INTERNET DRAFT Yoav Nir draft-nir-ikev2-auth-lt-00.txt Check Point Expires: October 2004 Intended status: Informational May 11, 2004 Repeated Authentication in IKEv2 Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. Abstract With some IPsec peers, particularly in the remote access scenario, it is desirable to repeat the mutual authentication periodically. The purpose of this is to limit the time an IKE SA can be used by a third party who has gained control of the IPsec peer. This is not the same as IKE SA rekeying. At the end of the IKE_AUTH negotiation, the Responder sends a notification to the Initiator with the number of seconds before the authentication needs to be repeated. The Initiator will repeat the Initial exchange before that time is expired. 1. Introduction This document extends the IKEv2 document [IKEv2]. It describes the authentication lifetime notification and its processing. The key words "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY" in this document are to be interpreted as described in [RFC2119]. 2. Authentication Lifetime The Responder in an IKEv2 negotiation MAY be configured to limit the time that an IKE SA and the associated IPsec SAs may be used before the peer is required to repeat the authentication, through a new Initial Exchange. Nir [Page 1] INTERNET-DRAFT Repeated Authentication in IKEv2 April 2004 The Informational exchange follows the IKE_AUTH exchange, and is formed as follows: Initiator Responder ----------------------------- ----------------------------- HDR, SAi1, KEi, Ni --> <-- HDR, SAr1, KEr, Nr, [CERTREQ] HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,] AUTH, SAi2, TSi, TSr} --> <-- HDR, SK {IDr, [CERT,] AUTH, SAr2, TSi, TSr} <-- HDR, SK {N(AUTH_LIFETIME)} HDR --> The AUTH_LIFETIME notification is described in section 3. The original Responder that sends the AUTH_LIFETIME notification SHOULD send a DELETE notification when the end of the lifetime period. An Initiator that received an AUTH_LIFETIME notification SHOULD start an Initial exchange within the time indicated in the notification. The AUTH_LIFETIME notification MUST be protected and MAY be sent by the original Responder at any time. If the policy changes, the original Responder MAY send it again in a new Informational. The new Initial exchange will look like this: Initiator Responder ----------------------------- -------------------------- HDR, SAi1, KEi, Ni --> <-- HDR, SAr1, KEr, Nr, [CERTREQ] HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,] AUTH, N(REKEY_SA)} --> <-- HDR, SK {IDr, [CERT,] AUTH} The REKEY_SA notification MUST contain the IKE SPI of the old SA. The Responder MUST check that the the IDi and SAi1 payloads match those of the old SA. The AUTH payloads sign the first and second messages of this exchange. 3. AUTH_LIFETIME Notification The AUTH_LIFETIME message is a notification payload formatted as follows: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ! Next Payload !C! RESERVED ! Payload Length ! +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ! Protocol ID ! SPI Size ! Notify Message Type ! +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ! Lifetime ! +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Nir [Page 2] INTERNET-DRAFT Repeated Authentication in IKEv2 April 2004 o Payload Length is 12. o Protocol ID (1 octet) MUST be 1 (IKE_SA). o SPI size is 0 (SPI is in message header). o Notify Message type is to be assigned by IANA o Lifetime is the amount of time in seconds left before the peer should repeat the Initial exchange. 4. Interoperability with non-compliant IKEv2 implementations IKEv2 implementations that do not support the AUTH_LIFETIME notification will ignore it and will not repeat the authentication. In that case the original Responder will send a Delete notification for the IKE SA in an Informational exchange. Non-compliant Responders are not a problem, because they will simply not send these notifications. In that case, there is no requirement that the original Initiator re-authenticate. 5. Security Considerations The AUTH_LIFETIME notification sent by the Responder does not override any security policy on the Initiator. In particular, the Initiator MAY have a different policy regarding re-authentication, requiring more frequent re-authentication. Such an Initiator can repeat the authentication earlier then is required by the notification. An Initiator MAY set reasonable limits on the amount of time in the AUTH_LIFETIME notification. For example, in the remote-access scenario, it may be unreasonable for the lifetime to be lower than 300 seconds. 6. References [IKEv2] "Internet Key Exchange (IKEv2) Protocol", draft-ietf-ipsec-ikev2, work in progress. 7. IANA Considerations IANA is asked to assign a notification payload type for the AUTH_LIFETIME notifications from the IKEv2 Notification Payload Types registry. 8. Author's address Yoav Nir Check Point Software Technologies ynir@checkpoint.com Nir [Page 3]