2011-03-10
08 Sean Turner [Ballot Position Update] New position, Yes, has been recorded for Sean Turner
2011-03-10
08 Sean Turner Ballot has been issued
2011-03-10
08 Sean Turner Created "Approve" ballot
2011-03-10
08 Sean Turner State changed to IESG Evaluation from Waiting for AD Go-Ahead.
2011-03-10
08 Sean Turner Ballot writeup text changed
2011-03-10
08 (System) State changed to Waiting for AD Go-Ahead from In Last Call.
2011-03-04
08 Amanda Baber
Upon approval of this document, IANA will make the following
registration in the 16406-40959 range of the IKEv2 Notify Message Types
registry at
http://www.iana.org/assignments/ikev2-parameters

TBD …
Upon approval of this document, IANA will make the following
registration in the 16406-40959 range of the IKEv2 Notify Message Types
registry at
http://www.iana.org/assignments/ikev2-parameters

TBD QUICK_CRASH_DETECTION [RFC-to-be]
2011-02-26
08 Samuel Weiler Request for Last Call review by SECDIR is assigned to Magnus Nystrom
2011-02-26
08 Samuel Weiler Request for Last Call review by SECDIR is assigned to Magnus Nystrom
2011-02-24
08 David Harrington Request for Last Call review by TSVDIR is assigned to Mark Allman
2011-02-24
08 David Harrington Request for Last Call review by TSVDIR is assigned to Mark Allman
2011-02-24
08 Sean Turner Placed on agenda for telechat - 2011-03-17
2011-02-24
08 Sean Turner Status Date has been changed to 2011-02-24 from None
2011-02-24
08 Cindy Morgan Last call sent
2011-02-24
08 Cindy Morgan
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: …
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (A Quick Crash Detection Method for IKE) to Proposed Standard


The IESG has received a request from the IP Security Maintenance and
Extensions WG (ipsecme) to consider the following document:
- 'A Quick Crash Detection Method for IKE'
  as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2011-03-10. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-ipsecme-failure-detection/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-ipsecme-failure-detection/

2011-02-24
08 Sean Turner Last Call was requested
2011-02-24
08 Sean Turner State changed to Last Call Requested from Publication Requested.
2011-02-24
08 Sean Turner Last Call text changed
2011-02-24
08 (System) Ballot writeup text was added
2011-02-24
08 (System) Last call text was added
2011-02-24
08 (System) Ballot approval text was added
2011-02-24
08 Cindy Morgan
(1.a) Who is the Document Shepherd for this document? Has the
Document Shepherd personally reviewed this version of the
document and, in particular, does he …
(1.a) Who is the Document Shepherd for this document? Has the
Document Shepherd personally reviewed this version of the
document and, in particular, does he or she believe this
version is ready for forwarding to the IESG for publication?
Paul Hoffman, co-chair of IPsecME WG. Yes. Yes.

(1.b) Has the document had adequate review both from key WG members
and from key non-WG members? Does the Document Shepherd have
any concerns about the depth or breadth of the reviews that
have been performed?
Yes. It recently went through a WG LC. There were not a lot of
comments on the document, but at least a few people who are not the
document authors commented.

(1.c) Does the Document Shepherd have concerns that the document
needs more review from a particular or broader perspective,
e.g., security, operational complexity, someone familiar with
AAA, internationalization or XML?
No concerns.

(1.d) Does the Document Shepherd have any specific concerns or
issues with this document that the Responsible Area Director
and/or the IESG should be aware of? For example, perhaps he
or she is uncomfortable with certain parts of the document, or
has concerns whether there really is a need for it. In any
event, if the WG has discussed those issues and has indicated
that it still wishes to advance the document, detail those
concerns here. Has an IPR disclosure related to this document
been filed? If so, please include a reference to the
disclosure and summarize the WG discussion and conclusion on
this issue.
No concerns.

(1.e) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with
others being silent, or does the WG as a whole understand and
agree with it?
The WG has run out of steam, but I believe that there is rough
consensus both in the utility of this new protocol and in the
protocol's design.

(1.f) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in
separate email messages to the Responsible Area Director. (It
should be in a separate email because this questionnaire is
entered into the ID Tracker.)
No threats.

(1.g) Has the Document Shepherd personally verified that the
document satisfies all ID nits? (See the Internet-Drafts Checklist
and http://tools.ietf.org/tools/idnits/). Boilerplate checks are
not enough; this check needs to be thorough. Has the document
met all formal review criteria it needs to, such as the MIB
Doctor, media type and URI type reviews?
All ID nits satisfied.

(1.h) Has the document split its references into normative and
informative? Are there normative references to documents that
are not ready for advancement or are otherwise in an unclear
state? If such normative references exist, what is the
strategy for their completion? Are there normative references
that are downward references, as described in [RFC3967]? If
so, list these downward references to support the Area
Director in the Last Call procedure for them [RFC3967].
Yes, and I agree with the split. (I just noticed that one of the
informative references is now an RFC and the other is expired,
but we can deal with those after IETF LC.)

(1.i) Has the Document Shepherd verified that the document IANA
consideration section exists and is consistent with the body
of the document? If the document specifies protocol
extensions, are reservations requested in appropriate IANA
registries? Are the IANA registries clearly identified? If
the document creates a new registry, does it define the
proposed initial contents of the registry and an allocation
procedure for future registrations? Does it suggest a
reasonable name for the new registry? See [RFC5226]. If the
document describes an Expert Review process has Shepherd
conferred with the Responsible Area Director so that the IESG
can appoint the needed Expert during the IESG Evaluation?
There is one IANA request, and it is properly formed.

(1.j) Has the Document Shepherd verified that sections of the
document that are written in a formal language, such as XML
code, BNF rules, MIB definitions, etc., validate correctly in
an automated checker?
No formal language used.

Technical Summary
When an IPsec tunnel between two IKEv2 peers is disconnected due
to a restart of one peer, it can take as much as several minutes
for the other peer to discover that the reboot has occurred. This
delays the recovery of the tunnel. This document describes an
IKEv2 extension that allows discovery of the reboot almost
immediately after the rebooted system is active again.

Working Group Summary
There was consensus both that this is a problem that needs to be
solved and for the proposed solution.

Document Quality
Some vendors expressed interest in implementing this in their
IPsec gateways.
2011-02-24
08 Cindy Morgan Draft added in state Publication Requested
2011-02-24
08 Cindy Morgan [Note]: 'Paul Hoffman (paul.hoffman@vpnc.org) is the document shepherd.' added
2011-02-18
05 (System) New version available: draft-ietf-ipsecme-failure-detection-05.txt
2011-02-11
04 (System) New version available: draft-ietf-ipsecme-failure-detection-04.txt
2011-01-10
03 (System) New version available: draft-ietf-ipsecme-failure-detection-03.txt
2010-10-25
02 (System) New version available: draft-ietf-ipsecme-failure-detection-02.txt
2010-10-10
01 (System) New version available: draft-ietf-ipsecme-failure-detection-01.txt
2010-09-02
00 (System) New version available: draft-ietf-ipsecme-failure-detection-00.txt