Network Working Group M. Richardson Internet-Draft SSW Expires: August 22, 2002 February 21, 2002 An echo request/reply mechanism for ISAKMP draft-richardson-ipsec-ikeping-00.txt Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http:// www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on August 22, 2002. Copyright Notice Copyright (C) The Internet Society (2002). All Rights Reserved. Richardson Expires August 22, 2002 [Page 1] Internet-Draft ikeping February 2002 Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4 2. Specification . . . . . . . . . . . . . . . . . . . . . . . 5 2.1 Format . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.1.1 Cookies . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.1.2 Next Payload . . . . . . . . . . . . . . . . . . . . . . . . 5 2.1.3 Major Version . . . . . . . . . . . . . . . . . . . . . . . 6 2.1.4 Minor Version . . . . . . . . . . . . . . . . . . . . . . . 6 2.1.5 Exchange Type . . . . . . . . . . . . . . . . . . . . . . . 6 2.1.6 Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.1.7 Message ID . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.2 Initiator . . . . . . . . . . . . . . . . . . . . . . . . . 6 3. Security Considerations . . . . . . . . . . . . . . . . . . 7 References . . . . . . . . . . . . . . . . . . . . . . . . . 8 Author's Address . . . . . . . . . . . . . . . . . . . . . . 8 Full Copyright Statement . . . . . . . . . . . . . . . . . . 9 Richardson Expires August 22, 2002 [Page 2] Internet-Draft ikeping February 2002 Abstract Bringing up IPsec gateways, clients and end systems is a hard task. One of the basic problems is determining if two peers can even communicate with each other. There are two typical blocks that can occur. They are at the transport and at the keying levels. A failure for IP protocol 50 or 51 is a transport layer issue. This failure is not addressed here. This document describes a diagnostic protocol for transport failures at the keying layer. Specifically it addresses determination of whether or not the ISAKMP port is open. Two new ISAKMP exchange types are defined, ECHOREQUEST and ECHOREPLY. Richardson Expires August 22, 2002 [Page 3] Internet-Draft ikeping February 2002 1. Introduction In complex network configurations, it is often the case that ISAKMP packets do not get through due to firewalls, network address translators, incompatible security settings, and sometimes even due to lack of actual network connectivity. Increasingly paranoid network operators are turning off typical methods of determining reachability - the ICMP Echo Request ([1]) or "ping" packet. It is also not uncommon for a secure host to simply ignore ICMP echo requests. For some time it has been well known that without access to log files at both ends of a IPsec tunnel the chances of successful configuration are low. At the same time, people are building more complicated virtual private networks using IPsec. These are often cross-organizational. A single administrator seldom gets access to both sets of log files. When Opportunistic Encryption becomes more prevalent, this will be the norm rather than the exception. Better diagnostics are necessary. Richardson Expires August 22, 2002 [Page 4] Internet-Draft ikeping February 2002 2. Specification This document proposes two new ISAKMP exchange types. (See [2]. These would be: ISAKMP_XCHG_ECHOREQUEST (value TBD-IANA) a request for an echo. ISAKMP_XCHG_ECHOREPLY (value TBD-IANA) a reply to an echo request. 2.1 Format These are minimal length ISAKMP packets, consisting of only the ISAKMP header with no payload. --------------------------------------------------------------------- ISAKMP Echo Request/reply packet format 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ! Initiator ! ! Cookie ! +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ! Responder ! ! Cookie ! +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ! Next Payload ! MjVer ! MnVer ! Exchange Type ! Flags ! +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ! Message ID ! +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ! Length ! +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 1: packet format --------------------------------------------------------------------- 2.1.1 Cookies The cookie fields are arbitrarily set by the initiator and swapped by the recipient in the reply. 2.1.2 Next Payload Next payload is set to 0. Richardson Expires August 22, 2002 [Page 5] Internet-Draft ikeping February 2002 2.1.3 Major Version The Major version field is set to the maximum version supported by the end sending the packet. 2.1.4 Minor Version The Minor version field is set to the maximum version supported by the end sending the packet. 2.1.5 Exchange Type The Exchange type file is set ISAKMP_XCHG_ECHOREQUEST (value TBD- IANA) by the initiator of the echo request. It is set to ISAKMP_XCHG_ECHOREPLY (value TBD-IANA) by the responder. 2.1.6 Flags The Flags field is set to 0. There are no meaningful flags. There is no payload, and if there was, it would not be encrypted. 2.1.7 Message ID The message ID is set by the initiator, and simply repeated by the responder. 2.2 Initiator The initiator of an ISAKMP echo sends a properly formatted datagram under operator control. Often this will not be a full ISAKMP daemon instead a diagnostic utility, but this specification does not make any requirements here. Any node which receives an ISAKMP echo request MAY log it. Repeated echo requests from the same originator SHOULD not cause excessive logging to occur. A node MAY reply to an ISAKMP echo request with an ISAKMP echo reply. An implementation SHOULD rate limit the number of echo replies it sends to approximately 1 per second. A node receiving an ISAKMP echo reply MAY log it. Repeated echo replies from the same originator SHOULD not cause excessive logging to occur. Richardson Expires August 22, 2002 [Page 6] Internet-Draft ikeping February 2002 3. Security Considerations There is a concern that this protocol not be used to perform distributed denial attacks. If responder can be tricked into replying to a broadcast address, it could lead to an explosive multiplicative effect. This protocol is not susceptible to this because there are seperate messages for request and reply. In addition to the above observation, nodes are expected to rate limit all responses. The responding node is asked to put its highest available ISAKMP version number in the reply. This is potentially useful information to an attacker, and implementations MAY choose to lie here. This is not recommended as there are other ways of determining this information. Richardson Expires August 22, 2002 [Page 7] Internet-Draft ikeping February 2002 References [1] Postel, J., "Internet Control Message Protocol", STD 5, RFC 792, September 1981. [2] Maughan, D., Schneider, M. and M. Schertler, "Internet Security Association and Key Management Protocol (ISAKMP)", RFC 2408, November 1998. Author's Address Michael C. Richardson Sandelman Software Works 470 Dawson Avenue Ottawa, ON K1Z 5V7 CA EMail: mcr@sandelman.ottawa.on.ca URI: http://www.sandelman.ottawa.on.ca/ Richardson Expires August 22, 2002 [Page 8] Internet-Draft ikeping February 2002 Full Copyright Statement Copyright (C) The Internet Society (2002). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Acknowledgement Funding for the RFC Editor function is currently provided by the Internet Society. Richardson Expires August 22, 2002 [Page 9]