< draft-vidya-ipsec-failover-ps-01.txt   draft-vidya-ipsec-failover-ps-02.txt >
Network Working Group V. Narayanan, Ed. Network Working Group V. Narayanan, Ed.
Internet-Draft Qualcomm, Inc. Internet-Draft Qualcomm, Inc.
Intended status: Informational February 27, 2007 Intended status: Informational May 18, 2007
Expires: August 31, 2007 Expires: November 19, 2007
IPsec Gateway Failover and Redundancy - Problem Statement and Goals IPsec Gateway Failover and Redundancy - Problem Statement and Goals
draft-vidya-ipsec-failover-ps-01 draft-vidya-ipsec-failover-ps-02
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
skipping to change at page 1, line 34 skipping to change at page 1, line 34
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on August 31, 2007. This Internet-Draft will expire on November 19, 2007.
Copyright Notice Copyright Notice
Copyright (C) The IETF Trust (2007). Copyright (C) The IETF Trust (2007).
Abstract Abstract
Recovering from failure of IPsec gateways maintaining large numbers Recovering from failure of IPsec gateways maintaining large numbers
of SAs may take several minutes, if they need to re-establish the of SAs may take several minutes, if they need to re-establish the
IPsec SAs by re-running the key management protocol, IKEv2. A IPsec SAs by re-running the key management protocol, IKEv2. A
skipping to change at page 2, line 11 skipping to change at page 2, line 11
this approach is significant, leading to a need for a faster and yet this approach is significant, leading to a need for a faster and yet
secure failover solution. This document describes the problem secure failover solution. This document describes the problem
statement and the goals for an IPsec/IKEv2 gateway failover/ statement and the goals for an IPsec/IKEv2 gateway failover/
redundancy solution. redundancy solution.
Table of Contents Table of Contents
1. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
4. Applicability and Problem Statement . . . . . . . . . . . . . 4 4. Motivation and Background . . . . . . . . . . . . . . . . . . 4
5. IPsec Failover Redundancy Solution Goals . . . . . . . . . . . 6 4.1. Use of IPsec in 3G Networks . . . . . . . . . . . . . . . 4
6. Security Considerations . . . . . . . . . . . . . . . . . . . 7 4.1.1. Mobile IPv6 in 3G Networks and IPsec State Related
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8 Concerns . . . . . . . . . . . . . . . . . . . . . . . 6
8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 8 4.2. Mobile IPv6 Home Agent Reliability and IPsec Failover . . 7
9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 8 5. Applicability and Problem Statement . . . . . . . . . . . . . 8
9.1. Normative References . . . . . . . . . . . . . . . . . . . 8 5.1. Failover Cases . . . . . . . . . . . . . . . . . . . . . . 9
9.2. Informative References . . . . . . . . . . . . . . . . . . 9 6. IPsec Failover Redundancy Solution Goals . . . . . . . . . . . 10
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 9 7. Security Considerations . . . . . . . . . . . . . . . . . . . 12
Intellectual Property and Copyright Statements . . . . . . . . . . 10 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 13
9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 13
10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 14
10.1. Normative References . . . . . . . . . . . . . . . . . . . 14
10.2. Informative References . . . . . . . . . . . . . . . . . . 14
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 14
Intellectual Property and Copyright Statements . . . . . . . . . . 15
1. Contributors 1. Contributors
This document reflects contributions from and active discussions This document reflects contributions from and active discussions
among the following individuals (in alphabetical order): among the following individuals (in alphabetical order):
Lakshminath Dondeti (ldondeti@qualcomm.com) Lakshminath Dondeti (ldondeti@qualcomm.com)
Paul Hoffman (paul.hoffman@vpnc.org) Paul Hoffman (paul.hoffman@vpnc.org)
skipping to change at page 3, line 43 skipping to change at page 3, line 43
The IKEv2 protocol, while more efficient and involves fewer round The IKEv2 protocol, while more efficient and involves fewer round
trips compared to its predecessor is quite computationally intensive, trips compared to its predecessor is quite computationally intensive,
especially when entity authentication is by way of public-key based especially when entity authentication is by way of public-key based
certificates. IKEv2 also needs 2-3 roundtrips when using PSKs or certificates. IKEv2 also needs 2-3 roundtrips when using PSKs or
public keys for authentication and 4 or more roundtrips when EAP is public keys for authentication and 4 or more roundtrips when EAP is
used for client authentication. Thus, the process of setting up used for client authentication. Thus, the process of setting up
IPsec SAs is an expensive process, in terms of the number of messages IPsec SAs is an expensive process, in terms of the number of messages
exchanged between the initiator and responder. exchanged between the initiator and responder.
Aside from the number of messages, IKEv2 also uses Diffie-Hellman for
key negotiation. Network or gateway failures that result in a large
number of clients reconnecting to a gateway will potentially lead to
expensive computation on the gateway due to too many D-H exchanges
within a short time span.
When an IPsec entity has a large number of SAs with various other When an IPsec entity has a large number of SAs with various other
endpoints, establishing all the SAs again upon a failure recovery endpoints, establishing all the SAs again upon a failure recovery
condition takes a long time. Examples of entities that manage a condition takes a long time. Examples of entities that manage a
large number of IPsec SAs include IPsec remote access gateways, and large number of IPsec SAs include IPsec remote access gateways, and
application servers that use IPsec for protection of signaling application servers that use IPsec for protection of signaling
traffic. For efficient recovery from gateway or server failure, it traffic. For efficient recovery from gateway or server failure, it
might make sense to allow those entities to maintain copies of IPsec might make sense to allow those entities to maintain copies of IPsec
and IKEv2 state (SAD, SPD, and associated state) on other gateways and IKEv2 state (SAD, SPD, and associated state) on other gateways
(for stateful operation) or on the client itself (for stateless (for stateful operation) or on the client itself (for stateless
operation). Either the recovered IPsec entity or other entities in operation). Either the recovered IPsec entity or other entities in
the gateway pool may retrieve the stored IPsec and IKEv2 state for the gateway pool may retrieve the stored IPsec and IKEv2 state for
faster recovery. faster recovery.
There are a number of proprietary solutions for this problem in the There are a number of proprietary solutions for some part of this
industry, however, those solutions do not interoperate. Applications problem in the industry, however, those solutions do not
that need IPsec failover capability, such as Mobile IPv6 have interoperate. Applications that need IPsec failover capability, such
solutions under development for interoperable Home Agent (HA) as Mobile IPv6 have solutions under development for interoperable
failover. Without interoperable (client to server and server to Home Agent (HA) failover. Without interoperable (client to server
server) IPsec failover capability HA failover solutions are and server to server) IPsec failover capability, Home Agent failover
incomplete. Thus, there is a need for an interoperable means of solutions are incomplete. Thus, there is a need for an interoperable
performing SA uploads and retrieval so that such IPsec redundancy can means of performing SA uploads and retrieval so that such IPsec
be implemented in an interoperable fashion. redundancy can be implemented in an interoperable fashion.
3. Terminology 3. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [1]. document are to be interpreted as described in RFC 2119 [1].
This document uses terminology defined in [2], [3], and [4]. In This document uses terminology defined in [2], [3], and [4]. In
addition, this document uses the following terms: addition, this document uses the following terms:
4. Applicability and Problem Statement 4. Motivation and Background
This work is motivated by the use of IPsec in 3G networks, where the
protocols used are often optimized for efficient, low overhead, low
latency operation. As will be noted from the rest of this document,
this does not mean that a solution developed will only be applicable
for use in such 3G networks. The intent is to develop a solution
that will be applicable for any entities using IKEv2/IPsec. This
section provides details on the motivation and background that will
help understand the problem statement and goals that follow.
4.1. Use of IPsec in 3G Networks
A high level view of a 3G network with the various IPsec components
is shown in Figure 1.
------------ ---------------
| Home Agent | | Other servers |
|(MIP6,IPsec)| |(May use IPsec)|
------------ ---------------
| |
| |
--------------------
( )
( IP Network )
( )
--------------------
| |
/ \
/ \
---------------- -------------
/ Trusted access \ | VPN Gateway |
\ / | (IPsec) |
---------------- -------------
|
|
------------------
/ Untrusted access \
\ /
\ ------------------
\ /
\ /
----------------
| Mobile Station |
| (IPsec Client) |
----------------
Figure 1: High Level Network View with IPsec Components
There are multiple uses of IPsec being considered in next generation
3G networks. One is the use of IPsec in untrusted access networks -
this is much like a remote access VPN, with a VPN gateway placed in
the network to provide secure connectivity to mobile devices over an
untrusted network. The second is the use of IPsec for Mobile IPv6
(MIP6) - here, the MIP6 signaling is protected using IPsec, as
required by MIP6, between the mobile node and the Home Agent (HA).
Additionally, data tunneled through the Home Agent may also be
protected using IPsec. In both these cases, IKEv2 is the mode of
establishing the IPsec SA and EAP is often used in IKEv2 for client
authentication.
A third use of IPsec is in the IP Multimedia Subsystem (IMS) -
however, IKEv2 is not used to set up the IPsec SA for use in IMS and
hence, that use is not considered in this document. It should be
noted that these may only be a subset of the IPsec use cases; this
document applies to any use of IPsec that uses IKEv2 for SA
establishment.
In all these cases, the execution of IKEv2 (especially with EAP for
client authentication) takes up a number of message exchanges and
reasonable computational expense. When executed once upon power up,
it may not be a significant concern. However, if IKEv2/EAP needs to
be executed during handoffs, it often adds an unacceptable handoff
latency. Further, upon failure of the network or the IPsec gateway,
there is significant time needed to bring all the clients back in
service.
Distributed network elements to which the clients can connect using
IPsec allow distributed failovers without the need for a fully
reduandant IPsec gateway. Even when a fully redundant IPsec gateway
is used, the ability to failover to distributed gateways provides
better site-level redundancy.
4.1.1. Mobile IPv6 in 3G Networks and IPsec State Related Concerns
------------ ---------------
| Home Agent | | Other servers |
------------ ---------------
| |
| |
--------------------
( )
( IP Network )
( )
--------------------
| |
| |_ _ _ _ _ _ _ _ _
| |
------------- ----------------
/ Home Access \ / Roaming access \
\ / \ /
------------- ----------------
| |
| |
---------------- ----------------
| Mobile Station | | Mobile Station |
|(No MIP6; IPsec | -----> | (MIP6, IPsec |
| unused) | | in use) |
---------------- ----------------
Figure 2: Mobile IPv6 with Home and Roaming Networks
One potential use of MIP6 in 3G networks involves using the protocol
only when the mobile node roams outside of the its home network.
This is shown in Figure 2. There is a need to keep the handoff upon
roaming seamless and hence, this makes the setting up of IPsec SAs
upon roaming undesirable. It is also not always feasible to predict
roaming well ahead of time, sufficiently enough to proactively set up
an IPsec SA. For this reason, it is better to set up the SAs while
the mobile node is still on the home network (for e.g., upon first
attachment to the network).
However, it is also the case that device roaming is unpredictable -
so, if the Home Agent is required to maintain all the IPsec SAs for
all the mobile nodes, that is a significant waste of resources on the
Home Agent, given that it is maintaining state for several devices
that may never roam. Hence, establishing the IPsec SA, losing the
state on the Home Agent, and allowing resumption of state when needed
is a more scalable approach to handling the scenario.
This case, while does not constitute a true failure of any kind, can
be viewed as an instance where the network lost the state meant for
the client. In such circumstances, any stateless failover mechanisms
defined can be used to quickly resume the IPsec SA when the mobile
device roams and actually needs to use it.
4.2. Mobile IPv6 Home Agent Reliability and IPsec Failover
There are ongoing efforts to standardize Mobile IP Home Agent
reliability [5] mechanisms for interoperable MIP6 failovers. The
scope of that work addresses having distributed home agents that
share MIP6 state. IPsec state sharing is not assumed by the work,
although some IPsec state may be shared across the gateways. For
this work, it is assumed that the home agents will have different IP
addresses, although, the client IP addresses will be preserved after
failover. If the IPsec state is perfectly synchronized among the
different home agents, it may be feasible to have a failover that is
transparent to the clients from an IPsec perspective. Note that the
failover is not exactly transparent from a Mobile IP perspective, due
to the change in Home Agent IP address. However, per packet
synchronization of IPsec state is very hard to achieve, especially
across distributed entities and hence, a need for client involved
IPsec failover also becomes essential in that case.
In all the cases described above, the resumption of IKEv2/IPsec state
needs to happen with minimal latency to avoid longer resumption times
for applications in progress on the clients.
5. Applicability and Problem Statement
There are at least two cases where fast recovery from failure of an There are at least two cases where fast recovery from failure of an
IPsec entity is applicable. IPsec entity is applicable.
IPsec Gateways -- The first case is that of an IPsec remote access IPsec Gateways -- The first case is that of an IPsec remote access
gateway managing tunnel mode SAs with clients. The gateway may be gateway managing tunnel mode SAs with clients. The gateway may be
enforcing access control to an enterprise network; this is the enforcing access control to an enterprise network; this is the
typical remote access use case. The gateway could also be typical remote access use case. The gateway could also be
enforcing service provider network access control. In that case, enforcing service provider network access control. In that case,
clients typically use EAP over IKEv2 to establish an IPsec session clients typically use EAP over IKEv2 to establish an IPsec session
with a network access gateway. In either IPsec Gateway use case, with a network access gateway. In either IPsec Gateway use case,
the IPsec traffic itself flows from the VPN clients or Initiators the IPsec traffic itself flows from the VPN clients or Initiators
to the VPN gateway; the gateway decapsulates the IPsec packets and to the VPN gateway; the gateway decapsulates the IPsec packets and
forwards the cleartext packets based on inner IP headers. In the forwards the cleartext packets based on inner IP headers. In the
reverse direction, the VPN gateway uses the security policy reverse direction, the VPN gateway uses the security policy
database (SPD) or associated caches as per RFC4301, to lookup the database (SPD) or associated caches as per RFC4301, to lookup the
relevant IPsec, encapsulates the packets and sends to the relevant IPsec SA, encapsulates the packets and sends to the
appropriate VPN client. appropriate VPN client.
Servers -- The second use is that of an IPsec entity acting as a Servers -- The second use is that of an IPsec entity acting as a
server for an application such as Mobile IP. In these cases, server for an application such as Mobile IP. In these cases,
Mobile IP messages are protected using IPsec. Each Mobile IP Home Mobile IP messages are protected using IPsec. Each Mobile IP Home
Agent (HA) maintains a large number of transport or tunnel mode Agent (HA) maintains a large number of transport or tunnel mode
IPsec sessions with their respective clients. In this case, IPsec IPsec sessions with their respective clients. In this case, IPsec
protected signaling messages are sent end-to-end, between Mobile protected signaling messages are sent end-to-end, between Mobile
IP client and HA, respectively. IP client and HA, respectively.
skipping to change at page 5, line 34 skipping to change at page 9, line 5
number of clients. In such a case, one or more of the gateways in number of clients. In such a case, one or more of the gateways in
the cluster may take over clients associated with another gateway in the cluster may take over clients associated with another gateway in
the cluster in the event of a failure. the cluster in the event of a failure.
When IPsec is used for protection of signaling between an application When IPsec is used for protection of signaling between an application
client and server, server redundancy is often an important client and server, server redundancy is often an important
consideration. As in the gateway model, it is necessary for another consideration. As in the gateway model, it is necessary for another
server to be able to seamlessly take over clients being served by a server to be able to seamlessly take over clients being served by a
failed server. failed server.
In cases of gateway or server failures, it may also be that the
clients re-attach to the same gateway or server after recovery of the
entity. The failover procedures must be able to support that type of
recovery.
In addition to server failures, massive network failures of a short In addition to server failures, massive network failures of a short
duration (minutes), followed by network recovery are also a concern. duration (minutes), followed by network recovery are also a concern.
The network failure results in all clients being disconnected first The network failure results in all clients being disconnected first
(e.g. because of dead-peer detection), and then simultaneously (e.g. because of dead-peer detection), and then simultaneously
attempting to reconnect. This can be classified as a subset of the attempting to reconnect. This can be classified as a subset of the
gateway failure case for the purpose of this effort. gateway failure case for the purpose of this effort.
In all these cases outlined above, it is feasible to perform secure In all these cases outlined above, it is feasible to perform secure
IPsec and IKEv2 state transfer across endpoints to provide smoother IPsec and IKEv2 state transfer across endpoints to provide smoother
failure recovery. Today, such redundancy operations are performed in failure recovery. Today, such redundancy operations are performed in
a vendor specific manner and are not interoperable. Also, lack of a vendor specific manner and are not interoperable. Also, lack of
client involvement implies a failover mode that is transparent to the client involvement implies a failover mode that is transparent to the
client. However, in the above cases, the failover cannot always be client. However, in the above cases, the failover may not always be
transparent to the client and hence, an interoperable protocol transparent to the client and hence, an interoperable mechanism
becomes very important. becomes very important.
5. IPsec Failover Redundancy Solution Goals 5.1. Failover Cases
--------------------------
( )
( Internet )
( )
--------------------------
| |
/ \
/ \
---------- ---- ----------
|Operator X| ( ) |Operator X|
| Site A | ( IP ) | Site B |
| | ( ) | |
| ------ | ( N ) | ------ |
| |IPsec | | ( e ) | |IPsec | |
| |GW A1 | |------( t )-----| |GW B1 | |
| ------ | ( w ) | ------ |
| ------ | ( o ) | ------ |
| |IPsec | | ( r ) | |IPsec | |
| |GW A2 | | ( k ) | |GW B2 | |
| ------ | ( ) | ------ |
| | ---- | |
---------- ----------
Figure 3: Various IPsec Entities in the Network
Figure 3 shows the various possible IPsec gateways that may be
present in an operator's network. This figure shows a two-site
operator network, each of which may have multiple IPsec gateways.
Even though the term "IPsec gateway" has been used in the figure, it
is also representative of any application server serving as an IPsec
endpoint. The following are applicable failover cases under
consideration.
1. Intra-site gateways with no direct gateway-to-gateway state
synchronization mechanisms: In this case, the IPsec state is
either partially available (e.g., no per packet state
synchronization, but, the IKE SA is available, etc.) or not
available at all. However, this does not restrict any state
synchronization of other applications (e.g., the Mobile IP state
may still be fully sychronized). This would be a case where
IPsec Gateway A2 or B2 is acting as the backup gateway for IPsec
Gateway A1 or B1 respectively in Figure 3.
2. Inter-site gateways that are geographically distributed: It is
assumed that complete IPsec state synchronization across inter-
site gateways is either complicated or impractical. This again
does not rule of synchronization of other state such as Mobile IP
state. This would be a case where IPsec Gateway B1 or B2 is
acting as the backup gateway for IPsec Gateway A1 or A2 or vice-
versa in Figure 3.
3. Gateway reboots: This is the case of clients attaching to the
same gateway after it has recovered from a failure. Often, the
gateway has lost the relevant IPsec state in such cases. This
would be a case where any single IPsec Gateway in Figure 3
recovers from a failure and has clients connecting to it again.
6. IPsec Failover Redundancy Solution Goals
The following are goals for the IPsec Failover Redundancy solution. The following are goals for the IPsec Failover Redundancy solution.
Note that the motivation for this effort is to develop mechanisms and Note that the motivation for this effort is to develop mechanisms and
perhaps protocols to facilitate failover capabilities. It is perhaps protocols to facilitate failover capabilities. It is
plausible that the design facilitates features such as load plausible that the design facilitates features such as load
balancing, but additional signaling or protocol design to facilitate balancing, but additional signaling or protocol design to facilitate
load balancing exclusively is outside the scope of this effort. load balancing exclusively is outside the scope of this effort.
o Distributed Failover Mechanism: Gateways may be located at 1. Distributed Failover Mechanism: Gateways may be located at
different sites and may not share the same IP address or have the different sites and may not share the same IP address or have the
same view of the network. For instance, the various distributed same view of the network. For instance, the various distributed
gateways may be connected to different backend elements such as gateways may be connected to different backend elements such as
EAP servers, DHCP servers, etc. A failover mechanism must be able EAP servers, DHCP servers, etc. A failover mechanism must be
to allow such distributed gateways to take over the clients able to allow such distributed gateways to take over the clients
associated with a failed gateway. The idea here is that there is associated with a failed gateway. The idea here is that there is
no need for a fully redundant gateway that only starts functioning no need for a fully redundant gateway that only starts
in the event of a failure. It is more cost-effective to allow functioning in the event of a failure. It is more cost-effective
such failover to distributed gateways that may be functional on to allow such failover to distributed gateways that may be
their own, serving other clients. The temporary increase in load functional on their own, serving other clients. The temporary
on some gateways in the system may be acceptable to many increase in load on some gateways in the system may be acceptable
deployments in the event of a failure. Such a mechanism across to many deployments in the event of a failure. Such a mechanism
distributed gateways may also be used for client handoff to other across distributed gateways may also be used for client handoff
gateways due to other reasons, e.g., load balancing. Gateways to other gateways due to other reasons, e.g., load balancing.
located on the same link with the same view of the network may be Gateways located on the same link with the same view of the
viewed as a subset. network may be viewed as a subset.
o Client Involvement: Given that the gateways may be distributed, 2. Client Involvement: Given that the gateways may be distributed,
the failover is not intended to be transparent to the client. The the failover is not intended to be transparent to the client.
goal is to allow the client to initiate the switch to a different There may be times when the client, from its perspective, sees
gateway. the gateway as unavailable and therefore needs to take some
action to use a new gateway. The goal is to allow the option for
the client to initiate the switch to a different gateway. In
some cases, such as the Mobile IPv6 Home Agent reliability
process, the Home Agent, acting as the IPsec gateway, may
initiate the switch. This is due to the fact that the MIP6 Home
Agent reliability procedures would allow a new Home Agent to
detect the failure of an old Home Agent and trigger communication
with its clients.
o Low Latency failover: One of the major goals is to allow a low 3. Low Latency failover: One of the major goals is to allow a low
latency failover, without having to re-establish all the IKEv2 and latency failover, without having to re-establish all the IKEv2
IPsec state all over again. The bottleneck here is the new IPsec and IPsec state all over again. The bottleneck here is the new
gateway trying to handle a flood of IKEv2 exchanges upon a IPsec gateway trying to handle a flood of IKEv2 exchanges upon a
failover. Further, for applications such as Mobile IPv6 that use failover. Further, for applications such as Mobile IPv6 that use
IKEv2/IPsec for securing the signaling, re-establishment of IKEv2 IKEv2/IPsec for securing the signaling, re-establishment of IKEv2
often adds unacceptable latencies. Ideally, a mechanism that does often adds unacceptable latencies. Ideally, a mechanism that
not need any new messages to exclusively support failover is does not need any new messages to exclusively support failover is
desired. In general, the goal is to have significantly lower desired. In general, the goal is to have significantly lower
latency and to incur a lower computational overhead than a regular latency and to incur a lower computational overhead than a
IKEv2 exchange. In cases where EAP is used for client regular IKEv2 exchange. In cases where EAP is used for client
authentication in IKEv2, the failover should not require EAP authentication in IKEv2, the failover should not require EAP
authentication, to avoid AAA overloading and possible user authentication, to avoid AAA overloading and possible user
interaction. interaction. This may mean that any attributes returned from the
AAA server as a result of EAP must also be stored as part of the
state, if those are required for IPsec operation.
o Application Usage of IPsec: When IPsec is used to protect other 4. Application Usage of IPsec: When IPsec is used to protect other
protocols, the extent of failover interoperability that can be protocols, the extent of failover interoperability that can be
expected by such protocols greatly hinge on the interoperability expected by such protocols greatly hinge on the interoperability
of IPsec failover mechanisms. For e.g., Mobile IP Home Agent of IPsec failover mechanisms. For e.g., Mobile IP Home Agent
reliability [5] mechanisms are intended to be standardized for reliability [5] mechanisms are intended to be standardized for
interoperability. However, it is incomplete without IPsec interoperability. However, it is incomplete without IPsec
failover. So, it is important to allow applications that use failover. So, it is important to allow applications that use
IPsec to take advantage of the IPsec failover mechanism. It is IPsec to take advantage of the IPsec failover mechanism. It is
not expected that the IPsec failover solution will address this, not expected that the IPsec failover solution will address this,
but a guidance needs to be provided to allow application but a guidance needs to be provided to allow application
specifications to specify the appropriate interface/interaction specifications to specify the appropriate interface/interaction
needed (e.g., if synchronization between application state and needed (e.g., if synchronization between application state and
IPsec state is needed). IPsec state is needed).
o Interoperability: Client-gateway and gateway-gateway 5. Interoperability: Client-gateway and gateway-gateway
interoperability is required. This follows from the discussion on interoperability is required. Note that the gateway-gateway
the other goals stated above. interoperability does not refer to any full SA state
synchronization mechanisms across gateways. Interoperability
across gateways is, however, needed from the perspective of
having a standard state format that multi-vendor gateways would
be able to use for failover, for example.
o Stateless Gateway Operation: The IPsec failover mechanism should 6. Stateless Gateway Operation: The IPsec failover mechanism should
specify a mode of operation that will allow the backup gateways to specify a mode of operation that will allow the backup gateways
remain stateless until a failover occurs or during a temporary to not have to maintain state for clients it is not serving. A
service interruption. This will allow for better scalability of gateway must need to acquire and store state for a client that is
the solution, since a given gateway only needs to store state for otherwise served by a different gateway, only when a failover
clients that are being served by it. This requires for an equally occurs or during a temporary service interruption with the
secure means of storing state in the clients and allowing the client's old gateway. This will allow for better scalability of
client to present it to the gateway for recovery. the solution, since a given gateway only needs to store state for
clients that are being served by it. This requires for an
equally secure means of storing state in the clients and allowing
the client to present it to the gateway for recovery.
o Support for IPsec transport and tunnel modes: As noted in the 7. Support for IPsec transport and tunnel modes: As noted in the
applicability section of this document, the IPsec infrastructure applicability section of this document, the IPsec infrastructure
endpoint may either be an IPsec VPN gateway employing tunnel mode endpoint may either be an IPsec VPN gateway employing tunnel mode
SAs with the client or an application server that uses IPsec SAs with the client or an application server that uses IPsec
transport or tunnel mode to protect signaling exchanges with the transport or tunnel mode to protect signaling exchanges with the
client. Hence, a solution developed for failover must support client. Hence, a solution developed for failover must support
failover of both transport and tunnel mode SAs. failover of both transport and tunnel mode SAs.
6. Security Considerations 7. Security Considerations
This document provides the problem description and goals for an IPsec This document provides the problem description and goals for an IPsec
failover solution. The solution must ensure secure operation and failover solution. The solution must ensure secure operation and
there are several important points to consider for that. We there are several important points to consider for that. We
highlight a few of the important ones below : highlight a few of the important ones below :
o First, any SA storage and retrieval mechanisms specified between o First, any SA storage and retrieval mechanisms specified between
the backend entities must be protected with a secure channel that the backend entities must be protected with a secure channel that
has the following properties: confidentiality, integrity has the following properties: confidentiality, integrity
protection, and replay protection. protection, and replay protection.
o In a client-server model, where the client always initiates the o In a client-server model, where the client always initiates the
secure communication, the client is always the IKEv2 initiator. secure communication, the client is always the IKEv2 initiator.
Solutions for failover in such cases, may allow the client to find Solutions for failover in such cases, may allow the client to find
the new gateway address through external means. Subsequently, the the new gateway IP address through external means. Subsequently,
client must be able to verify that the new gateway possesses the the client must be able to verify that the new gateway possesses
IKEv2 key material. A client should be able to initiate a new the IKEv2 key material. A client should be able to initiate a new
IKEv2 SA with one or more auxiliary gateways without interrupting IKEv2 SA with one or more auxiliary gateways without interrupting
a connection to the currently used primary gateway. The client a connection to the currently used primary gateway. The client
must consider the new gateway as a provisional one until it has must consider the new gateway as a provisional one until it has
verified a new gateway is the appropriate replacement for the verified a new gateway is the appropriate replacement for the
primary gateway. primary gateway.
o Any solution must adequately describe the consequences to replay o Any solution must adequately describe the consequences to replay
protection as a result of IPsec failover. For replay protection, protection as a result of IPsec failover. For replay protection,
it may be best for the replacement gateway to assume that the it may be best for the replacement gateway to assume that the
IPsec SA state is outdated and reestablish the IPsec SA using an IPsec SA state is outdated and reestablish the IPsec SA using an
IKEv2 CREATE_CHILD_SA exchange. IKEv2 CREATE_CHILD_SA exchange.
o IPsec failover facilitates the replacement of an IPsec GW serving o IPsec failover facilitates the replacement of an IPsec GW serving
a client with another GW. The design must take into account the a client with another GW. The design must take into account the
possibility of an adversary creating a ping-ponging scenario where possibility of an adversary creating a ping-ponging scenario where
a client may be forced to move between two or more GWs a client may be forced to move between two or more GWs
persistently. persistently.
7. IANA Considerations o It may be plausible for an attacker to force failover of a client
to a gateway that is more advantageous to the attacker. The
design must provide a means of verifying that a particular gateway
belongs to the secure domain that the client may attach to using
the same IKE SA.
8. IANA Considerations
No IANA action is required for this document. No IANA action is required for this document.
8. Acknowledgments 9. Acknowledgments
We thank Russ Housley, Jun Wang, Marcello Lioy, and Raymond Hsu for We thank Russ Housley, Jun Wang, Marcello Lioy, and Raymond Hsu for
technical discussions and/or help with standardization aspects technical discussions and/or help with standardization aspects
related to this work. We also thank Steve Kent for his review of the related to this work. We thank Steve Kent for his review of the
draft. draft. We also thank Kuntal Chowdhury, Vijay Devarapalli and Kent
Leung for their discussions on the applicability to Mobile IPv6 and
3G networks in general.
9. References 10. References
9.1. Normative References 10.1. Normative References
[1] Bradner, S., "Key words for use in RFCs to Indicate Requirement [1] Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997. Levels", BCP 14, RFC 2119, March 1997.
[2] Kent, S. and K. Seo, "Security Architecture for the Internet [2] Kent, S. and K. Seo, "Security Architecture for the Internet
Protocol", RFC 4301, December 2005. Protocol", RFC 4301, December 2005.
[3] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", RFC 4306, [3] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", RFC 4306,
December 2005. December 2005.
[4] Eronen, P., "IKEv2 Mobility and Multihoming Protocol (MOBIKE)", [4] Eronen, P., "IKEv2 Mobility and Multihoming Protocol (MOBIKE)",
RFC 4555, June 2006. RFC 4555, June 2006.
9.2. Informative References 10.2. Informative References
[5] Wakikawa, R., "Home Agent Reliability Protocol", [5] Wakikawa, R., "Home Agent Reliability Protocol",
draft-ietf-mip6-hareliability-00 (work in progress), June 2006. draft-ietf-mip6-hareliability-01 (work in progress), March 2007.
Author's Address Author's Address
Vidya Narayanan (editor) Vidya Narayanan (editor)
Qualcomm, Inc. Qualcomm, Inc.
5775 Morehouse Dr 5775 Morehouse Dr
San Diego, CA San Diego, CA
USA USA
Phone: +1 858-845-2483 Phone: +1 858-845-2483
 End of changes. 27 change blocks. 
106 lines changed or deleted 364 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/