Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks (RFC8019)

IP.com Disclosure Number: IPCOM000248337D
Original Publication Date: 2016-Nov-01
Included in the Prior Art Database: 2016-Nov-17
Document File: 64 page(s) / 78K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

Y. Nir: AUTHOR [+2]

Abstract

Denial-of-Service (DoS) attacks have always been considered a serious threat. These attacks are usually difficult to defend against since the amount of resources the victim has is always bounded (regardless of how high it is) and because some resources are required for distinguishing a legitimate session from an attack.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 4% of the total text.

Internet Engineering Task Force (IETF)                            Y. Nir Request for Comments: 8019                                   Check Point Category: Standards Track                                     V. Smyslov ISSN: 2070-1721                                               ELVIS-PLUS                                                            November 2016

       Protecting Internet Key Exchange Protocol Version 2 (IKEv2)        Implementations from Distributed Denial-of-Service Attacks

Abstract

   This document recommends implementation and configuration best    practices for Internet Key Exchange Protocol version 2 (IKEv2)    Responders, to allow them to resist Denial-of-Service and Distributed    Denial-of-Service attacks.  Additionally, the document introduces a    new mechanism called "Client Puzzles" that helps accomplish this    task.

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force    (IETF).  It represents the consensus of the IETF community.  It has    received public review and has been approved for publication by the    Internet Engineering Steering Group (IESG).  Further information on    Internet Standards is available in Section 2 of RFC 7841.

   Information about the current status of this document, any errata,    and how to provide feedback on it may be obtained at    http://www.rfc-editor.org/info/rfc8019.

Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the    document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal    Provisions Relating to IETF Documents    (http://trustee.ietf.org/license-info) in effect on the date of    publication of this document.  Please review these documents    carefully, as they describe your rights and restrictions with respect    to this document.  Code Components extracted from this document must    include Simplified BSD License text as described in Section 4.e of    the Trust Legal Provisions and are provided without warranty as    described in the Simplified BSD License.

 Nir & Smyslov                Standards Track                    [Page 1]
 RFC 8019                DDoS Protection for IKEv2          November 2016

 Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3

   2.  Conventions Used in This Document . . . . . . . . . . . . . .   3

   3.  The Vulnerability . . . . . . . . . . . . . . . . . . . . . .   3

   4.  Defense Measures While the IKE SA Is Being Created  . . . . .   6

     4.1.  Retention Per...