2.3 Operations of Stub Bank
There are many ways to build stub bank. It can be
independent equipment, or be together with some
servers like AAA server, OMC, etc. Whatever
embodiment of stub bank is, there must be some
way to synchronize stubs with IKE SAs on IPsec
gateway. The protocols to synchronize stubs could
be extension of other protocols (such RADUIS, etc),
or new protocols. In this paper, we implemented a
simple protocol for maintenance of stub. The stubs
will be expired after the corresponding IKE SA is
expired. Another problem is when the stubs should
be synchronized. Basically, when IKE SA is set-up,
re-keyed, expired, or closed, the related stubs must
be synchronized between stub bank and IPsec
gateway. Sometimes, the IKE session may exist for
a long time without re-key, operators can define a
cycle for synchronization. In this paper, the timer of
stub synchronization cycle is set to be half cycle of
the re-key timer. Stub is only valid for one time use.
After successful transaction, the stub will be deleted.
And, new IPsec gateway must update the stub while
IKE SA is re-built.
2.4 Analysis on Applicability in Mobile
Network
As specified in (Devarapalli V., et.al, 2007) and
(Arkko, J., et. al, 2004), IPsec is mandatory to
protect mobile IPv6 (MIPv6) signalling by transport
mode. It’s recommended to use protect traffic by
tunnel mode. IKE SA is set up between mobile node
(MN) and home agent (HA). CHILD SAs are
between home address (HoA) of MN and HA, while
IKE SA is between Care-of Address (CoA) and HA.
When HA, which is also IPsec gateway, fails or
overloads The route of CoA in MN is still available.
It can use CoA to initiate the re-establishment of
IKE SA quickly. After IKE SA is set up, MN can
use build the CHILD SA between HoA and HA by
regular IKEv2 protocol. The solution in this paper
does not rely on HoA of MN. So, unavailability of
HoA route does not hurt its applicability in MIPv6.
Another consideration is handover. MN gets new
CoA in another network after handover. If HA fails
before MIPv6 re-registration and IKE/IPsec SA
update, the new CoA will not be updated in the
network side. However, the solution of this paper
does IKE SAs’ rebuilding and mutual authentication
without the help from CoA as well.
Lastly, mobile network has limited radio
resources, especially in reverse link. When, a big
number of clients want to initiate a procedure at the
same time, the intensive signalling may congest the
reverse link. But, in the solution of this paper, the
extension part of IKE_SA_INIT is quite short: a few
bytes for reference and encrypted reference. It’s has
much low possibility of congestion.
3 EVALUATIONS
3.1 Security Analysis
3.1.1 Mutual Authentication
One of the most important functions of DH
exchange is to authenticate the IKEv2 client and
gateway with each other.
SK_d is keying material of IKE SA for deriving
new keys for CHILD SAs (Kaufman, C., 2005). It is
updated when IKE SA re-key is done. Mutual
authentication in this paper is done based on SK_d.
While client initiates IKE_SA_INIT with extensions,
it must encrypt the stub reference in SK{} by SK_d.
Gateway can authenticate the client by decrypting
SK{} content using SK_d in the stub and comparing
it to [REF] provided by client. In order to be
authenticated by clients, gateway needs to enclose
encrypted IDr and Nr in SK{} by the newly
generated keying materials as defined in (2). Then,
client will derive new keys and decrypt SK{} from
new gateway. Finally, it can authenticate the
gateway by comparing decrypted information to the
corresponding part in the message.
Operator may want to refresh key material before
IKE SA re-establishment. In this case, client can
generate a temporary key (say SK_dt) for mutual
authentication as (3). The information of SK_d_old,
SPIi and SPIr can be found in stub. Ni is generated
by client for refreshment of key materials.
)||,__(
}_|_|_|_|_{
SPIrSPIiNiolddSKprf
erSKeiSKarSKaiSKdtSK
+=
(3)
3.1.2 Deny-of-Service (DoS) Attack
While new IPsec gateway fails/overloads, there may
have a big number of clients try to initiate the IKE
SA re-establishment at the same time. The gateway
may treat this situation as Deny-of-Service (DoS)
attack. This paper borrows the cookie mechanism of
IKEv2 protocol with some extensions.
As shown in
Figure 5, if new gateway finds
potential risk of DoS attack, it will respond the
message with cookie.
SECRYPT 2009 - International Conference on Security and Cryptography
114